Re: [6lo] Generation of IPv6 IIDs

Fernando Gont <fgont@si6networks.com> Mon, 05 May 2014 07:45 UTC

Return-Path: <fgont@si6networks.com>
X-Original-To: 6lo@ietfa.amsl.com
Delivered-To: 6lo@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3163F1A027A for <6lo@ietfa.amsl.com>; Mon, 5 May 2014 00:45:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level:
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id d9g2pOicArAU for <6lo@ietfa.amsl.com>; Mon, 5 May 2014 00:45:27 -0700 (PDT)
Received: from web01.jbserver.net (web01.jbserver.net [IPv6:2a00:8240:6:a::1]) by ietfa.amsl.com (Postfix) with ESMTP id C12111A0275 for <6lo@ietf.org>; Mon, 5 May 2014 00:45:27 -0700 (PDT)
Received: from [186.134.58.253] (helo=[192.168.0.6]) by web01.jbserver.net with esmtpsa (TLSv1:DHE-RSA-AES128-SHA:128) (Exim 4.82) (envelope-from <fgont@si6networks.com>) id 1WhDaK-0001Mk-Us; Mon, 05 May 2014 09:45:15 +0200
Message-ID: <53673F11.7090203@si6networks.com>
Date: Mon, 05 May 2014 02:34:41 -0500
From: Fernando Gont <fgont@si6networks.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Thunderbird/24.4.0
MIME-Version: 1.0
To: Carsten Bormann <cabo@tzi.org>, "robert.cragie@gridmerge.com Cragie" <robert.cragie@gridmerge.com>, "6lo@ietf.org" <6lo@ietf.org>
References: <5361A67D.4010508@si6networks.com> <031DD135F9160444ABBE3B0C36CED61816A16351@AMSPRD9003MB066.MGDPHG.emi.philips.com> <5362B6CE.1020000@gridmerge.com> <CAC00F89-3BE1-4795-8B38-F1D753A2B3E7@tzi.org>
In-Reply-To: <CAC00F89-3BE1-4795-8B38-F1D753A2B3E7@tzi.org>
X-Enigmail-Version: 1.5.2
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit
Archived-At: http://mailarchive.ietf.org/arch/msg/6lo/QMdhj6TIceQ2pHNJTzsSB0F5cxk
Cc: "6lo-chairs@tools.ietf.org" <6lo-chairs@tools.ietf.org>, "draft-ietf-6man-default-iids@tools.ietf.org" <draft-ietf-6man-default-iids@tools.ietf.org>, Dave Thaler <dthaler@microsoft.com>, "Dijk, Esko" <esko.dijk@philips.com>
Subject: Re: [6lo] Generation of IPv6 IIDs
X-BeenThere: 6lo@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Mailing list for the 6lo WG for Internet Area issues in IPv6 over constrained node networks." <6lo.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/6lo>, <mailto:6lo-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/6lo/>
List-Post: <mailto:6lo@ietf.org>
List-Help: <mailto:6lo-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/6lo>, <mailto:6lo-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 05 May 2014 07:45:30 -0000

Hi, Carsten,

On 05/01/2014 04:32 PM, Carsten Bormann wrote:
> On 01 May 2014, at 23:04, Robert Cragie <robert.cragie@gridmerge.com>
> wrote:
> 
>> However, for link local addresses, especially in a route-over mesh
>> where a link-local IP packet travels strictly one node hop, it does
>> not seem as critical. As mentioned below, in many cases 6LoWPAN
>> compression relies on a one-to-one correspondence between a link
>> local and IPv6 address to provide effective compression.
> 
> Indeed, and a more complete approach to fix the privacy leaks for the
> link-local cases will involve privacy enhancements to the layers
> below (as discussed by Piers O'Hanlon at IETF 89 and see also
> https://www.w3.org/2014/strint/papers/35.pdf).

While I don't necessarily disagree with doing any privacy-wise
improvements at the link-layer, that's mostly orthogonal to what we're
discussing here.

Several things to note:

* Firstly (and most importantly), traditional SLAAC IIDs mean that the
IID has the same properties as the underlying MAC address. That's where
the problem resides.  If you play with the underlying MAC address,
you're not solving that problem.

* If you do simple MAC-address-randomization + traditional SLAAC, that
would lead to IPv6 addresses that change over time, even when that's not
really desirable. In order to know where such change might be desirable,
you would need to do some sort flavor of RFC6059.. but most of the
"hints" there are not available at layer-2.

* The scale of the problem is different between MAC address privacy vs.
IPv6 address privacy: In order to exploit the former, you essentially
need a rogue device connected to the victim's network. In order to
exploit the later, you just need to be connected to the Internet.

* Finally, there could even be cases where the MAC address is not
changeable (for one reason or another).

Thanks,
-- 
Fernando Gont
SI6 Networks
e-mail: fgont@si6networks.com
PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492