[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
New I-D: Teredo Security Concerns Beyond What Is In RFC 4380
Hello,
Some months ago, when he was reviewing a version of [1], Christian Huitema
suggested that I submit my Teredo security concerns to the v6ops working
group as an Internet Draft. You now see the result of this, documenting
what I feel are security concerns not mentioned in RFC 4380. I hope this
proves useful.
http://www.ietf.org/internet-drafts/draft-hoagland-v6ops-teredosecconcerns-0
0.txt
I need to disclose that I, unfortunately, only have a limited amount of time
to spend on this draft going forward; I can monitor discussion on this
mailing list, but I won't be able to travel to any IETF meetings.
Therefore, I feel that I need one or more co-authors in order for this draft
to progress. If you are interested, please contact me off-list.
Incidentally, I am aware that certain of the concerns I mention derive from
Teredo being a tunnel. Without having done a similar study for
6to4/4to6/ISATAP/etc, I cannot reliably compare the security implications
for each, to say whether Teredo is better or worse than most (though I
suspect worse). In any case, I feel the concerns are valid, even if they
are typical of tunnels.
Sincerely,
Jim
[1] http://www.symantec.com/avcenter/reference/Teredo_Security.pdf
P.s. My views cannot be assumed to be necessarily reflective of my
employer.
--
Jim Hoagland, Ph.D., CISSP
Principal Security Researcher
Advanced Threats Research
Symantec Security Response
www.symantec.com