Fernando, I posted this the other day but you may not have seen it.
Nothing TOO major just a few comments and recommendations.

"Pampers use multiple layers of protection to prevent leakage. Rommel used 
defense in depth to defend European fortresses." (A.White) 
[email protected]


>-----Original Message-----
>From: [email protected] [mailto:[email protected]] On Behalf
>Of Smith, Donald
>Sent: Tuesday, January 22, 2013 4:12 PM
>To: Warren Kumari; [email protected]; opsec chairs
>Subject: Re: [OPSEC] WGLC on draft-ietf-opsec-ipv6-implications-on-ipv4-
>nets-02
>
>1.
>
>No mention of v6 aware devices that haven't been configured for v6. One
>example is acls on most routers have to be duplicated for v6. Firewall
>rules too. So it isn't just a "can it support issue" but also a is it
>configured to examine v6 or other tunneled traffic.
>
>
>
>
>Only in some exceptional cases (such as military operations networks)
>   could this approach to mitigating the aforementioned security
>   implications be thought of as a longer-term strategy.
>
>I am not sure that is true. Some enterprise may very well be able to use
>just v4 for quite a while especially internally. They might have to
>offer services on v6 but via some hosting or other DMZ methods they may
>be able to keep their internal network v4 for many more years.
>
>
>3.6
>The corresponding addresses can be easily obtained from a UNIX
>      host by issuing the command 'dig teredo.ipv6.microsoft.com a'
>      (without quotes).
>
>dig isn't a "standard" unix tool. nslookup or host is in nearly all
>cases but not all unix systems have dig installed by default. (nslookup
>is deprecated for host but still fairly common if not universal).
>
>How about nslookup since that is also on windows and other platforms?
>
>4.
>This:
>This is likely to cause IPv6-capable hosts to attempt to
>   reach an ever-increasing number of popular destinations via IPv6,
>   even if this IPv6 connectivity is provided relies on a transition
>   technology over an IPv4-only network.
>Should be this:
>This is likely to cause IPv6-capable hosts to attempt to
>   reach an ever-increasing number of popular destinations via IPv6,
>   even if this IPv6 connectivity as provided relies on a transition
>   technology over an IPv4-only network.
>
>Shouldn't this be NXD instead of dropping the requests. That way the
>client can see it is getting errors not just blackholeing the aaaa
>requests?
>
>For this reason, networks attempting to prevent IPv6 traffic from
>   traversing their devices should consider configuring their local
>   recursive DNS servers to ignore queries for AAAA DNS records, or even
>   consider filtering AAAA records at the network ingress point to
>   prevent end hosts from attempting their own DNS resolution.
>
>That could also be done on a forwarder right not just a local recursive
>dns server?
>
>
>A firewall could signal the packet drop by means of an ICMPv6
>      error message (or TCP [RFC0793] RST segment if appropriate), such
>      that the source node can e.g. quickly react as described in
>      [RFC5461].
>
>If there is no v6 connectivity I wouldn't expect icmpv6 to work and the
>queries will usually be udp so a tcp resest is not valid.
>
>I think therefore that NXD from  dns server or icmpv4 from a middle box
>is better. And I would change firewall to middle box since there are
>IPSes, UTM devices, portals etc... that could be dropping the v6
>queries.
>
>
>
>
>
>(coffee != sleep) & (!coffee == sleep)
> [email protected]
>
>
>
>From: [email protected] [[email protected]] on behalf of
>Warren Kumari [[email protected]]
>Sent: Tuesday, January 22, 2013 1:17 PM
>To: [email protected]; opsec chairs
>Cc: Warren Kumari
>Subject: Re: [OPSEC] WGLC on draft-ietf-opsec-ipv6-implications-on-ipv4-
>nets-02
>
>
>
>On Jan 10, 2013, at 11:28 AM, Warren Kumari <[email protected]> wrote:
>
>> Hello OpSec!
>>
>> This starts a working group last call for draft-ietf-opsec-ipv6-
>implications-on-ipv4-nets-02 -- "Security Implications of IPv6 on IPv4
>Networks"
>>
>> The draft is available at http://tools.ietf.org/html/draft-ietf-opsec-
>ipv6-implications-on-ipv4-nets-02 and
>https://datatracker.ietf.org/doc/draft-ietf-opsec-ipv6-implications-on-
>ipv4-nets/
>>
>> Please review this draft to see if you think it is ready for
>publication. Send comments to the list.
>>
>> The WGLC will end on 25th January 2013.
>
>This is a reminder to please provide feedback on this draft -- so far I
>do not think we have enough feedback to call consensus.
>Thanks to the folk we do have feedback from; Wes, Simon and Rama...
>
>W
>
>>
>> --Warren, speaking as OpSec WG co-chair
>>
>>
>> --
>> I had no shoes and wept.  Then I met a man who had no feet.  So I
>said, "Hey man, got any shoes you're not using?"
>>
>>
>> _______________________________________________
>> OPSEC mailing list
>> [email protected]
>> https://www.ietf.org/mailman/listinfo/opsec
>>
>
>--
>The duke had a mind that ticked like a clock and, like a clock, it
>regularly went cuckoo.
>
>    -- (Terry Pratchett, Wyrd Sisters)
>
>
>_______________________________________________
>OPSEC mailing list
>[email protected]
>https://www.ietf.org/mailman/listinfo/opsec
>_______________________________________________
>OPSEC mailing list
>[email protected]
>https://www.ietf.org/mailman/listinfo/opsec
_______________________________________________
OPSEC mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/opsec

Reply via email to