[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Some additional comments on
draft-ietf-v6ops-tunnel-security-concerns
X-Enigmail-Version: 0.96.0
OpenPGP: id=D076FFF1
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Sender: owner-v6ops@ops.ietf.org
Precedence: bulk
List-ID: <v6ops.ops.ietf.org>
Folks,
Meta comment:
Being an ops I-D/RFC, I would expect some concrete advice on, e.g., how
to filter well-known tunneling mechanisms. IMO, one should be able to
answer the questions "How should I filter Teredo?", "How should I filter
6to4?", and others (without this being an invitation to do so).
Another specific comments:
> 6. Additional Security Concerns
>
> 6.1. Attacks Facilitated By Changing Tunnel Server Setting
>
> 6.1.1. Problem
The I-D seems to assume that the tunnel endpoint *is* configured by
resolving a domainname, and that there's no workaround.
Firstly, while e.g. Windows does configure e.g. the Teredo server and
the 6to4 relay by resolving domain-names, this need not be the case.
Secondly, one could override such setting and eliminate *this* attack
vector by configuring a hardcoded IP address (e.g., the 6to4 anycast
address)
Thanks!
Kind regards,
--
Fernando Gont
e-mail: fernando@gont.com.ar || fgont@acm.org
PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1