[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

New version of Security Overview published



A new version of IPv6 Transition/Co-existence Security Considerations (draft-ietf-v6ops-security-overview-05.txt) has been published today. This version is intended to address the comments made during IESG evaluation, including comments from the General Area Reviewer and the Security Directorate Reviewer. A significant number of essentially editorial changes have been made plus some minor technical changes in s2.1.11 and s2.1.12.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-v6ops-security-overview-05.txt

The main reasons that changes have been made are:
1. To heavily emphasise that certain recommendations could lead to legal but unusual traffic being dropped: the document highlights (and has always done so) a number of areas where the IPv6 protocol specification leaves the door open to a malicious node sending damaging traffic that is technically within the specification but would only be likely to be sent with malicious intent. Recommendations are made in the document that suggest how to minimize the risk from such traffic. The warnings to administrators to be aware of the trade-offs (security gain vs potential for a very limited amount of legitimate traffic being dropped) have been reinforced, and the need for monitoring the effects of the rules highlighted. The actual recommendations have not been changed except for one case related to link local addresses. 2. Documented the trade-off relating to the extensibility of the IPv6 header chain: allowing unrestricted access for packets with unknown headers and options vs maximum security. 3. The draft previously referred to a number of expired drafts from which issues have been collected. These references have been removed. They have been replaced by a small amount of additional explanatory text plus acknowledgement of the sources in the draft.
4. The effects of asymmetric routing have been considered.

Details of changes:
s1: added explanation of rationale for consideration of long term IPv4 and IPv6 coexistence (from draft-savola-v6ops-transarch).

s2: added detailed explanation of the issue 1 above.

s2.1.1: removed ref to draft-savola-ipv6-rh-hosts and added corresponding explanation of the problems resulting from the rules in RFC1122 that permit hsost to perform local source routing.

s2.1.4: reference to draft-savola-v6ops-firewalling removed. s2.1.5. the proposed tests to identify bogus errored packets embedded in ICMPv6 messages have been improved to take into account the possibility of asymmetric routing and the discussion of how much of the errored packet should be expected in the ICMPv6 message has been expanded to emphasise that an ICMPv6 message is supposed to contain *as much* of the packet as possible taking into account the guaranteed minimum MTU.

s2.1.7: the reference to draft-dupont-ipv6-rfc3041harnful has been replaced by draft-ietf-ipv6-privacy-addrs-v2 which contains the same discussion.

s2.1.8: examples of situations in which reverse DNS records are checked has been given to give better justification of the need for reverse DNS updating.

s2.1.9: reference to draft-savola-v6ops-firewalling removed and note of incomplete specification in RFC2460 added.

s2.1.9.1: changed statement that destination options are not processed en route (correct but incomplete) to statement that only hop-by-hop options are processed at every node on the path. Added recommendation stating that vendors and administrators may currently choose to ignore the RFC2460 rules on header processing in middleboxes to give enhanced security without serious consequence, but that they should be aware that future extensions might change the situation.

s2.1.9.2, para 3: added explanation that it is the requirement for detailed knowledge of the layout of header types that would be problematic if headers did not use TLV format.

s2.9.2, para 5: applies to hop-by-hop options as well as destination options.

s2.1.9.3: with reference to item 3 above, documented the dilemma for administrators of facilitating extensibility by allowing 'unknown' headers and options unfettered access vs securing the network by limiting access to well-known headers and options. Emphasized recommendation for using configurable firewalls that can be updated to take account of newly standardized headers but will still remove unknown items.

s2.1.9.4: removed reference to draft-krishnan-ipv-hopbyhop and provided a brief summary of the problems documented therein.

s2.1.9.5: redrafted the recommendation on what are 'reasonable' sequences of padding options (unreasonable to pad beyond next 8 octet boundary, each pad should be done with one PadN of the right size or a sequence of Pad1 options of the right length)

s2.1.10: highlighted that packets with overlapping fragments are a major security risk. Redrafted last four paragraphs to clarify the recommendations.

s2.1.11: added a concrete analysis to demonstrate that non-final fragments smaller than 50% of the guaranteed minimum MTU are unreasonable and should be considered for dropping.

s2.1.12: Removed discussion of IPv4 link local addresses. Removed port-based MAC address security as a suggested mitigation for securing a link layer. Expanded the discussion of the advisability of filtering link local addresses used for other than control and management functions, including discussion of zone identifiers and the consequences of potentially overlapping link local address spaces at nodes with multiple interfaces.

s2.1.15.1: rmoved reference to draft-savola-ipv6-rh-ha-security.

s2.2: reference to draft-cmetz-v6ops-v4mapped-api-harmful and draft-itojun-v6ops-v4mapped-harmful removed and explanation of the issues in these drafts incorporated.

s2.3.2: reference to Trusted Compting architecture added.

s4.1: removed reference to draft-ietf-v6ops-v6onbydefault and added a note about the risks of tunneling transition mechanisms and VPNs.

s4.3: added examples of management interfaces that need to be secured.

s4.4: modified comments on link local addresses in line with s2.1.12. Added example of using multiple subnets on a single link.

s4.9: added clarification of 'finer grained access control mechanism' and reference to draft-ietf-ipv6-privacy-addrs-v2.

s4.10: redrafted last para as a reminder that SEND will need to be extended if NDproxies are standardized rather than as a requirement in the here and now.

s7: Acknowledgments extended to cover the authors of the various expired drafts no longer referenced.

s8: References updated: expired drafts removed and draft->RFC changes incorporated. RFC3041 replaced by draft-ietf-ipv6-privacy-addrs-v2 throughout.

Other minor editorial changes were also made.

Regards,
Elwyn
for the authors