David,

How are you? When you get this email, I hope you had a safe travel back
home.

After, Erik Nordmark, Thomas Narten, myself, and Wes Beebee discussed
the issue you brought to v6ops @ IETF and we summarized that your issue
will not be able to touch the router forwarding tables, why did anyone
post a security warning to FeeeBSD with totally erroneous data?

We never agreed during discussions in IETF that there was a security
problem.  All that happens with the issue you raised is creation of a
bogus entry in the router or node ND-cache. 

I don't consider the following data (shown in square brackets) in the
BSD security posting as valid:

1.

[II.  Problem Description

IPv6 routers may allow "on-link" IPv6 nodes to create and update the
router's neighbor cache and forwarding information.  A malicious IPv6
node
sharing a common router but on a different physical segment from another
node may be able to spoof Neighbor Discovery messages, allowing it to
update
router information for the victim node.]

Router forwarding table will not be updated.

2. Another false analysis is this data:

[III. Impact

An attacker on a different physical network connected to the same IPv6
router as another node could redirect IPv6 traffic intended for that
node.
This could lead to denial of service or improper access to private
network
traffic.]

Traffic will not be redirected.

So the whole premise behind the BSD warning is baseless.

But we still totally appreciate the issue you raised and the five of us
did appreciate that bullets 3-4 of on-link determination in RFC4861 did
deserve a revisit and that is why Thomas proposed the new text to be
added to our draft.  

Hemant

-----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
Pekka Savola
Sent: Thursday, October 02, 2008 3:08 AM
To: ipv6@ietf.org
Subject: Neighbor Discovery from non-neighbors

FYI,

http://security.freebsd.org/advisories/FreeBSD-SA-08:10.nd6.asc

"IPv6 routers may allow "on-link" IPv6 nodes to create and update the
router's neighbor cache and forwarding information.  A malicious IPv6
node sharing a common router but on a different physical segment from
another node may be able to spoof Neighbor Discovery messages, allowing
it to update router information for the victim node."
...

"NOTE WELL: The solution described below causes IPv6 Neighbor Discovery
Neighbor Solicitation messages from non-neighbors to be ignored. This
can be re-enabled if required by setting the newly added
net.inet6.icmp6.nd6_onlink_ns_rfc4861 sysctl to a non-zero value."

+               /*
+                * According to recent IETF discussions, it is not a
good idea
+                * to accept a NS from an address which would not be
deemed
+                * to be a neighbor otherwise.  This point is expected
to be
+                * clarified in future revisions of the specification.
+                */

I wonder if off-list discussion qualifies as "IETF discussion".  Or has
this been raised on a list somewhere?

http://www.freebsd.org/cgi/cvsweb.cgi/src/sys/netinet6/nd6_nbr.c.diff?r1
=1.52;r2=1.53

I guess we have a problem.

-- 
Pekka Savola                 "You each name yourselves king, yet the
Netcore Oy                    kingdom bleeds."
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings
--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------
--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to