Brian,

> -----Original Message-----
> From: Brian E Carpenter [mailto:brian.e.carpen...@gmail.com]
> Sent: Monday, September 14, 2009 9:03 PM
> To: Templin, Fred L
> Cc: v6ops; Christian Huitema; ipv6@ietf.org; sec...@ietf.org
> Subject: Re: Routing loop attacks using IPv6 tunnels
> 
> On 2009-09-15 04:25, Templin, Fred L wrote:
> > Brian,
> >
> >> -----Original Message-----
> >> From: Brian E Carpenter [mailto:brian.e.carpen...@gmail.com]
> >> Sent: Friday, September 11, 2009 6:27 PM
> >> To: Templin, Fred L
> >> Cc: v6ops; Christian Huitema; ipv6@ietf.org; sec...@ietf.org
> >> Subject: Re: Routing loop attacks using IPv6 tunnels
> >>
> >> On 2009-09-12 11:12, Templin, Fred L wrote:
> >>> Brian,
> >>>
> >>>> -----Original Message-----
> >>>> From: Brian E Carpenter [mailto:brian.e.carpen...@gmail.com]
> >>>> Sent: Friday, September 11, 2009 4:06 PM
> >>>> To: Templin, Fred L
> >>>> Cc: Christian Huitema; v6ops; ipv6@ietf.org; sec...@ietf.org
> >>>> Subject: Re: Routing loop attacks using IPv6 tunnels
> >>>>
> >>>> On 2009-09-12 09:13, Templin, Fred L wrote:
> >>>>
> >>>> (much text deleted)
> >>>>
> >>>>> Otherwise, the best solution IMHO
> >>>>> would be to allow only routers (and not hosts) on the
> >>>>> virtual links.
> >>>> This was of course the original intention for 6to4, so
> >>>> that any misconfiguration issues could be limited to presumably
> >>>> trusted staff and boxes. Unfortunately, reality has turned out
> >>>> to be different, with host-based automatic tunnels becoming
> >>>> popular.
> >>> Thanks. I was rethinking this a bit after sending, and
> >>> I may have been too premature in saying routers only
> >>> and not hosts.
> >>>
> >>> What I would rather have said was that mechanisms such as
> >>> SEcure Neighbor Discovery (SEND) may be helpful in private
> >>> addressing domains where spoofing is possible. Let me know
> >>> if this makes sense.
> >> Except for the practical problems involved in deploying SEND.
> >
> > Can it be said that there is any appreciable operational
> > experience with SEND yet? Are there implementations?
> 
> I'd like to know that too.
> 
> >
> >> We still have an issue in unmanaged networks.
> >
> > By "unmanaged", how unmanaged do you mean?
> 
> I was thinking of home networks, the kind where Teredo or
> 6to4 starts up spontaneously. Probably not a concern for
> ISATAP sites.

OK, thanks for the clarification. I think you probably
mean home networks where the home gateway has not yet
been turned into an ISATAP router - else, it would be
a managed network. Does that sound right?

Fred
fred.l.temp...@boeing.com

>     Brian
> 
> > ISATAP is
> > intended for networks where there is at least some modicum
> > of cooperative management. We want that it can also be used
> > in "loosly" managed networks where there is an overall mutual
> > spirit of cooperation but where site-internal link-layer
> > address spoofing may still be possible. Can SEND be used
> > for that, or do we need something else in addition (e.g.,
> > a nonce with every message)?
> >
> > Thanks - Fred
> > fred.l.temp...@boeing.com
> >
> >>     Brian
> >>
--------------------------------------------------------------------
> >> IETF IPv6 working group mailing list
> >> ipv6@ietf.org
> >> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> >>
--------------------------------------------------------------------
> >
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------
--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to