[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: I-D ACTION:draft-savola-v6ops-6to4-security-02.txt



Just in case when I say deployment I am talking test beds.
/jim

> -----Original Message-----
> From: Bound, Jim 
> Sent: Sunday, May 04, 2003 8:28 AM
> To: Brian E Carpenter; IPv6 Operations
> Subject: RE: I-D ACTION:draft-savola-v6ops-6to4-security-02.txt
> 
> 
> Any tunnel creates embedded verification needs unless all 
> parameters are secure to build it or there are checks to do 
> decap at non-secure points in the path.  This is not 
> indicative of 6-to-4, but of tunnels.  But it can be done.  I 
> think it should go to Info RFC too.
> 
> That being said 6-to-4 is very close and ready for production 
> wide IPv6 deployment and my recommendation to the public.  It 
> is the only transition mechanism in this condition mostly 
> because it has been widely implemented.
> 
> It appears ISATAP is close to being the same from what I can 
> tell of implementations. But, I am still not clear because it 
> is not as clear and straight forward as 6-to-4 for network 
> operators.  It requires more bake-off time.  
> 
> No comment on Teredo or DSTM at this point but both have 
> initial implementations and some deployment in some geographies.
> 
> /jim
> 
> > -----Original Message-----
> > From: Brian E Carpenter [mailto:brian@hursley.ibm.com]
> > Sent: Sunday, May 04, 2003 4:26 AM
> > To: IPv6 Operations
> > Subject: Re: I-D ACTION:draft-savola-v6ops-6to4-security-02.txt
> > 
> > 
> > I'm wondering what we should do with this draft.
> > 
> > It seems to me to be basically correct (i.e. it says that there are 
> > specific spoofing and DoS attacks using 6to4 that are 
> harder to trace 
> > than "standard" spoofing and DoS attacks).
> > 
> > It is more explicit about the checks to be applied than the
> > base 6to4 specification, but those checks cannot eliminate 
> > the attacks.
> > 
> > The document might also assist intrusion-detection
> > implementors in detecting these attacks.
> > 
> > So I think it should probably be published as an Info RFC,
> > and if/when we revise the basic 6to4 spec, Pekka's document 
> > would be a source for improving the security section.
> > 
> >    Brian
> > 
> > 
> > 
> 
>