Re: [Captive-portals] IETF 100: ICMP Discussion Summary

Erik Kline <ek@google.com> Wed, 24 January 2018 01:53 UTC

Return-Path: <ek@google.com>
X-Original-To: captive-portals@ietfa.amsl.com
Delivered-To: captive-portals@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BC52C124205 for <captive-portals@ietfa.amsl.com>; Tue, 23 Jan 2018 17:53:44 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.011
X-Spam-Level:
X-Spam-Status: No, score=-2.011 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vJYiZfEiLqP8 for <captive-portals@ietfa.amsl.com>; Tue, 23 Jan 2018 17:53:42 -0800 (PST)
Received: from mail-yb0-x22a.google.com (mail-yb0-x22a.google.com [IPv6:2607:f8b0:4002:c09::22a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 78922120047 for <captive-portals@ietf.org>; Tue, 23 Jan 2018 17:53:42 -0800 (PST)
Received: by mail-yb0-x22a.google.com with SMTP id y77so963532ybe.13 for <captive-portals@ietf.org>; Tue, 23 Jan 2018 17:53:42 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=DehvXiy+eED1mQ9OHMbyAE5jYygpvRLF0kj7qebssg4=; b=FYHGpCL7Dp8OolBMIAcEo0JK04DcWCZoyD0i6L6HbqLwnx1IUFK7L0H6EV9LKHW4rr ne5hpTmA+CZQVH2sOTO2c18diMnhwD2LbWWWe0WaCtDzKt1cwRI1T8bR/O9o+KLOhhjC nOYH1b4HPZE0xZ8L0Nm+iI3fFuktA1ObbJVRzxy7ZzkitN1Q805b6iP28HLbKJjm9kwu m3UiWm34/orpmF5uBEDPTYilGkUAXg2TJaIy+v/cXNA0UC/a4SHvQzVyrOt36Nq8bn2T KVulIEHGmDIzKwN1id7TNAiDaOtyayiPqaY+2IqLAnGvNjvCkRurGwwgiWTtE1kv0RaO ip8w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=DehvXiy+eED1mQ9OHMbyAE5jYygpvRLF0kj7qebssg4=; b=PEz+qJed5Ff9RarN3z9CC/7QfjTNEnIONPKQKxX2EEktbt8nJtSPnP7wgu/NyEkbk5 BpUcyz8zDzaNPw7bjIWt7IHPlQwaoyT1Xb9vWNAcSBFC7SOU4RVmHpzOlBkQJ8ZHeQJv CZEWUTPpDHYIBYUfoL2aatXG1B1M3xFr+NADVmViK5hPq9MJBCNPd0zfD8hEfawezHo/ anT7Gb4CAopLRk2rVnjPlqU28CeRj1l9WzPYAjKTF3ja+Fsk7/Lbrn4z2owf0Lfe0RW7 aJ6u0qViL1Xfto4ONrGfYTfX+LANFwbq9/0ICDRNRJK3Lwei00G5NWHQh9skawo28/3t s1hw==
X-Gm-Message-State: AKwxytdmm7qvby4+zV4LSEs1wfcp2x5ZPI/7CZt8ck2jZWFi3N0oF21K qwtufOnna/VPMj2qPaOa1o0DH7QFXYb2gJvR/79CpQ==
X-Google-Smtp-Source: AH8x226VwJyiYhu6SqbXcl6PvJKuADmNXBHL0fDkXxYfHIskt0jXSD/nBzCjWTjMPDacz0x6ToqhWqiELTJAGWW7TIM=
X-Received: by 10.37.175.146 with SMTP id g18mr4163180ybh.506.1516758821213; Tue, 23 Jan 2018 17:53:41 -0800 (PST)
MIME-Version: 1.0
Received: by 10.37.207.148 with HTTP; Tue, 23 Jan 2018 17:53:20 -0800 (PST)
In-Reply-To: <546300760cea4ec7bef773a0ccf63f2c@sandvine.com>
References: <3dd416b1eece470c949225f6d6fc1fb7@sandvine.com> <27649.1512347103@obiwan.sandelman.ca> <CAAedzxrgTDm1=Hc88fuUP9_a=X6sx04n4Mb_xp7CJczz7FQ5fw@mail.gmail.com> <546300760cea4ec7bef773a0ccf63f2c@sandvine.com>
From: Erik Kline <ek@google.com>
Date: Wed, 24 Jan 2018 10:53:20 +0900
Message-ID: <CAAedzxpFUSGqtBhjtZrTP32zf0f2MSGBy1vubijb19WTr0aZvQ@mail.gmail.com>
To: Dave Dolson <ddolson@sandvine.com>
Cc: Michael Richardson <mcr+ietf@sandelman.ca>, Kyle Larose <klarose@sandvine.com>, "captive-portals@ietf.org" <captive-portals@ietf.org>
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg="sha-256"; boundary="089e0823d5ccc8f8f205637bee36"
Archived-At: <https://mailarchive.ietf.org/arch/msg/captive-portals/d2fP6CafzJW3SRqWSBvhe-DPSII>
Subject: Re: [Captive-portals] IETF 100: ICMP Discussion Summary
X-BeenThere: captive-portals@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Discussion of issues related to captive portals <captive-portals.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/captive-portals>, <mailto:captive-portals-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/captive-portals/>
List-Post: <mailto:captive-portals@ietf.org>
List-Help: <mailto:captive-portals-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/captive-portals>, <mailto:captive-portals-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Jan 2018 01:53:44 -0000

<hat off>

I don't think we should be limiting the ability of the host to address
itself.  And requiring each new address that is formed to be approved
by the capport infrastructure creates that opportunity, going against
the spirit of 7934.

Is it possible instead to scope our current work to enforcement
environments that are able to use only "properties of or from the
link" in their "are you captive or not" decisions?

By "properties of or from the link" I mean things like enforcing based on:

    - MAC address
    - the IPv6 /64 from which the source address comes
    - the IPv6 /56 (or other known delegation boundary)
    - DSL line-id
    - other link-associated metadata appropriate to the environment

Maybe "properties discernible from available link information" is a
(slightly) better phrasing.

On 5 December 2017 at 00:22, Dave Dolson <ddolson@sandvine.com> wrote:
> Regarding multiple IPv6 addresses, consider these two alternatives:
> 1. Associate the new address with an existing capport "session", for uninterrupted experience.
> 2. Treat a new address as a new session, for increased anonymity to the captive portal.
>
> (I don't see how one can have the anonymity without the pain of signing in again.)
>
> Since the level of anonymity with the portal is dubious anyhow (it sees the MAC address, and possibly other credentials), and repeatedly signing into a portal is annoying, I think it is important to try to provide a standard for (1).
> Even if (1) is provided, the device of a privacy-seeking user could nonetheless choose to trigger the workflow of a new device, case (2).
>
> I propose that the capport API permits new IP addresses to be assigned to an existing session, by providing an appropriate token.
>
> -Dave
>
>
> -----Original Message-----
> From: Captive-portals [mailto:captive-portals-bounces@ietf.org] On Behalf Of Erik Kline
> Sent: Sunday, December 3, 2017 10:48 PM
> To: Michael Richardson
> Cc: Kyle Larose; captive-portals@ietf.org
> Subject: Re: [Captive-portals] IETF 100: ICMP Discussion Summary
>
> On 4 December 2017 at 09:25, Michael Richardson <mcr+ietf@sandelman.ca> wrote:
>>
>> {did not make it in person, and had a conflict and I haven't watched
>> the session on youtube yet}
>>
>> Kyle Larose <klarose@sandvine.com> wrote:
>>     > - Question was raised about whether we should restrict the number of v6
>>     > addresses (one address, one prefix, etc).
>>
>> Was there any consensus?
>>
>> I don't see a way to restrict the number of v6 addresses per UE except
>> via stateful DHCPv6, and few use that.
>
> No consensus yet, IIRC.
>
> <hats:off>
>
> My opinion is that we cannot restrict IPv6 addresses (violation of 7934).  And any captive portal that identifies clients solely by IPv6 address is going to give some UEs a royally painful experience.  When the downstream network architecture can include whole /64s given to single devices (e.g. 64-per-host) the experience will get really bad.
>
> This is just a reality of dealing with IPv6 (and I think it's a good thing).  We just need to adapt, and I think it actually points to some constraints we can use to narrow down the solution space.
>
> As I see it at the moment, the only future-proof options come down do:
>
>     - building into the portal/enforcement point knowledge of the network architecture
>     - identifying clients by things that identify the device on-link (e.g. MAC address)
>     - identifying clients by things that identify the link itself (DSL line ID, /64, ...)
>
> </hats>
> _______________________________________________
> Captive-portals mailing list
> Captive-portals@ietf.org
> https://www.ietf.org/mailman/listinfo/captive-portals