Hi,

My thanks to all of the editors for their joint work to sort out
these drafts and to progress them together.  It is substantial
work to undertake.  The drafts generally seem fine and are
eminently readable.

However, the "Security Considerations" for both 
draft-ietf-6man-flow-ecmp-02 and draft-ietf-6man-flow-3697bis 
seem not to mention the issue where the IPv6 Flow Label field
is a relatively high-bandwidth covert channel.  This means the
Security Considerations for those 2 I-Ds are incomplete.

I'm pleased that the covert channel issue is discussed on page 4 
of draft-ietf-6man-flow-update-05.  This covert channel issue is 
one reason why a number of deployed IPv6-capable firewalls (and 
other similar security appliances) clear the IPv6 Flow Label 
(e.g. in financial/trading environments where M&A information 
has very high monetary value).  

I request that this operational security concern, which is entirely 
legitimate albeit not applicable to all operational environments, 
at least be mentioned at the top of page 11 of draft-ietf-6man-flow-3697bis 
(i.e. where the fact that Flow Labels will continue to be zeroed 
in some deployments is noted).  At present, the words there seem 
to imply that the zeroing behaviour is illogical, silly, and/or wrong 
-- when in fact it is logical, sensible, and quite correct in certain 
deployments.  I would be MUCH happier if the wording were changed
to allow an "operational security" exception to the general 
principle of not modifying non-zero IPv6 Flow Labels during transit.
For example, the wording could say that network devices ought
not modify non-zero IPv6 Flow Labels *by default*, leaving it
open for users with particular security concerns to configure
a non-default configuration (i.e. zeroing the Flow Label).

I request that at least a brief mention of the covert channel
issue be made in the Security Considerations sections of both 
draft-ietf-6man-flow-ecmp and draft-ietf-6man-flow-3697bis.
If desired, such mentions could refer to the Gont draft or 
to the -3697bis draft for more detailed discussion of that
issue.

I am troubled by the apparent decision to ignore legitimate
operational security considerations (e.g. about covert channels) 
and also the apparent decision to write these documents 
in a manner intended to legislate reasonable security measures 
(if applicable only in selected deployments) out of existence.
This seems to be a case of the IETF levying deployment
constraints upon users/operators, which is something that the
IETF generally tries to avoid.

Yours,

Ran Atkinson

--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to