Hello,

I have been selected as the Routing Directorate reviewer for this draft. The Routing Directorate seeks to review all routing or routing-related drafts as they pass through IETF Last Call and IESG review, and sometimes on special request. The purpose of the review is to provide assistance to the Routing ADs. For more information about the Routing Directorate, please see http://www.ietf.org/iesg/directorate/routing.html

Although these comments are primarily for the use of the Routing ADs, it would be helpful if you could consider them along with any other IETF Last Call comments that you receive, and strive to resolve them through discussion or by updating the draft.

Document: draft-ietf-opsec-vpn-leakages-02
Reviewer: Martin Vigoureux
Review Date: 2013-12-05
IETF LC End Date: 2013-12-16
Intended Status: Informational

Summary:
This document is basically ready for publication, but has nits that should be considered prior to publication.

Comments:
This document is short, focussed, and well written.
However it is unclear, beyond that fact that users do not know that traffic is leaking from (rather not mapped onto) their VPN, what the real issue is. Yes, a man in the middle, might intercept the leaked traffic but this traffic is a priori intended to resources only accessible through the VPN. So, knowing that the leaked traffic will not reach the targeted destination, it is not clear which critical information it may carry. I believe that it would be worth giving an example. Note that this relates to/extends a comment raised against draft-gont-opsec-vpn-leakages-00 but which was apparently not addressed.
http://www.ietf.org/mail-archive/web/opsec/current/msg01135.html

Minor Issues:
Abstract:
   This document discusses some scenarios in which such VPN leakages
   may occur, either as a side effect of enabling IPv6 on a local
   network, or as a result of a deliberate attack from a local
   attacker.
I believe this sentence does not exactly reflect the content of the document. For the first part, I think it is not only because of enabling IPv6 but because a site has both IPv4 and IPv6 support *and* a VPN client has poor capabilities in handling securely (i.e., mapping on the VPN) packets which use one of the two address families.
By the way this is said in section 4:
   the resulting VPN traffic leakage is a side-effect of employing
   IPv6-unaware VPN software in a dual-stacked host/network.

Thanks
-m
_______________________________________________
OPSEC mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/opsec

Reply via email to