Re: [v6ops] draft-ietf-v6ops-ula-usage-recommendations - work or abandon?

Fernando Gont <fgont@si6networks.com> Sun, 15 November 2015 18:47 UTC

Return-Path: <fgont@si6networks.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C5F3B1A8A42 for <v6ops@ietfa.amsl.com>; Sun, 15 Nov 2015 10:47:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 2.99
X-Spam-Level: **
X-Spam-Status: No, score=2.99 tagged_above=-999 required=5 tests=[BAYES_50=0.8, DATE_IN_PAST_03_06=1.592, J_CHICKENPOX_64=0.6, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id L51N1ZqEWRlv for <v6ops@ietfa.amsl.com>; Sun, 15 Nov 2015 10:47:11 -0800 (PST)
Received: from web01.jbserver.net (web01.jbserver.net [IPv6:2a00:8240:6:a::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BC2581A8A41 for <v6ops@ietf.org>; Sun, 15 Nov 2015 10:47:11 -0800 (PST)
Received: from [198.134.88.215] (helo=[10.252.46.169]) by web01.jbserver.net with esmtpsa (TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128) (Exim 4.86) (envelope-from <fgont@si6networks.com>) id 1Zy2KO-0000Ue-9z; Sun, 15 Nov 2015 19:47:04 +0100
To: Lorenzo Colitti <lorenzo@google.com>
References: <D25D5920.C914E%Lee.Howard@twcable.com> <CAKD1Yr1EqbiGJ8EZo8E909zujUt49skcz1SNe8stEWfHnbUsTw@mail.gmail.com> <CAG6TeAsHMTyhbRrOenb1kA9XEDdOCBBbuN3ZGF3LJ=8ToyGtiQ@mail.gmail.com> <CAKD1Yr3RUc9FEw7VyJ=ENH_sJY85m1BESo77v_maShPvCkj6rA@mail.gmail.com> <CAG6TeAv9DPYUCsNG_vHCTOpwwJ8KdhjWeGE=-s6dEuMgaVHf1g@mail.gmail.com> <CAKD1Yr2VXVFareTk-J_+pcr_UW9Do-zf_uYcyjNW-MTPts6hRQ@mail.gmail.com> <CAG6TeAt2JJJmALy=pJFaojbnZrQRE0e0i-D=XtTce=rmbf08tQ@mail.gmail.com> <CAKD1Yr1H2HgxBNOZBrx-ttoB6z6caLAck3csF=ti6CDUzW57ng@mail.gmail.com> <D267B9E3.5DB8C%evyncke@cisco.com> <CAKD1Yr2zY9qr76f-KO7DTnYXQEmMJ0O6M22nFczfjGfL5Dk=dA@mail.gmail.com> <564537A7.90102@si6networks.com> <CAKD1Yr3dUMEoG-De5YWDFyjGehhxBq-uyN-NSqbYgvinDUy8Wg@mail.gmail.com> <56455ACD.6040804@si6networks.com> <CAKD1Yr0V_8DYOCm_BcB-xjKmCJc6AX25J8QZRE-c0CgYnnUM7g@mail.gmail.com> <CAG6TeAsrKe28qLcKyvjxr57PZaD9KZQTZMd0qPx3+ctLPutDsg@mail.gmail.com> <CAKD1Yr3NxyHd5zgVMjoBepLAkocv_ee+8n5PGW19x4tgY=mggg@mail.gmail.com>
From: Fernando Gont <fgont@si6networks.com>
X-Enigmail-Draft-Status: N1110
Message-ID: <56489030.2010808@si6networks.com>
Date: Sun, 15 Nov 2015 23:01:20 +0900
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.3.0
MIME-Version: 1.0
In-Reply-To: <CAKD1Yr3NxyHd5zgVMjoBepLAkocv_ee+8n5PGW19x4tgY=mggg@mail.gmail.com>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/v6ops/yk96HajBSTNvPPGdZz2ExOF_HbM>
Cc: IPv6 Operations <v6ops@ietf.org>
Subject: Re: [v6ops] draft-ietf-v6ops-ula-usage-recommendations - work or abandon?
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 15 Nov 2015 18:47:13 -0000

On 11/13/2015 08:11 PM, Lorenzo Colitti wrote:
> On Fri, Nov 13, 2015 at 1:15 PM, Fernando Gont
> <fgont@si6networks.com <mailto:fgont@si6networks.com>> wrote:
> 
>> The IP addresses and port numbers could be signaled out of band
>> using another mechanism (NFC, bluetooth, email, smoke signals,
>> well-known ports, whatever).
> 
> And for that signaling you need.... a third party.
> 
> Not for NFC, bluetooth, smoke signals, or well-known ports you
> don't. And even if you do need a third party, there's a huge
> difference between a third party that relays / snoops your traffic
> vs. a third party that just puts the two parties in touch and then
> disappears from the equation.

Could you please elaborate how this would work:

1. A is behind a diode firewall
2. B is behind a diode firewall
3. A initiates a TCP connection with B.




>> As noted, shortcuts in the current in the current architecture should
>> not be interpreted as design principles.. NATs happen to make this
>> very evident. Don't shoot the messenger for this.
> 
> And we come around to the previous argument. The situation is not
> that we are shooting NAT for coming and telling us the architecture
> is broken. The situation is that we are shooting NAT for breaking
> it.

I fully disagree. NAT can be the most evil device ever. But all this
things we've being talking about have to do with an incomplete
architecture that NAT is making evident rather than about a complete
architecture that NAT is breaking.



>> If a network has a policy of only allowing outgoing connections, then
>> any workaround to do that is an attack on that policy. And 
>> making.that workaround more difficult can thus be seen as a feature.
> 
> Such a policy is misguided

Says who? It's the policy that is being enforced. Period.


> because it ignores the reality that today 
> outgoing connections are just as dangerous as incoming ones, if not 
> more.

I disagree. Your claim can be correct for an enterprise with BYOD. BUt
it is certainly not true for virtually every home network where a number
of devices are attached to it -- possibly un-updated, with bad defaults,
etc.

In any case it's possible to DoS a device with a single packet, or
worse, that you can root a device with a single packet (see one of the
few openbsd remotely exploitable vulns, alas IPv6-based), a diode
firewall would prevent such devices from being owned from the Internet.

(Not to mention reflection attacks, etc.)

This doesn't mean "yeah.. there couldn't be nothing evil inside", but is
rather along the lines of the principle of "least privilege" applied in
security -- "if I don't need something for ding what I need to do, then
I get read of it"... whether that's superuser privileges, or
connectivity privileges.

Yes... in general, your ability to play with my network is at odds with
my network's security.


> We need a better reason to break the architecture than
> misguided policies.

The only references to architecture have been shortcomings (e.g.,
well-known ports) r not-so-clean app design such as FTP PORT -- that
become evident with NATs. The rest is policy, not architecture.

In case it's not clear: it's perfectly understandable why many of such
things happened that way. What's not understandable is that we, 40 years
later, don't learn from history and consider "design principles" things
that are not.

Thanks,
-- 
Fernando Gont
SI6 Networks
e-mail: fgont@si6networks.com
PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492