[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: WGLC: draft-ietf-v6ops-cpe-simple-security-10.txt



Thanks. On your first point, we tossed around the idea of merging it into draft-ietf-cpe-router and chose not to. This document describes an additional feature that vendors MAY build into a CPE Router.

On Apr 20, 2010, at 9:17 AM, Laganier, Julien wrote:

>> Fred Baker wrote: 
>> 
>> As agreed at the last IETF meeting, I am opening a two week WGLC of 
>> draft-ietf-v6ops-cpe-simple-security-10.txt. Please read the document, 
>> comment to this list on matters of substance, and send nits (spelling/
>> grammar, word choice, sentence structure comments) to the authors.
> 
> I realize I am late with this but I have reviewed the document and have the following comment:
> 
> The document does not explicitly mention how should IPv6 be treated by a CPE. 
> 
> Mobile IPv6 involves the use of IP-in-IP tunneling and of IPsec and IKE, all of which seems to be covered in Section 2.2. in an adequate manner:
> 
> 2.2.  Internet Layer Protocols
> 
>   As virtual private networking tunnels are regarded as an unacceptably
>   wide attack surface, this document recommends the DEFAULT operating
>   mode for residential IPv6 simple security is to treat IP-in-IP and
>   GRE tunneling protocols as opaque transport layers, i.e. inbound
>   tunnel initiations are denied and outbound tunnel initiations are
>   accepted.  IPsec transport and tunnel modes are explicitly secured by
>   definition, so this document recommends the DEFAULT operating mode
>   permit IPsec and Internet Key Exchange (IKE) flows to pass without
>   filtering.
> 
> Mobile IPv6 also involves the use of the Mobility Header, which seems to be appropriately covered by the recommendation of Section 3.2.2.:
> 
> 3.2.2.  Upper-layer Transport Protocols
> 
>   Residential IPv6 gateways are not expected to prohibit the use of
>   applications to be developed using future upper-layer transport
>   protocols.  In particular, transport protocols not otherwise
>   discussed in subsequent sections of this document are expected to be
>   treated consistently, i.e. as having connection-free semantics and no
>   special requirements to inspect the transport headers.
> 
>   In general, upper-layer transport filter state records are expected
>   to be created when an interior endpoint sends a packet to an exterior
>   address.  The filter allocates (or reuses) a record for the duration
>   of communications, with an idle timer to delete the state record when
>   no further communications are detected.
> 
>   REC-10: Filter state records for generic upper-layer transport
>   protocols MUST BE indexable by a 3-tuple comprising the interior node
>   address, the exterior node address and the upper-layer transport
>   protocol identifier.
> 
>   REC-11: Filter state records for generic upper-layer transport
>   protocols MUST NOT be deleted or recycled until an idle timer not
>   less than two minutes has expired without having forwarded a packet
>   matching the state in some configurable amount of time.  By DEFAULT,
>   the idle timer for such state records is five minutes.
> 
> However MIPv6 also relies on the use of a degenerated tunneling mechanism between a Mobile Node and its corresponds nodes. This tunneling involves the use of the Routing Header Type 2 and of the Home Address destination option, which are not covered in the document. 
> 
> In practice I believe this type of tunnel should be treated as IP-in-IP tunnels, but this is currently not the case. The issues is as follows:
> 
> Outbound packets sent in the tunnel are sent from the Mobile Node Care-of Address and with a Home Address destination option -- so it seems that there is no problem for those, although we might want to be explicit.
> 
> However inbound packets corresponding to an outbound initiated tunnel should be accepted as well (as for IP-in-IP), but these packets will be destined to the Home Address and carrying the Care-of Address in the Routing Header Type 2, so they will not be handled properly absent an explicit recommendation that the CPE tracks MIPv6 HoA/RH2 degenerated tunnels.
> 
> I believe we should cover MIPv6 adequately in this specification by adding explicit tracking of outbound initiated MIPv6 HoA/RH2 degenerated tunnels. 
> 
> [ The MEXT WG has two documents specifying firewall behavior for MIPv6 that could be used as a starting point for text to be included in this spec -- see http://tools.ietf.org/html/draft-ietf-mext-firewall-vendor-02 and http://tools.ietf.org/html/draft-ietf-mext-firewall-admin-02 ]
> 
> What do people think?
> 
> --julien
> 
> 
> 

http://www.ipinc.net/IPv4.GIF