Re: [v6ops] draft-ietf-v6ops-balanced-ipv6-security WGLC

"Fred Baker (fred)" <fred@cisco.com> Wed, 13 November 2013 16:46 UTC

Return-Path: <fred@cisco.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8663D21E8082 for <v6ops@ietfa.amsl.com>; Wed, 13 Nov 2013 08:46:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -110.468
X-Spam-Level:
X-Spam-Status: No, score=-110.468 tagged_above=-999 required=5 tests=[AWL=0.131, BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LLnYhJ7M7z37 for <v6ops@ietfa.amsl.com>; Wed, 13 Nov 2013 08:46:39 -0800 (PST)
Received: from rcdn-iport-3.cisco.com (rcdn-iport-3.cisco.com [173.37.86.74]) by ietfa.amsl.com (Postfix) with ESMTP id 9E59911E8119 for <v6ops@ietf.org>; Wed, 13 Nov 2013 08:46:39 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=2528; q=dns/txt; s=iport; t=1384361199; x=1385570799; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=TPidxzKdHymFExu5EnWrmkcVVtko2sg3US3G4sFHTgU=; b=Zaew2L2gKfsGQe7StcT+YkypikhSuFGl80kPvL1gxe6su4BBqUs6AMM6 EAa2lHvvngdVBByOh2zcEo9JrG0BdAEgmpS6MvfH6HfunzCwOMkymLcCB l9p07xA81YJD0vv6/qdRvrEyl3qkf5X409tMOtGrLbhbaJ9aF/6EKgT6Q M=;
X-Files: signature.asc : 195
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AgsFAK+rg1KtJXG8/2dsb2JhbABbgwc4U78ogSMWdIIlAQEBAwFlFAULAgEIRjIlAgQOBQ6HbQbAJY9fB4MggREDkDCBMIYwkguDKIIq
X-IronPort-AV: E=Sophos; i="4.93,693,1378857600"; d="asc'?scan'208"; a="284342836"
Received: from rcdn-core2-1.cisco.com ([173.37.113.188]) by rcdn-iport-3.cisco.com with ESMTP; 13 Nov 2013 16:46:39 +0000
Received: from xhc-rcd-x09.cisco.com (xhc-rcd-x09.cisco.com [173.37.183.83]) by rcdn-core2-1.cisco.com (8.14.5/8.14.5) with ESMTP id rADGkddo014856 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Wed, 13 Nov 2013 16:46:39 GMT
Received: from xmb-rcd-x09.cisco.com ([169.254.9.122]) by xhc-rcd-x09.cisco.com ([173.37.183.83]) with mapi id 14.03.0123.003; Wed, 13 Nov 2013 10:46:38 -0600
From: "Fred Baker (fred)" <fred@cisco.com>
To: Tarko Tikan <tarko@lanparty.ee>
Thread-Topic: [v6ops] draft-ietf-v6ops-balanced-ipv6-security WGLC
Thread-Index: AQHO4I/sAG11bn7zoUqMRCwrKgQsrA==
Date: Wed, 13 Nov 2013 16:46:38 +0000
Message-ID: <6FE564A3-7FD9-4E17-9910-5B08B9FCA2EF@cisco.com>
References: <201311101900.rAAJ0AR6025350@irp-view13.cisco.com> <CAB0C4xOfz_JAjEEJZ-Zz7MBEyZhVzrAE+8Ghf1ggC3+9pyHmNg@mail.gmail.com> <989B8ED6-273E-45D4-BFD8-66A1793A1C9F@cisco.com> <52833B8F.10708@lanparty.ee>
In-Reply-To: <52833B8F.10708@lanparty.ee>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
x-originating-ip: [10.19.64.121]
Content-Type: multipart/signed; boundary="Apple-Mail=_822ED0EF-0C28-44D5-A1C0-1349E0C89BE0"; protocol="application/pgp-signature"; micalg="pgp-sha1"
MIME-Version: 1.0
Cc: "<v6ops@ietf.org>" <v6ops@ietf.org>
Subject: Re: [v6ops] draft-ietf-v6ops-balanced-ipv6-security WGLC
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/v6ops>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Nov 2013 16:46:45 -0000

On Nov 13, 2013, at 12:42 AM, Tarko Tikan <tarko@lanparty.ee>
 wrote:

> hey,
> 
>> From my perspective, I think I would prefer that the firewall - if implemented - blocked everything, and applications within the network advised the firewall(s) of traffic that they are willing to receive. If a potential session has no willing counterpart within my network, I don't see the argument for letting the first packet in.
> 
> That would be preferred but as already discussed, there are no suitable protocols (and implementations) for deployment today. And recommending to block all inbound sessions by default is not good idea with IPv6 end2end mentality.
> 
> To improve on the idea - I don't see why application should signal to CPE, firewalling in CPE is useless against ddos attacks. I'd prefer application to signal to edge routers and have firewall there, this way to-be-denied packets never make it to CPE and will not congest AN uplinks.

The action of the application would  be the same, right? If the user has a managed service, one can easily imagine the upstream firewall/router doing this. That simply says where the PCP traffic would go to.

The "IPv6 end2end mentality", I would argue, doesn't come into play here. The phrase "end to end" implies having multiple endpoints. If there is no application in the network prepared to be the receiving end, the sending end can do whatever it likes - there is nobody to talk with. And from a policy perspective, even if there is someone that *could* talk (the HTTP server on my phone, designed for management use), that doesn't imply that I want it to. I'm fine with saying there will be no impedance of traffic that is useful and fits policy. As far as I know, firewalls aren't supposed to block that anyway.