Re: [6lo] Secdir last call review of draft-ietf-6lo-plc-05

Shwetha <> Sun, 28 March 2021 08:29 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id C44F43A11D4 for <>; Sun, 28 Mar 2021 01:29:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: (amavisd-new); dkim=pass (2048-bit key)
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id tKqAt6AGjCtA for <>; Sun, 28 Mar 2021 01:29:09 -0700 (PDT)
Received: from ( [IPv6:2607:f8b0:4864:20::b2a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by (Postfix) with ESMTPS id BFFA53A11D3 for <>; Sun, 28 Mar 2021 01:29:08 -0700 (PDT)
Received: by with SMTP id j2so10488025ybj.8 for <>; Sun, 28 Mar 2021 01:29:08 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;; s=20161025; h=mime-version:from:date:message-id:subject:to:cc; bh=cMdGcVzxcFXAxWJwdsEUTd95NxLQdSYhTQIj01ZniCo=; b=rKLTXKj8A5G01BZy3ltrvgQDNbTvHmNmAAl+1fKI3OuPrvEe9NzYNKh2LWIisdBuFt DUsDN5NxSwEA0SD9r4ysP2+Ta8S8HRNIph2RuVXIXlBpPcSQ7KB5qOjtCv1G8tiNe5Gy gfkvzuufDZOthZ+ACHym/gNOFqL4wLK1XmcjzOCbXSPGFlfVdKKJPm24DnyrJ5jOv0fg XGzXER2EairpVgFnzzDhRwfgL5TUR186DlvZhMUhpG/e0oZGlFUlC2sFtqKw5oNnYGNE NnlZcYekZkQfIunJ4dYRAB+1eFNcQtL55UwjL6fSyTYLP1JzXJfmx/WgyElg8t52Bo5h E/MQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to:cc; bh=cMdGcVzxcFXAxWJwdsEUTd95NxLQdSYhTQIj01ZniCo=; b=hv34RavgFLdDp0lbpvwpVyXvoIkv5o5T/iffTDosQ4BGG/HS+iO7CHW/Iz29MlDiYP C8zEcmsvNmzOR7ZF6xteb6jPPd7dNF9gMGpyqVnsrWKmjF8HNFCFrF8P5k8NMDOupfQZ HXe9Hh9LJkmC0NfEaMdFoxM6Ujtz/6Tb/HMomzT3W/cnB4SPinorJorR3wkpayKVWmCz 3N+y+1alqnuULTT3qJ15yQDXO9HJ4jgOWlfBkPW5hfcw0ALx4zy0VypdM8yPvEh4TPJ8 cVnu6cRbRDaD2DfJbaKeb1uDyXXj/jvuA6E7rg+nzmk/m8ZvxMAN3JTGtnKX2JU7Sxa3 cuNA==
X-Gm-Message-State: AOAM532leB6Q0jo2wcjsq/30dpcYCXU2gTYkLzepixxAzRBNb8/zq/Pl b54oyTkewAyK319Jomu/L+OhtBNi0p21VIDa6rI=
X-Google-Smtp-Source: ABdhPJyRXNT7cp2yQQwRCFOzSgAxJJpEzm/EEZyq8MRRWNf+EVs6ZMs4W4biuElqRbHJ3bIbfVVKbF0lErRnLeOss9A=
X-Received: by 2002:a25:d89:: with SMTP id 131mr27936520ybn.481.1616920147393; Sun, 28 Mar 2021 01:29:07 -0700 (PDT)
MIME-Version: 1.0
From: Shwetha <>
Date: Sun, 28 Mar 2021 13:58:55 +0530
Message-ID: <>
Cc:, Erik Kline <>, Carles Gomez Montenegro <>
Content-Type: multipart/alternative; boundary="00000000000004053205be948fb6"
Archived-At: <>
Subject: Re: [6lo] Secdir last call review of draft-ietf-6lo-plc-05
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Mailing list for the 6lo WG for Internet Area issues in IPv6 over constrained node networks." <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Sun, 28 Mar 2021 08:29:14 -0000

Following up on this, from the discussion at IETF 110:
The privacy and security considerations in the PLC drafts:

[RFC3315], [RFC3972], [RFC4941],
   [RFC5535], [RFC7217], and [RFC8065] provide valuable information for IID
formation with improved privacy, and are RECOMMENDED for IPv6 networks.

1. A cleanup of references for security and privacy considerations is
needed : 7217, 8981, 8065 should suffice?
2. Do we need the reference to SeND RFC 3972?


Tue, 09 March 2021 03:30 UTCShow header

Hello Robert,

Thank you for your reply. Please find my text inline.

Best regards,
发件人: Robert Sparks []
发送时间: 2021年3月5日 23:58
收件人: Liubing (Remy) <>om>gt;om>;
主题: Re: Secdir last call review of draft-ietf-6lo-plc-05


On 3/4/21 9:49 PM, Liubing (Remy) wrote:
> Hello Robert,
> Thank you very much for your comments. It helps a lot.
> Please see our response inline.
> Best regards,
> Remy
> -----邮件原件-----
> 发件人: Robert Sparks via Datatracker []
> 发送时间: 2021年2月15日 6:50
> 收件人:
> 抄送:;;
> 主题: Secdir last call review of draft-ietf-6lo-plc-05
> Reviewer: Robert Sparks
> Review result: Has Issues
> I have reviewed this document as part of the security directorate's
ongoing effort to review all IETF documents being processed by the IESG.
These comments were written primarily for the benefit of the security area
directors. Document editors and WG chairs should treat these comments just
like any other last call comments.
> This document has issues that should be addressed before publication as
Proposed Standard RFC.
> Document reviewed: draft-ietf-6lo-plc-05
> This document's primary point is to standardize mappings of ipv6
identifiers for using ipv6 over IEEE 1901.1, 1901.2, and IT-T G.9903
> Those standards are not publicy available, and I have not reviewed how
these mappings and the security mechanisms in those protocols interact.
> The document has content that is not needed for its purpose. Section 5 in
particular might be useful in an informational RFC, but is has no impact on
someone implementing what this document is trying to standardize.
> [Remy] Yes, this section is more like informational. We'll ask the WG if
we should remove it or not.
> The security considerations section speaks primarily to generic
considerations for 6lo-like networks. There is no specific discussion of
the impact of the identifier mappings with the underlying protocols, in
particular the constraints that don't allow using the full number of bits
of entropy in the identifiers in those underlying protocols. There is only
a passing mention of RFC8065.
> [Remy] We would like to extend the description as follows: RFC8065
discusses the privacy threats when interface identifiers (IID) are
generated without sufficient entropy, including correlation of activities
over time, location tracking, device-specific vulnerability exploitation,
and address scanning. Schemes such as limited lease period in DHCPv6
[RFC3315] Cryptographically Generated Addresses (CGAs) [RFC3972], privacy
extensions [RFC4941], Hash-Based Addresses (HBAs) [RFC5535], or
semantically opaque addresses [RFC7217] SHOULD be considered to enhance the
IID privacy. As per RFC8065, when short addresses are used on PLC links, a
shared secret key or version number from the Authoritative Border Router
Option [RFC6775] can be used to improve the entropy of the hash input, thus
the generated IID can be spread out to the full range of the IID address
space while stateless address compression is still allowed.
> Do you think it solves the issue?
It's better, yes, but I hope people with more expertise and experience with
the recommendations than me look closely at it.
> Implementors are advised to "look at" RFC8604 when considering building
stable addresses, but this document specifies doing things that RFC8604
recommends against (see the use of RFC2464, for example). More discussion
seems warranted.
> [Remy] In the same paragraph we reference RFC8604, we limit the usage of
MAC generated IID as per RFC2464 in link-local address configuration.

Well, that's my point - I think RFC8064 (sorry for my original typo
above) recommends NOT to do the things in 2464 that you are saying to do. I
could be wrong. But having clearer text noting how what you are requiring
avoids the issues 8064 brings up would help. Again, I hope people with more
expertise than me look closely here.

[Remy] The problem has been solved in RFC8065 (designed in 6lo), when short
addresses (the 16 or 12 bits link layer address) are used on PLC links, a
shared secret key or version number from the Authoritative Border Router
Option [RFC6775] can be used to improve the entropy of the hash input, thus
the generated IID can be spread out to the full range of the IID address
space while stateless address compression is still allowed. We will update
the draft to change the reference to RFC8064 into the reference to RFC8065,
and specify the solution in section 4.1 instead of the security
> There is a short mention of the possibility of acquiring a network
encryption key during onboarding but there's no discussion about what that
means for these specific layer-2 protocols.
> [Remy] The acquirement of layer-2 encryption key is specified in the IEEE
and ITU-T standards and not related to the authentication process in the
same paragraph. Thus this phrase is redundant, and we prefer to remove this
> Editorial comments:
> At section 4.6, the first paragraph can make its point more clearly. All
that's needed to say is that the lower layers handle segmentation and
reassembly, but the adaptation layer still needs to be ready to do so in
the lower layer cant handle the 1280 octet MTU. At the last paragraph, when
you say "referring to"
> do you mean "as specified in"?
> [Remy] That's a good point. We would like to simplify the first paragraph
of the section 4.6 as follows: PLC MAC layer provides the function of
segmentation and reassembly, however, Fragmentation and reassembly is still
required at the adaptation layer, if the MAC layer cannot support the
minimum MTU demanded by IPv6, which is 1280 octets.
> Yes, we will change it to "as specified in".
> At section 7, "For security consideration, link layer security is
guaranteed in every PLC technology." needs clarification. Do you mean the
three protocols discussed here provide link layer security? Or do you mean
to say that if anyone plans to provide an adaptation layer to some other
PLC protocol, that it must provide link layer security? Or do you mean
something else?
> [Remy] We meant that link layer security mechanisms are designed in these
three PLC technologies. We will rephrase it.
> Nit: Expand LLN on first use.
> [Remy] Will update it.