[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
RE: Residual threats in draft-savola-v6ops-6to4-security-02.txt?
Responding to a very old post..
On Wed, 16 Jul 2003, Christian Huitema wrote:
> In fact, the document could get some editing.
I certainly agree it could be clearer :-)
> We should adopt a
> structure "by threat", in which for each thread we describe the attack,
> note the existing mitigation, discuss whether other additional
> mitigations should be implemented, and conclude by the qualification of
> the residual threat.
But I'm not sure what you mean especially with the first two. Could you
create an example threat based on the structure you'd propose to make us
see the difference?
> We also need to agree on some qualification level. We discussed that on
> the list, but basically it is a matter of comparing the situation with
> 6to4 to the situation without. If the mitigations are sufficient to make
> the situation no worse with 6to4 than with the existing IPv4 Internet,
> then the threat should not considered critical. This forces us to decide
> a question, what is the level we compare to. For example, a lot is said
> about address spoofing, but addresses can in practice be spoofed
> today...
Yes, it's very important to decide this. That's what I tried to raise in
the v6ops security session in Vienna, but apparently there are no silver
bullets which make it easier for you to consider what is the acceptable
level of security.
(.. and more importantly, whether it would warrant scrapping 6to4, trying
to fix it somehow, documenting mitigation methods, encouraging folks to
use different kind of mechanisms or what..)
--
Pekka Savola "You each name yourselves king, yet the
Netcore Oy kingdom bleeds."
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings