I think that this is worthwhile work for Opsec to undertake, because ND 
security is definitely something that not all vendors and SPs have a handle on 
yet, and it's really useful to have all of the information in one place to be 
able to point vendors at when trying to improve the state of ND security.

That said, I have some concern about the current format of this document vs. 
its name and intent. This is supposed to be a security assessment, but rather 
than simply identifying the current vulnerabilities, it also provides 
recommendations on how to secure against them. This is certainly good 
information that I support being in a document, we just need to decide if it 
belongs in this document and whether that drives a title and abstract change to 
reflect the document's purpose more accurately, or whether we want to split out 
mitigation from assessment.
The doc is currently informational, and does not include any RFC2119 
boilerplate, but it makes recommendations for behaviors that are not explicitly 
required by the existing protocol implementation. Many of the places where 
"...should..." appears in the document look prescriptive/normative to me, and 
it's not always clear from the text/references whether this is simply 
reiterating what is already in the standard, or making a new recommendation for 
better security.

e.g. section 3.1: " If
   the packet does not pass this check, it should be silently dropped.

      While this is not explicitly required in [RFC4861] this provides
      an additional counter-measure (other than the validation of the
      Hop Limit) for non-local malicious nodes willing to make use of
      Router Solicitation messages for reconnaissance purposes."

Perhaps BCP would be a better choice, or info with 2119 keywords, I don't know.

I'd also recommend moving the current section 6 much earlier in the document, 
so that you start by discussing the vulnerabilities, and then you can go into 
the recommendations on ND validations (current section 3). I'm not sure how 
sections 4 and 5 fit into that framework, since they appear to be talking about 
vulnerabilities as well, but I know that the current one doesn't seem very 
intuitive to me.


Thanks,

Wes George




> -----Original Message-----
> From: [email protected] [mailto:[email protected]] On Behalf
> Of Warren Kumari
> Sent: Wednesday, September 11, 2013 10:17 AM
> To: [email protected]; [email protected]
> Cc: Warren Kumari
> Subject: [OPSEC] Call for Adoption: draft-gont-opsec-ipv6-nd-security-01
>
> Dear OpSec WG,
>
> This starts a Call for Adoption for draft-gont-opsec-ipv6-nd-security-
> 01.
>
Anything below this line has been added by my company's mail server, I have no 
control over it.
-----------------

This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.
_______________________________________________
OPSEC mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/opsec

Reply via email to