[dhcwg] Re: Intdir telechat review of draft-ietf-dhc-addr-notification-11

CARLOS JESUS BERNARDOS CANO <cjbc@it.uc3m.es> Tue, 14 May 2024 10:11 UTC

Return-Path: <cjbc@it.uc3m.es>
X-Original-To: dhcwg@ietfa.amsl.com
Delivered-To: dhcwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4F1A0C14CF1B for <dhcwg@ietfa.amsl.com>; Tue, 14 May 2024 03:11:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.996
X-Spam-Level:
X-Spam-Status: No, score=-1.996 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=it.uc3m.es
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uuKtPMLUCKxf for <dhcwg@ietfa.amsl.com>; Tue, 14 May 2024 03:11:43 -0700 (PDT)
Received: from mail-lj1-x230.google.com (mail-lj1-x230.google.com [IPv6:2a00:1450:4864:20::230]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 16379C14F711 for <dhcwg@ietf.org>; Tue, 14 May 2024 03:11:42 -0700 (PDT)
Received: by mail-lj1-x230.google.com with SMTP id 38308e7fff4ca-2dcc8d10d39so63360381fa.3 for <dhcwg@ietf.org>; Tue, 14 May 2024 03:11:42 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=it.uc3m.es; s=google; t=1715681500; x=1716286300; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=TkUuoDwyQuN1y4IBxXNcE9JbmAMwKjaChirHjWV2KSQ=; b=jitHNkL8hA3p/I/m3u8fce+D+rnVHU4l9MadDkKbJPpgBfM4rfh6ufGQ+l46xFHcxZ Ge/RG9GEDWa7K27G5kGuOajcDDbgKuCm818MS8o2hIXmAfWD5xEviVkYP/XpQUeg1leq x7Ezc2iOqH+KqjTY/l6G6B6yOkex/acRX/UPajPwGHnaqegbq9e5Bl5r+pBzvxnK8Sug RtVvhRbFdAqFSIGm5BIF6MjtBGGeuwmXYGWsPchXHfj6CsUFPR8NzncbyNsaOGfBmRPv k4aejHJ+VtQs9A3T8TBTULzg0JKv3ovkQ7xzcWMsA8vHi9GQlpKwV5NhbxNIvunUsUwU wnKw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1715681500; x=1716286300; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=TkUuoDwyQuN1y4IBxXNcE9JbmAMwKjaChirHjWV2KSQ=; b=a/TT3WUW2oiSXpjMKcxxahAWZmD3LCTWUwUmiNngEpGyxnOozuDAlrSi6rZDzta1lb lcWHimCcvUkLG6c9utuEUqidF3QkYXt2u5mKWrCqlYi+nKGxtFCVbluYvyngDXWqn1+o PLRSYE4pceC2OuQEyxXd0kQiZOzVr2dZotUbTqcw7lNQFg7OLBLGo+eK498M7M27XI3k 5GO3Jaul6g+MLlqxg1fpVVwLdI5ibrt6lhpRd2c3RiD7E+Z8FSLuRrEblxOLzGpbnhi2 JBDmsiBbrTwuJH9mMlXi66acEWrhxR5+qWbPbNG40Y42GNfCBABqj1hkJAADDVZY9HfI YCfA==
X-Forwarded-Encrypted: i=1; AJvYcCVkFVj5XdlwMIE9LkwfJCSUPjbB6AEiKjdqyOmxgWor6YHLrW5B8aw2pTUP1+ueOAllbaXKbUHjMhWHCWjuAw==
X-Gm-Message-State: AOJu0YyUDcSyyCFxnVZUJjAEAd3qfTsd0Q9aEzOTS8tBRgeXoMhX3rxj QwZGdeew1yk1JQ4SWM91ZRLu6Y4a8tECNAWonZqE7mykQLdYP32ob2YXA01dzAFxoRQiZPrT18E rapVgBbrqdDMOAvj5gHpxh8n1X6mbjodxU8Yz3A==
X-Google-Smtp-Source: AGHT+IEgrAarYYiHkHS4ai9cvAPmvKl1jqyu2uB2gpi1jCa5uEyMWieheMvhhbnic7aG8mHODy1s9nJ7Db98m1k571U=
X-Received: by 2002:a2e:8785:0:b0:2e2:802:7d5f with SMTP id 38308e7fff4ca-2e51fe532c5mr86890911fa.15.1715681500345; Tue, 14 May 2024 03:11:40 -0700 (PDT)
MIME-Version: 1.0
References: <171529147607.11804.16114886878600792078@ietfa.amsl.com> <CAFU7BAQRBTbWH3CwoadxTw=zuN65bGDDc-YNNiSNMfbVFAJO7w@mail.gmail.com>
In-Reply-To: <CAFU7BAQRBTbWH3CwoadxTw=zuN65bGDDc-YNNiSNMfbVFAJO7w@mail.gmail.com>
From: CARLOS JESUS BERNARDOS CANO <cjbc@it.uc3m.es>
Date: Tue, 14 May 2024 12:11:24 +0200
Message-ID: <CALypLp_+pSHye07wToKGwciO9C5cY6cwX1M=zGSrpg2Mc3Jsvg@mail.gmail.com>
To: Jen Linkova <furry13@gmail.com>
Content-Type: multipart/alternative; boundary="0000000000006053910618673ac8"
Message-ID-Hash: KL25U6LBQYEK37RVILVGV5PG74GI3I6I
X-Message-ID-Hash: KL25U6LBQYEK37RVILVGV5PG74GI3I6I
X-MailFrom: cjbc@it.uc3m.es
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-dhcwg.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: int-dir@ietf.org, dhcwg@ietf.org, draft-ietf-dhc-addr-notification.all@ietf.org, last-call@ietf.org
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [dhcwg] Re: Intdir telechat review of draft-ietf-dhc-addr-notification-11
List-Id: Dynamic Host Configuration <dhcwg.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/dhcwg/176QYMIDyulcEKVyiFlewA9f0Fo>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dhcwg>
List-Help: <mailto:dhcwg-request@ietf.org?subject=help>
List-Owner: <mailto:dhcwg-owner@ietf.org>
List-Post: <mailto:dhcwg@ietf.org>
List-Subscribe: <mailto:dhcwg-join@ietf.org>
List-Unsubscribe: <mailto:dhcwg-leave@ietf.org>

Hi Jen,

Thanks for the updates. Some quick comments inline below.


On Tue, May 14, 2024 at 8:48 AM Jen Linkova <furry13@gmail.com> wrote:

> Hi Carlos,
>
> On Fri, May 10, 2024 at 7:51 AM Carlos Jesús Bernardos via Datatracker
> <noreply@ietf.org> wrote:
> > Based on my review, if I was on the IESG I would ballot this document as
> YES.
>
> Thank you! ;)
>
> > - At the end of section 1, it is mentioned that the mechanism described
> in the
> > document provides parity with IPv4, by allowing a device to inform the
> DHCPv6
> > server about a self-configured or statically configured address.
> Apologies for
> > my ignorance on this in advance, but, is there a mechanism in IPv4 to do
> so for
> > statically configured addresses? If so, I think adding a reference would
> be
> > useful. If not, maybe the text can be rewritten a bit, as I would find
> it a bit
> > unclear.
>
> We've just submitted -12 which now says:
> "This operational practice relies on the DHCP server knowing the IP
> address assignments. This works quite well for IPv4 addresses, as most
> addresses are either assigned by DHCP [RFC2131] or statically
> configured by the network operator. For IPv6, however, this practice
> is much harder to implement, as devices often self-configure IPv6
> addresses via SLAAC [RFC4862].
>
> This document provides a mechanism for a device to inform the DHCPv6
> server that the device has a self-configured IPv6 address (or has a
> statically configured address), and thus provides parity with IPv4, by
> making DHCPv6 infrastructure aware of self-assigned IPv6 addresses."
>
> I hope it's more clear now, pls let us know if you think further
> improvements are needed.
>

 [Carlos] Fine with me, thanks!


>
> > - It is mentioned that the client MUST include the Client Identifier
> option in
> > the ADDRESS-REG-INFORM messages. I think this might deserve some text
> regarding
> > how this might imply (or not) a potential privacy issue for hosts
> implementing
> > some kind of MAC address randomization and rotation of IPv6 self-assigned
> > addresses, as an observer could easily track the addresses being used
> and match
> > those to the same device.
>
> We don’t think this is a concern, because on-link attackers do not
> need to use the client identifier to match self-assigned addresses to
> devices, they can use the MAC address for that purpose.
> Privacy-sensitive clients that randomize their MAC addresses should
> obviously randomize their DHCPv6 Client Identifiers too. We’re not
> sure this document is the right place to say so, though?
>

[Carlos] While I agree that this is not the document to specify how to use
DHCPv6 Client Identifiers, I think adding notifications that can allow an
on-link attacker to match a MAC-changing device with the addresses it might
be using would deserve at least a reference to the documents that have
tackled the privacy issues in the past (I think there is one specifically
tackling the aspects of DHCPv6).


>
> > - It is not completely clear to me if the spec requires a client to use
> the
> > mechanism on ALL interfaces. I mean, can a client use it just on some
> > interfaces, but not all, by having configuration policies indicating on
> which
> > ones to use it? As I read the document, it seems to imply that if it is
> used on
> > one interface, it MUST be used on all of them.
>
> Oh very good point, I didn't realize we are not making that part
> clear. No, as the registration messame must be sent from the address
> being registered (section 4.2 does say that), and the registration
> support is network-specific, the client should (must) enable this on
> per-interface basis.
> We have added the following text to Section 4.4:
> "A client with multiple interfaces MUST discover address registration
> support for each interface independently. The client MUST NOT send
> address registration messages on a given interface unless the client
> has discovered that the interface is connected to a network which
> supports address registration."
>

[Carlos] Great, thanks!


>
>
> > - Minor nit (or maybe just nothing at it is just that I’m not a native
> English
> > speaker): “to specify the address to being registered” -> I guess the
> “to”
> > should be removed.
>
> Yeah, a typo, fixed!
>

[Carlos] Thanks!


>
> --
> Cheers, Jen Linkova
>