IPv6 Firewall on CPEs - Default on or off

Eric Vyncke (evyncke) evyncke at cisco.com
Fri Jan 25 12:25:47 CET 2013


If you remember this old discussion, then you may want to read a new Internet Draft by Martin, Guillaume, Ragnar and myself:

Filename:	 draft-v6ops-vyncke-balanced-ipv6-security
Revision:	 00
Title:		 Balanced Security for IPv6 CPE
Creation date:	 2013-01-25
WG ID:		 Individual Submission
Number of pages: 8
URL:             http://www.ietf.org/internet-drafts/draft-v6ops-vyncke-balanced-ipv6-security-00.txt
Status:          http://datatracker.ietf.org/doc/draft-v6ops-vyncke-balanced-ipv6-security
Htmlized:        http://tools.ietf.org/html/draft-v6ops-vyncke-balanced-ipv6-security-00

Comments are of course welcome :-)

-éric

> -----Original Message-----
> From: Merike Kaeo [mailto:merike at doubleshotsecurity.com]
> Sent: jeudi 6 décembre 2012 18:53
> To: Anfinsen, Ragnar
> Cc: Lorenzo Colitti; Martin Millnert; Eric Vyncke (evyncke); Tore Anderson;
> Benedikt Stockebrand; ipv6-ops at lists.cluenet.de
> Subject: Re: IPv6 Firewall on CPEs - Default on or off
> 
> 
> On Dec 5, 2012, at 12:31 AM, Anfinsen, Ragnar wrote:
> 
> > *Lorenzo
> >
> >> Eric, this isn't something you'd be interested in taking on (as an
> >> addition to your growing body of work on IPv6 security), by any chance?
> >
> > +1
> 
> After catching up with this thread there's a few points I figured I'd make.
> 
> 1. Agree with the Off/Low (default)/Diode style firewall approach although
> since CPEs are devices that get owned so easily I think the arguments on
> firewall aspect is somewhat humorous.  [sorry, in a somewhat cynical mood
> this AM].  In past year I've seen too many CPE's that are easily hacked that
> I'd prefer some attention be paid to ensuring noone can own your CPE rather
> than figure out what traffic makes sense to permit/deny through it.   The
> easiest way to own is by some devices enabling configuration thru WAN and of
> course the default username/pw that noone changes so even LAN side device
> access can be achieved.
> 
> When I first heard of the pinhole aspect and how applications have
> capability to poke a hole through the firewall I was cautiously optimistic
> that this would be an interesting compromise.  However, the realities are
> that not many applications clean up after themselves when the session is
> done.  Lots of holes everywhere.  So I became less enamored of a stateful
> firewall in CPE devices since it would give a user a false sense of
> security.  At least let them be aware that all traffic is passed and move
> the mitigation techniques elsewhere.
> 
> 
> 2. In my not so cynical mode I do like the idea of someone working thru what
> the Low mode would block.  In addition to the known to be primarily
> malicious use ports (there's only a handful) it may be useful to include
> packets with SRC IP of netblock that should never be passed. (this of course
> brings issues of what happens if some netblocks get reassigned to NOT be
> special purpose addresses as has happened in v4...well, keep the list tiny).
> 
> 
> 3. While many application attacks are increasing along with attacks that
> fall under the radar since they can't be spotted as 'anomolies' with network
> monitoring devices, don't discount the old ones.  They are seen around in
> plenty of script kiddie tools and are alive and well.   Spoofed addresses
> are used in some large DoS amplification attacks.
> 
> 4. I really am wary about arguments where 'we have not seen an IPv6 attack
> so there is no need to worry' - it's a matter of time.  But I would prefer
> to see the mitigation techniques be on end user devices.
> 
> Overall great to see all the discussion.  A lot of great work being done to
> move things forward.
> 
> - merike
> 
> 



More information about the ipv6-ops mailing list