On 02/09/2015 09:02 PM, Ted Lemon wrote:
> On Feb 9, 2015, at 6:48 PM, Fernando Gont <fg...@si6networks.com>
> wrote:
>> You're essentially proposing a hack to fix a known protocol design
>> flaw, instead of accepting the flaw, and allow DHCPv6-shield to
>> comply with the existing specifications/requirements (RFC7045).
> 
> How is this a hack? 

How can you positively tell whether what follow is an EH or a transport
protocol? -- You simply can't.

In your code, you assume that because something seems to be parseable by
the RFC6564 syntax, it does follow the RFC6564 syntax. And of course
that's, if anything, a hack. If there's a transport protocol that
happens to look like RFC6564, and it is followed by data that looks like
DHCPv6/UDP, your code will fail.

Your code also assumes that RFC6564 will the deployed, when
hepefuly/chances_are_that it won't. -- Because deploying RFC6564 would
essentially say "bye bye" to any new transport protocols. I keep
repeating it, and you keep ignoring it.

The question is: Are we in agreement that deploying RFC6564 would
prevent us developing any new transport protocols? And, if so, is that
what you want?




>> -- all this under the assumption that RFC6564 gets deployed. In
>> which case you're essentially declaring "game over" for any new
>> transport protocol.
> 
> Er, no, the point of this is to _not_ break new transport protocols.
> RFC 7045 does not deprecate RFC 6564.

That doesn't eliminate the flaw in RFC6564. Please see my two questions
above.

Thanks,
-- 
Fernando Gont
SI6 Networks
e-mail: fg...@si6networks.com
PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492




_______________________________________________
OPSEC mailing list
OPSEC@ietf.org
https://www.ietf.org/mailman/listinfo/opsec

Reply via email to