Skip to main content

Routing Loop Attack Using IPv6 Automatic Tunnels: Problem Statement and Proposed Mitigations
draft-ietf-v6ops-tunnel-loops-07

Revision differences

Document history

Date Rev. By Action
2012-08-22
07 (System) post-migration administrative database adjustment to the Yes position for Jari Arkko
2012-08-22
07 (System) post-migration administrative database adjustment to the No Objection position for Adrian Farrel
2012-08-22
07 (System) post-migration administrative database adjustment to the No Objection position for Russ Housley
2011-05-31
07 Cindy Morgan State changed to RFC Ed Queue from Approved-announcement sent.
2011-05-23
07 (System) IANA Action state changed to No IC from In Progress
2011-05-23
07 (System) IANA Action state changed to In Progress
2011-05-20
07 Amy Vezza IESG state changed to Approved-announcement sent
2011-05-20
07 Amy Vezza IESG has approved the document
2011-05-20
07 Amy Vezza Closed "Approve" ballot
2011-05-20
07 Amy Vezza Approval announcement text regenerated
2011-05-20
07 Amy Vezza Ballot writeup text changed
2011-05-20
07 Ron Bonica State changed to Approved-announcement to be sent from IESG Evaluation::AD Followup.
2011-05-06
07 (System) New version available: draft-ietf-v6ops-tunnel-loops-07.txt
2011-03-30
07 Stewart Bryant [Ballot Position Update] Position for Stewart Bryant has been changed to No Objection from Discuss
2011-03-30
07 Adrian Farrel [Ballot comment]
Thanks to the authors for engaging and for addressing my Discuss. I have cleared on the basis of the changes in revision -06
2011-03-30
07 Adrian Farrel [Ballot Position Update] Position for Adrian Farrel has been changed to No Objection from Discuss
2011-03-30
06 (System) New version available: draft-ietf-v6ops-tunnel-loops-06.txt
2011-03-14
05 (System) New version available: draft-ietf-v6ops-tunnel-loops-05.txt
2011-03-09
04 (System) New version available: draft-ietf-v6ops-tunnel-loops-04.txt
2011-02-11
07 Stewart Bryant
[Ballot discuss]
I do not understand what "The attacker exploits the fact that R2 does not know that R1 does not take part of T2" …
[Ballot discuss]
I do not understand what "The attacker exploits the fact that R2 does not know that R1 does not take part of T2" means.

I have tried to read section 2 a number of times and I do not understand the loop. Please re-write this section so that it clearly shows how the loop forms. When I understand how the loop forms, I will re-read the document and may have further comments.

I am concerned that R2 seems to be advertising reachability to an address that it cannot reach. It is fundamental to routing that routers must always tell the truth about what they can reach and if they do not do this loops and black holes form.
2011-02-07
07 Russ Housley
[Ballot discuss]
The Gen-ART Review by Joel Halpern on 28-Dec-2010 raises a question
  that has not been answered.  I think that a response is …
[Ballot discuss]
The Gen-ART Review by Joel Halpern on 28-Dec-2010 raises a question
  that has not been answered.  I think that a response is needed.

  Joel says:
  > It is unclear in the document what assumptions section 3.1 makes
  > about the relationship between supported tunnels and checked
  > embedded addresses.  Is there an assumption that the router only has
  > to check for addresses in the format and prefix it supports?
  The Gen-ART Review by Joel Halpern on 28-Dec-2010 raises a question
  that has not been answered.  I think that a response is needed.
2011-02-07
07 Russ Housley [Ballot Position Update] Position for Russ Housley has been changed to No Objection from Discuss
2011-02-04
03 (System) New version available: draft-ietf-v6ops-tunnel-loops-03.txt
2011-01-26
07 Jari Arkko [Ballot Position Update] Position for Jari Arkko has been changed to Yes from Discuss
2011-01-24
07 (System) Sub state has been changed to AD Follow up from New Id Needed
2011-01-24
02 (System) New version available: draft-ietf-v6ops-tunnel-loops-02.txt
2011-01-19
07 Lars Eggert Closed request for Last Call review by TSVDIR with state 'No Response'
2011-01-07
07 (System) Removed from agenda for telechat - 2011-01-06
2011-01-06
07 Cindy Morgan State changed to IESG Evaluation::Revised ID Needed from IESG Evaluation.
2011-01-06
07 Stewart Bryant
[Ballot discuss]
"based on protocol-41 encapsulation" needs a reference

I do not understand what "The attacker exploits the fact that R2 does not know that …
[Ballot discuss]
"based on protocol-41 encapsulation" needs a reference

I do not understand what "The attacker exploits the fact that R2 does not know that R1 does not take part of T2" means.

I have tried to read section 2 a number of times and I do not understand the loop. Please re-write this section so that it clearly shows how the loop forms. When I understand how the loop forms, I will re-read the document and may have further comments.

I am concerned that R2 seems to be advertising reachability to an address that it cannot reach. It is fundamental to routing that routers must always tell the truth about what they can reach and if they do not do this loops and black holes form.
2011-01-06
07 Adrian Farrel
[Ballot discuss]
Having had some time to go back and re-read this document I am now not comfortable.

1. In Figure 1, why is R2 …
[Ballot discuss]
Having had some time to go back and re-read this document I am now not comfortable.

1. In Figure 1, why is R2 advertising reachability to an IPv6 at all? It has only one point of attachment to the v6
  network. I think you are trying to say that there is a virtual link (v6 capable) running over the v4 network. Isn't
  that link simply part of the v6 network?

2. Why is R2 advertising reachability to an address that is not reachable through it? You say:
      "...destined to a fictitious end point that appears to be reached via T2..."
2011-01-06
07 Adrian Farrel [Ballot Position Update] Position for Adrian Farrel has been changed to Discuss from No Objection
2011-01-05
07 Peter Saint-Andre [Ballot comment]
Given that the document describes an attack that can result in denial of service, a reference to RFC 4732 would be appropriate.
2011-01-05
07 Peter Saint-Andre [Ballot Position Update] New position, No Objection, has been recorded
2011-01-05
07 Jari Arkko
[Ballot discuss]
This is a good document and should be published.

However, I have one concern about the described neighbor cache check
solution. First off, …
[Ballot discuss]
This is a good document and should be published.

However, I have one concern about the described neighbor cache check
solution. First off, the document is incorrect that hosts must
continuously send RSes to keep their address configuration up to date.
More importantly, the neighbor cache is just that, a cache. A better
solution would be to probe for a neighbor and only drop the packet if
there was no response. This is already described in the document.
My suggestion would be to delete the neighbor cache check solution
entirely from the document.

I think it would also be great if this document made a stronger statement
about the IMO most important use case for automatic tunnels: broadband
home networks. These are very simple networks with just one exit router
and it would be important to highlight the significance (or lack
thereof) of the attack in this case & point to the recommended solution.
2011-01-05
07 Jari Arkko [Ballot Position Update] New position, Discuss, has been recorded by Jari Arkko
2011-01-05
07 Sean Turner [Ballot Position Update] New position, No Objection, has been recorded
2011-01-05
07 Russ Housley
[Ballot discuss]
The Gen-ART Review by Joel Halpern on 28-Dec-2010 raises a question
  that has not been answered.  I think that a response is …
[Ballot discuss]
The Gen-ART Review by Joel Halpern on 28-Dec-2010 raises a question
  that has not been answered.  I think that a response is needed.

  Joel says:
  > It is unclear in the document what assumptions section 3.1 makes
  > about the relationship between supported tunnels and checked
  > embedded addresses.  Is there an assumption that the router only has
  > to check for addresses in the format and prefix it supports?
  The Gen-ART Review by Joel Halpern on 28-Dec-2010 raises a question
  that has not been answered.  I think that a response is needed.
2011-01-05
07 Russ Housley [Ballot Position Update] New position, Discuss, has been recorded
2011-01-05
07 Stewart Bryant
[Ballot discuss]
"based on protocol-41 encapsulation" needs a reference

I have tried to read section 2 a number of times and I do not understand …
[Ballot discuss]
"based on protocol-41 encapsulation" needs a reference

I have tried to read section 2 a number of times and I do not understand the loop.

I do not understand what "The attacker exploits the fact that R2 does not know that R1 does not take part of T2" means.
2011-01-05
07 Stewart Bryant [Ballot Position Update] New position, Discuss, has been recorded
2011-01-05
07 Tim Polk [Ballot comment]
Please clarify that the document's scope does not address the Teredo attacks
specified in the USENIX paper.
2011-01-05
07 Tim Polk [Ballot comment]
Placeholder comment: please clarify that the document's scope does not address the Teredo attacks
specified in the USENIX paper.
2011-01-05
07 Tim Polk [Ballot Position Update] New position, No Objection, has been recorded
2011-01-04
07 Samuel Weiler Request for Telechat review by SECDIR Completed. Reviewer: Tom Yu.
2011-01-04
07 Samuel Weiler Request for Telechat review by SECDIR is assigned to Tom Yu
2011-01-04
07 Samuel Weiler Request for Telechat review by SECDIR is assigned to Tom Yu
2011-01-04
07 Samuel Weiler Assignment of request for Last Call review by SECDIR to Yaron Sheffer was rejected
2011-01-03
07 Adrian Farrel [Ballot Position Update] New position, No Objection, has been recorded
2010-12-29
07 Ron Bonica State changed to IESG Evaluation from Waiting for AD Go-Ahead.
2010-12-29
07 (System) State changed to Waiting for AD Go-Ahead from In Last Call.
2010-12-27
07 Ron Bonica Placed on agenda for telechat - 2011-01-06 by Ron Bonica
2010-12-27
07 Ron Bonica [Ballot Position Update] New position, Yes, has been recorded for Ronald Bonica
2010-12-27
07 Ron Bonica Ballot has been issued
2010-12-27
07 Ron Bonica Created "Approve" ballot
2010-12-21
07 Amanda Baber We understand that this document does not require any IANA actions.
2010-12-17
07 David Harrington Request for Last Call review by TSVDIR is assigned to Scott Bradner
2010-12-17
07 David Harrington Request for Last Call review by TSVDIR is assigned to Scott Bradner
2010-12-16
07 Samuel Weiler Request for Last Call review by SECDIR is assigned to Yaron Sheffer
2010-12-16
07 Samuel Weiler Request for Last Call review by SECDIR is assigned to Yaron Sheffer
2010-12-15
07 Amy Vezza Last call sent
2010-12-15
07 Amy Vezza
State changed to In Last Call from Last Call Requested.

The following Last Call Announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: …
State changed to In Last Call from Last Call Requested.

The following Last Call Announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: ietf@ietf.org
Subject: Last Call:  (Routing Loop Attack using IPv6 Automatic Tunnels: Problem Statement and Proposed Mitigations) to Informational RFC


The IESG has received a request from the IPv6 Operations WG (v6ops) to
consider the following document:
- 'Routing Loop Attack using IPv6 Automatic Tunnels: Problem Statement
  and Proposed Mitigations'
  as an Informational RFC

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2010-12-29. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

The file can be obtained via
http://datatracker.ietf.org/doc/draft-ietf-v6ops-tunnel-loops/

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-ietf-v6ops-tunnel-loops/
2010-12-15
07 Ron Bonica Last Call was requested
2010-12-15
07 Ron Bonica State changed to Last Call Requested from Publication Requested.
2010-12-15
07 (System) Ballot writeup text was added
2010-12-15
07 (System) Last call text was added
2010-12-15
07 (System) Ballot approval text was added
2010-11-16
07 Amy Vezza Intended Status has been changed to Informational from Historic
2010-11-16
07 Amy Vezza [Note]: 'Joel Jaeggli (joelja@bogus.com) is the document shepherd.' added by Amy Vezza
2010-11-16
07 Amy Vezza
Document Shepherd writeup for draft-ietf-v6ops-tunnel-loops-01

Prepared by Joel Jaeggli 11/16/2010

1.a

Joel Jaeggli v6ops wg co-chair is the document shepherd for
draft-ietf-v6ops-tunnel-loops. The document shepherd …
Document Shepherd writeup for draft-ietf-v6ops-tunnel-loops-01

Prepared by Joel Jaeggli 11/16/2010

1.a

Joel Jaeggli v6ops wg co-chair is the document shepherd for
draft-ietf-v6ops-tunnel-loops. The document shepherd has read the
document, and concludes that as a result of comments received during
last call and subsequent changes that the document is prepared for
publication.

1.b

The document has been reviewed both in the v6ops working group and
passed last call. The document was socialized in softwire and elsewhere
work on ipv6 tunnels was performed, substantial comments were recived.

1.c

The shepherd believes that the documents conclusions are sound and a
will pass additional review.

1.d

The document shepherd has no such concerns.

1.e

WG last call generated some commentary on the draft. No opinions were
ventured that the document should not be published. The volume of
approval for the document was not huge, and we do not automatically
conclude that silence equals consent however we believe the the document
has received adequate coverage.

1.f

No appeals have been threatened or are anticipated.

1.g

The document passes idnits checking.

1.h

References are properly divided between normative and informative
references.

1.i

The document makes no requests of IANA. The IANA considerations sections
exists.

1.j

No formal language is present in the document.

1.k

Technical Summary

This document is concerned with security vulnerabilities in IPv6-in-
IPv4 automatic tunnels. These vulnerabilities allow an attacker to
take advantage of inconsistencies between the IPv4 routing state and
the IPv6 routing state. The attack forms a routing loop which can be
abused as a vehicle for traffic amplification to facilitate DoS
attacks. The first aim of this document is to inform on this attack
and its root causes. The second aim is to present some possible
mitigation measures.

Working Group Summary

The initial version of the document was published 10/20/09.
Subsequent to IETF 78 the document was accepted as a working group
document. Last call was completed on 10/12/10.

Document Quality

This work has benefited from discussions on the V6OPS, 6MAN and
SECDIR mailing lists. Remi Despres, Christian Huitema, Dmitry
Anipko, Dave Thaler and Fernando Gont are acknowledged for their
contributions.
2010-11-16
07 Amy Vezza Draft Added by Amy Vezza in state Publication Requested
2010-11-09
01 (System) New version available: draft-ietf-v6ops-tunnel-loops-01.txt
2010-09-11
00 (System) New version available: draft-ietf-v6ops-tunnel-loops-00.txt