Hi, Ran,

On 07/19/2012 09:04 PM, RJ Atkinson wrote:
>> Should we make this latter bit (about this being configurable)
>> a MAY, or would you prefer to have non-RFC2119 language?
> 
> I believe this configurability is really desirable.
> It isn't a big burden for an implementer, as it is
> simply an on/off flag, but we don't want to require it.
> 
> So I would suggest either use "SHOULD support configuration of
> whether an ICMPv6 error/diagnostic message is sent" (edit to preference) 
> OR (more simply) avoid using RFC21109 ALL-CAPS wording and
> still urge that implementers support this as a configurable 
> setting as part of supporting "local operational policy".

Ok. I will craft some text, and post it to the list for review...


>>> 4) Security Considerations ought to note the importance of
>>>   deploying Source Address Forgery Prevention filters, in
>>>   order to reduce the threat of an adversary forging an
>>>   illegal packet with contains a victim/target's IP address
>>>   in the Source IPv6 Address field of the illegal packet.
>>>   [RFC-2827, RFC-3704]
>>
>> I have no problem with this.
>> However, should we really elaborate on this topic,
>> since it applies to all ICMPv6 error messages and
>> hence is probably a topic belonging to e.g. RFC 4443?
> 
> I think a brief reminder here is appropriate, in part 
> because this draft increases the attack surface a bit,
> by making illegal a previously-valid, if very odd, 
> IPv6 packet construct.

Ok. As with the above, I will craft some text and send it to the list
for review.

Cheers,
-- 
Fernando Gont
SI6 Networks
e-mail: fg...@si6networks.com
PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492





--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to