Skip to main content

Recommended Simple Security Capabilities in Customer Premises Equipment (CPE) for Providing Residential IPv6 Internet Service
draft-ietf-v6ops-cpe-simple-security-16

Revision differences

Document history

Date Rev. By Action
2012-08-22
16 (System) post-migration administrative database adjustment to the No Objection position for Jari Arkko
2010-10-25
16 Amy Vezza State changed to RFC Ed Queue from Approved-announcement sent by Amy Vezza
2010-10-22
16 (System) IANA Action state changed to No IC
2010-10-22
16 Amy Vezza IESG state changed to Approved-announcement sent
2010-10-22
16 Amy Vezza IESG has approved the document
2010-10-22
16 Amy Vezza Closed "Approve" ballot
2010-10-21
16 (System) New version available: draft-ietf-v6ops-cpe-simple-security-16.txt
2010-10-21
16 Ron Bonica State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Ron Bonica
2010-10-13
16 Jari Arkko [Ballot Position Update] Position for Jari Arkko has been changed to No Objection from Discuss by Jari Arkko
2010-10-12
16 (System) Sub state has been changed to AD Follow up from New Id Needed
2010-10-12
15 (System) New version available: draft-ietf-v6ops-cpe-simple-security-15.txt
2010-10-08
16 (System) Removed from agenda for telechat - 2010-10-07
2010-10-07
16 Jari Arkko
[Ballot discuss]
Section 3.3.4 is not entirely correct on claiming that Shim6 is not
applicable. Of course, it is true that a single-homed home network …
[Ballot discuss]
Section 3.3.4 is not entirely correct on claiming that Shim6 is not
applicable. Of course, it is true that a single-homed home network does
not need Shim6 for itself. However, it is possible that the other end
does. Hence, I believe it would be proper to allow Shim6 headers.

Also, the only mention of new protocols and unrecognized protocols and what to do with them is here:

  Conversely, simple Internet gateways are not expected to prohibit the
  development of new applications.  In particular, packets with end-to-
  end network security and routing extension headers for mobility are
  expected to pass Internet gateways freely.

In other words, if you package your traffic in IPsec (or Mobile IPv6) it will work, otherwise not. I think the document should be more explicit about this limitation, and that new extension headers, new transport protocols, etc. would not work through the simple gateway. I would suggest that the document say something about recommending automatic software updates for any device that supports this type of a functionality so that newly allocated protocol numbers could become supported in an easy manner.
2010-10-07
16 Cindy Morgan State changed to IESG Evaluation::Revised ID Needed from IESG Evaluation by Cindy Morgan
2010-10-07
16 Cindy Morgan [Ballot Position Update] New position, Discuss, has been recorded by Cindy Morgan
2010-10-07
16 Jari Arkko
[Ballot discuss]
Section 3.3.4 is not entirely correct on claiming that Shim6 is not
applicable. Of course, it is true that a single-homed home network …
[Ballot discuss]
Section 3.3.4 is not entirely correct on claiming that Shim6 is not
applicable. Of course, it is true that a single-homed home network does
not need Shim6 for itself. However, it is possible that the other end
does. Hence, I believe it would be proper to allow Shim6 headers.

Jari
2010-10-07
16 Amy Vezza State changed to IESG Evaluation from Waiting for AD Go-Ahead by Amy Vezza
2010-10-07
16 Stewart Bryant [Ballot Position Update] New position, No Objection, has been recorded by Stewart Bryant
2010-10-07
16 Dan Romascanu [Ballot Position Update] New position, No Objection, has been recorded by Dan Romascanu
2010-10-06
16 Tim Polk
[Ballot comment]
Two comments:

(1) REC-25 seems out of place.  REC-25 specifies default mode for  handling Host Identity Protocol (hip) packets,
but is in section …
[Ballot comment]
Two comments:

(1) REC-25 seems out of place.  REC-25 specifies default mode for  handling Host Identity Protocol (hip) packets,
but is in section 3.2.4 "IPsec and Internet Key Exchange (IKE)".

(2) Shouldn't REC-21 cover WESP packets as well as ESP packets?  It would seem the same rules would apply.
2010-10-06
16 Tim Polk [Ballot Position Update] New position, No Objection, has been recorded by Tim Polk
2010-10-06
16 Robert Sparks [Ballot Position Update] New position, No Objection, has been recorded by Robert Sparks
2010-10-06
16 Russ Housley [Ballot Position Update] New position, No Objection, has been recorded by Russ Housley
2010-10-06
16 Gonzalo Camarillo [Ballot Position Update] New position, No Objection, has been recorded by Gonzalo Camarillo
2010-10-05
16 Peter Saint-Andre [Ballot Position Update] New position, No Objection, has been recorded by Peter Saint-Andre
2010-10-05
16 Adrian Farrel [Ballot Position Update] New position, No Objection, has been recorded by Adrian Farrel
2010-10-05
16 Adrian Farrel [Ballot comment]
Please note that RFC 4306 has been obsoleted by RFC 5996
2010-10-05
16 Ralph Droms
[Ballot comment]
Section 3.1:

  REC-9: Inbound DHCPv6 discovery packets [RFC3315] received on
  exterior interfaces MUST NOT be processed by any integrated …
[Ballot comment]
Section 3.1:

  REC-9: Inbound DHCPv6 discovery packets [RFC3315] received on
  exterior interfaces MUST NOT be processed by any integrated DHCPv6
  server.

Did you consider processing by an integrated DHCPv6 relay agent?  I would
suggest "server and/or relay agent".
2010-10-05
16 Ralph Droms
[Ballot comment]
Section 3.1:

  REC-9: Inbound DHCPv6 discovery packets [RFC3315] received on
  exterior interfaces MUST NOT be processed by any integrated …
[Ballot comment]
Section 3.1:

  REC-9: Inbound DHCPv6 discovery packets [RFC3315] received on
  exterior interfaces MUST NOT be processed by any integrated DHCPv6
  server.

Did you consider processing by an integrated DHCPv6 relay agent?  I would suggest "server and/or relay agent".
2010-10-05
16 Ralph Droms [Ballot Position Update] New position, No Objection, has been recorded by Ralph Droms
2010-10-05
16 Sean Turner [Ballot comment]
Sec 3.1: r/recommended/RECOMMENDED ?
2010-10-05
16 Sean Turner [Ballot Position Update] New position, No Objection, has been recorded by Sean Turner
2010-09-29
14 (System) New version available: draft-ietf-v6ops-cpe-simple-security-14.txt
2010-09-28
13 (System) New version available: draft-ietf-v6ops-cpe-simple-security-13.txt
2010-09-28
16 Cindy Morgan State changed to Waiting for AD Go-Ahead from In Last Call by Cindy Morgan
2010-09-28
16 Ron Bonica Placed on agenda for telechat - 2010-10-07 by Ron Bonica
2010-09-28
16 Ron Bonica [Ballot Position Update] New position, Yes, has been recorded for Ronald Bonica
2010-09-28
16 Ron Bonica Ballot has been issued by Ron Bonica
2010-09-28
16 Ron Bonica Created "Approve" ballot
2010-09-16
16 Amanda Baber IANA understands that there are NO IANA ACTIONS required upon approval
of this document.
2010-09-13
16 Amy Vezza Last call sent
2010-09-13
16 Amy Vezza State changed to In Last Call from Last Call Requested by Amy Vezza
2010-09-11
16 Sam Weiler Request for Last Call review by SECDIR is assigned to Alan DeKok
2010-09-11
16 Sam Weiler Request for Last Call review by SECDIR is assigned to Alan DeKok
2010-09-10
16 Ron Bonica State Changes to Last Call Requested from AD Evaluation by Ron Bonica
2010-09-10
16 Ron Bonica Last Call was requested by Ron Bonica
2010-09-10
16 (System) Ballot writeup text was added
2010-09-10
16 (System) Last call text was added
2010-09-10
16 (System) Ballot approval text was added
2010-08-24
16 Ron Bonica State Changes to AD Evaluation from Publication Requested by Ron Bonica
2010-07-14
16 Cindy Morgan [Note]: 'Fred Baker (fred@cisco.com) is the document shepherd.' added by Cindy Morgan
2010-07-14
16 Cindy Morgan
> (1.a) Who is the Document Shepherd for this document? Has the
> Document Shepherd personally reviewed this version of the
> document and, in …
> (1.a) Who is the Document Shepherd for this document? Has the
> Document Shepherd personally reviewed this version of the
> document and, in particular, does he or she believe this
> version is ready for forwarding to the IESG for publication?

The document shepherd is Fred Baker. Yes, I believe that it is ready for IESG consideration.

> (1.b) Has the document had adequate review both from key WG members
> and from key non-WG members? Does the Document Shepherd have
> any concerns about the depth or breadth of the reviews that
> have been performed?

This document has experienced extensive review and discussion.

> (1.c) Does the Document Shepherd have concerns that the document
> needs more review from a particular or broader perspective,
> e.g., security, operational complexity, someone familiar with
> AAA, internationalization or XML?

I could imagine a review from the Security Directorate...

The one recommendation that is unusual among IPv4 stateful firewalls is that be default sessions secured by IPsec are passed without notice. This appears benign on the surface, as IPsec provides its own security. That said, in view of port-agile attacks and applications, this seems to me to be a potential attack vector, as consenting applications could use it to bypass the firewall. This was discussed in the working group and the working group considered it an acceptable risk.

> (1.d) Does the Document Shepherd have any specific concerns or
> issues with this document that the Responsible Area Director
> and/or the IESG should be aware of? For example, perhaps he
> or she is uncomfortable with certain parts of the document, or
> has concerns whether there really is a need for it. In any
> event, if the WG has discussed those issues and has indicated
> that it still wishes to advance the document, detail those
> concerns here. Has an IPR disclosure related to this document
> been filed? If so, please include a reference to the
> disclosure and summarize the WG discussion and conclusion on
> this issue.

I don't have any areas of discomfort on a procedural basis.

> (1.e) How solid is the WG consensus behind this document? Does it
> represent the strong concurrence of a few individuals, with
> others being silent, or does the WG as a whole understand and
> agree with it?

The working group has been very divided on the document - not because of its specific recommendations, but because of its general concept. It describes a stateful firewall, and some in the IPv6 community are very much opposed to anything resembling a firewall (or a NAT), believing it to be an impediment to the deployment of an end to end IPv6 network. I note that the document came into existence primarily because the author's company discovered the hard way that the existence of firewalls as a product if not a deployment fact is an absolute business requirement, regardless of the political opinions the author or anyone else might have.

As such, the document represents the intersection of the opinions of those who support definition and deployment of firewalls and those who do not, after those who would filibuster the concept have been ruled out of order.

> (1.f) Has anyone threatened an appeal or otherwise indicated extreme
> discontent? If so, please summarise the areas of conflict in
> separate email messages to the Responsible Area Director. (It
> should be in a separate email because this questionnaire is
> entered into the ID Tracker.)

No. However, an alternative draft has been proposed, draft-vyncke-advanced-ipv6-security. The authors of that draft have been invited to progress the draft in the working group as they fill out the concept.

> (1.g) Has the Document Shepherd personally verified that the
> document satisfies all ID nits? (See the
> Internet-Drafts Checklist
>
> and
> http://tools.ietf.org/tools/idnits/
> ). Boilerplate checks are
> not enough; this check needs to be thorough. Has the document
> met all formal review criteria it needs to, such as the MIB
> Doctor, media type and URI type reviews?

Yes.

> (1.h) Has the document split its references into normative and
> informative?

Yes

> Are there normative references to documents that
> are not ready for advancement or are otherwise in an unclear
> state? If such normative references exist, what is the
> strategy for their completion? Are there normative references
> that are downward references, as described in [RFC3967]? If
> so, list these downward references to support the Area
> Director in the Last Call procedure for them [RFC3967].

This draft is informational, and its normative references are all RFCs.

> (1.i) Has the Document Shepherd verified that the document IANA
> consideration section exists and is consistent with the body
> of the document?

The document correctly states that it makes no request of IANA.

> (1.j) Has the Document Shepherd verified that sections of the
> document that are written in a formal language, such as XML
> code, BNF rules, MIB definitions, etc., validate correctly in
> an automated checker?

No such sections exist.

> (1.k) The IESG approval announcement includes a Document
> Announcement Write-Up. Please provide such a Document
> Announcement Write-Up? Recent examples can be found in the
> "Action" announcements for approved documents. The approval
> announcement contains the following sections:
>
> Technical Summary

This document identifies a set of recommendations for the makers of
devices describing how to provide for "simple security" capabilities
at the perimeter of local-area IPv6 networks in Internet-enabled
homes and small offices.

> Working Group Summary

The working group was divided on the concept of defining or recommending the use of firewalls; as a result, this document is very explicitly a set of recommendations for those that would choose to build or deploy a firewall without making any recommendation on whether anyone should do either. It describes a simple stateful firewall, permeable to traffic that is secured using IPsec.

> Document Quality

There is at least one deployed implementation of this firewall, and expected to be others. The document clearly specifies a consensus set of recommendations for such firewalls.
2010-07-14
16 Cindy Morgan Draft Added by Cindy Morgan in state Publication Requested
2010-06-22
12 (System) New version available: draft-ietf-v6ops-cpe-simple-security-12.txt
2010-04-24
11 (System) New version available: draft-ietf-v6ops-cpe-simple-security-11.txt
2010-03-26
10 (System) New version available: draft-ietf-v6ops-cpe-simple-security-10.txt
2010-02-19
09 (System) New version available: draft-ietf-v6ops-cpe-simple-security-09.txt
2009-10-20
08 (System) New version available: draft-ietf-v6ops-cpe-simple-security-08.txt
2009-07-27
07 (System) New version available: draft-ietf-v6ops-cpe-simple-security-07.txt
2009-06-17
06 (System) New version available: draft-ietf-v6ops-cpe-simple-security-06.txt
2009-04-17
05 (System) New version available: draft-ietf-v6ops-cpe-simple-security-05.txt
2009-03-23
04 (System) New version available: draft-ietf-v6ops-cpe-simple-security-04.txt
2009-01-30
16 (System) Document has expired
2008-07-29
03 (System) New version available: draft-ietf-v6ops-cpe-simple-security-03.txt
2008-02-13
02 (System) New version available: draft-ietf-v6ops-cpe-simple-security-02.txt
2007-12-21
01 (System) New version available: draft-ietf-v6ops-cpe-simple-security-01.txt
2007-06-15
00 (System) New version available: draft-ietf-v6ops-cpe-simple-security-00.txt