[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: New I-D: Teredo Security Concerns Beyond What Is In RFC 4380



Le vendredi 1 juin 2007, Jim Hoagland a écrit :
> Does the return routability check ensure that the sender listed in a
> Teredo packet is from the specified side of a network boundry?
>
> Ingress filtering can also be used to filter IPv6 addresses that are
> associated with, say, a denial of service attack.
>
> Egress filtering makes sure that (perhaps compromised) hosts inside
> your network do not pretend to be somewhere else on the Internet.  A
> gateway device would have to look inside the Teredo tunnel to do
> egress filtering for Teredo clients.

There is something terribly wrong if one tries to use Teredo in a 
typical controlled corporate network. Teredo is not an "internal" 
transition mechanism; IETF has specified ISATAP for that purpose.

Teredo is only suitable for hosts in unmanaged networks. Much of the 
concerns in your draft seems to come from a misunderstanding or a 
disagreement as to where/when Teredo is suitable.

There is something seriously wrong if a corporate network relies on a 
NAT for security purposes, precisely because Teredo or any other hole 
punching system will break it easily.

(...)
> I'm not aware of any RFC 4380 requirement that Teredo clients
> voluntarily give up their Teredo qualification when they stop being
> able to contact the server.

5.2.5.  Maintenance

   The Teredo client must ensure that the mappings that it uses remain
   valid.  It does so by checking that packets are regularly received
   from the Teredo server.

You may argue that it does not strictly require that the client stops 
the tunnel when it receives no response, but this is common sense when 
implementing any NAT traversal and hole punching mechanism. Indeed, all 
of the, err... two publicly available Teredo client implementations do 
that.

-- 
Rémi Denis-Courmont
http://www.remlab.net/