[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: New I-D: Teredo Security Concerns Beyond What Is In RFC 4380



> > There is something terribly wrong if one tries to use Teredo in a
> > typical controlled corporate network. Teredo is not an "internal"
> > transition mechanism; IETF has specified ISATAP for that purpose.
> 
> Yes.  That's why there is a security concern that Teredo might be
> used to escape policy enforcement at the network perimeter.  This
> draft explains how traffic in Teredo tunnels can be made subject to
> the same policy enforcement as everything else.  That's a good thing,
> isn't it?

Frankly, I am not really concerned that someone will use Teredo to
"escape policy enforcement" in managed network. Teredo has a very
visible signature, using a fixed port for its signaling traffic.
Firewalls can very easily control that. If I want to escape the local
policy, I would much rather use some less visible tunnel solution, e.g.
tunneling IP over some random UDP port.

-- Christian Huitema