[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
I-D.vyncke-advanced-ipv6-security-00
- To: IPv6 Operations <v6ops@ops.ietf.org>
- Subject: I-D.vyncke-advanced-ipv6-security-00
- From: james woodyatt <jhw@apple.com>
- Date: Mon, 9 Nov 2009 20:33:47 -0800
everyone--
John Brzozowski, the Jabber scribe for the Tuesday V6OPS session when
this draft was presented, asked me to send my thoughts about the
applicability of the seven security policies enumerated in the draft
to IPv6 residential CPE gateways.
1. RejectBogon -- this is already in I-D.ietf-v6ops-cpe-simple-
security, but called something different.
2. BlockBadReputation -- an interesting architectural idea, but I
suspect it will be difficult to establish consensus around a pragmatic
application to the residential usage scenario.
3. AllowReturn -- i'm really looking forward to seeing the IPR
disclosures on this one, but i'm generally supportive. not sure how
i'm going to implement it, but that isn't IETF's problem.
4. AllowToPublicDNSHost -- sounds good on first hearing, but... to
DNSSEC or not to DNSSEC? hmmm...
5. ProtectLocalOnly -- this is just silly. things that shouldn't be
reachable from outside should not have address that a routed to the
outside. i really don't like the idea of coddling the developers of
applications and embedded devices that don't take host security
seriously. IT IS NOT MY FAULT AS A ROUTER VENDOR THAT YOUR CODE IS
VULNERABLE. if you ask me to protect such hosts, then you are asking
me to encourage bad practice that relies on routers providing the
ProtectLocalOnly policy rather than just being smart about assigning
interface addresses.
6. CryptoIntercept -- this made everyone in my staff meeting laugh out
loud when i mentioned it to them. nobody wants their home gateway
doing this behind their back. i predict difficulty selling this to
users as a feature and not a bug.
7. ParanoidOpenness -- this is a very good idea. i wish we could grab
this and jam it into I-D.ietf-v6ops-cpe-simple-security draft.
--
james woodyatt <jhw@apple.com>
member of technical staff, communications engineering