Re: SECDIR review: draft-ietf-v6ops-tunnel-concerns

Nathan Ward <v6ops@daork.net> Fri, 09 January 2009 04:52 UTC

Return-Path: <owner-v6ops@ops.ietf.org>
X-Original-To: ietfarch-v6ops-archive@core3.amsl.com
Delivered-To: ietfarch-v6ops-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 949D73A6B03 for <ietfarch-v6ops-archive@core3.amsl.com>; Thu, 8 Jan 2009 20:52:44 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.824
X-Spam-Level:
X-Spam-Status: No, score=-3.824 tagged_above=-999 required=5 tests=[AWL=-2.776, BAYES_00=-2.599, FH_RELAY_NODNS=1.451, RDNS_NONE=0.1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Cdr4nM-B+hPk for <ietfarch-v6ops-archive@core3.amsl.com>; Thu, 8 Jan 2009 20:52:43 -0800 (PST)
Received: from psg.com (psg.com [IPv6:2001:418:1::62]) by core3.amsl.com (Postfix) with ESMTP id 7EE383A6909 for <v6ops-archive@lists.ietf.org>; Thu, 8 Jan 2009 20:52:43 -0800 (PST)
Received: from majordom by psg.com with local (Exim 4.69 (FreeBSD)) (envelope-from <owner-v6ops@ops.ietf.org>) id 1LL9GV-0005uu-SX for v6ops-data0@psg.com; Fri, 09 Jan 2009 04:46:35 +0000
Received: from [202.50.176.161] (helo=unobtainium.braintrust.co.nz) by psg.com with esmtp (Exim 4.69 (FreeBSD)) (envelope-from <v6ops@daork.net>) id 1LL9GN-0005ue-HC for v6ops@ops.ietf.org; Fri, 09 Jan 2009 04:46:29 +0000
Received: from [192.168.0.51] (ip-118-90-105-213.xdsl.xnet.co.nz [118.90.105.213]) by unobtainium.braintrust.co.nz (Postfix) with ESMTP id E25F227521; Fri, 9 Jan 2009 17:46:22 +1300 (NZDT)
Cc: Suresh Krishnan <suresh.krishnan@ericsson.com>, Christian Huitema <huitema@windows.microsoft.com>, Kurt Zeilenga <Kurt.Zeilenga@Isode.com>, Pasi Eronen <Pasi.Eronen@nokia.com>, Tim Polk <tim.polk@nist.gov>, "secdir@mit.edu" <secdir@mit.edu>, "Jim_Hoagland@symantec.com" <Jim_Hoagland@symantec.com>, Dave Thaler <dthaler@windows.microsoft.com>, "v6ops@ops.ietf.org" <v6ops@ops.ietf.org>
Message-Id: <4D50A24E-E6AD-4096-895B-E4084EBEFB19@daork.net>
From: Nathan Ward <v6ops@daork.net>
To: Brian E Carpenter <brian.e.carpenter@gmail.com>
In-Reply-To: <48FF8AEC.9060708@gmail.com>
Content-Type: text/plain; charset="US-ASCII"; format="flowed"; delsp="yes"
Content-Transfer-Encoding: 7bit
Mime-Version: 1.0 (Apple Message framework v929.2)
Subject: Re: SECDIR review: draft-ietf-v6ops-tunnel-concerns
Date: Fri, 09 Jan 2009 17:46:22 +1300
References: <8B128AB2-BBD9-49B9-A837-F00DD80BF5D3@Isode.com> <48F2C29B.8090900@ericsson.com> <D6947E23-5209-4767-882A-7EBA645B3DCB@daork.net> <48F8EE0D.4060307@ericsson.com> <48FB9A79.8040407@gmail.com> <8EFB68EAE061884A8517F2A755E8B60A134A70E895@NA-EXMSG-W601.wingroup.windeploy.ntdev.microsoft.com> <48FDFBCB.1090508@ericsson.com> <48FE4681.4070006@gmail.com> <5333EA69-337F-4373-A247-1852B61D96C0@daork.net> <48FF8AEC.9060708@gmail.com>
X-Mailer: Apple Mail (2.929.2)
Sender: owner-v6ops@ops.ietf.org
Precedence: bulk
List-ID: <v6ops.ops.ietf.org>

On 23/10/2008, at 9:19 AM, Brian E Carpenter wrote:

> As far as I can see, there's a general problem in attempting
> to detect and block Teredo packets (I mean UDP/IPv4 packets
> in Teredo format). But it seems to me that by running an
> internal Teredo server, a site is much better placed to
> track and trace Teredo users. This is important as Teredo
> users really need to be running an IPv6-savvy host firewall.

Nope, as remote Teredo relays and hosts will send traffic directly. I  
do not believe that it is not possible to restrict Teredo to a certain  
domain.

Perhaps if the local Teredo server tells the local Teredo aware  
firewall what UDP ports on each IPv4 /32 are used for an address, then  
the firewall could inspect packets, but there are no such products  
currently.

You also have to force end hosts to use that Teredo server. It's not  
immediately clear to me how you would do that.

If you're in a position to operate a Teredo server in an end site  
organisation, you are better off doing ISATAP. That is what it is  
designed for.

>>> I agree with you that there are real threats (or will be, once
>>> there is enough deployment to make IPv6 tunnels an interesting
>>> target). It's quite appropriate to document them.
>>
>>
>> I need to preface these remarks by say that I haven't read the  
>> document
>> apart from a quick skim read, so sorry if I'm saying something that's
>> already in there, or is not relevant.
>>
>> I think it's important to distinguish between tunnels that end users'
>> systems create automatically (ala 6to4, Teredo in Vista), and tunnels
>> that end users create to work around firewalls.
>>
>> The former is easy to document solutions for, in fact, it seems to me
>> that any tunnelling protocol RFC should include details as to how a
>> network administrator can prevent these protocols passing through  
>> their
>> network. For Teredo this means blocking port 3544/3545. For 6to4 this
>> means blocking protocol 41 (preferably returning ICMPv6 messages
>> encapsulated in 6to4 so the the application is told about it..).  
>> This is
>> more about blocking things that do not work or perform poorly in a
>> certain environment, rather than trying to secure a network.
>>
>> The latter is not so easy, and I think this document should simply  
>> point
>> out that the only way to really do this is to completely control  
>> the end
>> users' machines, and not allow any third party software or  
>> configuration
>> changes. Anything else is instilling a false sense of security in the
>> minds of network administrators who perhaps are not as fluent in  
>> these
>> things as we are.
>
> Yes, but there are plenty of environments where that's impossible,
> and default deny is unacceptable because it blocks legitimate usage.
> I think the document needs to steer between the extremes, and suggest
> scenarios that are reasonably safe.


This is the security trade-off, and is up to the security people of  
each organisation I suppose. I don't think we can say what is or is  
not acceptable.

Most organisations where I have been employed have used default deny,  
and required the use of an HTTP proxy. That worked fine for 99% of  
people, and the few of us who had different requirements had special  
ethernet ports, etc.

I am very concerned about the direction we're heading in with firewall  
type stuff if we're requiring security people in organisations to  
understand (fairly) complex protocols like Teredo. I have a hard  
enough time explaining this to people who have worked in IP networking  
for a long time. An excellent example of this is Brian's comments in  
the first part of this email.

Because of this, I feel that this document should list several  
options, and state that the only way to be sure is the default deny,  
option unless you *really* understand the protocols and can prove it.

--
Nathan Ward