Hi James,
On Sat, 20 Mar 2010 23:00:40 -0700
james woodyatt<jhw@apple.com> wrote:
On Mar 20, 2010, at 18:00, Mark Smith wrote:
One thing that does seem to be missing from the draft is a specific list of threats it is attempting to mitigate i.e. a threat model.
RFC 4864 doesn't offer one, and its authors haven't offered much in the way of specifics to the discussion here or on the design team list. Perhaps, you'd like to offer a contribution?
While threat model is probably the correct term, more broadly I think
probably something of a problem statement i.e. what security measures
the CPE does provide, and what it doesn't, probably with some
justification.
I think the role of IPv6 CPE in the residential Internet security model
is different to the role IPv4/NAT CPE commonly is or was capable of
playing.
Stating the obvious, IPv4/NAT provides a much harder boundary between
internal and external devices, primarily due to the nature of NAPT.
NAPT by it's nature provides a default deny to inbound traffic. That's
what breaks end-to-end. Because of that harder boundary, I think
end-user expectations are that the IPv4/NAPT CPE can perform much
more of a primary security role when it comes to protecting them from
the Internet.
The nature of the operation of NAPT inherently defined a set of threats
that it protected against.
With IPv6/CPE security, by trying to restore end-to-end, I think we're
inherently reducing the security that people formerly had with
IPv4/NAPT CPE. End nodes will now have to play more of a primary
security role, with filtering IPv6/CPE providing an
assisting/secondary/defence in depth role.