Re: [v6ops] draft-ietf-v6ops-balanced-ipv6-security WGLC

Ray Hunter <v6ops@globis.net> Wed, 20 November 2013 10:01 UTC

Return-Path: <v6ops@globis.net>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CA7971AE054 for <v6ops@ietfa.amsl.com>; Wed, 20 Nov 2013 02:01:39 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.121
X-Spam-Level:
X-Spam-Status: No, score=-1.121 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Em8IfkH3hbBk for <v6ops@ietfa.amsl.com>; Wed, 20 Nov 2013 02:01:38 -0800 (PST)
Received: from globis01.globis.net (RayH-1-pt.tunnel.tserv11.ams1.ipv6.he.net [IPv6:2001:470:1f14:62e::2]) by ietfa.amsl.com (Postfix) with ESMTP id 51D891AD8F2 for <v6ops@ietf.org>; Wed, 20 Nov 2013 02:01:38 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by globis01.globis.net (Postfix) with ESMTP id D3E2E870071; Wed, 20 Nov 2013 11:01:29 +0100 (CET)
Received: from globis01.globis.net ([127.0.0.1]) by localhost (mail.globis.net [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cx-fIiHRiOT6; Wed, 20 Nov 2013 11:01:29 +0100 (CET)
Received: from Rays-iMac-2.local (unknown [192.168.0.3]) (Authenticated sender: Ray.Hunter@globis.net) by globis01.globis.net (Postfix) with ESMTPA id AE5DF870040; Wed, 20 Nov 2013 11:01:29 +0100 (CET)
Message-ID: <528C8878.4090808@globis.net>
Date: Wed, 20 Nov 2013 11:01:28 +0100
From: Ray Hunter <v6ops@globis.net>
User-Agent: Postbox 3.0.8 (Macintosh/20130427)
MIME-Version: 1.0
To: Lorenzo Colitti <lorenzo@google.com>
References: <201311101900.rAAJ0AR6025350@irp-view13.cisco.com> <CAB0C4xOfz_JAjEEJZ-Zz7MBEyZhVzrAE+8Ghf1ggC3+9pyHmNg@mail.gmail.com> <989B8ED6-273E-45D4-BFD8-66A1793A1C9F@cisco.com> <5288FC15.5080508@globis.net> <CAKD1Yr1gQ8r80NxbJwxbNc8esm1ekk1JGMUoQo712CpvLJ8ogw@mail.gmail.com> <528C6E76.1010704@globis.net> <CAKD1Yr3Jfv+4+_KYHzkDP=Sm2-5jvDs_V32wrJ74YY_gZi-3AQ@mail.gmail.com>
In-Reply-To: <CAKD1Yr3Jfv+4+_KYHzkDP=Sm2-5jvDs_V32wrJ74YY_gZi-3AQ@mail.gmail.com>
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit
Cc: "v6ops@ietf.org WG" <v6ops@ietf.org>
Subject: Re: [v6ops] draft-ietf-v6ops-balanced-ipv6-security WGLC
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Nov 2013 10:01:40 -0000

> Lorenzo Colitti <mailto:lorenzo@google.com>
> 20 November 2013 09:14
>
> Er... which is what this draft says?
>
> These are an example set of generic rules to be applied. Each would
> normally be configurable, either by the user directly or on behalf of
> the user by a subscription service.
>
So what does the draft really say?

Here's some filtering rules, that you may or may not like, which may or
may not be overridden, which may change over time, which only mitigate a
very limited number of threats, and maybe the ISP will manage the
security policy but maybe the end user wants to take this responsibility
......

Where's the evidence to say that this approach is any better than an
open security policy of "allow everything bi-directionally" ?

The threats are listed in the draft as:

   o  denial of service by packet flooding: overwhelming either the
      access bandwidth or the bandwidth of a slower link in the
      residential network (like a slow home automation network) or the
      CPU power of a slow IPv6 host (like networked thermostat or any
      other sensor type nodes);

not covered.

   o  denial of service by Neighbor Discovery cache exhaustion
      [RFC6583]: the outside attacker floods the inside prefix(es) with
      packets with a random destination address forcing the CPE to
      exhaust its memory and its CPU in useless Neighbor Solicitations;

not covered.

   o  denial of service by service requests: like sending print jobs
      from the Internet to an ink jet printer until the ink cartridge is
      empty or like filing some file server with junk data;

not covered.e.g. port 515

   o  unauthorized use of services: like accessing a webcam or a file
      server which are open to anonymous access within the residential
      network but should not be accessed from outside of the home
      network or accessing to remote desktop or SSH with weak password
      protection;

not covered. e.g. port 8080.

   o  exploiting a vulnerability in the host in order to get access to
      data or to execute some arbitrary code in the attacked host such
      as several against old versions of Windows;

not covered.

   o  trojanized host (belonging to a Botnet) can communicate via a
      covert channel to its master and launch attacks to Internet
      targets.

not covered.

And in the Security section, the draft only addresses "Unauthorized
access because vulnerable ports are blocked" ?

IMHO this threat is anyway blocked by machine firewalls running on every
modern OS shipping today (any device that is likely to support IPv6)

-- 
Regards,
RayH