Re: [v6tc] Issue 1: Could we live with UDP encapsulation always on?
Alain Durand <Alain.Durand@Sun.COM> Fri, 17 December 2004 11:25 UTC
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA06308;
Fri, 17 Dec 2004 06:25:04 -0500 (EST)
Received: from megatron.ietf.org ([132.151.6.71])
by ietf-mx.ietf.org with esmtp (Exim 4.33)
id 1CfGMz-0000je-Kj; Fri, 17 Dec 2004 06:34:01 -0500
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
by megatron.ietf.org with esmtp (Exim 4.32)
id 1CfGD7-0004qi-LW; Fri, 17 Dec 2004 06:23:49 -0500
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
by megatron.ietf.org with esmtp (Exim 4.32) id 1CfGC5-0004cL-Cx
for v6tc@megatron.ietf.org; Fri, 17 Dec 2004 06:22:46 -0500
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA06180
for <v6tc@ietf.org>; Fri, 17 Dec 2004 06:22:43 -0500 (EST)
Received: from brmea-mail-4.sun.com ([192.18.98.36])
by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1CfGKi-0000ga-8Y
for v6tc@ietf.org; Fri, 17 Dec 2004 06:31:40 -0500
Received: from esunmail ([129.147.156.34])
by brmea-mail-4.sun.com (8.12.10/8.12.9) with ESMTP id iBHBMidt015613
for <v6tc@ietf.org>; Fri, 17 Dec 2004 04:22:44 -0700 (MST)
Received: from xpa-fe2 (esunmail [129.147.156.34]) by edgemail1.Central.Sun.COM
(iPlanet Messaging Server 5.2 HotFix 2.02 (built Oct 21 2004))
with ESMTP id <0I8V002BJ69VEG@edgemail1.Central.Sun.COM> for
v6tc@ietf.org; Fri, 17 Dec 2004 04:22:43 -0700 (MST)
Received: from [192.168.1.4] ([83.113.219.105])
by mail.sun.net (iPlanet Messaging Server 5.2 HotFix 2.02 (built Oct 21
2004))
with ESMTPSA id <0I8V007P969SOK@mail.sun.net> for v6tc@ietf.org; Fri,
17 Dec 2004 04:22:43 -0700 (MST)
Date: Fri, 17 Dec 2004 03:22:47 -0800
From: Alain Durand <Alain.Durand@Sun.COM>
Subject: Re: [v6tc] Issue 1: Could we live with UDP encapsulation always on?
In-reply-to: <1103281912.25975.87.camel@firenze.zurich.ibm.com>
To: Jeroen Massar <jeroen@unfix.org>
Message-id: <FA7693F5-501D-11D9-81E4-00039358A080@sun.com>
MIME-version: 1.0
X-Mailer: Apple Mail (2.619)
Content-type: text/plain; charset=US-ASCII; format=flowed
Content-transfer-encoding: 7BIT
References: <6D2CE1A0-5011-11D9-81E4-00039358A080@sun.com>
<1103278369.25975.57.camel@firenze.zurich.ibm.com>
<Pine.LNX.4.61.0412171231230.19294@netcore.fi>
<1103281912.25975.87.camel@firenze.zurich.ibm.com>
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 67c1ea29f88502ef6a32ccec927970f0
Content-Transfer-Encoding: 7BIT
Cc: v6tc@ietf.org
X-BeenThere: v6tc@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: v6tc.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/v6tc>,
<mailto:v6tc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/v6tc>
List-Post: <mailto:v6tc@ietf.org>
List-Help: <mailto:v6tc-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/v6tc>,
<mailto:v6tc-request@ietf.org?subject=subscribe>
Sender: v6tc-bounces@ietf.org
Errors-To: v6tc-bounces@ietf.org
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 2086112c730e13d5955355df27e3074b
Content-Transfer-Encoding: 7BIT
Please keep this discussion for the upcoming issue 3 thread: "Should some of this authentication mechanism "follow-on" atfer the tunnel set-up phase as finished?" To keep the discussion focussed, I will only introduce one issue at a time. - Alain. On Dec 17, 2004, at 3:11 AM, Jeroen Massar wrote: >> The assumption is that if you want to protect the payload, you'll want >> to use a real security mechanism -- this is not the place to >> (try to) invent one. > > You mean using IPSEC, which does not (easily) work over the NAT we > where > trying to cross in the first place ? :) > > Also I don't mean to protect the payload, I could not care less about > crypto, use SSH/HTTPS/TLS in the cases you need to crypt something. It > is about verification that the sender really send the packet which you > are going to forward for them. > > Because that is the issue here. Also expect people to abuse this > proposed protocol, just like they are abusing proto-41 by simply > spoofing packets and inserting them, causing some nice network traffic > spikes, being totally untraceable as there is no way to trace where > they > are coming from and one will think it is coming from the legit user, > who > is suddenly getting claims of sending a large ddos to somebody, while > that person is really only browsing the web, if using the connection at > all. > > By having at least a *small* md5/MMH/UMAC signature on the packet this > problem gets solved and the packet can be quietly dropped at the > tunnelserver. > > btw typo in the draft (sect 4, security): > 8<--------- > Creating tunnel state based on the first UDP packet ___is can___ open > the server to a DoS attack with spoofed source addresses. > --------->8 > > As none of the following packets are verified, anybody who is able to > send a spoofed packet, which is very commonly possible with most > networks not doing RPF and other mechanisms, every packet can be > spoofed > and sent out over the tunnelserver. Thus please add "can become the > source of an untraceable ddos attack in case the infrastructure between > the endpoints is not secure". > > As this protocol is for endpoints behind NAT's I guess there is also a > very large assumption which can be made that the above is the case, > thus > roll up your sleeves when your friendly (ahem) neighbourhood kid finds > out that he can use his 100k+ botnet* for some more 'action' in the new > world... > > * these things also exist because the network administrator is either > too busy/lazy or simply doesn't care about his network. > For that matter I am waiting for them to start abusing Teredo and other > public relays, as there is normally unconfigured only a few number of > Teredo relays you don't want to imagine the effect it will have on > them. > It would boost IPv6 traffic a bit of course, but this is not the kind > of > traffic that people would like to see I think ;) > > > Next to this security issue, the proposed protocol (is there a name for > it, would make it easier to reference it) does not take care of the > case > where a user gets an IP address, starts a huge video stream, thus eg > multicast udp packets at 2mbit/s, coming unacked to the endpoint. User > disconnects/changes IP, which is a common case with ISP's who also > limit > their users to one IP address, they also usually have some nice change- > your-ip-every-day tricks to get you to maybe buy a more expensive > account, the next user getting this IP will then get this nice streams > of 2mbit/s tunneled IPv6 traffic. And actually she didn't want to get 1 > byte, maybe she is even paying for the bandwidth and thus is paying for > a lot of unwanted traffic. Cash for the ISP, but not very nice for the > user. In short: please add a heartbeat mechanism, which also allows one > to change IP during the tunnel lifetime and thus seamlessy swap over to > another IP. > > No, this is not to replace Mobile IP and no it is not intended to > replace IPSEC, but it does make certain things much better without > having to rely on two of the protocols which most OS's don't > have/support nor can't use because of the NAT which they are behind. > It has also already been proven that it is very easy to deploy the > above > described protocol and I actually I wonder why there is need for yet > another one while the others are sufficient for the purposes requisted. > But that could be me of course ;) > >>> Why is there a checksum in that newly proposed protocol anyway? >>> There was a reason why checksumming was removed from the IPv6 >>> headers ;) >> >> It is the standard UDP checksum. The first two lines are the UDP >> header. > > Ah, I glanced over it too quickly, usually protocol descriptions don't > include the upper layer protocol again, this more looks like a > redefinition of UDP in this case... > > Greets, > Jeroen > > _______________________________________________ > v6tc mailing list > v6tc@ietf.org > https://www1.ietf.org/mailman/listinfo/v6tc _______________________________________________ v6tc mailing list v6tc@ietf.org https://www1.ietf.org/mailman/listinfo/v6tc
- [v6tc] Issue 1: Could we live with UDP encapsulat… Alain Durand
- Re: [v6tc] Issue 1: Could we live with UDP encaps… Jeroen Massar
- Re: [v6tc] Issue 1: Could we live with UDP encaps… Pekka Savola
- Re: [v6tc] Issue 1: Could we live with UDP encaps… Jeroen Massar
- Re: [v6tc] Issue 1: Could we live with UDP encaps… Alain Durand
- Re: [v6tc] Issue 1: Could we live with UDP encaps… Alain Durand
- Re: [v6tc] Issue 1: Could we live with UDP encaps… Jeroen Massar
- Re: [v6tc] Issue 1: Could we live with UDP encaps… Alain Durand