Skip to main content

Security Considerations for 6to4
RFC 3964

Revision differences

Document history

Date Rev. By Action
2020-01-21
04 (System) Received changes through RFC Editor sync (added Verified Errata tag)
2012-08-22
04 (System) post-migration administrative database adjustment to the No Objection position for Scott Hollenbeck
2012-08-22
04 (System) post-migration administrative database adjustment to the No Objection position for Ted Hardie
2004-12-07
04 Amy Vezza State Changes to RFC Published from RFC Ed Queue by Amy Vezza
2004-12-07
04 Amy Vezza [Note]: 'RFC 3964' added by Amy Vezza
2004-12-03
04 (System) RFC published
2004-08-17
04 Amy Vezza State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza
2004-08-16
04 Amy Vezza IESG state changed to Approved-announcement sent
2004-08-16
04 Amy Vezza IESG has approved the document
2004-08-16
04 Amy Vezza Closed "Approve" ballot
2004-08-13
04 David Kessens State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by David Kessens
2004-07-21
04 Ted Hardie [Ballot Position Update] Position for Ted Hardie has been changed to No Objection from Undefined by Ted Hardie
2004-07-21
04 Scott Hollenbeck [Ballot Position Update] Position for Scott Hollenbeck has been changed to No Objection from Discuss by Scott Hollenbeck
2004-07-20
04 (System) New version available: draft-ietf-v6ops-6to4-security-04.txt
2004-07-09
04 (System) Removed from agenda for telechat - 2004-07-08
2004-07-08
04 Amy Vezza State Changes to IESG Evaluation::AD Followup from IESG Evaluation by Amy Vezza
2004-07-08
04 Alex Zinin [Ballot Position Update] New position, No Objection, has been recorded for Alex Zinin by Alex Zinin
2004-07-08
04 Margaret Cullen [Ballot Position Update] New position, No Objection, has been recorded for Margaret Wasserman by Margaret Wasserman
2004-07-08
04 Bill Fenner [Ballot Position Update] New position, No Objection, has been recorded for Bill Fenner by Bill Fenner
2004-07-06
04 Steven Bellovin [Ballot Position Update] New position, No Objection, has been recorded for Steve Bellovin by Steve Bellovin
2004-07-06
04 David Kessens Note: Red Team
2004-07-06
04 Ted Hardie
[Ballot discuss]
In 3.1, the document says:

  o  Disallow traffic that has private, broadcast or reserved IPv4
      addresses in tunnels, or …
[Ballot discuss]
In 3.1, the document says:

  o  Disallow traffic that has private, broadcast or reserved IPv4
      addresses in tunnels, or the matching 6to4 prefixes.

It is not clear whether the "reserved IPv4 addresses" mentioned
here include the unallocated address space, or only those
set aside for special purposes.

This is important because of the relative work involved between
tracking currently unallocated space and tracking space set
aside.  Keeping up-to-date filter lists for the first is a major
undertaking, and there are screams of pain from the first
provider to get an allocation from a previously unallocated
block.  Things like Team Cymru's Bogon reference page
and route server help, but it is still a lot of work that
*everyone* has to do.

In general, the draft is very free with describing mitigations
that impose a hefty (and unspecified burden)--for example:

  Malicious native IPv6 nodes could be caught easily if ingress
  filtering was enabled everywhere in the IPv6 Internet.

I think the draft needs to describe the amount of effort associated
with the mitigation, and to focus on *who* needs to do the work.
Work that can be done by the 6to4 relay operator has a hope
of success--work that relies on *anything* being "enable everywhere"
does not.  Section 6.2 does this to some extent, but I think
the document would be more valuable if it were extended greatly.


Section 4.2.6 says:


Further, when someone is filing complaints to the owner of
  192.88.99.0/24, they notice multiple WHOIS records and see a pointer

At least at the moment, this is not accurate.  A single record is
returned from ARIN with a pointer to IANA, noting that it is reserved and
giving a reference to 3068:

NetRange: 192.88.99.0 - 192.88.99.255
CIDR: 192.88.99.0/24
NetName: IANA-192
NetHandle: NET-192-88-99-0-1
Parent: NET-192-0-0-0-0
NetType: IANA Special Use
Comment: This block is reserved for special purposes.
Comment: Please see RFC 3068 for additional information.
Comment:
RegDate:
Updated: 2002-09-16
2004-07-06
04 Ted Hardie
[Ballot discuss]
In 3.1, the document says:

  o  Disallow traffic that has private, broadcast or reserved IPv4
      addresses in tunnels, or …
[Ballot discuss]
In 3.1, the document says:

  o  Disallow traffic that has private, broadcast or reserved IPv4
      addresses in tunnels, or the matching 6to4 prefixes.

It is not clear whether the "reserved IPv4 addresses" mentioned
here include the unallocated address space, or only those
set aside for special purposes.

This is important because of the relative work involved between
tracking currently unallocated space and tracking space set
aside.  Keeping up-to-date filter lists for the first is a major
undertaking, and there are screams of pain from the first
provider to get an allocation from a previously unallocated
block.  Things like Team Cymru's Bogon reference page
and route server help, but it is still a lot of work that
*everyone* has to do.

In general, the draft is very free with describing mitigations
that impose a hefty (and unspecified burden)--for example:

  Malicious native IPv6 nodes could be caught easily if ingress
  filtering was enabled everywhere in the IPv6 Internet.

I think the draft needs to describe the amount of effort associated
with the mitigation, and to focus on *who* needs to do the work.
Work that can be done by the 6to4 relay operator has a hope
of success--work that relies on *anything* being "enable everywhere"
does not.  Section 6.2 does this to some extent, but I think
the document would be more valuable if it were extended greatly.


Section 4.2.6 says:


Further, when someone is filing complaints to the owner of
  192.88.99.0/24, they notice multiple WHOIS records and see a pointer

At least at the moment, this is not accurate.  A single record is
returned from ARIN with a pointer to IANA, noting that it is reserved and
giving a reference to 3068:

NetRange: 192.88.99.0 - 192.88.99.255
CIDR: 192.88.99.0/24
NetName: IANA-192
NetHandle: NET-192-88-99-0-1
Parent: NET-192-0-0-0-0
NetType: IANA Special Use
Comment: This block is reserved for special purposes.
Comment: Please see RFC 3068 for additional information.
Comment:
RegDate:
Updated: 2002-09-16
2004-07-06
04 Ted Hardie [Ballot Position Update] Position for Ted Hardie has been changed to Undefined from Discuss by Ted Hardie
2004-07-06
04 Ted Hardie [Ballot Position Update] New position, Discuss, has been recorded for Ted Hardie by Ted Hardie
2004-07-01
04 Scott Hollenbeck
[Ballot discuss]
Section 4:
The text notes that "the IPv4 address blocks 8.0.0.0/24 and 9.0.0.0/24 are only used for demonstrative purposes, and represent global IPv4 …
[Ballot discuss]
Section 4:
The text notes that "the IPv4 address blocks 8.0.0.0/24 and 9.0.0.0/24 are only used for demonstrative purposes, and represent global IPv4 addresses". These two address blocks are assigned to BBN and IBM and shouldn't be used for examples.  Per RFC 3330, 192.0.2.0/24 is set aside for use in "for use in documentation and example code".

Is there a reason that these two in-use address blocks are being used in examples?

I didn't check the IPv6 examples.
2004-07-01
04 Scott Hollenbeck [Ballot Position Update] Position for Scott Hollenbeck has been changed to Discuss from Undefined by Scott Hollenbeck
2004-07-01
04 Scott Hollenbeck [Ballot Position Update] New position, Undefined, has been recorded for Scott Hollenbeck by Scott Hollenbeck
2004-06-30
04 David Kessens Placed on agenda for telechat - 2004-07-08 by David Kessens
2004-06-30
04 David Kessens State Changes to IESG Evaluation from AD Evaluation by David Kessens
2004-06-30
04 David Kessens [Ballot Position Update] New position, Yes, has been recorded for David Kessens
2004-06-30
04 David Kessens Ballot has been issued by David Kessens
2004-06-30
04 David Kessens Created "Approve" ballot
2004-06-30
04 (System) Ballot writeup text was added
2004-06-30
04 (System) Last call text was added
2004-06-30
04 (System) Ballot approval text was added
2004-06-29
04 David Kessens State Changes to AD Evaluation from Publication Requested by David Kessens
2004-06-24
04 Dinara Suleymanova Draft Added by Dinara Suleymanova in state Publication Requested
2004-06-18
03 (System) New version available: draft-ietf-v6ops-6to4-security-03.txt
2004-03-12
02 (System) New version available: draft-ietf-v6ops-6to4-security-02.txt
2004-02-10
01 (System) New version available: draft-ietf-v6ops-6to4-security-01.txt
2003-10-08
00 (System) New version available: draft-ietf-v6ops-6to4-security-00.txt