[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Edits to Teredo Security concerns



On Thu, 05 Jul 2007 19:21:53 -0700, Jim Hoagland

<jim_hoagland@symantec.com> wrote:

> 

> On 7/5/07 11:34 AM, "Suresh Krishnan" <suresh.krishnan@ericsson.com>

> wrote:

> 

>>    * It is easy to identify and filter Teredo packets

>>    Action: I will replace section 3 with a simple way of identifying and

>> filtering Teredo as follows

>>       Inbound traffic

>>       ===============

>>       src_port==3544 identifies Teredo packets

>>

>>       Outbound traffic

>>       ================

>>       dest_port==3544 identifies Teredo packets

> 

> This would only cover 3.2 (filtering).  As this does not find content

> packets (only Teredo overhead packets), this cannot cover 3.1

> (inspection).



True. But that matters only if inspection is aimed at monitoring rather

than

filtering. If port 3544 is blocked, no conforming client will ever send

outgoing or process incoming content packet.



And if that is not satisfactory, then it's all about "You cannot rely on

stateful firewalling to block tunnels", and it's not a Teredo protocol

issue.



-- 

Rémi Denis-Courmont

http://www.remlab.net/