Le 17 sept. 09 à 11:28, Xu Xiaohu a écrit :

As a matter of facts, ISATAP can be useful with a global IPv4 address
in a large private network that has enough global IPv4 addresses to
use them internally: this provides IPv6 connectivity to dual-stack
hosts that support ISATAP (e.g. with Windows or Linux AKAIK).

The site network could use public IPv4 address as long as the address used
as ISATAP tunnel endpoint on the ISATAP router is an address which is
unaccessible from the IPv4 Internet.

Yes.
I would also suggest to configure it this way.

But, one may want to protect the 6to4 relay WITHOUT assumptions that go beyond what the ISATAP spec says (IMHO a legitimate objective).
For this, the proposed check can do the job.

BTW, are there scenarios you are interested in where having to protect the 9th octet of IPv6 addresses is very annoying (I find it annoying myself but, well, if we have to live with it let's accept it and proceed.)

Regards,
RD



Xiaohu

Hence, I don't think the routing-loop attack prevention is a
justification
for the "IID-format constraint".

I also wish it would not have been a justification, but for the
reason above I believe it is one we have to live with :-(.

Did I miss anything?

Regards,
RD



For a brief illustration of one instance of the the attack, here is an
example:

+-------------------------------------------------------+
| IPv6                   IPv6 packet                    |
|Internet        dst6:  2002:198.16.9.9::1              |
|                src6:  2001:db8:1::200:5efe:192.88.99.1|
|                                           |           |
|                                           V           |
|          .--------------->--------------. |           |
|         /                                \|           |
+--------+----------------------------------+-----------+
         |                                  |
  2001:db8:1::/48                       2002::/16
    +---------+                        +---------+
    | ISATAP  |                        |  6to4   |
    +---------+                        +---------+
    198.16.9.9                         192.88.99.1
         |                                  |
+--------+---------+                        |
| IPv4   ^         |                        |
| site   ^         |                        |
|        ^         |                        V
|        ^         |                        |
+--------+---------+                        |
    198.16.9.0/24                           |
         |                                  |
         |                                  |
+--------+----------------------------------+-----------+
| IPv4    \                                /            |
|internet  '----------------<-------------'             |
|                 IPv6 in IPv4 packet                   |
|                  dst4: 198.16.9.9                     |
|                  src4: 192.88.99.1                    |
|                                                       |
+--------+----------------------------------+-----------+



_______________________________________________
Softwires mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/softwires

Reply via email to