In your previous mail you wrote:

   > => this is not true, hosts are not supposed to forward source routed
   > packets to other nodes. Many implementations have a flag which enforces
   > this behavior by default because disabling source route breaks things
   > and enabling forwarding breaks security).
   
   Please read RFC2460 4.4.  Nowhere does it say that hosts should not
   forward source-routed packets.

=> 4.4 just describes how to process a source route header, it doesn't
specify if/why a node should process it. This is implementation dependent
and of course a clever implementer won't blindly forward source routed
packets. Of course the host requirement document should fix that
(as RFC 1122 section 3.3.5). A statement like mine is likely to be in it...
(note that RFC 1122 is applied to IPv6 too for many details, this doesn't
really replace a real spec but it helps (:-), in your case RFC 1122 should
be enough, not a surprise...)

   > => this is not true (and AH authenticates routing headers, rewritting
   > doesn't matter because it is predictable).
   
   Ok granted, this can be done, but intermediate nodes should at least check
   for the existance of AH.
   
=> I can't see the benefit because intermediate nodes won't be able to
verify the AH (authenticated source routing is known to be unfeasible
with IPsec, just check IPsec mailing list archives).

   > => host2 should drop the packet on the floor.
   
   No. AFAICS, RFC 2460 8.4 applies only to the end-node, here host3,
   replying to the packet:
   
=> 8.4 is for the final destination. Your issue is with an intermediate
destination which is a host. If it doesn't forward packets there is no
problem, isn't it?
   
   >    Does disabling routing header break anything significant?
   >
   > => YES, IT DOES!
   
   Please elaborate.

=> any device which needs to set the path followed by a packet:
 - mobile IPv6 routing optimization (a case of source route without
   forwarding)
 - some multihoming solutions
 - policy routing
etc.

   Something related to Mobile IPv6? They should be using AH anyway.

=> no, mobile IPv6 doesn't mandate AH for every packets!
   
   Most ngtrans methods can be used for some kind of DoS attacks; with some,
   you can even disguise yourself pretty well.  These are being worked.
   
=> this is more serious issue than source routing, and the fix is
not easy.

   I haven't taken a look at home address option too deeply, but wasn't it
   just that Mobile IPv6 was put to freeze due to improper security
   considerations?

=> no, for improper solution to security considerations (even I personally
believe more work is needed for the home address option).

Regards

[EMAIL PROTECTED]

PS: is my proposed fix for the future host requirement document enough
for you? (for other implementors) is it acceptable? is it already what
you do (or would like to do)?
--------------------------------------------------------------------
IETF IPng Working Group Mailing List
IPng Home Page:                      http://playground.sun.com/ipng
FTP archive:                      ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]
--------------------------------------------------------------------

Reply via email to