[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

draft remarks



After reading the following drafts in preparation for monday's meeting I noticed some stuff.

draft-lear-multi6-things-to-think-about-03

- are there any questions about how site policy can be applied? (where "policy" has a big overlap with "traffic engineering"
- I would like to see a new question: "Is it possible to implement the solution in middleboxes?"
3.4 I think the question about MPLS traffic engineering warrants a pointer to what exactly this is about, as this is a layer 2 thing which we can't assume everyone is familiar with
2.4.12 I think it's important to split between interaction of updated hosts in a multihomed site with unmodified correspondents, and operation of "legacy" hosts in multihomed sites.
2.4.13 "compatable"?
2.4.15 An IETF meeting isn't really an example of an ad-hoc network. Some people sitting together and creating a network on the fly without being able to request address space and such would be a better example.
2.4.19 Referrals don't work all that well in IPv4 either. I think a "must" is too strong here. For instance, if referrals fail after a rehoming event I would consider that acceptable. A separate effort to make referrals work well regardless of multi6 would be good, too.
2.4.20 Quotation marks gone astray.
4. You misspelled my name, and Patrik's too, I think.


draft-nordmark-multi6-threats-02

1.1 I think the assumption that an attacker can do everything is dangerous, as this isn't a typical capability that an attacker would have. It's much more common that an attacker can just monitor, or monitor and inject but not block. Countermeasures that address these threats but not the one where an attacker can also block traffic could still be useful.
2- ULP I think that the definition of ULP clashes with other uses of the term, where it is used as "anything above the network layer" or "anything above the layer under discussion". The current definition is largely the same as "transport layer" if we ignore some more esoteric protocols that run on top of IP (such as ICMP) which are special cases with regard to multihoming anyway.
2 - address "unique identifier" can be read as "only identifier" but means "that uniquely identifies".
2 - identifier If not associated with an interface, then with what? (Host, of course... But what is a "host"?)
3.4 Slow down packets? Example please...
Page 17: "signally"?


BTW, it occurs to me that we can avoid some problems by imposing some restrictions on the FQDN <-> (identifier) <-> IP address/locator relationship(s). I.e., no longer allowing an FQDN to point to more than one host. Would this be a reasonable thing to do and/or useful?

Re 3.4: I think it would be possible to mitigate many of the problems here by including a periodic state refresh and disallowing adding new locators when the original address which has been "validated" using return routability is no longer reachable.

4.3 can be addressed by reflecting the original address back so if the negotiation is corrupted by an attacker at least there is a way to trace this back part of the way.

About 5: a good start would be to make a split between the state for incoming and outgoing sessions. Having to do work per session may not be so bad if there is a way to quickly sync up with the state that's already there for older sessions. Both hosts would then know they're still talking to the same correspondent. If this fails (maybe legitimate loss of state due to timeout) they can fall back to a full session initialization.

Maybe a stupid idea, but would it be useful to have some mechanism to discover insecure links? A simple way to do this would be blocking (initial) multi6 packets on such links so initiating multihoming negotiations over such unsafe links which may lead to later redirection attacks becomes impossible.

draft-huston-multi6-architectures-00

(Hm, was there a new version? I used the links from Brian's last announcement.)

Page 8: "teh"
Page 9: "sitines"
4.4 In theory there is a split between having site exit routers (actually many of the functions attributed to site exit routers here would be more naturally placed in middleboxes) determine which addresses are appropriate and then rewrite them, or have the hosts do this themselves. In reality, requiring all hosts AND all routers to be upgraded is a non-starter, so hosts must always be prepared to do this themselves, even if routers can do it too.
4.4 Comparing to NAT is not very appropriate as the addresses are written back before reaching the transport and/or application.
4.6 Note about tunneling: this is insecure as the implied relationship between inner and outer addresses can't be trusted. So this must be checked, but then the receiver knows what to expect so the actual inner values can be compressed away. I think we called this "aliasing" in the meeting.
4.6 Separate communications channel: "beware of the firewall"
5.1 ICMP triggers