Hi, thanks for the quick response! One comment below.

Ben.

On 27 Sep 2016, at 4:44, [email protected] wrote:

- section 3: "This may lead to setting a different IPv4 service
continuity mechanism than the one initially preferred by the network
   side"

Are there consequences of that that should be discussed? E.g. bid-down attacks, ability to direct packets via a compromised path, etc? (I'm not
saying there are; I'm just asking.)


[Med] We didn't include examples of such consequences because those attacks depend on the modification of other DHCPv6 options that are not defined in this document. For example, the ability to direct packets via a compromised path will require the modification of the content of DHCPv6 Option #64 or #90 to redirect packets to an illegitimate AFTR/BR.

What about the following change:

OLD:

   Misbehaving intermediate nodes may alter the content of the S46
   Priority Option.  This may lead to setting a different IPv4 service
continuity mechanism than the one initially preferred by the network
   side.

NEW:

   Misbehaving intermediate nodes may alter the content of the S46
   Priority Option.  This may lead to setting a different IPv4 service
continuity mechanism than the one initially preferred by the network side. For example, a misbehaving node may alter the context of the S46 Priority Option and other DHCPv6 options (e.g., DHCPv6 Option #64 or #90)
   so that the traffic is intercepted by an illegitimate node.

That helps. I was thinking more in terms of the S46 priority option specifically, but I guess it doesn't hurt to mention others. If one can modify the DHCPv6 options in general, one can do plenty of mischief without S46 Priority. Does adding S46 priority add any _new_ issues to that? I suspect the answer is "no", but if so it would be worth saying that.
_______________________________________________
Softwires mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/softwires

Reply via email to