[v6ops] Document Action: 'Routing Loop Attack using IPv6 Automatic Tunnels: Problem Statement and Proposed Mitigations' to Informational RFC (draft-ietf-v6ops-tunnel-loops-07.txt)

The IESG <iesg-secretary@ietf.org> Fri, 20 May 2011 23:37 UTC

Return-Path: <iesg-secretary@ietf.org>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C186BE0740; Fri, 20 May 2011 16:37:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.244
X-Spam-Level:
X-Spam-Status: No, score=-102.244 tagged_above=-999 required=5 tests=[AWL=-0.245, BAYES_00=-2.599, J_CHICKENPOX_13=0.6, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id h+ye-YRW-OUQ; Fri, 20 May 2011 16:37:55 -0700 (PDT)
Received: from ietfa.amsl.com (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2E331E0772; Fri, 20 May 2011 16:37:55 -0700 (PDT)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce <ietf-announce@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 3.54
Message-ID: <20110520233755.12486.96637.idtracker@ietfa.amsl.com>
Date: Fri, 20 May 2011 16:37:55 -0700
Cc: v6ops mailing list <v6ops@ietf.org>, v6ops chair <v6ops-chairs@tools.ietf.org>, RFC Editor <rfc-editor@rfc-editor.org>
Subject: [v6ops] Document Action: 'Routing Loop Attack using IPv6 Automatic Tunnels: Problem Statement and Proposed Mitigations' to Informational RFC (draft-ietf-v6ops-tunnel-loops-07.txt)
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/v6ops>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 May 2011 23:37:55 -0000

The IESG has approved the following document:
- 'Routing Loop Attack using IPv6 Automatic Tunnels: Problem Statement
   and Proposed Mitigations'
  (draft-ietf-v6ops-tunnel-loops-07.txt) as an Informational RFC

This document is the product of the IPv6 Operations Working Group.

The IESG contact persons are Ron Bonica and Dan Romascanu.

A URL of this Internet Draft is:
http://datatracker.ietf.org/doc/draft-ietf-v6ops-tunnel-loops/




Technical Summary

   This document is concerned with security vulnerabilities in IPv6-in-
   IPv4 automatic tunnels.  These vulnerabilities allow an attacker to
   take advantage of inconsistencies between the IPv4 routing state and
   the IPv6 routing state.  The attack forms a routing loop which can be
   abused as a vehicle for traffic amplification to facilitate DoS
   attacks.  The first aim of this document is to inform on this attack
   and its root causes.  The second aim is to present some possible
   mitigation measures.

Working Group Summary

   The initial version of the document was published 10/20/09.
   Subsequent to IETF 78 the document was accepted as a working group
   document. Last call was completed on 10/12/10.

Document Quality

   This work has benefited from discussions on the V6OPS, 6MAN and
   SECDIR mailing lists.  Remi Despres, Christian Huitema, Dmitry
   Anipko, Dave Thaler and Fernando Gont are acknowledged for their
   contributions.

Personnel

Joel Jaegli is documet sheperd.