Re: [Full-disclosure] IPv6 security myths

2010-10-31 Thread Masataka Ohta
Hadriel Kaplan wrote:

>> Do you know some major application over the Internet using IPsec
>> with transport mode?
> 
> Yes: SIP.  SIP/UDP over IPsec in transport mode on the Internet
> is not uncommon.  Arguably more common than SIP over TLS,
> anyway... though that's expected to change. (and of course SIP
> over IPsec or TLS are both noise compared with plain SIP over UDP)

Yes, IPv6 deployment also is expected to change.

> Also, Femtocells running various protocols typically use IPsec
> over the Internet, though in tunnel mode I believe - but one
> wouldn't think of it as being a "VPN" in the traditional sense.

It's a traditional VPN to encrypt data to/from mobile terminals
in femtocells by femtocell stations.

In the same VPN, protocols to control the stations may also be
carried, which does not make the VPN not traditional.

> Oh, and I believe storage/SAN (FCIP, iFCP, iSCSI) use IPsec over
> the Internet; or at least the IPsec chip vendors seem to focus
> on those markets a lot.  Though again in tunnel mode I think,
> but not a classic "VPN" use.

Are you saying the SAN is a part of the public Internet?

> The Internet is big and diverse - not everything is HTTP and DNS. ;)

So?

Masataka Ohta
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: More labels for RFCs

2010-10-31 Thread Julian Reschke

On 31.10.2010 16:51, Hadriel Kaplan wrote:


On Oct 31, 2010, at 5:27 AM, Julian Reschke wrote:


All RFCs published since last January have that pointer in the
boilerplate, it goes to

   http://www.rfc-editor.org/info/rfc


Sweet. :)
I actually checked the boilerplate I use for I-D's before saying it, but I 
guess my boilerplate is old.


Oh, it's only in RFCs...

Best regards, Julian
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [Full-disclosure] IPv6 security myths

2010-10-31 Thread Hadriel Kaplan

On Oct 31, 2010, at 12:00 AM, Masataka Ohta wrote:

> TJ wrote:
>> I would be quite curious to know your definition of failure, given that
>> IPsec is currently deployed, and working in "more than a few" deployments
>> ...
> 
> Sorry for lack of clarification.
> My context is IPsec in the Internet, which excludes VPNs.

That's a strange exclusion, considering VPNs have been the primary use-case for 
IPsec over the Internet.


> Do you know some major application over the Internet using IPsec
> with transport mode?

Yes: SIP.  SIP/UDP over IPsec in transport mode on the Internet is not 
uncommon.  Arguably more common than SIP over TLS, anyway... though that's 
expected to change. (and of course SIP over IPsec or TLS are both noise 
compared with plain SIP over UDP)

Also, Femtocells running various protocols typically use IPsec over the 
Internet, though in tunnel mode I believe - but one wouldn't think of it as 
being a "VPN" in the traditional sense.

Oh, and I believe storage/SAN (FCIP, iFCP, iSCSI) use IPsec over the Internet; 
or at least the IPsec chip vendors seem to focus on those markets a lot.  
Though again in tunnel mode I think, but not a classic "VPN" use.

The Internet is big and diverse - not everything is HTTP and DNS. ;)

-hadriel

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: More labels for RFCs

2010-10-31 Thread Hadriel Kaplan

On Oct 31, 2010, at 5:27 AM, Julian Reschke wrote:
> 
> All RFCs published since last January have that pointer in the 
> boilerplate, it goes to
> 
>   http://www.rfc-editor.org/info/rfc

Sweet. :)
I actually checked the boilerplate I use for I-D's before saying it, but I 
guess my boilerplate is old.

-hadriel
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Alternate entry document model

2010-10-31 Thread Dave CROCKER



On 10/30/2010 11:31 AM, Joel M. Halpern wrote:

 One of the positive effects
of our current system is taht because WG knows tha tthye have to clear all the
ADs, not just their own, they actually think about all these issues. And usually
manage to cope with them


A working group is diligent or it isn't.  It gets a range of feedback and 
responds constructively to it... or it doesn't.


The working group behaviors that I have seen that pay explicit attention to the 
specific question of satisfying AD reviews have nothing to do with quality of 
the work and more to do with guessing what will personally bother an AD.  In 
other words, it's about dealing with AD idiosyncrasy rather than with quality.


It is now common to get cross-area reviews and my own observation is that these 
are a) typically quite reasonable and diligent, and b) dealt with constructive 
by the working group.


ADs do sometimes come up with interesting and even important points, but AD 
review is an extremely expensive and often frustrating mechanism that we already 
have a vastly superior replacement for.  Its timing is better and it distributes 
the work far better.


The fact that an AD sometimes catches some important problem is typically taken 
as proof that the AD review and Discuss mechanism is essential.  This is highly 
flawed logic, on two counts.


One is that it does not represent meaningful cost/benefit evaluation.  The cost 
is actually quite high in energy, delay and frustration, and the significant 
benefit overall is quite low (if the wg has been diligent and has gotten 
cross-area reviews.)


The other is that protocol specs have a statistical likelihood of bugs, even 
with the AD review.  We talk about AD review almost as if it ensures perfection, 
but of course we know it does not.


Ultimately, we have to trust the real world to evaluate the safety and efficacy 
of a protocol.  That fact ought to give us permission to balance the cost and 
benefit of the quality assurance efforts we require during specification 
development and approval.




Yes, it would be very good to spot all of these things sooner. I have not yet
seen a proposal that actually works for doing so. But letting WGs or WGs + ADs
approve documents for general advancement is a step likely to lead to problems.
If all our WGs handed their ADs high quality documents that they had checked for
all these issues, then maybe we could look at this differently.


We do need quality assurance efforts.  The basic idea that working group efforts 
are subject to outside review prior to approval is a significant value-add by 
the IETF, IMO.  The question is how to provide sufficient review in a reasonable 
way.


I believe that cross-area reviews largely satisfy that requirement.  If 
within-area reviews are also needed, the AD should commission them, not do them 
directly.


d/
--

  Dave Crocker
  Brandenburg InternetWorking
  bbiw.net
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [Full-disclosure] IPv6 security myths

2010-10-31 Thread TJ
If you mean widespread, point to point / peer to peer IPsec - yes, there is
a distinct lack of (free, easy, global) PKI out there.

There are steps in the right direction though, such as MS's Direct Access
...

/TJ
On Oct 31, 2010 12:02 AM, "Masataka Ohta" 
wrote:
> TJ wrote:
>> I would be quite curious to know your definition of failure, given that
>> IPsec is currently deployed, and working in "more than a few" deployments
>> ...
>
> Sorry for lack of clarification.
>
> My context is IPsec in the Internet, which excludes VPNs.
>
> Do you know some major application over the Internet using IPsec
> with transport mode?
>
> Masataka Ohta
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: RE: [Full-disclosure] IPv6 security myths

2010-10-31 Thread TJ
Perhaps I should have said deployable ...  Although it is deployed in some
places, and growing rapidly - I'd be surprised if your situation didn't
change over then next 12-15 months ...

/TJ
On Oct 30, 2010 11:28 PM, "Michel Py" 
wrote:
>> TJ [trej...@gmail.com] wrote:
>> I would be quite curious to know your definition of failure, given
> that
>> IPsec is currently deployed, and working in "more than a few"
> deployments
>> On a possibly related note, IPv6 use deployed and working too ...
>
> Failure means that, I leave in the capital city of California and I
> can't find a single ISP that offers native IPv6. We're in the end of
> 2010. And no change in sight. Tunnels? Oh yes tunnels. I had that 10
> years ago.
>
> You call that deployed?
>
> Michel.
>
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: More labels for RFCs

2010-10-31 Thread Julian Reschke

On 29.10.2010 18:20, Hadriel Kaplan wrote:

...
The problem with a labeling scheme like this is it's subjective.
"Updates" and "Obsoletes" are not subjective, and to determine whether
to apply those two labels is fairly easy. Labels of the form *-Quality
would cause massive debate and need a WG-wide or larger consensus
agreement process, if you mean them to be formal labels.
...


It's only sometimes easy. It get's really hard when the "old" RFC 
combines too many different things (like a new HTTP method, one 
application for it, and a registry because previously there was none), 
or when the new spec is actually a set of RFCs.



For some of what you describe above, people already produce RFCs to
document - RFCs which deprecate a previous RFC, or enumerate issues
found, or BCPs, etc. And obviously errata are already captured by the
RFC editor.

What's missing I think is some way to remind/force readers of an RFC to
check for errata and updating/obsoleting RFCs, and how. Since it's a
static document when published, I think the most natural way would be to
add to the boilerplate a sentence reminding the reader to check for
updates, obsoletes, and errata at
"http://datatracker.ietf.org/doc/rfc"; where  is filled in by the
RFC Editor upon RFC publication.


All RFCs published since last January have that pointer in the 
boilerplate, it goes to


  http://www.rfc-editor.org/info/rfc

(now if we published specs in (X)HTML, people might actually click on it)


Or if you want to be really fancy, you could have the IETF auto-create a
Wiki type page for each RFC, that allows open community wiki-input about
quality and implementation/deployment experience and such, with a big
banner indicating the wiki content is not an official IETF position.


That might be a good thing to have.

Best regards, Julian
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [Full-disclosure] IPv6 security myths

2010-10-31 Thread Masataka Ohta
Francis Dupont wrote:

>   In your previous mail you wrote:
> 
> My context is IPsec in the Internet, which excludes VPNs.
> 
> =>  this is a bit unfair: VPNs are the natural model for IPsec use
> (putting back an uniform I could talk about red and black :-).

It's fair as we are talking about IPsec as IPv6 security myth.

It is of course that IPsec tunnel mode is used by IPv4 and/or
IPv6 VPN gateways.

But it does not make IPv6 more secure than IPv4.

Masataka Ohta
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [Full-disclosure] IPv6 security myths

2010-10-31 Thread Francis Dupont
 In your previous mail you wrote:

   My context is IPsec in the Internet, which excludes VPNs.
   
=> this is a bit unfair: VPNs are the natural model for IPsec use
(putting back an uniform I could talk about red and black :-).

   Do you know some major application over the Internet using IPsec
   with transport mode?
   
Regards

francis.dup...@fdupont.fr
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf