[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: draft-nakibly-v6ops-tunnel-loops-03



Let me repeat a question I asked before. Gaki reminds me that we discussed, in June, adoption of his document as a WG draft. It escaped my mind with the hubbub of the IETF meeting. There were several comments that it should be adopted as a working group draft. Are there at this time any objections? Barring any, I'll have him re-post as a working group draft.

On Aug 19, 2010, at 11:46 AM, Gabi Nakibly wrote:

> Hi Fred,
> 
> Thanks for your input.
> 
> Regarding the new revision of the draft, I would like to remind you that a few 
> weeks ago I have requested you and the WG to adopt the draft as a WG item. It 
> has received positive reviews from Mark Townsley and Brian Carpenter. Following 
> the feedback we revised the draft - we removed a mitigation measure and added a 
> new Recommendations section that clarifies which measures should be exercised 
> under various conditions. The reviewers support adopting the draft once their 
> comments are addressed.
> 
> Regarding the purpose of the draft, I definitely agree with you that the end 
> game is native IPv6. But as Brian commented, tunnels will be around for a while, 
> 
> weather we like it or not. So I think it would be prudent to have an 
> informational RFC that at least informs the community on the loop problem and to 
> 
> advice on measures to mitigate it (true - these are not perfect measures, but 
> they do the job). Otherwise operators might jeopardize their networks when 
> deploying the tunnels. I agree that a document is valuable only if it helps 
> people to deploy IPv6. But I would add - deploy securely (I note item #2 of the 
> v6ops charter). We certainly do not want people to suspect that IPv6 puts their 
> networks at risk. I believe that the draft helps people deploy IPv6 more 
> securely. 
> 
> 
> I would like to note that 6rd is also vulnerable to the attack. Following 
> discussions with Remi on the list a few months back, proper mitigation measures 
> were devised for 6rd as documented in the Security Considerations of RFC 5969. I 
> 
> think that appropriate mitigation measures for other tunnels should be also 
> devised.
> 
> As I understand, the ball is in your court. I truly hope that you decide on the 
> adoption of the draft as a WG item.
> 
> Thanks,
> Gabi
> 
> ----- Original Message ----
>> From: Fred Baker <fred@cisco.com>
>> To: Gabi Nakibly <gnakibly@yahoo.com>
>> Sent: Wed, August 18, 2010 10:20:06 PM
>> Subject: Re: draft-nakibly-v6ops-tunnel-loops-03
>> 
>> Thanks.
>> 
>> In the note I just sent to v6ops, I noted that you didn't present at IETF 78 
>> and that there had not been significant working group discussion on this on the 
> 
> 
> 
> 
> 
>> list, and suspected that you were done with it.
>> 
>> http://tools.ietf.org/rfcdiff?url2=draft-nakibly-v6ops-tunnel-loops-03.txt 
>> shows some changes, mostly minor editing and a rework of section 3.3 into 
>> section 4.
>> 
>> I'll give you my personal bias, just so that I'm perfectly transparent. I think 
>> 
>> 
>> 
>> 
>> 
>> this document and Suresh's document highlight a very basic concern, which is 
>> that IPv6 routing is in these cases completely disjoint from IPv4 routing, and 
>> they are opaque to each other, but they are not independent. If IPv6 routing is 
> 
> 
> 
> 
> 
>> going to depend on IPv4 routing, something true of all IPv6/IPv4 solutions, it 
>> would be much nicer if they were also linked, as I would argue is the case with 
> 
> 
> 
> 
> 
>> 6rd. I don't think you're going to fix the issues until they are.
>> 
>> I also think that the end game is not to perfect the coexistence mechanisms, 
>> but to make the transition. Anything that keeps people busy doing something 
>> besides native IPv6 deployment is only valuable if it helps them to deploy. 
>> 
>> 
>> In any event, thanks for reposting, and let's discuss it on the list.
>> 
>> On Aug 18, 2010, at 12:00 PM, Gabi Nakibly wrote:
>> 
>>> A new version of draft-nakibly-v6ops-tunnel-loops has been posted.
>>> The new version follows the comments given on the list.
>>> The major change is the addition of a Recommendation section 
>>> that recommends preferred mitigation measures under different conditions.
>>> 
>>> Gabi
>>> 
>>> 
>>> ----- Forwarded Message ----
>>>> From: IETF I-D Submission Tool <idsubmission@ietf.org>
>>>> To: gnakibly@yahoo.com
>>>> Cc: fltemplin@acm.org
>>>> Sent: Wed, August 18, 2010 9:46:46 PM
>>>> Subject: New Version Notification for draft-nakibly-v6ops-tunnel-loops-03
>>>> 
>>>> 
>>>> A new version of I-D, draft-nakibly-v6ops-tunnel-loops-03.txt has been 
>>>> successfully submitted by Gabi Nakibly and posted to the IETF repository.
>>>> 
>>>> Filename:    draft-nakibly-v6ops-tunnel-loops
>>>> Revision:    03
>>>> Title:        Routing Loop Attack using IPv6 Automatic Tunnels: Problem 
>>>> Statement and Proposed Mitigations
>>>> Creation_date:    2010-08-18
>>>> WG ID:        Independent Submission
>>>> Number_of_pages: 11
>>>> 
>>>> Abstract:
>>>> This document is concerned with security vulnerabilities in IPv6-in-
>>>> IPv4 automatic tunnels.  These vulnerabilities allow an attacker to
>>>> take advantage of inconsistencies between a tunnel's overlay IPv6
>>>> routing state and the native IPv6 routing state.  The attack forms a
>>>> routing loop which can be abused as a vehicle for traffic
>>>> amplification to facilitate DoS attacks.  The first aim of this
>>>> document is to inform on this attack and its root causes.  The second
>>>> aim is to present some possible mitigation measures.
>>>>                                                                               
>> 
>> 
>> 
>> 
>> 
>>   
>> 
>>>>   
>>>> 
>>>> 
>>>> 
>>>> The IETF Secretariat.
>>>> 
>>>> 
>>>> 
>>> 
>>> 
>> 
>> 
> 
> 
> 
>