[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: New I-D: Teredo Security Concerns Beyond What Is In RFC 4380



On Jun 1, 2007, at 09:17, Rémi Denis-Courmont wrote:

There is something terribly wrong if one tries to use Teredo in a
typical controlled corporate network. Teredo is not an "internal"
transition mechanism; IETF has specified ISATAP for that purpose.

Yes. That's why there is a security concern that Teredo might be used to escape policy enforcement at the network perimeter. This draft explains how traffic in Teredo tunnels can be made subject to the same policy enforcement as everything else. That's a good thing, isn't it?

5.2.5.  Maintenance

   The Teredo client must ensure that the mappings that it uses remain
   valid.  It does so by checking that packets are regularly received
   from the Teredo server.

You may argue that it does not strictly require that the client stops
the tunnel when it receives no response, but this is common sense when
implementing any NAT traversal and hole punching mechanism. Indeed, all
of the, err... two publicly available Teredo client implementations do
that.

I think the worry here is about the Teredo implementations that might be integrated into malware for the purpose of escaping network perimeter policy enforcement. In particular, I'd think that enterprises interested in controlling Skype would be concerned that Teredo might present an otherwise uncontrolled communication vector.


--
james woodyatt <jhw@apple.com>
member of technical staff, communications engineering