[dhcwg] Re: Intdir telechat review of draft-ietf-dhc-addr-notification-11

Jen Linkova <furry13@gmail.com> Wed, 15 May 2024 10:21 UTC

Return-Path: <furry13@gmail.com>
X-Original-To: dhcwg@ietfa.amsl.com
Delivered-To: dhcwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B6406C1D875C; Wed, 15 May 2024 03:21:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.845
X-Spam-Level:
X-Spam-Status: No, score=-6.845 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id h7QJ909wRzbd; Wed, 15 May 2024 03:21:33 -0700 (PDT)
Received: from mail-lj1-x22c.google.com (mail-lj1-x22c.google.com [IPv6:2a00:1450:4864:20::22c]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3C610C1DA1D7; Wed, 15 May 2024 03:21:24 -0700 (PDT)
Received: by mail-lj1-x22c.google.com with SMTP id 38308e7fff4ca-2e1fa2ff499so73156961fa.0; Wed, 15 May 2024 03:21:24 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1715768482; x=1716373282; darn=ietf.org; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=lgfo9ASkzcZeYFNvfIco3yh7BJDAtGHA6XkAp2FhMdI=; b=lEPhGJVqFugdBQaey55IHjMMKnx1qoOEmF8kZTHvJjg6lL0WEAnaYs5oznpuUUh884 27Zl2HSuAtPZWSe/3U8+BVSQJdFYgQsmx/83Eg40fzkBBVPxGXm+d2gS2iBj+BH4mCGY rEdSHdbxcXqKrnAq9GURVuOa/CXaxAw7wU0UAKq5UVvSrgm5s3kPXyrTXNhYHmwjZebz OZEnNj0vUahmJK3x+fhf7nCpvvZz2qwM56zSNro8Pnj52g1tUh3ZpLqd0cAFbMQDRqZQ tRaPjwTRCAKsKWh6yVz16t6QDC8Y7NPZNnJZ0e3RNWibcWvDHou/KMr3QaWIudSm7XEa 8fkA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1715768482; x=1716373282; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=lgfo9ASkzcZeYFNvfIco3yh7BJDAtGHA6XkAp2FhMdI=; b=Hpg2JN7IcWrbdIcQLJIlIWCy9pg9cjwZ+FTMH/8j3JYbIptvBloLGUdgkRGA6/bjYY QuAtdRyK+3GFo16h6vhJvEC/m/ub1ZeXPB9KvJB5QR1t0z4PbzReOL+C21lpIP1Oanqm 0lRmWbiGUy3VL3B5EKXpwTHQS7yHHH00mPHSAZngijAzzsGc5HO224xCPa1bpTm2BRp3 gjrPAz0nbgGWUT+OtU0mAM0mRKrbhFqoxiURge+xZugQrxgdaMfDx9H3QlK7IwU18Vnh +kHY1hMkI6/9ziNK2Yrqz0QMjq9fmyuDbqle24M1vh7kul74RE1wzHp64YF3nAcQBJto B9LA==
X-Forwarded-Encrypted: i=1; AJvYcCWEF9/JDk9zZG0CIG1Jn7DQ8EzIO/G6iTRII41b+/Vk8UeFIcqbpxrsYcp2CufCv6WGNRNjW3kylto30fMhTL3sRapd2ffMYGbzrCp/6Iw0O5NCsQxfZwF5UhJdr9yXEIqLAggNHHtJl7mzhBiqjpS/FGyvkPj/SyCSu4lb0uy6RHnkRr2OaPDQOi+9drdbuBadtuI=
X-Gm-Message-State: AOJu0YxspvQ971u7v8X60fRLkH9x4XT0ZLzRB9mWZ/wPjaOaZAaIHELw GQl1ZXz7eNEcq40s9crbGA6aUMYGzgsMsE7Ck3IG2ir51ADcRntlQ58bkWixA8GHVjwcO9rZfDd On8XDrfnS/18P2pSjr52jcsttyBaMzXqnDAs=
X-Google-Smtp-Source: AGHT+IGUreEr2x019EeXYzqvLl/X9S7iebzPMFNT5y9LrWdP6jpyDNlPuNOQUtirNZGVfqHWFCow70+ohF2t2jlJbd0=
X-Received: by 2002:a2e:a238:0:b0:2e6:a0b3:24ac with SMTP id 38308e7fff4ca-2e6a0b32716mr26221161fa.2.1715768481917; Wed, 15 May 2024 03:21:21 -0700 (PDT)
MIME-Version: 1.0
References: <CALypLp_+pSHye07wToKGwciO9C5cY6cwX1M=zGSrpg2Mc3Jsvg@mail.gmail.com> <1C7C07C3-E7D3-4142-8B61-72DDA60C0452@gmail.com> <CALypLp-q36MJF0_eQxEP3w8+LNA804tP1NRUNEQLud4k95JNzg@mail.gmail.com>
In-Reply-To: <CALypLp-q36MJF0_eQxEP3w8+LNA804tP1NRUNEQLud4k95JNzg@mail.gmail.com>
From: Jen Linkova <furry13@gmail.com>
Date: Wed, 15 May 2024 20:21:10 +1000
Message-ID: <CAFU7BAR0Mm+JR4dqTne=0u1Wf0W=Zkjmbpo6OEWHR==RQArbMA@mail.gmail.com>
To: CARLOS JESUS BERNARDOS CANO <cjbc@it.uc3m.es>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Message-ID-Hash: 64NAZ5A5AGGQWGTAVJ2OUEXAJMRQK2OO
X-Message-ID-Hash: 64NAZ5A5AGGQWGTAVJ2OUEXAJMRQK2OO
X-MailFrom: furry13@gmail.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-dhcwg.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: int-dir@ietf.org, dhcwg@ietf.org, draft-ietf-dhc-addr-notification.all@ietf.org, last-call@ietf.org
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [dhcwg] Re: Intdir telechat review of draft-ietf-dhc-addr-notification-11
List-Id: Dynamic Host Configuration <dhcwg.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/dhcwg/2rTHbw_gW-VEdMAhOr6amxwqeJ0>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dhcwg>
List-Help: <mailto:dhcwg-request@ietf.org?subject=help>
List-Owner: <mailto:dhcwg-owner@ietf.org>
List-Post: <mailto:dhcwg@ietf.org>
List-Subscribe: <mailto:dhcwg-join@ietf.org>
List-Unsubscribe: <mailto:dhcwg-leave@ietf.org>

Thank you Carlos and Bernie!

The Security section already had some text about an on-link observer
tracking IPv6 addresses belonging to a host.
Based on this discussion we made the following changes:

- 3 paragraphs are moved out of Security Considerations to a new
Privacy Consideration section.
- that text is updated so it now mentions DUID as an unique identifier
which can be used for tracking
- reference to  Section 4.3 of [RFC7844] added.

You can see the new text (not submitted to Datatracker yet) at
https://wkumari.github.io/draft-wkumari-dhc-addr-notification/draft-ietf-dhc-addr-notification.html#name-privacy-considerations

Please let me know if you'd like to see more changes.

Thank you!

On Tue, May 14, 2024 at 8:19 PM CARLOS JESUS BERNARDOS CANO
<cjbc@it.uc3m.es> wrote:
>
> Thanks Bernie!
>
> On Tue, May 14, 2024 at 12:16 PM Bernie Volz <bevolz@gmail.com> wrote:
>>
>> FYI:
>>
>> Regarding the privacy issue (Client Identifier), you could reference RFC 7844 (Anonymity Profiles for DHCP Clients), section 4.3.
>>
>> - Bernie
>>
>> On May 14, 2024, at 6:11 AM, CARLOS JESUS BERNARDOS CANO <cjbc@it.uc3m.es> wrote:
>>
>> 
>> Hi Jen,
>>
>> Thanks for the updates. Some quick comments inline below.
>>
>>
>> On Tue, May 14, 2024 at 8:48 AM Jen Linkova <furry13@gmail.com> wrote:
>>>
>>> Hi Carlos,
>>>
>>> On Fri, May 10, 2024 at 7:51 AM Carlos Jesús Bernardos via Datatracker
>>> <noreply@ietf.org> wrote:
>>> > Based on my review, if I was on the IESG I would ballot this document as YES.
>>>
>>> Thank you! ;)
>>>
>>> > - At the end of section 1, it is mentioned that the mechanism described in the
>>> > document provides parity with IPv4, by allowing a device to inform the DHCPv6
>>> > server about a self-configured or statically configured address. Apologies for
>>> > my ignorance on this in advance, but, is there a mechanism in IPv4 to do so for
>>> > statically configured addresses? If so, I think adding a reference would be
>>> > useful. If not, maybe the text can be rewritten a bit, as I would find it a bit
>>> > unclear.
>>>
>>> We've just submitted -12 which now says:
>>> "This operational practice relies on the DHCP server knowing the IP
>>> address assignments. This works quite well for IPv4 addresses, as most
>>> addresses are either assigned by DHCP [RFC2131] or statically
>>> configured by the network operator. For IPv6, however, this practice
>>> is much harder to implement, as devices often self-configure IPv6
>>> addresses via SLAAC [RFC4862].
>>>
>>> This document provides a mechanism for a device to inform the DHCPv6
>>> server that the device has a self-configured IPv6 address (or has a
>>> statically configured address), and thus provides parity with IPv4, by
>>> making DHCPv6 infrastructure aware of self-assigned IPv6 addresses."
>>>
>>> I hope it's more clear now, pls let us know if you think further
>>> improvements are needed.
>>
>>
>>  [Carlos] Fine with me, thanks!
>>
>>>
>>>
>>> > - It is mentioned that the client MUST include the Client Identifier option in
>>> > the ADDRESS-REG-INFORM messages. I think this might deserve some text regarding
>>> > how this might imply (or not) a potential privacy issue for hosts implementing
>>> > some kind of MAC address randomization and rotation of IPv6 self-assigned
>>> > addresses, as an observer could easily track the addresses being used and match
>>> > those to the same device.
>>>
>>> We don’t think this is a concern, because on-link attackers do not
>>> need to use the client identifier to match self-assigned addresses to
>>> devices, they can use the MAC address for that purpose.
>>> Privacy-sensitive clients that randomize their MAC addresses should
>>> obviously randomize their DHCPv6 Client Identifiers too. We’re not
>>> sure this document is the right place to say so, though?
>>
>>
>> [Carlos] While I agree that this is not the document to specify how to use DHCPv6 Client Identifiers, I think adding notifications that can allow an on-link attacker to match a MAC-changing device with the addresses it might be using would deserve at least a reference to the documents that have tackled the privacy issues in the past (I think there is one specifically tackling the aspects of DHCPv6).
>>
>>>
>>>
>>> > - It is not completely clear to me if the spec requires a client to use the
>>> > mechanism on ALL interfaces. I mean, can a client use it just on some
>>> > interfaces, but not all, by having configuration policies indicating on which
>>> > ones to use it? As I read the document, it seems to imply that if it is used on
>>> > one interface, it MUST be used on all of them.
>>>
>>> Oh very good point, I didn't realize we are not making that part
>>> clear. No, as the registration messame must be sent from the address
>>> being registered (section 4.2 does say that), and the registration
>>> support is network-specific, the client should (must) enable this on
>>> per-interface basis.
>>> We have added the following text to Section 4.4:
>>> "A client with multiple interfaces MUST discover address registration
>>> support for each interface independently. The client MUST NOT send
>>> address registration messages on a given interface unless the client
>>> has discovered that the interface is connected to a network which
>>> supports address registration."
>>
>>
>> [Carlos] Great, thanks!
>>
>>>
>>>
>>>
>>> > - Minor nit (or maybe just nothing at it is just that I’m not a native English
>>> > speaker): “to specify the address to being registered” -> I guess the “to”
>>> > should be removed.
>>>
>>> Yeah, a typo, fixed!
>>
>>
>> [Carlos] Thanks!
>>
>>>
>>>
>>> --
>>> Cheers, Jen Linkova



-- 
Cheers, Jen Linkova