RE: Some suggestions for draft-ietf-v6ops-cpe-simple-security-03

"Dan Wing" <dwing@cisco.com> Tue, 26 August 2008 17:23 UTC

Return-Path: <owner-v6ops@ops.ietf.org>
X-Original-To: ietfarch-v6ops-archive@core3.amsl.com
Delivered-To: ietfarch-v6ops-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 05CA128C1E9 for <ietfarch-v6ops-archive@core3.amsl.com>; Tue, 26 Aug 2008 10:23:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.263
X-Spam-Level:
X-Spam-Status: No, score=-4.263 tagged_above=-999 required=5 tests=[AWL=0.232, BAYES_00=-2.599, FH_RELAY_NODNS=1.451, HELO_MISMATCH_COM=0.553, RCVD_IN_DNSWL_MED=-4, RDNS_NONE=0.1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3F+pSqroIqYB for <ietfarch-v6ops-archive@core3.amsl.com>; Tue, 26 Aug 2008 10:23:54 -0700 (PDT)
Received: from psg.com (psg.com [IPv6:2001:418:1::62]) by core3.amsl.com (Postfix) with ESMTP id 0D04E28C1DF for <v6ops-archive@lists.ietf.org>; Tue, 26 Aug 2008 10:23:54 -0700 (PDT)
Received: from majordom by psg.com with local (Exim 4.69 (FreeBSD)) (envelope-from <owner-v6ops@ops.ietf.org>) id 1KY2CC-0001E7-V1 for v6ops-data@psg.com; Tue, 26 Aug 2008 17:19:08 +0000
Received: from [171.71.176.117] (helo=sj-iport-6.cisco.com) by psg.com with esmtps (TLSv1:RC4-SHA:128) (Exim 4.69 (FreeBSD)) (envelope-from <dwing@cisco.com>) id 1KY2C7-0001D3-SJ for v6ops@ops.ietf.org; Tue, 26 Aug 2008 17:19:06 +0000
X-IronPort-AV: E=Sophos;i="4.32,271,1217808000"; d="scan'208";a="146862677"
Received: from sj-dkim-1.cisco.com ([171.71.179.21]) by sj-iport-6.cisco.com with ESMTP; 26 Aug 2008 17:18:58 +0000
Received: from sj-core-5.cisco.com (sj-core-5.cisco.com [171.71.177.238]) by sj-dkim-1.cisco.com (8.12.11/8.12.11) with ESMTP id m7QHIwZv021803; Tue, 26 Aug 2008 10:18:58 -0700
Received: from dwingwxp01 ([10.32.240.194]) by sj-core-5.cisco.com (8.13.8/8.13.8) with ESMTP id m7QHIwWl029036; Tue, 26 Aug 2008 17:18:58 GMT
From: Dan Wing <dwing@cisco.com>
To: 'Gert Doering' <gert@space.net>
Cc: 'Truman Boyes' <truman@suspicious.org>, 'Brian E Carpenter' <brian.e.carpenter@gmail.com>, 'Mark Smith' <ipng@69706e6720323030352d30312d31340a.nosense.org>, jhw@apple.com, 'IPv6 Operations' <v6ops@ops.ietf.org>
References: <01af01c9065b$b4602440$c2f0200a@cisco.com> <48B23391.1090503@gmail.com> <01cd01c90672$a57c8790$c2f0200a@cisco.com> <48B31DA3.6080001@gmail.com> <07d201c906f7$50a85e30$c2f0200a@cisco.com> <48B32B43.5010103@gmail.com> <084c01c906fe$f9bf1840$c2f0200a@cisco.com> <48B33430.40704@gmail.com> <A31EB889-2BD9-4283-A408-AB6DCC1D568A@suspicious.org> <08be01c90712$d876cd40$c2f0200a@cisco.com> <20080826114919.GN19694@Space.Net>
Subject: RE: Some suggestions for draft-ietf-v6ops-cpe-simple-security-03
Date: Tue, 26 Aug 2008 10:18:58 -0700
Message-ID: <011f01c9079f$d3971c20$c2f0200a@cisco.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Office Outlook 11
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3198
thread-index: AckHccoX1Us6jo0tRJ++H0vqba9JEgALcnhw
In-Reply-To: <20080826114919.GN19694@Space.Net>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; l=1551; t=1219771138; x=1220635138; c=relaxed/simple; s=sjdkim1004; h=Content-Type:From:Subject:Content-Transfer-Encoding:MIME-Version; d=cisco.com; i=dwing@cisco.com; z=From:=20=22Dan=20Wing=22=20<dwing@cisco.com> |Subject:=20RE=3A=20Some=20suggestions=20for=20draft-ietf-v 6ops-cpe-simple-security-03 |Sender:=20; bh=SVcn62NMc8o5MjKvEmvgQFztgCuLMA+gQp+IGdJIwCg=; b=XDpo+lbXXC8DBNULu9kKFOaRBjYg3GZNZEVeLzpgz4HabszDrr/2mECnUC 03AgLj0724MIgEFPfHtwRkrjcKDTagWqjtVEyvH/vnXZnKn3jJfYkfOL2vxM X/RZ41/CHH/6Eo5DZNRKfd4f97Ugsbg/MbYkIIo6gCIkWQbVRRU9o=;
Authentication-Results: sj-dkim-1; header.From=dwing@cisco.com; dkim=pass ( sig from cisco.com/sjdkim1004 verified; );
Sender: owner-v6ops@ops.ietf.org
Precedence: bulk
List-ID: <v6ops.ops.ietf.org>

 

> -----Original Message-----
> From: Gert Doering [mailto:gert@space.net] 
> Sent: Tuesday, August 26, 2008 4:49 AM
> To: Dan Wing
> Cc: 'Truman Boyes'; 'Brian E Carpenter'; 'Mark Smith'; 
> jhw@apple.com; 'IPv6 Operations'
> Subject: Re: Some suggestions for 
> draft-ietf-v6ops-cpe-simple-security-03
> 
> Hi,
> 
> On Mon, Aug 25, 2008 at 05:29:47PM -0700, Dan Wing wrote:
> > Internalt to external is permitted, by default, in the 
> current document.
> > 
> > We are discussing external to internal.  
> 
> What is "internal to external" is inevitably "external to internal" to
> someone else.
> 
> How do you solve "tunneling is permitted if solicited from 
> the inside" for the
> 
>   Host A --- CPE A ----[Internet]---- CBE B --- Host B
> 
> case?

The host (A and/or B) have to tell the CPE that they want the communication
to occur.

Let me ask the question the other way:  how do you prevent a mis-configured
application on Host A or Host B from being accessed from the Internet?  It is
my understanding such protection ('simple security') is the primary goal of
this working group document.

-d


> Gert Doering
>         -- NetMaster
> -- 
> Total number of prefixes smaller than registry allocations:  128645
> 
> SpaceNet AG                        Vorstand: Sebastian v. Bomhard
> Joseph-Dollinger-Bogen 14          Aufsichtsratsvors.: A. 
> Grundner-Culemann
> D-80807 Muenchen                   HRB: 136055 (AG Muenchen)
> Tel: +49 (89) 32356-444            USt-IdNr.: DE813185279