Sorry about that, just clicked reply!

 

I’m working already, hopefully finish today, to review the other 40 pages. It 
is a really long document! May be I will break it down in several parts.

 

I will make sure to submit to opsec this time!


Regards,

Jordi

 

 

 

El 30/3/19 11:33, "Fred Baker" <[email protected]> escribió:

 

This was sent to v6ops instead of opsec



From: JORDI PALET MARTINEZ <[email protected]>

Subject: Re: [v6ops] draft-ietf-opsec-v6

Date: March 29, 2019 at 5:13:32 PM GMT+1

To: IPv6 Operations <[email protected]>

 

Hi all,

Thanks for the reminder, overdue task for me for a while ... So here is it 
(partially, as I'm working in the plane, so more in following emails).

2.1.  Addressing Architecture

  Once an address allocation has been assigned, there should be some
  thought given to an overall address allocation plan.  With the
  abundance of address space available, an address allocation may be
  structured around services along with geographic locations, which
  then can be a basis for more structured security policies to permit
  or deny services between geographic regions.

One of MOST frequent issues when you start implementing IPv6 is that people 
tend to go to their RIR for a default allocation/assignment, and then try to 
make the addressing plan with what they have, instead of planning correctly and 
then going to the RIR. The result is many cases is ISPs providing a single /64 
to customers, which is really bad.

Also, if the document is for operators and enterprises, you need to 
differentiate among allocation and assignment.

So, I will like to suggest rewording as:
"A key task before starting an IPv6 deployment, once the sufficient knowledge 
has been acquired, is to prepare an addressing plan. With the abundance of 
address space available, an addressing plan may be structured around services 
along with geographic locations, which then can be a basis for more structured 
security policies to permit or deny services between geographic regions.

This may be seen as a simple task, but it is an activity within the IPv6 
deployment project, that requires a very in depth thinking and it makes sense 
to invest as much time as required on it. Only once that addressing plan has 
been designed is the right time to go to the relevant Regional Internet 
Registry (RIR) to ask for an allocation or an assignment."

Then, in the next p.:

  A common question is whether companies should use Provider
  Independent (PI) vs Provider Allocated (PA) space [RFC7381], but from
  a security perspective there is little difference.

Replace with

"A common question is whether companies should use Provider Independent (PI) vs 
Provider Allocated (PA) space [RFC7381], but from a security perspective there 
is little difference. From the RIRs policies perspective, PI space is assigned 
to organizations if they don't need to sub-assign to third parties, while PA is 
allocated to operators or organizations that will sub-assign to third parties. 
For example, a big corporation may have different subsidiaries and they are 
legally different entities, so in this case each one need their own PI space, 
or the responsible for the network need to get allocated PA space. A public 
institution such as a Ministry, may get a PI, if is only for their own use and 
not for other government institutions, however if it is the government entity 
managing the network that interconnects several institutions and provide each 
one their own space, they need to obtain PA space."

And continue with "However, one ..." in a new p.

2.1.1.  Statically Configured Addresses

Nit:
The use of well-known(such
The use of well-known (such

There are many scanning techniques and more to
  come possible, hence, operators should never relly on the 'impossible
  to find because my address is random' paradigm.

I will say:

There are many scanning techniques and more to
  come possible, hence, operators should never relly on the 'impossible
  to find because my address is random' paradigm, even if it is a good practice 
to have the statically configured addresses randomly distributed across the /64 
subnets and use always DNS.

2.1.2.  Use of ULAs

I will add:

"Even if today a network is not connected to Internet, and it looks like it 
will not be in the future, things change and it is a considerable effort to 
renumber it. So it may be relevant to obtain an IPv6 PI assignment from the RIR 
and have a stable addressing space since day one."

2.1.3.  Point-to-Point Links

I disagree with the mention that RFC6164 indicate that /127 is the way. RFC6164 
is about "routers must support it". See draft-palet-v6ops-p2p-links (new 
version coming soon, so may be a reference to it). So I think some rewording is 
needed here, specially because router vendors sorted out those bugs long time 
ago.

2.1.4.  Temporary Addresses - Privacy Extensions for SLAAC

I will add, that "In those cases where accounting/auditing/extreme granular 
security is required, because is impractical to use DHCPv6 due to the lack of 
support in Android based OSs, link-layer security such as IEEE802.1x may be 
used."

2.1.6.  DHCP/DNS Considerations

This probably belongs to another section (may be a specific one for DNS), but 
related:

"If there is a need for Statically Configured Addresses, it should considered 
using DNS to refer to them, so no hard-coded addresses are used by 
applications. This facilitates also debugging/troubleshooting as avoids 
remembering addresses. In may be advisable to have multiple-faced DNS ("views") 
in order to ensure that internal-only used hosts, aren't published globally and 
full zone transfers are disallowed."

2.1.7.  Using a /64 per host

I will add:

"This also avoids the need to "proxy" or NAT-like operations if multiple VMs, 
containers, or similar ones, need their own IPv6 address from a single /64 ."

Regards,
Jordi



El 29/3/19 6:19, "v6ops en nombre de Fred Baker" <[email protected] en 
nombre de [email protected]> escribió:

   Yesterday, the authors of an opec draft asked us for comments on their 
draft, which is in a second WGLC in opec ([email protected]). You may have missed 
the character string:

   https://datatracker.ietf.org/doc/draft-ietf-opsec-v6
   https://tools.ietf.org/html/draft-ietf-opsec-v6
     "Operational Security Considerations for IPv6 Networks", Eric Vyncke,
     Chittimaneni Kk, Merike Kaeo, Enno Rey, 2019-03-11,

   I'd encourage people to read it and comment on the opec list.

   
--------------------------------------------------------------------------------
   Victorious warriors win first and then go to war,
   Defeated warriors go to war first and then seek to win.
        Sun Tzu

   _______________________________________________
   v6ops mailing list
   [email protected]
   https://www.ietf.org/mailman/listinfo/v6ops




**********************************************
IPv4 is over
Are you ready for the new Internet ?
http://www.theipv6company.com
The IPv6 Company

This electronic message contains information which may be privileged or 
confidential. The information is intended to be for the exclusive use of the 
individual(s) named above and further non-explicilty authorized disclosure, 
copying, distribution or use of the contents of this information, even if 
partially, including attached files, is strictly prohibited and will be 
considered a criminal offense. If you are not the intended recipient be aware 
that any disclosure, copying, distribution or use of the contents of this 
information, even if partially, including attached files, is strictly 
prohibited, will be considered a criminal offense, so you must reply to the 
original sender to inform about this communication and delete it.



_______________________________________________
v6ops mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/v6ops

 

--------------------------------------------------------------------------------

The fact that there is a highway to hell and a stairway to heaven is an 
interesting comment on projected traffic volume...






**********************************************
IPv4 is over
Are you ready for the new Internet ?
http://www.theipv6company.com
The IPv6 Company

This electronic message contains information which may be privileged or 
confidential. The information is intended to be for the exclusive use of the 
individual(s) named above and further non-explicilty authorized disclosure, 
copying, distribution or use of the contents of this information, even if 
partially, including attached files, is strictly prohibited and will be 
considered a criminal offense. If you are not the intended recipient be aware 
that any disclosure, copying, distribution or use of the contents of this 
information, even if partially, including attached files, is strictly 
prohibited, will be considered a criminal offense, so you must reply to the 
original sender to inform about this communication and delete it.

_______________________________________________
OPSEC mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/opsec

Reply via email to