Just a nit initially.
"This document
   specifies a set of requirements for IPv6 firewalls, marked as
   "mandatory", "recommended", or "optional"."


That isn't the language we use.
In fact in terminology Mr Gont uses the right language.
"
3.  Terminology


   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC 2119 [RFC2119]."

This is hard very hard I don't know of a single v4 firewall that can do full 
proxies for all tcp applications.

REQ GEN-3:
      MUST support full-proxy for the TCP [RFC0793] connections (the
      handshake is validated on the firewall before reaching the target
      system).
I think what you want is proxies for common layer 7 protocols (like http, ftp 
etc...)
So maybe something like this:

REQ GEN-3:
      Should support full-proxy for common TCP [RFC0793] layer seven protocols.


However if what you really want is TCP three ways proxied that is a little 
different.
Would a tcp cookie implementation meet this requirement? Or do you want the 
three way done with the firewall then thrown away and you add the src to a 
whitelist for the next attempt or replay one side or do you want the fw to 
proxy the syn in, syn/ack out and ack back in? If so what is the benefit if it 
keeps all the state in two places now (host and firewall)?

Time outs are generally used mostly for UDP not TCP. I don't object to having a 
timeout ability on tcp connections too but their primary use is UDP today in v4.

REQ GEN-4:
      MUST be able to enforce timeouts on TCP connections based on
      specific protocols (e.g. enforce DNS timeout to a specific number
      of seconds, or FIN-WAIT, etc.).  In general, it MUST have
      different kind of timeout values and thresholds to be used to
      prevent idle established connections to saturate resources on both
      the device and the service that is defended.


So maybe "timeouts on UDP, TCP and other IP protocols" ...


This is sometimes referred to as policy routing.

REQ GEN-6:
      MUST be able to redirect specific traffic to a proxy server e.g.
      for HTTP/S protocols.

But by saying "redirect" in theory a FW could meet that requirement by just 
rewriting the MAC and replaying the packet. Not really routing a layer 2 
redirect. Which did you mean or did you mean both?

REQ SPC-1 and 4 are the same.

It says here that we want to match icmpv6 errors to tcp and udp you should 
include "and other ipv6 protocols" and won't this bring on new icmp blind tcp 
reset issues?

REQ SPC-6:
      MUST be able to statefully match ICMPv6 errors to TCP [RFC0793],
      UDP [RFC0768], and ICMPv6 [RFC4443] communication instances.

Split tunneling is almost always a concern on the client side not on firewalls.

REQ VPN-5:
      MUST be able to disable or enable split-tunnelling feature on VPN
      as required.

I have never seen that applied to a firewall but can't say it couldn't be:)
In general you allow in a vpn remote access client and DON'T want them also 
connected directly to the internet as that punches a whole in your firewall 
(potentially anyways).


This:
   REQ VPN-6:
      MUST be able to work indifferently on IPv4 and IPv6, and also
      offer both protocol in dual-stack in the same VPN connection.

Should be this:
   REQ VPN-6:
      MUST be able to transit IPv4 and IPv6 packets providing full parity for 
services, and also
      offer both protocols in dual-stack in the same VPN connection.

I am thinking tunnel instead of connection but do not feel strongly about it.
The use of indifferently isn't technically wrong but isn't the common use of 
that word.


This is really ip stack specific attacks (not really os specific).
I have run non-native ip stacks on some OSes in the past (win3.1...)


REQ DoS-1:
      MUST be able to protect against OS-specific attacks: nuke, ping-
      of-death (NOTE: this list should be expanded, and references
      added).

And all of those pretty much died out. Having said that in there isn't bad.
Here are a few more of those ip stack attacks.

ICMP Fragments based attacks (this would include POD) and you include fragement 
based attacks in the next requirement.
Smurf Attack
Xmas Tree Attack
LAND Attack
Teardrop Attack



This one probably needs some expansion.

   REQ DoS-4:
      MUST be able to protect against TCP resource exhaustion attacks:
      zero-window attacks, SYN-floods, etc. (see e.g. [CPNI-TCP])


So for syn flooding do we want proxied tcp cookies, or simple tcp ratelimiting 
and do you expect grey, white and blacklisting to be done based on some form of 
authentication (completes the hand shake or gets the cookie right ...)?
Or can any or all methods be treated the same?


Wrong RFC :)
  REQ DoS-8:
      MUST be able to participate to a blackhole/sync hole routing
      infrastructure as per [RFC5635].

You probably want this one https://tools.ietf.org/rfc/rfc3882.txt as it talks 
about sinkholing (and it is sink hole not sync hole :)
The other one is about doing urpf with BHF and being able to do src based BHF.

Also we may need to define what "participate" means. I generally don't expect 
firewalls (FW) to talk bgp and BHF is generally done with BGP.


I will stop here for now to allow you to think about it and the next section is 
going to take more thought.














(coffee != sleep) & (!coffee == sleep)
 [email protected]



From: OPSEC [[email protected]] on behalf of Marco Ermini 
[[email protected]]
Sent: Tuesday, February 18, 2014 7:57 AM
To: [email protected]
Subject: [OPSEC] I-D Action: draft-gont-opsec-ipv6-firewall-reqs-00.txt


Hi everyone,

a new Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is about defining requirements for IPv6-capable Firewalls. You are 
welcome to have a look and contribute.

        Title           : Using Only Link-Local Addressing Inside an IPv6 
Network
        Authors : F. Gont
                          M. Ermini
                          W. Liu
        Filename        : draft-gont-opsec-ipv6-firewall-reqs-00.txt
        Pages           : 12
        Date            : 2014-02-14

Abstract:

   While there are a large number of documents discussing IP and IPv6
   packet filtering, requirements for IPv6 firewalls have never been
   specified in the RFC series.  When it comes to IPv6, the more limited
   experience with the protocols, and reduced variety of products has
   made it rather difficult to specify what are reasonable features to
   be expected from an IPv6 firewall.  This has typically been a problem
   for network operators, who typically have to produce a "Request for
   Proposal" (from scratch) that describes such features.  This document
   specifies a set of requirements for IPv6 firewalls, marked as
   "mandatory", "recommended", or "optional".

The IETF datatracker status page for this draft is:

https://datatracker.ietf.org/doc/draft-gont-opsec-ipv6-firewall-reqs/

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


Kind regards,

Marco Ermini - PhD CISSP CISA CEH ITIL MCP
Senior IT Security & Compliance Analyst | Compliance Europe
ResMed Germany Inc.
Geschäftsführer: Frank Rebbert, Eric Paffrath, Michael Taube
Sitz der Gesellschaft: München
Registergericht: München, HRB 156206

 ----------------------------------------------------------------------
Warning:  Copyright ResMed.  Where the contents of this email and/or attachment 
includes materials prepared by ResMed, the use of those
materials is subject exclusively to the conditions of engagement between ResMed 
and the intended recipient.  This communication is confidential and may contain 
legally privileged information.  By the use of email over the Internet or other 
communication systems, ResMed is not waiving either confidentiality of, or 
legal privilege in, the content of the email and of any attachments.  If the 
recipient of this message is not the intended addressee, please call ResMed 
immediately on  1 (800) 424-0737 USA.
 ----------------------------------------------------------------------

_______________________________________________
OPSEC mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/opsec
_______________________________________________
OPSEC mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/opsec

Reply via email to