Generally I support the draft, but I also agree with comments about
firewalls.

To make this idea work, I would suggest changing word "must" to word
"SHOULD" in definition of Hdr Options parameters.
Designers of these additional headers have to acknowledge the fact that
there is no guarantee of delivery of unknown headers over firewalls in any
case.

I also have concern about mandatory "ICMP Parameter problem" message
required by second bit in the Hdr Options. While generally this is a nice
idea, it could be abused to start a reflection attack. Obviously in real
life this will be mitigated by control plane policing and other
traditional security measures, but draft does not permit that.
Replacing "must" with a "SHOULD" will fix this problem as well.

Have you considered an option to allow a device that does not understand
extension header to remove just the unknown header and continue processing
the packet?
 


Best Regards,
Yaroslav



On 4/1/11 12:43 AM, "Fernando Gont" <ferna...@gont.com.ar> wrote:

>On 03/01/2011 06:25 p.m., Brian E Carpenter wrote:
>
>> The basic motivation for the present draft is clear:
>> 
>>>    However,
>>>    some intermediate nodes such as firewalls, may need to look at the
>>>    transport layer header fields in order to make a decision to allow
>>>or
>>>    deny the packet.
>> 
>> That is, help middleboxes to violate e2e transparency and, furthermore,
>> allow unknown headers to cross those middleboxes.
>
>I don't think this I-D will make a difference.
>
>From the POV of a firewall, unless it really wants a packet to
>pass-through, it will block it.
>
>So, whether the Extension Header is unknown, or whether
>draft-ietf-6man-exthdr-01.txt is implemented and the Specific type is
>unknown will lead to the same result: the packet will be discarded.
>
>This proposal would only be useful to firewalls that implement a
>"default allow", and that simply want to somehow ignore an unknown
>extension header and base their decision on the upper-layer protocol
>(only). -- But we all know that firewalls operate (or should operate) in
>"default deny" rather than "default allow".
>
>So IMHO this proposal won't be useful for such firewalls.
>
>Thanks,
>-- 
>Fernando Gont
>e-mail: ferna...@gont.com.ar || fg...@acm.org
>PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1
>
>
>
>
>--------------------------------------------------------------------
>IETF IPv6 working group mailing list
>ipv6@ietf.org
>Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
>--------------------------------------------------------------------

--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to