Security Considerations for 6to4
RFC 3964
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2020-01-21
|
04 | (System) | Received changes through RFC Editor sync (added Verified Errata tag) |
2012-08-22
|
04 | (System) | post-migration administrative database adjustment to the No Objection position for Scott Hollenbeck |
2012-08-22
|
04 | (System) | post-migration administrative database adjustment to the No Objection position for Ted Hardie |
2004-12-07
|
04 | Amy Vezza | State Changes to RFC Published from RFC Ed Queue by Amy Vezza |
2004-12-07
|
04 | Amy Vezza | [Note]: 'RFC 3964' added by Amy Vezza |
2004-12-03
|
04 | (System) | RFC published |
2004-08-17
|
04 | Amy Vezza | State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza |
2004-08-16
|
04 | Amy Vezza | IESG state changed to Approved-announcement sent |
2004-08-16
|
04 | Amy Vezza | IESG has approved the document |
2004-08-16
|
04 | Amy Vezza | Closed "Approve" ballot |
2004-08-13
|
04 | David Kessens | State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by David Kessens |
2004-07-21
|
04 | Ted Hardie | [Ballot Position Update] Position for Ted Hardie has been changed to No Objection from Undefined by Ted Hardie |
2004-07-21
|
04 | Scott Hollenbeck | [Ballot Position Update] Position for Scott Hollenbeck has been changed to No Objection from Discuss by Scott Hollenbeck |
2004-07-20
|
04 | (System) | New version available: draft-ietf-v6ops-6to4-security-04.txt |
2004-07-09
|
04 | (System) | Removed from agenda for telechat - 2004-07-08 |
2004-07-08
|
04 | Amy Vezza | State Changes to IESG Evaluation::AD Followup from IESG Evaluation by Amy Vezza |
2004-07-08
|
04 | Alex Zinin | [Ballot Position Update] New position, No Objection, has been recorded for Alex Zinin by Alex Zinin |
2004-07-08
|
04 | Margaret Cullen | [Ballot Position Update] New position, No Objection, has been recorded for Margaret Wasserman by Margaret Wasserman |
2004-07-08
|
04 | Bill Fenner | [Ballot Position Update] New position, No Objection, has been recorded for Bill Fenner by Bill Fenner |
2004-07-06
|
04 | Steven Bellovin | [Ballot Position Update] New position, No Objection, has been recorded for Steve Bellovin by Steve Bellovin |
2004-07-06
|
04 | David Kessens | Note: Red Team |
2004-07-06
|
04 | Ted Hardie | [Ballot discuss] In 3.1, the document says: o Disallow traffic that has private, broadcast or reserved IPv4 addresses in tunnels, or … [Ballot discuss] In 3.1, the document says: o Disallow traffic that has private, broadcast or reserved IPv4 addresses in tunnels, or the matching 6to4 prefixes. It is not clear whether the "reserved IPv4 addresses" mentioned here include the unallocated address space, or only those set aside for special purposes. This is important because of the relative work involved between tracking currently unallocated space and tracking space set aside. Keeping up-to-date filter lists for the first is a major undertaking, and there are screams of pain from the first provider to get an allocation from a previously unallocated block. Things like Team Cymru's Bogon reference page and route server help, but it is still a lot of work that *everyone* has to do. In general, the draft is very free with describing mitigations that impose a hefty (and unspecified burden)--for example: Malicious native IPv6 nodes could be caught easily if ingress filtering was enabled everywhere in the IPv6 Internet. I think the draft needs to describe the amount of effort associated with the mitigation, and to focus on *who* needs to do the work. Work that can be done by the 6to4 relay operator has a hope of success--work that relies on *anything* being "enable everywhere" does not. Section 6.2 does this to some extent, but I think the document would be more valuable if it were extended greatly. Section 4.2.6 says: Further, when someone is filing complaints to the owner of 192.88.99.0/24, they notice multiple WHOIS records and see a pointer At least at the moment, this is not accurate. A single record is returned from ARIN with a pointer to IANA, noting that it is reserved and giving a reference to 3068: NetRange: 192.88.99.0 - 192.88.99.255 CIDR: 192.88.99.0/24 NetName: IANA-192 NetHandle: NET-192-88-99-0-1 Parent: NET-192-0-0-0-0 NetType: IANA Special Use Comment: This block is reserved for special purposes. Comment: Please see RFC 3068 for additional information. Comment: RegDate: Updated: 2002-09-16 |
2004-07-06
|
04 | Ted Hardie | [Ballot discuss] In 3.1, the document says: o Disallow traffic that has private, broadcast or reserved IPv4 addresses in tunnels, or … [Ballot discuss] In 3.1, the document says: o Disallow traffic that has private, broadcast or reserved IPv4 addresses in tunnels, or the matching 6to4 prefixes. It is not clear whether the "reserved IPv4 addresses" mentioned here include the unallocated address space, or only those set aside for special purposes. This is important because of the relative work involved between tracking currently unallocated space and tracking space set aside. Keeping up-to-date filter lists for the first is a major undertaking, and there are screams of pain from the first provider to get an allocation from a previously unallocated block. Things like Team Cymru's Bogon reference page and route server help, but it is still a lot of work that *everyone* has to do. In general, the draft is very free with describing mitigations that impose a hefty (and unspecified burden)--for example: Malicious native IPv6 nodes could be caught easily if ingress filtering was enabled everywhere in the IPv6 Internet. I think the draft needs to describe the amount of effort associated with the mitigation, and to focus on *who* needs to do the work. Work that can be done by the 6to4 relay operator has a hope of success--work that relies on *anything* being "enable everywhere" does not. Section 6.2 does this to some extent, but I think the document would be more valuable if it were extended greatly. Section 4.2.6 says: Further, when someone is filing complaints to the owner of 192.88.99.0/24, they notice multiple WHOIS records and see a pointer At least at the moment, this is not accurate. A single record is returned from ARIN with a pointer to IANA, noting that it is reserved and giving a reference to 3068: NetRange: 192.88.99.0 - 192.88.99.255 CIDR: 192.88.99.0/24 NetName: IANA-192 NetHandle: NET-192-88-99-0-1 Parent: NET-192-0-0-0-0 NetType: IANA Special Use Comment: This block is reserved for special purposes. Comment: Please see RFC 3068 for additional information. Comment: RegDate: Updated: 2002-09-16 |
2004-07-06
|
04 | Ted Hardie | [Ballot Position Update] Position for Ted Hardie has been changed to Undefined from Discuss by Ted Hardie |
2004-07-06
|
04 | Ted Hardie | [Ballot Position Update] New position, Discuss, has been recorded for Ted Hardie by Ted Hardie |
2004-07-01
|
04 | Scott Hollenbeck | [Ballot discuss] Section 4: The text notes that "the IPv4 address blocks 8.0.0.0/24 and 9.0.0.0/24 are only used for demonstrative purposes, and represent global IPv4 … [Ballot discuss] Section 4: The text notes that "the IPv4 address blocks 8.0.0.0/24 and 9.0.0.0/24 are only used for demonstrative purposes, and represent global IPv4 addresses". These two address blocks are assigned to BBN and IBM and shouldn't be used for examples. Per RFC 3330, 192.0.2.0/24 is set aside for use in "for use in documentation and example code". Is there a reason that these two in-use address blocks are being used in examples? I didn't check the IPv6 examples. |
2004-07-01
|
04 | Scott Hollenbeck | [Ballot Position Update] Position for Scott Hollenbeck has been changed to Discuss from Undefined by Scott Hollenbeck |
2004-07-01
|
04 | Scott Hollenbeck | [Ballot Position Update] New position, Undefined, has been recorded for Scott Hollenbeck by Scott Hollenbeck |
2004-06-30
|
04 | David Kessens | Placed on agenda for telechat - 2004-07-08 by David Kessens |
2004-06-30
|
04 | David Kessens | State Changes to IESG Evaluation from AD Evaluation by David Kessens |
2004-06-30
|
04 | David Kessens | [Ballot Position Update] New position, Yes, has been recorded for David Kessens |
2004-06-30
|
04 | David Kessens | Ballot has been issued by David Kessens |
2004-06-30
|
04 | David Kessens | Created "Approve" ballot |
2004-06-30
|
04 | (System) | Ballot writeup text was added |
2004-06-30
|
04 | (System) | Last call text was added |
2004-06-30
|
04 | (System) | Ballot approval text was added |
2004-06-29
|
04 | David Kessens | State Changes to AD Evaluation from Publication Requested by David Kessens |
2004-06-24
|
04 | Dinara Suleymanova | Draft Added by Dinara Suleymanova in state Publication Requested |
2004-06-18
|
03 | (System) | New version available: draft-ietf-v6ops-6to4-security-03.txt |
2004-03-12
|
02 | (System) | New version available: draft-ietf-v6ops-6to4-security-02.txt |
2004-02-10
|
01 | (System) | New version available: draft-ietf-v6ops-6to4-security-01.txt |
2003-10-08
|
00 | (System) | New version available: draft-ietf-v6ops-6to4-security-00.txt |