Skip to main content

Teredo Security Updates
draft-krishnan-v6ops-teredo-update-10

Revision differences

Document history

Date Rev. By Action
2012-08-22
10 (System) post-migration administrative database adjustment to the No Objection position for Tim Polk
2012-08-22
10 (System) post-migration administrative database adjustment to the No Objection position for Ralph Droms
2012-08-22
10 (System) post-migration administrative database adjustment to the No Objection position for Russ Housley
2010-06-07
10 Cindy Morgan State Changes to RFC Ed Queue from Approved-announcement sent by Cindy Morgan
2010-06-07
10 (System) IANA Action state changed to No IC from In Progress
2010-06-07
10 (System) IANA Action state changed to In Progress
2010-06-07
10 Amy Vezza IESG state changed to Approved-announcement sent
2010-06-07
10 Amy Vezza IESG has approved the document
2010-06-07
10 Amy Vezza Closed "Approve" ballot
2010-06-04
10 (System) Removed from agenda for telechat - 2010-06-03
2010-06-03
10 Cindy Morgan State Changes to Approved-announcement to be sent from IESG Evaluation by Cindy Morgan
2010-06-03
10 Tim Polk [Ballot Position Update] Position for Tim Polk has been changed to No Objection from Undefined by Tim Polk
2010-06-03
10 Tim Polk [Ballot Position Update] Position for Tim Polk has been changed to Undefined from Discuss by Tim Polk
2010-06-03
10 (System) New version available: draft-krishnan-v6ops-teredo-update-10.txt
2010-06-03
10 Gonzalo Camarillo [Ballot Position Update] New position, No Objection, has been recorded by Gonzalo Camarillo
2010-06-03
10 Russ Housley [Ballot Position Update] Position for Russ Housley has been changed to No Objection from Discuss by Russ Housley
2010-06-03
10 Robert Sparks [Ballot Position Update] New position, No Objection, has been recorded by Robert Sparks
2010-06-03
10 Dan Romascanu [Ballot Position Update] New position, No Objection, has been recorded by Dan Romascanu
2010-06-03
09 (System) New version available: draft-krishnan-v6ops-teredo-update-09.txt
2010-06-03
10 Samuel Weiler Request for Telechat review by SECDIR Completed. Reviewer: Tom Yu.
2010-06-03
10 Lars Eggert [Ballot Position Update] New position, No Objection, has been recorded by Lars Eggert
2010-06-02
10 David Harrington [Ballot Position Update] New position, No Objection, has been recorded by David Harrington
2010-06-02
08 (System) New version available: draft-krishnan-v6ops-teredo-update-08.txt
2010-06-02
10 Ron Bonica [Ballot Position Update] New position, No Objection, has been recorded by Ron Bonica
2010-06-02
10 Sean Turner [Ballot comment]
I support Tim's DISCUSS.  An additional location for more information on random #s: ftp://ftp.rfc-editor.org/in-notes/rfc4086.txt
2010-06-02
10 Sean Turner [Ballot Position Update] New position, No Objection, has been recorded by Sean Turner
2010-06-02
10 Tim Polk
[Ballot discuss]
Given the importance of random number generation to this specification,
and our long and sad experience with bad RNGs in various implementations,
I …
[Ballot discuss]
Given the importance of random number generation to this specification,
and our long and sad experience with bad RNGs in various implementations,
I would really like to see a discussion of this topic in the security
considerations with pointers to one or more informational references on
techniques for good RNGs.

Here are a couple of references that I am aware of:

NIST SP 800-90, Recommendation for Random Number Generation Using Deterministic Random Bit Generators, March 2007.
http://csrc.nist.gov/publications/nistpubs/800-90/SP800-90revised_March2007.pdf

ANSI X9.82-1:2006, Random Number Generation Part 1: Overview and Basic Principles

ANSI X9.82-3:2007, Financial Services - Random Number Generation Part 3: Deterministic Random Bit Generators

[There are certainly others, and I am not hung up on which references
you choose!]
2010-06-02
10 Tim Polk [Ballot Position Update] New position, Discuss, has been recorded by Tim Polk
2010-06-02
10 Russ Housley
[Ballot comment]
The first paragraph in the Security Considerations section states the
  goal of comparable address prediction resistance with respect to a
  host …
[Ballot comment]
The first paragraph in the Security Considerations section states the
  goal of comparable address prediction resistance with respect to a
  host directly attached to an untrusted Internet link, but nothing in
  the Security Considerations section indicates how close the technique
  in this document comes to achieving that goal.  A short discussion of
  the 13 random bits and this goal should be added.
2010-06-02
10 Russ Housley
[Ballot discuss]
This document is clearly intended to update RFC 4380.  An RFC Editor
  note already adds "Updates: 4380" to the left side …
[Ballot discuss]
This document is clearly intended to update RFC 4380.  An RFC Editor
  note already adds "Updates: 4380" to the left side of the title page.
  Please revise the first paragraph of the Introduction to indicate
  that this document updates RFC 4380.
2010-06-01
10 Ralph Droms [Ballot Position Update] Position for Ralph Droms has been changed to No Objection from Discuss by Ralph Droms
2010-06-01
10 Ralph Droms [Ballot discuss]
Discuss-discuss; I'll clear after finding out why this document is not a v6ops work item?
2010-06-01
10 Ralph Droms [Ballot Position Update] New position, Discuss, has been recorded by Ralph Droms
2010-06-01
10 Stewart Bryant [Ballot Position Update] New position, No Objection, has been recorded by Stewart Bryant
2010-06-01
10 Peter Saint-Andre [Ballot Position Update] New position, No Objection, has been recorded by Peter Saint-Andre
2010-05-31
10 Russ Housley
[Ballot comment]
Section 3.2 uses acronyms RA and RS; please expand them on first use.

  The first paragraph in the Security Considerations section states …
[Ballot comment]
Section 3.2 uses acronyms RA and RS; please expand them on first use.

  The first paragraph in the Security Considerations section states the
  goal of comparable address prediction resistance with respect to a
  host directly attached to an untrusted Internet link, but nothing in
  the Security Considerations section indicates how close the technique
  in this document comes to achieving that goal.  A short discussion of
  the 13 random bits and this goal should be added.
2010-05-31
10 Russ Housley
[Ballot discuss]
This document is clearly intended to update RFC 4380.  Please add
  "Updates: 4380 (once approved)" to the left side of the …
[Ballot discuss]
This document is clearly intended to update RFC 4380.  Please add
  "Updates: 4380 (once approved)" to the left side of the title page.
  Please revise the first paragraph of the Introduction to indicate
  that this document updates RFC 4380.

  Please add "Intended status: Standards Track" to the left side of
  the title page.
2010-05-31
10 Russ Housley [Ballot Position Update] New position, Discuss, has been recorded by Russ Housley
2010-05-31
10 Jari Arkko State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Jari Arkko
2010-05-25
10 (System) State has been changed to Waiting for AD Go-Ahead from In Last Call by system
2010-05-13
10 Amanda Baber IANA comments:

We understand this document to have NO IANA Actions.
2010-05-04
07 (System) New version available: draft-krishnan-v6ops-teredo-update-07.txt
2010-04-27
10 Samuel Weiler Request for Telechat review by SECDIR is assigned to Tom Yu
2010-04-27
10 Samuel Weiler Request for Telechat review by SECDIR is assigned to Tom Yu
2010-04-27
10 Amy Vezza Last call sent
2010-04-27
10 Amy Vezza State Changes to In Last Call from Last Call Requested by Amy Vezza
2010-04-27
10 Jari Arkko State Changes to Last Call Requested from AD Evaluation by Jari Arkko
2010-04-27
10 Jari Arkko Last Call was requested by Jari Arkko
2010-04-27
10 Jari Arkko [Ballot Position Update] New position, Yes, has been recorded for Jari Arkko
2010-04-27
10 Jari Arkko Ballot has been issued by Jari Arkko
2010-04-27
10 Jari Arkko Created "Approve" ballot
2010-04-27
10 (System) Ballot writeup text was added
2010-04-27
10 (System) Last call text was added
2010-04-27
10 (System) Ballot approval text was added
2010-04-27
10 Jari Arkko Placed on agenda for telechat - 2010-06-03 by Jari Arkko
2010-04-27
10 Jari Arkko Area acronymn has been changed to int from gen
2010-04-27
10 Jari Arkko Intended Status has been changed to Proposed Standard from None
2010-04-27
10 Jari Arkko
I have reviewed this draft and have the following comments. In general, the draft is in good shape and can move forward. I have two …
I have reviewed this draft and have the following comments. In general, the draft is in good shape and can move forward. I have two small technical issues and a few minor editorial ones. Nevertheless, I have decided to initiate last call, but I would appreciate a quick document update in the next few days to correct these issues.

Technical:
> Teredo Client: A node that has access to the IPv4 Internet and wants
> to gain access to the IPv6 Internet.
There are lots of such nodes, but not all of them are Teredo clients, i.e., implement the Teredo protocol... please correct the definition.

> Opening a hole in an enterprise firewall
> [I-D.ietf-v6ops-tunnel-security-concerns]: Teredo is NOT RECOMMENDED
> as a solution for managed networks.  Administrators of such networks
> may wish to filter all Teredo traffic at the boundaries of their
> networks.

I'm not sure the term "managed networks" is a correct one here. There are many types of managed networks, some care about blocking Teredo and some would not. Suggested rewrite:

"Opening a hole in an enterprise firewall [I-D.ietf-v6ops-tunnel-security-concerns]: Teredo is NOT RECOMMENDED as a solution for networks that wish to implement strict controls for what traffic passes to and from the Internet.  Administrators of such networks may wish to filter all Teredo traffic at the boundaries of their networks."

(Also, speaking personally, I may not completely agree with the conclusions from draft-ietf-v6ops-tunnel-security-concerns that inspection of tunneled traffic is always hard and inefficient. I think there is some room to allow firewalls to inspect tunneling traffic on top of well-known and established tunneling protocols such as Teredo.)

Editorial:

> Teredo IPv6 Address: An IPv6 address that starts with the prefix
> 2001:0000:/32 and is formed as specified in [RFC4380] section 2.14.

Wouldn't Section 4 be a better reference here?

> Teredo addresses are structured and some of the fields contained in
> them are fairly predictable.  This can be used to better predict the
> address.

I would rewrite the second sentence (which currently doesn't say much) as follows: "This makes it easier to predict an address, opening a (small) vulnerability."

>    open on a IPv4 address, prior to trying to form a Teredo address for
s/on a/on an/

> 4. Acknowledgments
> ....
> 5. Security Considerations

I think it would be better if all the technical parts of the document were explained first, followed by the acknowledgment section. That is, I think Section 5 would come more naturally before Section 4.
2010-04-26
10 Jari Arkko State Changes to AD Evaluation from Publication Requested by Jari Arkko
2010-02-02
10 Cindy Morgan Responsible AD has been changed to Jari Arkko from Mark Townsley
2010-02-02
10 Cindy Morgan State Changes to Publication Requested from Dead by Cindy Morgan
2010-02-02
10 Cindy Morgan
PROTO writeup for:
draft-thaler-v6ops-teredo-extensions-06.txt and
draft-krishnan-v6ops-teredo-update-06.txt

  (1.a)  Who is the Document Shepherd for this document?

These are individual AD-sponsored submissions.  RFC 4858 only specifies …
PROTO writeup for:
draft-thaler-v6ops-teredo-extensions-06.txt and
draft-krishnan-v6ops-teredo-update-06.txt

  (1.a)  Who is the Document Shepherd for this document?

These are individual AD-sponsored submissions.  RFC 4858 only specifies
document shepherds for WG documents.  Per Jari's suggestion, I'm
answering these questions as if I were the shepherd.

          Has the
          Document Shepherd personally reviewed this version of the
          document and, in particular, does he or she believe this
          version is ready for forwarding to the IESG for publication?

Yes.

  (1.b)  Has the document had adequate review both from key WG members
          and from key non-WG members?  Does the Document Shepherd have
          any concerns about the depth or breadth of the reviews that
          have been performed?

These documents were discussed within and reviewed by the V6OPS WG
(being the successor to NGTRANS which published RFC 4380, which these
update/extend), and went through two pseudo-WGLCs:
http://ops.ietf.org/lists/v6ops/v6ops.2009/msg00007.html
http://ops.ietf.org/lists/v6ops/v6ops.2008/msg01408.html

Comments were received on the public list from Remi Denis:
http://ops.ietf.org/lists/v6ops/v6ops.2008/msg01183.html
http://ops.ietf.org/lists/v6ops/v6ops.2008/msg01415.html
and from a bunch of others privately to the authors.

These drafts are I-D versions of a document [MS-TERE] that has been
hosted on a Microsoft site
(http://msdn.microsoft.com/en-us/library/cc247482(PROT.13).aspx)
where it has been subject to detailed review by:

* The Technical Committee (thetc.org) which is an independent
  organization tasked by the US government with reviewing and quality
  checking/reporting of Microsoft protocol documents, and

* compliance test suite developers who developed tests from the
  document and verified that the widely deployed implementation
  matches the spec, and

* by network sniffer developers who have written parsers for it. 

Much feedback from those communities has also been addressed before and
during the WGLCs.

  (1.c)  Does the Document Shepherd have concerns that the document
          needs more review from a particular or broader perspective,
          e.g., security, operational complexity, someone familiar with
          AAA, internationalization, or XML?

No concerns.

draft-krishnan-v6ops-teredo-update is a result of detailed security
reviews of RFC 4380, independently by both Symantec and Microsoft.

  (1.d)  Does the Document Shepherd have any specific concerns or
          issues with this document that the Responsible Area Director
          and/or the IESG should be aware of?  For example, perhaps he
          or she is uncomfortable with certain parts of the document, or
          has concerns whether there really is a need for it.  In any
          event, if the WG has discussed those issues and has indicated
          that it still wishes to advance the document, detail those
          concerns here.

No concerns.

          Has an IPR disclosure related to this document
          been filed?  If so, please include a reference to the
          disclosure and summarize the WG discussion and conclusion on
          this issue.

Yes.

The base Teredo RFC (RFC 4380) was in the same position when it was
approved as a Proposed Standard:
  https://datatracker.ietf.org/ipr/129/
where the declaration states it's RAND-Z for standards-track IETF documents.

The intent is that the extensions and security updates have the same
status as RFC 4380.  The disclosure on draft-thaler-v6ops-teredo-extensions
is:
  https://datatracker.ietf.org/ipr/1022/

The disclosures on draft-krishnan-v6ops-teredo-update is:
  https://datatracker.ietf.org/ipr/1042/

The declarations are again RAND-Z for standards track.

As such, the V6OPS WG saw no issues with the extensions and the security
update having the same status as the base protocol, and it being
Proposed Standard.


  (1.e)  How solid is the WG consensus behind this document?  Does it
          represent the strong concurrence of a few individuals, with
          others being silent, or does the WG as a whole understand and
          agree with it?

There were not V6OPS WG documents, but the V6OPS WG reviewed them due
to the original Teredo protocol being an NGTRANS output.  Within V6OPS,
they represent the strong concurrence of a few knowledgeable individuals,
with others being silent.  Both drafts are also widely deployed.


  (1.f)  Has anyone threatened an appeal or otherwise indicated extreme
          discontent?  If so, please summarize the areas of conflict in
          separate email messages to the Responsible Area Director.  (It
          should be in a separate email because this questionnaire is
          entered into the ID Tracker.)

No such threats or appeals.


  (1.g)  Has the Document Shepherd personally verified that the
          document satisfies all ID nits?  (See
          http://www.ietf.org/ID-Checklist.html and
          http://tools.ietf.org/tools/idnits/.)

          Boilerplate checks are
          not enough; this check needs to be thorough.  Has the document
          met all formal review criteria it needs to, such as the MIB
          Doctor, media type, and URI type reviews?

Yes.  (And there is no MIB, media type, or URI type.)

          If the document
          does not already indicate its intended status at the top of
          the first page, please indicate the intended status here.

Intended Status:  Proposed Standard


  (1.h)  Has the document split its references into normative and
          informative?

Yes.

          Are there normative references to documents that
          are not ready for advancement or are otherwise in an unclear
          state?  If such normative references exist, what is the
          strategy for their completion?  Are there normative references
          that are downward references, as described in [RFC3967]?  If
          so, list these downward references to support the Area
          Director in the Last Call procedure for them [RFC3967].

All normative references are upward references, and all are RFCs.


  (1.i)  Has the Document Shepherd verified that the document's IANA
          Considerations section exists and is consistent with the body
          of the document?

Yes.

          If the document specifies protocol
          extensions, are reservations requested in appropriate IANA
          registries?

No reservations are necessary.

          Are the IANA registries clearly identified?

N/A.

          If
          the document creates a new registry, does it define the
          proposed initial contents of the registry and an allocation
          procedure for future registrations?

The documents do not create a new IANA registry.

          Does it suggest a
          reasonable name for the new registry?  See [RFC2434].  If the
          document describes an Expert Review process, has the Document
          Shepherd conferred with the Responsible Area Director so that
          the IESG can appoint the needed Expert during IESG Evaluation?

N/A.

  (1.j)  Has the Document Shepherd verified that sections of the
          document that are written in a formal language, such as XML
          code, BNF rules, MIB definitions, etc., validate correctly in
          an automated checker?

There are no sections written in a formal language.


  (1.k)  The IESG approval announcement includes a Document
          Announcement Write-Up.  Please provide such a Document
          Announcement Write-Up.  Recent examples can be found in the
          "Action" announcements for approved documents.  The approval
          announcement contains the following sections:

          Technical Summary
            Relevant content can frequently be found in the abstract
            and/or introduction of the document.  If not, this may be
            an indication that there are deficiencies in the abstract
            or introduction.

draft-thaler-v6ops-teredo-extensions specifies a set of extensions to
the Teredo protocol.  These extensions provide additional capabilities
to Teredo, including support for more types of NATs, and support for
more efficient communication (fewer signaling packets).

draft-krishnan-v6ops-teredo-update specifies a set of security updates
for Teredo that mitigate a number of security concerns.  Specifically,
the Teredo protocol defines a set of flags that are embedded in every
Teredo IPv6 address, and this document modifies the use of this flags
field in a backwards compatible way.

Microsoft's own spec [MS-TERE] combined teredo-update and
teredo-extensions, and the same IPR (RAND-Z) declaration
applies to both.  However, the teredo-update and teredo-extensions
docs are now separate to reflect V6OPS consensus that they should be separate:

1) The former addresses the security concerns raised with
  the original RFC, while the latter adds new functionality

2) Hence teredo-update needs to UPDATE 4380, the latter
  need not be listed as such once published as an RFC.

It's also worth noting that a third document
(draft-ietf-v6ops-tunnel-security-concerns, which is not part of this
publication request) discusses security issues and potential mitigations
regarding tunneling more generally, which were identified in the security
reviews of Teredo and other protocols, and is informatively referenced
by draft-krishnan-v6ops-teredo-update. 
draft-ietf-v6ops-tunnel-security-concerns has undergone SECDIR review,
and can be treated as further elaboration on the security considerations
sections of any tunneling protocol document.  Hence the security
considerations sections of the two documents being put forward for
publication now were deemed sufficient for those documents, given this
informative reference.

The third document was originally a V6OPS WG document because it
specifies no protocol behavior, just discusses issues, and because it
was about IPv6 tunneling.  However, the scope of the document was then
broadened to apply to any types of tunneling (not just IPv6), and
that's why it was since moved to (and was reviewed in) INTAREA, where
the discussion was about whether to merge it with Joe Touch's draft
on tunneling issues unrelated to security.  Based on INTAREA discussion,
the consensus was that the community had no preference and it was up to
the authors.  Neither the authors nor Joe Touch had a preference either,
and so the decision was made to keep them separate in the interests of
avoiding useless work in merging them.


          Working Group Summary
            Was there anything in the WG process that is worth noting?
            For example, was there controversy about particular points
            or were there decisions where the consensus was
            particularly rough?

No rough areas.

draft-krishnan-v6ops-teredo-update is closely related to
draft-thaler-v6ops-teredo-extensions.  The "Teredo update"
is a set of simple security fixes to the base Teredo protocol
to reflect what actually got implemented and deployed.
(The history is that Symantec originally wrote the security concerns
document and made a number of security recommendations, which mostly
match what Vista and Windows 7 actually do, and the recommendations
were what then became teredo-update.  When the WG reviewed the
recommendations, the only ones that had WG consensus turned out to
be the same ones that Vista and Windows 7 did, and the other things
were either removed or made MAY's to reflect WG consensus.)


          Document Quality
            Are there existing implementations of the protocol?

Yes.

            Have a
            significant number of vendors indicated their plan to
            implement the specification?

Only one "full" implementation is known to exist - Windows 7 includes
all extensions specified, and Vista includes almost all of them.  However,
separate partial implementations were done by test suite compliance
developers and parser developers.


            Are there any reviewers that
            merit special mention as having done a thorough review,
            e.g., one that resulted in important changes or a
            conclusion that the document had no substantive issues?

Remi Denis made very useful comments publically during the WGLCs.  In addition, the TC previously did thorough reviews.


            If
            there was a MIB Doctor, Media Type, or other Expert Review,
            what was its course (briefly)?  In the case of a Media Type
            Review, on what date was the request posted?

N/A

          Personnel
            Who is the Document Shepherd for this document?

These are individual AD-sponsored submissions.  RFC 4858 only specifies
document shepherds for WG documents.  Per Jari's suggestion, I'm
answering these questions as if I were the shepherd.


            Who is the
            Responsible Area Director?

Jari Arkko, jari.arkko@piuha.net


            If the document requires IANA
            experts(s), insert 'The IANA Expert(s) for the registries
            in this document are .'


The documents don't require IANA experts as there are no IANA actions.



  The Document Shepherd MUST send the Document Shepherd Write-Up to the
  Responsible Area Director and iesg-secretary@ietf.org together with
  the request to publish the document.  The Document Shepherd SHOULD
  also send the entire Document Shepherd Write-Up to the working group
  mailing list.  If the Document Shepherd feels that information which
  may prove to be sensitive, may lead to possible appeals, or is
  personal needs to be written up, it SHOULD be sent in direct email to
  the Responsible Area Director, because the Document Shepherd Write-Up
  is published openly in the ID Tracker.  Question (1.f) of the
  Write-Up covers any material of this nature and specifies this more
  confidential handling.
2010-02-02
06 (System) New version available: draft-krishnan-v6ops-teredo-update-06.txt
2010-01-03
10 (System) Document has expired
2009-07-03
05 (System) New version available: draft-krishnan-v6ops-teredo-update-05.txt
2009-04-17
10 (System) State Changes to Dead from AD is watching by system
2009-04-17
10 (System) Document has expired
2008-12-08
(System) Posted related IPR disclosure: Microsoft Corporation's Statement about IPR related to draft-krishnan-v6ops-teredo-update-04
2008-11-14
(System) Posted related IPR disclosure: Microsoft Corporation's Statement about IPR related to draft-krishnan-v6ops-teredo-update-04
2008-10-15
04 (System) New version available: draft-krishnan-v6ops-teredo-update-04.txt
2008-08-19
10 Samuel Weiler Request for Early review by SECDIR Completed. Reviewer: Tom Yu.
2008-08-06
10 Samuel Weiler Request for Early review by SECDIR is assigned to Tom Yu
2008-08-06
10 Samuel Weiler Request for Early review by SECDIR is assigned to Tom Yu
2008-08-05
10 Mark Townsley Draft Added by Mark Townsley in state AD is watching
2008-07-30
(System) Posted related IPR disclosure: Microsoft Corporation's Statement about IPR related to draft-krishnan-v6ops-teredo-update-03
2008-07-14
03 (System) New version available: draft-krishnan-v6ops-teredo-update-03.txt
2008-02-25
02 (System) New version available: draft-krishnan-v6ops-teredo-update-02.txt
2007-11-17
01 (System) New version available: draft-krishnan-v6ops-teredo-update-01.txt
2007-11-11
00 (System) New version available: draft-krishnan-v6ops-teredo-update-00.txt