Re: SECDIR review: draft-ietf-v6ops-tunnel-concerns

Nathan Ward <v6ops@daork.net> Fri, 09 January 2009 22:46 UTC

Return-Path: <owner-v6ops@ops.ietf.org>
X-Original-To: ietfarch-v6ops-archive@core3.amsl.com
Delivered-To: ietfarch-v6ops-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 7438A3A6864 for <ietfarch-v6ops-archive@core3.amsl.com>; Fri, 9 Jan 2009 14:46:16 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.898
X-Spam-Level:
X-Spam-Status: No, score=-2.898 tagged_above=-999 required=5 tests=[AWL=-1.850, BAYES_00=-2.599, FH_RELAY_NODNS=1.451, RDNS_NONE=0.1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7VIXmFs5VkOT for <ietfarch-v6ops-archive@core3.amsl.com>; Fri, 9 Jan 2009 14:46:15 -0800 (PST)
Received: from psg.com (psg.com [IPv6:2001:418:1::62]) by core3.amsl.com (Postfix) with ESMTP id 5E8B73A68DF for <v6ops-archive@lists.ietf.org>; Fri, 9 Jan 2009 14:46:14 -0800 (PST)
Received: from majordom by psg.com with local (Exim 4.69 (FreeBSD)) (envelope-from <owner-v6ops@ops.ietf.org>) id 1LLQ5I-0005bh-GB for v6ops-data0@psg.com; Fri, 09 Jan 2009 22:44:08 +0000
Received: from [202.50.176.161] (helo=unobtainium.braintrust.co.nz) by psg.com with esmtp (Exim 4.69 (FreeBSD)) (envelope-from <v6ops@daork.net>) id 1LLQ5C-0005bE-UV for v6ops@ops.ietf.org; Fri, 09 Jan 2009 22:44:05 +0000
Received: from [192.168.0.51] (ip-118-90-105-213.xdsl.xnet.co.nz [118.90.105.213]) by unobtainium.braintrust.co.nz (Postfix) with ESMTP id D6929271CC; Sat, 10 Jan 2009 11:43:58 +1300 (NZDT)
Cc: Suresh Krishnan <suresh.krishnan@ericsson.com>, Christian Huitema <huitema@windows.microsoft.com>, Kurt Zeilenga <Kurt.Zeilenga@Isode.com>, Pasi Eronen <Pasi.Eronen@nokia.com>, Tim Polk <tim.polk@nist.gov>, "secdir@mit.edu" <secdir@mit.edu>, "Jim_Hoagland@symantec.com" <Jim_Hoagland@symantec.com>, Dave Thaler <dthaler@windows.microsoft.com>, "v6ops@ops.ietf.org" <v6ops@ops.ietf.org>
Message-Id: <8AAA7487-A80F-41CE-92C5-F8E189D5D3B1@daork.net>
From: Nathan Ward <v6ops@daork.net>
To: Brian E Carpenter <brian.e.carpenter@gmail.com>
In-Reply-To: <4967C803.7060803@gmail.com>
Content-Type: text/plain; charset="US-ASCII"; format="flowed"; delsp="yes"
Content-Transfer-Encoding: 7bit
Mime-Version: 1.0 (Apple Message framework v929.2)
Subject: Re: SECDIR review: draft-ietf-v6ops-tunnel-concerns
Date: Sat, 10 Jan 2009 11:43:57 +1300
References: <8B128AB2-BBD9-49B9-A837-F00DD80BF5D3@Isode.com> <48F2C29B.8090900@ericsson.com> <D6947E23-5209-4767-882A-7EBA645B3DCB@daork.net> <48F8EE0D.4060307@ericsson.com> <48FB9A79.8040407@gmail.com> <8EFB68EAE061884A8517F2A755E8B60A134A70E895@NA-EXMSG-W601.wingroup.windeploy.ntdev.microsoft.com> <48FDFBCB.1090508@ericsson.com> <48FE4681.4070006@gmail.com> <5333EA69-337F-4373-A247-1852B61D96C0@daork.net> <48FF8AEC.9060708@gmail.com> <4D50A24E-E6AD-4096-895B-E4084EBEFB19@daork.net> <4967C803.7060803@gmail.com>
X-Mailer: Apple Mail (2.929.2)
Sender: owner-v6ops@ops.ietf.org
Precedence: bulk
List-ID: <v6ops.ops.ietf.org>

On 10/01/2009, at 10:56 AM, Brian E Carpenter wrote:

> On 2009-01-09 17:46, Nathan Ward wrote:
>> On 23/10/2008, at 9:19 AM, Brian E Carpenter wrote:
>>
>>> As far as I can see, there's a general problem in attempting
>>> to detect and block Teredo packets (I mean UDP/IPv4 packets
>>> in Teredo format). But it seems to me that by running an
>>> internal Teredo server, a site is much better placed to
>>> track and trace Teredo users. This is important as Teredo
>>> users really need to be running an IPv6-savvy host firewall.
>>
>> Nope, as remote Teredo relays and hosts will send traffic directly.  
>> I do
>> not believe that it is not possible to restrict Teredo to a certain  
>> domain.
>
> No, and that's not what I meant to suggest. I meant that by operating
> a local Teredo server, the local management can find out who is  
> actively
> using Teredo and ensure that they are adequately protected at the host
> level. It certainly isn't reasonable to expect a site firewall to be
> doing the necessary deep packet inspection.

Seems feasible. The Teredo server could do some sort of look-up before  
responding. If they do not respond the interface will not come up.

>> Perhaps if the local Teredo server tells the local Teredo aware  
>> firewall
>> what UDP ports on each IPv4 /32 are used for an address, then the
>> firewall could inspect packets, but there are no such products  
>> currently.
>>
>> You also have to force end hosts to use that Teredo server. It's not
>> immediately clear to me how you would do that.
>
> Quoting you out of context:
>
> "  Alternatively, a network may force customers to use its Teredo
>   servers by 'spoofing' DNS names or IPv4 addresses. "
>
> Were you planning to follow up on draft-nward-v6ops-teredo-server- 
> selection-00?

Yes. I am at this minute looking at flights to SFO for IETF74, and if  
that is financially do-able then I'll update it and present it there.

Few people seemed to be interested when I explained electronically, in  
person has worked better with various people since then, so in person  
will do well I'm sure.

>> If you're in a position to operate a Teredo server in an end site
>> organisation, you are better off doing ISATAP. That is what it is
>> designed for.
>
> Yes, but my concern was more about users who are spontaneously using
> Teredo. The above type of spoofing is a way to find them,
> however unpleasant it may be.

If they are spontaneously using Teredo (I assume by spontaneously, you  
mean automatically ala Vista etc. ?) then they are going to try ISATAP  
first. As ISATAP gives you unencapsulated traffic on your border  
router (or between your border and ISATAP routers if they are  
separate, etc. etc.) this seems like a better option, to me.

I suppose this depends whether you want to control security at the  
border, or at the host.

Hmm, it's probably worth noting that I'm talking about Windows hosts  
here. Linux hosts with a Teredo stack installed will not try ISATAP  
first.

Of course, if the local management have sufficient access to the host  
to secure it (as you suggest in the first part of the email), they  
have sufficient access to simply disable Teredo - either by having the  
host part of a Windows domain, or by pushing the right bits in to the  
registry. This seems to me to be a superior strategy.

--
Nathan Ward