Secdir last call review of draft-ietf-v6ops-transition-ipv4aas-11

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Reviewer: Christian Huitema
Review result: Has Issues

I have reviewed draft-ietf-v6ops-transition-ipv4aas-11 as part of the
security directorate's ongoing effort to review all IETF documents
being processed by the IESG.  These comments were written primarily for
the benefit of the security area directors.  Document editors and WG chairs
should treat these comments just like any other last call comments.

The summary of the review is "ready with issue".

The document describes solution for providing "IPv4 as a service", i.e.
provision of IPv4 as a service over an IPv6 only network.
It calls this support "transition as a service".

For various reasons, IETF working groups have standardized not just one but
five different mechanisms for providing this transition: 464XLAT [RFC6877],
Dual-Stack Lite [RFC6333], Lightweight 4over6 (lw4o6) [RFC7596],
MAP-E [RFC7597], and MAP-T [RFC7599]. (I am sure that Monty Python could have
produced a nice sketch about that.) The purpose of the draft is to
state how home routers (a.k.a. customer premise equipment, CPE) should
inform local devices about which of the mechanisms are available, which
should be preferred, and what parameters should be used when deploying
the chosen services. This is done using the DHCPv6 "S46" option
specified in RFC 8026.

The draft also makes specific recommendation regarding the use of the UPnP and
PCP services, by requiring specific error codes when a requested port mapping 
is not available through the specified transition technology.

The security section briefly points to the "Basic Requirements for IPv6
Customer Edge Routers" specified in RFC 7084, and to the security
section of each of the RFC describing the security technologies, and implicitly
argues that there are no other security issues. I think that is insufficient.

The draft introduces a reliance on the DHCPv6 "S46" option for assessing the
relative priority of different transition technologies. An attacker could spoof
the DHCPv6 response, and direct client traffic to a different technology than
selected by the service provider. This could be used, for example, to capture
IPv4 traffic in an IPv6 network and send it to a route chosen by the attacker.
The attack might also be used in a dual stack network that does not support
any transition technology. I don't understand how this attack is mitigated.

Nits:

The introduction uses the acronym WAN without spelling out "Wide Area Network". 
Also, WAN is used as substitute for local Internet Service Provider network. We could
debate whether such networks are always "wide area", by opposition to say
"metropolitan" or "regional". This is the same convention used in RFC 7084 that
this document updates. It is arguably defined by reference, but spelling it out
would be nice.

The comparison with RFC7084 section includes a mangled sentence: 

   This document doesn't include support for 6rd ([RFC5969]), because as
   in an IPv6-in-IPv4 tunneling.

Please rephrase. Please also rephrase the next sentence, for similar reasons:

   Regarding DS-LITE [RFC6333], this document includes slightly
   different requirements, because the PCP ([RFC6887]) support and the
   prioritization of the transition mechanisms, including dual-stack.






[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux