Recommended Simple Security Capabilities in Customer Premises Equipment (CPE) for Providing Residential IPv6 Internet Service
draft-ietf-v6ops-cpe-simple-security-16
Revision differences
Document history
| Date | Rev. | By | Action |
|---|---|---|---|
| 2012-08-22 | 16 | (System) | post-migration administrative database adjustment to the No Objection position for Jari Arkko |
| 2010-10-25 | 16 | Amy Vezza | State changed to RFC Ed Queue from Approved-announcement sent by Amy Vezza |
| 2010-10-22 | 16 | (System) | IANA Action state changed to No IC |
| 2010-10-22 | 16 | Amy Vezza | IESG state changed to Approved-announcement sent |
| 2010-10-22 | 16 | Amy Vezza | IESG has approved the document |
| 2010-10-22 | 16 | Amy Vezza | Closed "Approve" ballot |
| 2010-10-21 | 16 | (System) | New version available: draft-ietf-v6ops-cpe-simple-security-16.txt |
| 2010-10-21 | 16 | Ron Bonica | State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Ron Bonica |
| 2010-10-13 | 16 | Jari Arkko | [Ballot Position Update] Position for Jari Arkko has been changed to No Objection from Discuss by Jari Arkko |
| 2010-10-12 | 16 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
| 2010-10-12 | 15 | (System) | New version available: draft-ietf-v6ops-cpe-simple-security-15.txt |
| 2010-10-08 | 16 | (System) | Removed from agenda for telechat - 2010-10-07 |
| 2010-10-07 | 16 | Jari Arkko | [Ballot discuss] Section 3.3.4 is not entirely correct on claiming that Shim6 is not applicable. Of course, it is true that a single-homed home network … [Ballot discuss] Section 3.3.4 is not entirely correct on claiming that Shim6 is not applicable. Of course, it is true that a single-homed home network does not need Shim6 for itself. However, it is possible that the other end does. Hence, I believe it would be proper to allow Shim6 headers. Also, the only mention of new protocols and unrecognized protocols and what to do with them is here: Conversely, simple Internet gateways are not expected to prohibit the development of new applications. In particular, packets with end-to- end network security and routing extension headers for mobility are expected to pass Internet gateways freely. In other words, if you package your traffic in IPsec (or Mobile IPv6) it will work, otherwise not. I think the document should be more explicit about this limitation, and that new extension headers, new transport protocols, etc. would not work through the simple gateway. I would suggest that the document say something about recommending automatic software updates for any device that supports this type of a functionality so that newly allocated protocol numbers could become supported in an easy manner. |
| 2010-10-07 | 16 | Cindy Morgan | State changed to IESG Evaluation::Revised ID Needed from IESG Evaluation by Cindy Morgan |
| 2010-10-07 | 16 | Cindy Morgan | [Ballot Position Update] New position, Discuss, has been recorded by Cindy Morgan |
| 2010-10-07 | 16 | Jari Arkko | [Ballot discuss] Section 3.3.4 is not entirely correct on claiming that Shim6 is not applicable. Of course, it is true that a single-homed home network … [Ballot discuss] Section 3.3.4 is not entirely correct on claiming that Shim6 is not applicable. Of course, it is true that a single-homed home network does not need Shim6 for itself. However, it is possible that the other end does. Hence, I believe it would be proper to allow Shim6 headers. Jari |
| 2010-10-07 | 16 | Amy Vezza | State changed to IESG Evaluation from Waiting for AD Go-Ahead by Amy Vezza |
| 2010-10-07 | 16 | Stewart Bryant | [Ballot Position Update] New position, No Objection, has been recorded by Stewart Bryant |
| 2010-10-07 | 16 | Dan Romascanu | [Ballot Position Update] New position, No Objection, has been recorded by Dan Romascanu |
| 2010-10-06 | 16 | Tim Polk | [Ballot comment] Two comments: (1) REC-25 seems out of place. REC-25 specifies default mode for handling Host Identity Protocol (hip) packets, but is in section … [Ballot comment] Two comments: (1) REC-25 seems out of place. REC-25 specifies default mode for handling Host Identity Protocol (hip) packets, but is in section 3.2.4 "IPsec and Internet Key Exchange (IKE)". (2) Shouldn't REC-21 cover WESP packets as well as ESP packets? It would seem the same rules would apply. |
| 2010-10-06 | 16 | Tim Polk | [Ballot Position Update] New position, No Objection, has been recorded by Tim Polk |
| 2010-10-06 | 16 | Robert Sparks | [Ballot Position Update] New position, No Objection, has been recorded by Robert Sparks |
| 2010-10-06 | 16 | Russ Housley | [Ballot Position Update] New position, No Objection, has been recorded by Russ Housley |
| 2010-10-06 | 16 | Gonzalo Camarillo | [Ballot Position Update] New position, No Objection, has been recorded by Gonzalo Camarillo |
| 2010-10-05 | 16 | Peter Saint-Andre | [Ballot Position Update] New position, No Objection, has been recorded by Peter Saint-Andre |
| 2010-10-05 | 16 | Adrian Farrel | [Ballot Position Update] New position, No Objection, has been recorded by Adrian Farrel |
| 2010-10-05 | 16 | Adrian Farrel | [Ballot comment] Please note that RFC 4306 has been obsoleted by RFC 5996 |
| 2010-10-05 | 16 | Ralph Droms | [Ballot comment] Section 3.1: REC-9: Inbound DHCPv6 discovery packets [RFC3315] received on exterior interfaces MUST NOT be processed by any integrated … [Ballot comment] Section 3.1: REC-9: Inbound DHCPv6 discovery packets [RFC3315] received on exterior interfaces MUST NOT be processed by any integrated DHCPv6 server. Did you consider processing by an integrated DHCPv6 relay agent? I would suggest "server and/or relay agent". |
| 2010-10-05 | 16 | Ralph Droms | [Ballot comment] Section 3.1: REC-9: Inbound DHCPv6 discovery packets [RFC3315] received on exterior interfaces MUST NOT be processed by any integrated … [Ballot comment] Section 3.1: REC-9: Inbound DHCPv6 discovery packets [RFC3315] received on exterior interfaces MUST NOT be processed by any integrated DHCPv6 server. Did you consider processing by an integrated DHCPv6 relay agent? I would suggest "server and/or relay agent". |
| 2010-10-05 | 16 | Ralph Droms | [Ballot Position Update] New position, No Objection, has been recorded by Ralph Droms |
| 2010-10-05 | 16 | Sean Turner | [Ballot comment] Sec 3.1: r/recommended/RECOMMENDED ? |
| 2010-10-05 | 16 | Sean Turner | [Ballot Position Update] New position, No Objection, has been recorded by Sean Turner |
| 2010-09-29 | 14 | (System) | New version available: draft-ietf-v6ops-cpe-simple-security-14.txt |
| 2010-09-28 | 13 | (System) | New version available: draft-ietf-v6ops-cpe-simple-security-13.txt |
| 2010-09-28 | 16 | Cindy Morgan | State changed to Waiting for AD Go-Ahead from In Last Call by Cindy Morgan |
| 2010-09-28 | 16 | Ron Bonica | Placed on agenda for telechat - 2010-10-07 by Ron Bonica |
| 2010-09-28 | 16 | Ron Bonica | [Ballot Position Update] New position, Yes, has been recorded for Ronald Bonica |
| 2010-09-28 | 16 | Ron Bonica | Ballot has been issued by Ron Bonica |
| 2010-09-28 | 16 | Ron Bonica | Created "Approve" ballot |
| 2010-09-16 | 16 | Amanda Baber | IANA understands that there are NO IANA ACTIONS required upon approval of this document. |
| 2010-09-13 | 16 | Amy Vezza | Last call sent |
| 2010-09-13 | 16 | Amy Vezza | State changed to In Last Call from Last Call Requested by Amy Vezza |
| 2010-09-11 | 16 | Sam Weiler | Request for Last Call review by SECDIR is assigned to Alan DeKok |
| 2010-09-11 | 16 | Sam Weiler | Request for Last Call review by SECDIR is assigned to Alan DeKok |
| 2010-09-10 | 16 | Ron Bonica | State Changes to Last Call Requested from AD Evaluation by Ron Bonica |
| 2010-09-10 | 16 | Ron Bonica | Last Call was requested by Ron Bonica |
| 2010-09-10 | 16 | (System) | Ballot writeup text was added |
| 2010-09-10 | 16 | (System) | Last call text was added |
| 2010-09-10 | 16 | (System) | Ballot approval text was added |
| 2010-08-24 | 16 | Ron Bonica | State Changes to AD Evaluation from Publication Requested by Ron Bonica |
| 2010-07-14 | 16 | Cindy Morgan | [Note]: 'Fred Baker (fred@cisco.com) is the document shepherd.' added by Cindy Morgan |
| 2010-07-14 | 16 | Cindy Morgan | > (1.a) Who is the Document Shepherd for this document? Has the > Document Shepherd personally reviewed this version of the > document and, in … > (1.a) Who is the Document Shepherd for this document? Has the > Document Shepherd personally reviewed this version of the > document and, in particular, does he or she believe this > version is ready for forwarding to the IESG for publication? The document shepherd is Fred Baker. Yes, I believe that it is ready for IESG consideration. > (1.b) Has the document had adequate review both from key WG members > and from key non-WG members? Does the Document Shepherd have > any concerns about the depth or breadth of the reviews that > have been performed? This document has experienced extensive review and discussion. > (1.c) Does the Document Shepherd have concerns that the document > needs more review from a particular or broader perspective, > e.g., security, operational complexity, someone familiar with > AAA, internationalization or XML? I could imagine a review from the Security Directorate... The one recommendation that is unusual among IPv4 stateful firewalls is that be default sessions secured by IPsec are passed without notice. This appears benign on the surface, as IPsec provides its own security. That said, in view of port-agile attacks and applications, this seems to me to be a potential attack vector, as consenting applications could use it to bypass the firewall. This was discussed in the working group and the working group considered it an acceptable risk. > (1.d) Does the Document Shepherd have any specific concerns or > issues with this document that the Responsible Area Director > and/or the IESG should be aware of? For example, perhaps he > or she is uncomfortable with certain parts of the document, or > has concerns whether there really is a need for it. In any > event, if the WG has discussed those issues and has indicated > that it still wishes to advance the document, detail those > concerns here. Has an IPR disclosure related to this document > been filed? If so, please include a reference to the > disclosure and summarize the WG discussion and conclusion on > this issue. I don't have any areas of discomfort on a procedural basis. > (1.e) How solid is the WG consensus behind this document? Does it > represent the strong concurrence of a few individuals, with > others being silent, or does the WG as a whole understand and > agree with it? The working group has been very divided on the document - not because of its specific recommendations, but because of its general concept. It describes a stateful firewall, and some in the IPv6 community are very much opposed to anything resembling a firewall (or a NAT), believing it to be an impediment to the deployment of an end to end IPv6 network. I note that the document came into existence primarily because the author's company discovered the hard way that the existence of firewalls as a product if not a deployment fact is an absolute business requirement, regardless of the political opinions the author or anyone else might have. As such, the document represents the intersection of the opinions of those who support definition and deployment of firewalls and those who do not, after those who would filibuster the concept have been ruled out of order. > (1.f) Has anyone threatened an appeal or otherwise indicated extreme > discontent? If so, please summarise the areas of conflict in > separate email messages to the Responsible Area Director. (It > should be in a separate email because this questionnaire is > entered into the ID Tracker.) No. However, an alternative draft has been proposed, draft-vyncke-advanced-ipv6-security. The authors of that draft have been invited to progress the draft in the working group as they fill out the concept. > (1.g) Has the Document Shepherd personally verified that the > document satisfies all ID nits? (See the > Internet-Drafts Checklist > > and > http://tools.ietf.org/tools/idnits/ > ). Boilerplate checks are > not enough; this check needs to be thorough. Has the document > met all formal review criteria it needs to, such as the MIB > Doctor, media type and URI type reviews? Yes. > (1.h) Has the document split its references into normative and > informative? Yes > Are there normative references to documents that > are not ready for advancement or are otherwise in an unclear > state? If such normative references exist, what is the > strategy for their completion? Are there normative references > that are downward references, as described in [RFC3967]? If > so, list these downward references to support the Area > Director in the Last Call procedure for them [RFC3967]. This draft is informational, and its normative references are all RFCs. > (1.i) Has the Document Shepherd verified that the document IANA > consideration section exists and is consistent with the body > of the document? The document correctly states that it makes no request of IANA. > (1.j) Has the Document Shepherd verified that sections of the > document that are written in a formal language, such as XML > code, BNF rules, MIB definitions, etc., validate correctly in > an automated checker? No such sections exist. > (1.k) The IESG approval announcement includes a Document > Announcement Write-Up. Please provide such a Document > Announcement Write-Up? Recent examples can be found in the > "Action" announcements for approved documents. The approval > announcement contains the following sections: > > Technical Summary This document identifies a set of recommendations for the makers of devices describing how to provide for "simple security" capabilities at the perimeter of local-area IPv6 networks in Internet-enabled homes and small offices. > Working Group Summary The working group was divided on the concept of defining or recommending the use of firewalls; as a result, this document is very explicitly a set of recommendations for those that would choose to build or deploy a firewall without making any recommendation on whether anyone should do either. It describes a simple stateful firewall, permeable to traffic that is secured using IPsec. > Document Quality There is at least one deployed implementation of this firewall, and expected to be others. The document clearly specifies a consensus set of recommendations for such firewalls. |
| 2010-07-14 | 16 | Cindy Morgan | Draft Added by Cindy Morgan in state Publication Requested |
| 2010-06-22 | 12 | (System) | New version available: draft-ietf-v6ops-cpe-simple-security-12.txt |
| 2010-04-24 | 11 | (System) | New version available: draft-ietf-v6ops-cpe-simple-security-11.txt |
| 2010-03-26 | 10 | (System) | New version available: draft-ietf-v6ops-cpe-simple-security-10.txt |
| 2010-02-19 | 09 | (System) | New version available: draft-ietf-v6ops-cpe-simple-security-09.txt |
| 2009-10-20 | 08 | (System) | New version available: draft-ietf-v6ops-cpe-simple-security-08.txt |
| 2009-07-27 | 07 | (System) | New version available: draft-ietf-v6ops-cpe-simple-security-07.txt |
| 2009-06-17 | 06 | (System) | New version available: draft-ietf-v6ops-cpe-simple-security-06.txt |
| 2009-04-17 | 05 | (System) | New version available: draft-ietf-v6ops-cpe-simple-security-05.txt |
| 2009-03-23 | 04 | (System) | New version available: draft-ietf-v6ops-cpe-simple-security-04.txt |
| 2009-01-30 | 16 | (System) | Document has expired |
| 2008-07-29 | 03 | (System) | New version available: draft-ietf-v6ops-cpe-simple-security-03.txt |
| 2008-02-13 | 02 | (System) | New version available: draft-ietf-v6ops-cpe-simple-security-02.txt |
| 2007-12-21 | 01 | (System) | New version available: draft-ietf-v6ops-cpe-simple-security-01.txt |
| 2007-06-15 | 00 | (System) | New version available: draft-ietf-v6ops-cpe-simple-security-00.txt |