On Sun, 8 Feb 2015, Ted Lemon wrote:
> On Feb 8, 2015, at 1:47 PM, C. M. Heard <[email protected]> wrote:
> > It is not necessarily true that an unknown upper layer protocol 
> > header will look like a malformed extension header to a device that 
> > assumes it is an extension header following the format in RFC 6564.  
...
> This may or may not be true, but to the extent that it's true, 
> it's already addressed in RFC 7045, and it's addressed correctly 
> there.  There is no need to strengthen the advice in RFC 7045 
> here, which this document currently does, and indeed this is 
> completely unrelated to the supposed purpose of the document, 
> which is to prevent DHCP packets sent by unauthorized servers from 
> reaching clients.

Would your objections be addressed if Section 3 of the draft were 
replaced by something along the lines of the following?

=============================== cut here ===============================
3.  When parsing the IPv6 header chain, if the packet contains an
    unrecognized Next Header value, DHCPv6-Shield MUST be configurable
    to pass the packet.  The default configuration MAY drop such packets.
    When such a packet is dropped, DHCPv6-Shield SHOULD log the packet
    drop event in an implementation-specific manner as a security alert.

          RATIONALE: An unrecognized Next Header value could possibly
          identify an IPv6 Extension Header, and thus be leveraged to
          conceal a DHCPv6-server packet that should be dropped, or it
          may identify an unrecognized upper layer protocol, which
          should be passed.  There is no reliable way to tell the
          difference.  The advice given here is consistent with the
          requirements levied by [RFC7045] on forwarding nodes with
          respect to handling of unrecognized extension headers.

4.  When parsing the IPv6 header chain, if the packet is identified
    to be a DHCPv6 packet meant for a DHCPv6 client, DHCPv6-Shield MUST
    drop the packet, and SHOULD log the packet drop event in an
    implementation-specific manner as a security alert.
=============================== cut here ===============================

//cmh

_______________________________________________
OPSEC mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/opsec

Reply via email to