[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Comments on draft-ietf-v6ops-tunnel-security-concerns-00.txt



Hi Gabi,
  Thanks for your comments. Please find responses inline

Gabi Nakibly wrote:
Hello,
I have some general comments concerning draft-ietf-v6ops-tunnel-security-concerns-00.txt. 1) In the Introduction the draft mentions tunnels that go through NATs and it seems that it is focused solely on such tunnels. However, there are some security vulnerabilities discussed throughout the draft (specifically in sections 2 and 3) that relate to tunnels in general. I think the draft should be positioned to address tunnels in general.

We have come to the same conclusion as you and we are trying to get this reviewed on a broader stage (such as intarea).


2) What is the relation of this draft to RFC4942 ("IPv6 transition security considerations")? Will it update this RFC? There is some considerable overlap between section 3 of the RFC and the draft. The draft elaborates on issues which are already mentioned in section 3 of the RFC and there are some points mentioned in the RFC which are not raised in the draft. For example, using tunnels to make sure that the Hop Limit = 255. Of course, there some issues in the draft which are not mentioned in the RFC.

These two documents are largely independent. 4942 mainly covers issues with the IPv6 transition while the tunnel sec document covers also other generic tunneling related security issues. Also the tunnel sec document goes into more detail about the issues.

3) The major recommendation of the draft is in 3.1.3: "Tunneling over UDP or TCP (including HTTP) to reach the Internet is not recommended as a solution for managed networks.". Why is this recommendation relevant only to managed networks? It seems that in unmanaged environments (home or SOHO) the use of such tunnels will have similar effects.

It is an issue since managed networks may wish to enforce some kind of policy on the user initiated traffic and this becomes difficult in the presence of tunnels.

4) How the above recommendation settles with the softwire group's recommendation to use LT2P tunnels in the hub and spoke scenario (http://www.ietf.org/internet-drafts/draft-ietf-softwire-hs-framework-l2tpv2-09.txt)?

We have not looked at this document yet. Thanks for the pointer.

Thanks
Suresh