Routing Loop Attack Using IPv6 Automatic Tunnels: Problem Statement and Proposed Mitigations
draft-ietf-v6ops-tunnel-loops-07
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2012-08-22
|
07 | (System) | post-migration administrative database adjustment to the Yes position for Jari Arkko |
2012-08-22
|
07 | (System) | post-migration administrative database adjustment to the No Objection position for Adrian Farrel |
2012-08-22
|
07 | (System) | post-migration administrative database adjustment to the No Objection position for Russ Housley |
2011-05-31
|
07 | Cindy Morgan | State changed to RFC Ed Queue from Approved-announcement sent. |
2011-05-23
|
07 | (System) | IANA Action state changed to No IC from In Progress |
2011-05-23
|
07 | (System) | IANA Action state changed to In Progress |
2011-05-20
|
07 | Amy Vezza | IESG state changed to Approved-announcement sent |
2011-05-20
|
07 | Amy Vezza | IESG has approved the document |
2011-05-20
|
07 | Amy Vezza | Closed "Approve" ballot |
2011-05-20
|
07 | Amy Vezza | Approval announcement text regenerated |
2011-05-20
|
07 | Amy Vezza | Ballot writeup text changed |
2011-05-20
|
07 | Ron Bonica | State changed to Approved-announcement to be sent from IESG Evaluation::AD Followup. |
2011-05-06
|
07 | (System) | New version available: draft-ietf-v6ops-tunnel-loops-07.txt |
2011-03-30
|
07 | Stewart Bryant | [Ballot Position Update] Position for Stewart Bryant has been changed to No Objection from Discuss |
2011-03-30
|
07 | Adrian Farrel | [Ballot comment] Thanks to the authors for engaging and for addressing my Discuss. I have cleared on the basis of the changes in revision -06 |
2011-03-30
|
07 | Adrian Farrel | [Ballot Position Update] Position for Adrian Farrel has been changed to No Objection from Discuss |
2011-03-30
|
06 | (System) | New version available: draft-ietf-v6ops-tunnel-loops-06.txt |
2011-03-14
|
05 | (System) | New version available: draft-ietf-v6ops-tunnel-loops-05.txt |
2011-03-09
|
04 | (System) | New version available: draft-ietf-v6ops-tunnel-loops-04.txt |
2011-02-11
|
07 | Stewart Bryant | [Ballot discuss] I do not understand what "The attacker exploits the fact that R2 does not know that R1 does not take part of T2" … [Ballot discuss] I do not understand what "The attacker exploits the fact that R2 does not know that R1 does not take part of T2" means. I have tried to read section 2 a number of times and I do not understand the loop. Please re-write this section so that it clearly shows how the loop forms. When I understand how the loop forms, I will re-read the document and may have further comments. I am concerned that R2 seems to be advertising reachability to an address that it cannot reach. It is fundamental to routing that routers must always tell the truth about what they can reach and if they do not do this loops and black holes form. |
2011-02-07
|
07 | Russ Housley | [Ballot discuss] The Gen-ART Review by Joel Halpern on 28-Dec-2010 raises a question that has not been answered. I think that a response is … [Ballot discuss] The Gen-ART Review by Joel Halpern on 28-Dec-2010 raises a question that has not been answered. I think that a response is needed. Joel says: > It is unclear in the document what assumptions section 3.1 makes > about the relationship between supported tunnels and checked > embedded addresses. Is there an assumption that the router only has > to check for addresses in the format and prefix it supports? The Gen-ART Review by Joel Halpern on 28-Dec-2010 raises a question that has not been answered. I think that a response is needed. |
2011-02-07
|
07 | Russ Housley | [Ballot Position Update] Position for Russ Housley has been changed to No Objection from Discuss |
2011-02-04
|
03 | (System) | New version available: draft-ietf-v6ops-tunnel-loops-03.txt |
2011-01-26
|
07 | Jari Arkko | [Ballot Position Update] Position for Jari Arkko has been changed to Yes from Discuss |
2011-01-24
|
07 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2011-01-24
|
02 | (System) | New version available: draft-ietf-v6ops-tunnel-loops-02.txt |
2011-01-19
|
07 | Lars Eggert | Closed request for Last Call review by TSVDIR with state 'No Response' |
2011-01-07
|
07 | (System) | Removed from agenda for telechat - 2011-01-06 |
2011-01-06
|
07 | Cindy Morgan | State changed to IESG Evaluation::Revised ID Needed from IESG Evaluation. |
2011-01-06
|
07 | Stewart Bryant | [Ballot discuss] "based on protocol-41 encapsulation" needs a reference I do not understand what "The attacker exploits the fact that R2 does not know that … [Ballot discuss] "based on protocol-41 encapsulation" needs a reference I do not understand what "The attacker exploits the fact that R2 does not know that R1 does not take part of T2" means. I have tried to read section 2 a number of times and I do not understand the loop. Please re-write this section so that it clearly shows how the loop forms. When I understand how the loop forms, I will re-read the document and may have further comments. I am concerned that R2 seems to be advertising reachability to an address that it cannot reach. It is fundamental to routing that routers must always tell the truth about what they can reach and if they do not do this loops and black holes form. |
2011-01-06
|
07 | Adrian Farrel | [Ballot discuss] Having had some time to go back and re-read this document I am now not comfortable. 1. In Figure 1, why is R2 … [Ballot discuss] Having had some time to go back and re-read this document I am now not comfortable. 1. In Figure 1, why is R2 advertising reachability to an IPv6 at all? It has only one point of attachment to the v6 network. I think you are trying to say that there is a virtual link (v6 capable) running over the v4 network. Isn't that link simply part of the v6 network? 2. Why is R2 advertising reachability to an address that is not reachable through it? You say: "...destined to a fictitious end point that appears to be reached via T2..." |
2011-01-06
|
07 | Adrian Farrel | [Ballot Position Update] Position for Adrian Farrel has been changed to Discuss from No Objection |
2011-01-05
|
07 | Peter Saint-Andre | [Ballot comment] Given that the document describes an attack that can result in denial of service, a reference to RFC 4732 would be appropriate. |
2011-01-05
|
07 | Peter Saint-Andre | [Ballot Position Update] New position, No Objection, has been recorded |
2011-01-05
|
07 | Jari Arkko | [Ballot discuss] This is a good document and should be published. However, I have one concern about the described neighbor cache check solution. First off, … [Ballot discuss] This is a good document and should be published. However, I have one concern about the described neighbor cache check solution. First off, the document is incorrect that hosts must continuously send RSes to keep their address configuration up to date. More importantly, the neighbor cache is just that, a cache. A better solution would be to probe for a neighbor and only drop the packet if there was no response. This is already described in the document. My suggestion would be to delete the neighbor cache check solution entirely from the document. I think it would also be great if this document made a stronger statement about the IMO most important use case for automatic tunnels: broadband home networks. These are very simple networks with just one exit router and it would be important to highlight the significance (or lack thereof) of the attack in this case & point to the recommended solution. |
2011-01-05
|
07 | Jari Arkko | [Ballot Position Update] New position, Discuss, has been recorded by Jari Arkko |
2011-01-05
|
07 | Sean Turner | [Ballot Position Update] New position, No Objection, has been recorded |
2011-01-05
|
07 | Russ Housley | [Ballot discuss] The Gen-ART Review by Joel Halpern on 28-Dec-2010 raises a question that has not been answered. I think that a response is … [Ballot discuss] The Gen-ART Review by Joel Halpern on 28-Dec-2010 raises a question that has not been answered. I think that a response is needed. Joel says: > It is unclear in the document what assumptions section 3.1 makes > about the relationship between supported tunnels and checked > embedded addresses. Is there an assumption that the router only has > to check for addresses in the format and prefix it supports? The Gen-ART Review by Joel Halpern on 28-Dec-2010 raises a question that has not been answered. I think that a response is needed. |
2011-01-05
|
07 | Russ Housley | [Ballot Position Update] New position, Discuss, has been recorded |
2011-01-05
|
07 | Stewart Bryant | [Ballot discuss] "based on protocol-41 encapsulation" needs a reference I have tried to read section 2 a number of times and I do not understand … [Ballot discuss] "based on protocol-41 encapsulation" needs a reference I have tried to read section 2 a number of times and I do not understand the loop. I do not understand what "The attacker exploits the fact that R2 does not know that R1 does not take part of T2" means. |
2011-01-05
|
07 | Stewart Bryant | [Ballot Position Update] New position, Discuss, has been recorded |
2011-01-05
|
07 | Tim Polk | [Ballot comment] Please clarify that the document's scope does not address the Teredo attacks specified in the USENIX paper. |
2011-01-05
|
07 | Tim Polk | [Ballot comment] Placeholder comment: please clarify that the document's scope does not address the Teredo attacks specified in the USENIX paper. |
2011-01-05
|
07 | Tim Polk | [Ballot Position Update] New position, No Objection, has been recorded |
2011-01-04
|
07 | Sam Weiler | Request for Telechat review by SECDIR Completed. Reviewer: Tom Yu. |
2011-01-04
|
07 | Sam Weiler | Request for Telechat review by SECDIR is assigned to Tom Yu |
2011-01-04
|
07 | Sam Weiler | Request for Telechat review by SECDIR is assigned to Tom Yu |
2011-01-04
|
07 | Sam Weiler | Assignment of request for Last Call review by SECDIR to Yaron Sheffer was rejected |
2011-01-03
|
07 | Adrian Farrel | [Ballot Position Update] New position, No Objection, has been recorded |
2010-12-29
|
07 | Ron Bonica | State changed to IESG Evaluation from Waiting for AD Go-Ahead. |
2010-12-29
|
07 | (System) | State changed to Waiting for AD Go-Ahead from In Last Call. |
2010-12-27
|
07 | Ron Bonica | Placed on agenda for telechat - 2011-01-06 by Ron Bonica |
2010-12-27
|
07 | Ron Bonica | [Ballot Position Update] New position, Yes, has been recorded for Ronald Bonica |
2010-12-27
|
07 | Ron Bonica | Ballot has been issued |
2010-12-27
|
07 | Ron Bonica | Created "Approve" ballot |
2010-12-21
|
07 | Amanda Baber | We understand that this document does not require any IANA actions. |
2010-12-17
|
07 | David Harrington | Request for Last Call review by TSVDIR is assigned to Scott Bradner |
2010-12-17
|
07 | David Harrington | Request for Last Call review by TSVDIR is assigned to Scott Bradner |
2010-12-16
|
07 | Sam Weiler | Request for Last Call review by SECDIR is assigned to Yaron Sheffer |
2010-12-16
|
07 | Sam Weiler | Request for Last Call review by SECDIR is assigned to Yaron Sheffer |
2010-12-15
|
07 | Amy Vezza | Last call sent |
2010-12-15
|
07 | Amy Vezza | State changed to In Last Call from Last Call Requested. The following Last Call Announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: … State changed to In Last Call from Last Call Requested. The following Last Call Announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: ietf@ietf.org Subject: Last Call: (Routing Loop Attack using IPv6 Automatic Tunnels: Problem Statement and Proposed Mitigations) to Informational RFC The IESG has received a request from the IPv6 Operations WG (v6ops) to consider the following document: - 'Routing Loop Attack using IPv6 Automatic Tunnels: Problem Statement and Proposed Mitigations' as an Informational RFC The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2010-12-29. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. The file can be obtained via http://datatracker.ietf.org/doc/draft-ietf-v6ops-tunnel-loops/ IESG discussion can be tracked via http://datatracker.ietf.org/doc/draft-ietf-v6ops-tunnel-loops/ |
2010-12-15
|
07 | Ron Bonica | Last Call was requested |
2010-12-15
|
07 | Ron Bonica | State changed to Last Call Requested from Publication Requested. |
2010-12-15
|
07 | (System) | Ballot writeup text was added |
2010-12-15
|
07 | (System) | Last call text was added |
2010-12-15
|
07 | (System) | Ballot approval text was added |
2010-11-16
|
07 | Amy Vezza | Intended Status has been changed to Informational from Historic |
2010-11-16
|
07 | Amy Vezza | [Note]: 'Joel Jaeggli (joelja@bogus.com) is the document shepherd.' added by Amy Vezza |
2010-11-16
|
07 | Amy Vezza | Document Shepherd writeup for draft-ietf-v6ops-tunnel-loops-01 Prepared by Joel Jaeggli 11/16/2010 1.a Joel Jaeggli v6ops wg co-chair is the document shepherd for draft-ietf-v6ops-tunnel-loops. The document shepherd … Document Shepherd writeup for draft-ietf-v6ops-tunnel-loops-01 Prepared by Joel Jaeggli 11/16/2010 1.a Joel Jaeggli v6ops wg co-chair is the document shepherd for draft-ietf-v6ops-tunnel-loops. The document shepherd has read the document, and concludes that as a result of comments received during last call and subsequent changes that the document is prepared for publication. 1.b The document has been reviewed both in the v6ops working group and passed last call. The document was socialized in softwire and elsewhere work on ipv6 tunnels was performed, substantial comments were recived. 1.c The shepherd believes that the documents conclusions are sound and a will pass additional review. 1.d The document shepherd has no such concerns. 1.e WG last call generated some commentary on the draft. No opinions were ventured that the document should not be published. The volume of approval for the document was not huge, and we do not automatically conclude that silence equals consent however we believe the the document has received adequate coverage. 1.f No appeals have been threatened or are anticipated. 1.g The document passes idnits checking. 1.h References are properly divided between normative and informative references. 1.i The document makes no requests of IANA. The IANA considerations sections exists. 1.j No formal language is present in the document. 1.k Technical Summary This document is concerned with security vulnerabilities in IPv6-in- IPv4 automatic tunnels. These vulnerabilities allow an attacker to take advantage of inconsistencies between the IPv4 routing state and the IPv6 routing state. The attack forms a routing loop which can be abused as a vehicle for traffic amplification to facilitate DoS attacks. The first aim of this document is to inform on this attack and its root causes. The second aim is to present some possible mitigation measures. Working Group Summary The initial version of the document was published 10/20/09. Subsequent to IETF 78 the document was accepted as a working group document. Last call was completed on 10/12/10. Document Quality This work has benefited from discussions on the V6OPS, 6MAN and SECDIR mailing lists. Remi Despres, Christian Huitema, Dmitry Anipko, Dave Thaler and Fernando Gont are acknowledged for their contributions. |
2010-11-16
|
07 | Amy Vezza | Draft Added by Amy Vezza in state Publication Requested |
2010-11-09
|
01 | (System) | New version available: draft-ietf-v6ops-tunnel-loops-01.txt |
2010-09-11
|
00 | (System) | New version available: draft-ietf-v6ops-tunnel-loops-00.txt |