[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Residual threats in draft-savola-v6ops-6to4-security-02.txt?



below...

Pekka Savola wrote:
> 
> Responding to a very old post..
> 
> On Wed, 16 Jul 2003, Christian Huitema wrote:
> > In fact, the document could get some editing.
> 
> I certainly agree it could be clearer :-)
> 
> > We should adopt a
> > structure "by threat", in which for each thread we describe the attack,
> > note the existing mitigation, discuss whether other additional
> > mitigations should be implemented, and conclude by the qualification of
> > the residual threat.
> 
> But I'm not sure what you mean especially with the first two.  Could you
> create an example threat based on the structure you'd propose to make us
> see the difference?
> 
> > We also need to agree on some qualification level.  We discussed that on
> > the list, but basically it is a matter of comparing the situation with
> > 6to4 to the situation without. If the mitigations are sufficient to make
> > the situation no worse with 6to4 than with the existing IPv4 Internet,
> > then the threat should not considered critical. This forces us to decide
> > a question, what is the level we compare to. For example, a lot is said
> > about address spoofing, but addresses can in practice be spoofed
> > today...
> 
> Yes, it's very important to decide this.  That's what I tried to raise in
> the v6ops security session in Vienna, but apparently there are no silver
> bullets which make it easier for you to consider what is the acceptable
> level of security.
> 
> (.. and more importantly, whether it would warrant scrapping 6to4, trying
> to fix it somehow, documenting mitigation methods, encouraging folks to
> use different kind of mechanisms or what..)

Not just because it's my baby, but I don't see any realistic prospect of
"scrapping" it at this point. Even if the IETF declared it Historic,
it wouldn't go away.

I don't think there is any realistic fix. IP address fields are spoofable,
and this is just an example, with some negative consequences.

So I think documenting the methods of mitigation is the only option
in practice. Of course, if someone comes up with another low-configuration
solution for hopping over uncooperative ISPs, that's fine too. That's
where the recent conversation about tunnel brokers came from.

   Brian

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Brian E Carpenter 
Distinguished Engineer, Internet Standards & Technology, IBM 

NEW ADDRESS <brc@zurich.ibm.com> PLEASE UPDATE ADDRESS BOOK