Re: [OPSEC] Last Call: <draft-ietf-opsec-ipv6-eh-filtering-06.txt> (Recommendations on the Filtering of IPv6 Packets Containing IPv6 Extension Headers) to Informational RFC

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Sun, Nov 25, 2018 at 11:55 PM Fernando Gont wrote:
> On 24/11/18 17:37, C. M. Heard wrote:
> > On Sat, Nov 24, 2018 at 12:30 PM Nick Hilliard <nick@xxxxxxxxxx> wrote:
> >> Brian E Carpenter wrote on 24/11/2018 20:17:
> >>> Operators make their own
> >>> decisions, so I think that is what the draft should say. Something like:
> >>>
> >>> 3.5.5.  Advice
> >>>
> >>>     Operators should determine according to their own circumstances
> >>>     whether to discard packets containing unknown IPv6 EHs.
> >>>
> >>> And at the same time, delete the 2nd and 3rd sentences of this:
> >>>
> >>> 3.5.3.  Specific Security Implications
> >>>
> >>>     For obvious reasons, it is impossible to determine specific security
> >>>     implications of unknown IPv6 EHs.  However, from security standpoint,
> >>>     a device should discard IPv6 extension headers for which the security
> >>>     implications cannot be determined.  We note that this policy is
> >>>     allowed by [RFC7045].
> >>
> >> This looks like a sensible approach.
> >
> > I could live with that.
>
> FWIW, I can live with that, too. UNless somebody screams against it, I
> will apply the proposed change to the next rev. Thanks!
>
> > Similar changes might be considered for Sec. 4.4.5.
>
> Will do.

Thank you.  There is also related advice in the note to Section 3.1 that
needs similar changes and the matter of experimental EHs and experimental
options that I raised in my original comments. These are all cases where
the security implications cannot be determined. Proposed text for Sections
3.1, 3.4.10.5, 3.5.3 et. seq., 4.3.18.5, and 4.4.5 follows below.

---
OLD:
      NOTE: [RFC7112] specifies that non-fragmented IPv6 datagrams and
      IPv6 First-Fragments MUST contain the entire IPv6 header chain
      [RFC7112].  Therefore, intermediate systems can enforce the
      filtering policies discussed in this document, or resort to simply
      discarding the offending packets when they fail to comply with the
      requirements in [RFC7112].  We note that, in order to implement
      filtering rules on the fast path, it may be necessary for the
      filtering device to limit the depth into the packet that can be
      inspected before giving up.  In circumstances where there is such
      a limitation, it is recommended that implementations discard
      packets if, when trying to determine whether to discard or permit
      a packet, the aforementioned limit is encountered.

NEW:
      NOTE: [RFC7112] specifies that non-fragmented IPv6 datagrams and
      IPv6 First-Fragments MUST contain the entire IPv6 header chain
      [RFC7112].  Therefore, intermediate systems can enforce the
      filtering policies discussed in this document, or resort to simply
      discarding the offending packets when they fail to comply with the
      requirements in [RFC7112].  We note that, in order to implement
      filtering rules on the fast path, it may be necessary for the
      filtering device to limit the depth into the packet that can be
      inspected before giving up.  In circumstances where there is such
      a limitation, it is recommended that implementations provide a
      configuration option that specifies whether to discard packets if
      the aforementioned limit is encountered.  Operators may then
      determine according to their own circumstances how such packets
      will be handled.

---
OLD:
3.4.10.5.  Advice

   Intermediate systems should discard packets containing these EHs.
   Only in specific scenarios in which RFC3692-Style experiments are to
   be performed should these EHs be permitted.

NEW:
3.4.10.5.  Advice

   Operators should determine according to their own circumstances
   whether to discard packets containing experimental IPv6 EHs.

---
OLD:
3.5.3.  Specific Security Implications

   For obvious reasons, it is impossible to determine specific security
   implications of unknown IPv6 EHs.  However, from security standpoint,
   a device should discard IPv6 extension headers for which the security
   implications cannot be determined.  We note that this policy is
   allowed by [RFC7045].

3.5.4.  Operational and Interoperability Impact if Blocked

   As noted in [RFC7045], discarding unknown IPv6 EHs may slow down the
   deployment of new IPv6 EHs and transport protocols.  The
   corresponding IANA registry ([IANA-PROTOCOLS]) should be monitored
   such that filtering rules are updated as new IPv6 EHs are
   standardized.

   We note that since IPv6 EHs and upper-layer protocols share the same
   numbering space, discarding unknown IPv6 EHs may result in packets
   encapsulating unknown upper-layer protocols being discarded.

3.5.5.  Advice

   Intermediate systems should discard packets containing unknown IPv6
   EHs.

NEW:
3.5.3.  Specific Security Implications

   For obvious reasons, it is impossible to determine specific security
   implications of unknown IPv6 EHs.

3.5.4.  Operational and Interoperability Impact if Blocked

   As noted in [RFC7045], discarding unknown IPv6 EHs may slow down the
   deployment of new IPv6 EHs and transport protocols.  The
   corresponding IANA registry ([IANA-PROTOCOLS]) should be monitored
   such that filtering rules are updated as new IPv6 EHs are
   standardized.

   We note that since IPv6 EHs and upper-layer protocols share the same
   numbering space, discarding unknown IPv6 EHs may result in packets
   encapsulating unknown upper-layer protocols being discarded.

3.5.5.  Advice

   Operators should determine according to their own circumstances
   whether to discard packets containing unknown IPv6 EHs.

---
OLD:
4.3.18.5.  Advice

   Intermediate systems should discard packets that contain these
   options.  Only in specific environments where RFC3692-style
   experiments are meant to be performed should these options be
   permitted.

NEW:
4.3.18.5.  Advice

   Operators should determine according to their own circumstances
   whether to discard packets containing experimental IPv6 options.

---
OLD:
4.4.5.  Advice

   Enterprise intermediate systems that process the contents of IPv6 EHs
   should discard packets that contain unknown options.  Other
   intermediate systems that process the contents of IPv6 EHs should
   permit packets that contain unknown options.

NEW:
4.4.5.  Advice

   Operators should determine according to their own circumstances
   whether to discard packets containing unknown IPv6 options.


EDITORIAL: I believe that the following is simply mis-worded:

---
OLD:
4.3.10.5.  Advice

   Intermediate system should discard packets that contain this option.

NEW:
4.3.10.5.  Advice

   Intermediate systems that are not within a MANET domain should
   discard packets that contain this option.


NITS: These should be fixed prior to publication.

---
OLD:
4.3.1.4.  Operational and Interoperability Impact if Blocked

   Discarding packets that contain this option would potentially break
   any protocol that relies on IPv6 EHs.

NEW:
4.3.1.4.  Operational and Interoperability Impact if Blocked

   Discarding packets that contain this option would potentially break
   any protocol that relies on IPv6 options.

---
OLD:
4.3.2.4.  Operational and Interoperability Impact if Blocked

   Discarding packets that contain this option would potentially break
   any protocol that relies on IPv6 EHs.

NEW:
4.3.2.4.  Operational and Interoperability Impact if Blocked

   Discarding packets that contain this option would potentially break
   any protocol that relies on IPv6 options.


In some places the abbreviations RHT0 and RHT1 are used, while in other
places RTH0 and RTH1 are used. The usage should be consistent;  IMHO the
former abbreviations seem to be more correct.

Mike Heard




[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux