[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Comments on draft-ietf-v6ops-tunnel-security-concerns



Folks,

* Abstract (nit):

> The primary intent of
>    this document is to raise the awareness regarding the security issues
>    with IP tunnels as deployed today.

s/the awareness/awareness/


* Section 2.1.3:

>    Security administrators who do not consider tunneling an acceptable
>    risk should disable tunnel functionality either on the end-nodes
>    (hosts) or on the network nodes.  However, there may be an awareness
>    gap.  Thus, due to the possible negative security consequences, we
>    recommend that explicit user action be required to enable tunneling,
>    at least for the first time.

If tunnels are a concern to the secadmin, they should be disabled at the
perimeter. The sec admin has no control over, e.g. a user that connects
his laptop to the enterprise network.


* Section 2.1.3

>    For example, when Teredo is being enabled or when it is going to be
>    used for the first time, there could be a descriptive warning about
>    the possible reduction of defense in depth that will occur.

This makes sense for a technically-savvy user. The typical non-technical
user will simply press "Ok".


* Section 2.2.2

You never talk about filtering incoming packets based on their source
address. i.e., you should not allow packets with a source address that
belongs to your network to enter your network from the outside.


* Section 2.2.3

>    Tunnel clients should by default discard tunneled IP packets that
>    specify additional routing, as recommended in [RFC5095], though they
>    may also allow the user to configure what source routing types are
>    allowed.  All pre-existing source routing controls should be upgraded
>    to apply these controls to tunneled IP packets as well.

RFC 5095 talks about IPv6 "source routing". You should also be concerned
about IPv4 source routing. See:
* http://www.cpni.gov.uk/Docs/InternetProtocol.pdf
* draft-ietf-opsec-ip-security


* Section 3.1.3

You don't mention filtering proto 41 packets


* Section 3.2.2

>    For some protocols, it may be possible to monitor setup exchanges to
>    know to expect that data will be exchanged on certain ports later.
>    (Note that this does not necessarily apply to Teredo, for example,
>    since communicating with another Teredo client behind a cone NAT
>    device does not require such signaling.  However, deprecation of the
>    cone bit as discussed in [RFC4380] means this technique may indeed
>    work with Teredo.)

Even with deprecation of the cone-bit, you don't want a user with a
customized or legacy Teredo implementation to bypass these controls. So
security-wise, this control "does not work".


* Section 4.2.2:

>    2.  In some protocols (e.g., Teredo), the external IP address and
>        port are contained in the client's address that is used end-to-
>        end and possibly even advertised in a name resolution system.
>        While the tunnel protocol itself might only distribute this
>        address in IP headers, peers, routers, and other on-path nodes
>        still see the client's IP address.  Although this point does not
>        apply directly to protocols (e.g., L2TP) that do not construct
>        the inner IP address based on the outer IP address, the inner IP
>        address is still known to peers, routers, etc. and can still be
>        reached by attackers without knowing the external IP address or
>        port.

This is actually worse: the addresses might be stamped in, e.g. SMTP
envelopes. See Fred Baker's I-D on greynets.


Thanks!

Kind regards,
-- 
Fernando Gont
e-mail: fernando@gont.com.ar || fgont@acm.org
PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1