Re: [dhcwg] recommendation on DHCP6 source port numbers

Ted Lemon <mellon@fugue.com> Thu, 29 February 2024 20:24 UTC

Return-Path: <mellon@fugue.com>
X-Original-To: dhcwg@ietfa.amsl.com
Delivered-To: dhcwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 994C1C180B61 for <dhcwg@ietfa.amsl.com>; Thu, 29 Feb 2024 12:24:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.905
X-Spam-Level:
X-Spam-Status: No, score=-1.905 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=fugue-com.20230601.gappssmtp.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id C6GtFLNkb81X for <dhcwg@ietfa.amsl.com>; Thu, 29 Feb 2024 12:24:17 -0800 (PST)
Received: from mail-qt1-x82f.google.com (mail-qt1-x82f.google.com [IPv6:2607:f8b0:4864:20::82f]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A5DB1C17C8BA for <dhcwg@ietf.org>; Thu, 29 Feb 2024 12:24:17 -0800 (PST)
Received: by mail-qt1-x82f.google.com with SMTP id d75a77b69052e-429f53f0b0bso8313991cf.2 for <dhcwg@ietf.org>; Thu, 29 Feb 2024 12:24:17 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fugue-com.20230601.gappssmtp.com; s=20230601; t=1709238256; x=1709843056; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=5b2ahZjC9L8GInj5esNajH54etNwWqRNChkwnXcUz7U=; b=wXGH62sS8NMJcTZSsOzpiC1eiGW+KpKtJnG29MhrN0o/To20SE2fUxqVMxrk7Ue9ov aeGeTCwPLkQPdKTK0ZvUh7pzg6dIYgB+4G1cmC+bgIAMGoOPzccKgW1MgULgG0aVm6NE A5pORQLReqyV4h8B/NVmqo27bVkPODSMTUDNQ2/1a90R9IF3QmfvKrk7Qrydbw3MtglR BT6BB+JB5cJJZNMQGcmr4s9pgnvNS4R1Auz0SnooYQAe9bFyGyyhbCpSgfTYlA6I3t6y EVr2g3m4/d/BM/mqNPSOPmrvizzwON7w9eT8eTwbLR/GFYcOsy+i9QvGA5Al1R4W8VKg dAtA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1709238256; x=1709843056; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=5b2ahZjC9L8GInj5esNajH54etNwWqRNChkwnXcUz7U=; b=glvktgH0U9r6fHelEax6oPIbC7QrHID3lmLJxZ/xS2knTX08HAyMNGWIwE+ygT6avV bRx178oEB1F9R/xDSO/yxOP64L4C/TAlunDXf+o6NqeA2uU5gjjbO3fPT2LYOdbRTVC5 loPaR8ltItuFvKZqEotGSeAzyfmfPpZ2r9k6ecvQqbPNny0UW+hbVuevlrR4C9yrjv0X Yq1L9JyOyU9KE4Wdnr899Kbeh6yFVfpt9DSVKd8ri+PUXjg1Z2wsaxTQ5bjqWehidVN7 qOMPS9J9QwlTs1/pzPFi8NoSsOv2sCEg7drsfYnyyvZcbL82+RctqVbA68bz6wHJmX3y 9XFw==
X-Forwarded-Encrypted: i=1; AJvYcCVzA5Ft21Yez87ZcTWwyu+1f8Pah2BA/84WU95TAWpWcZqBhrTIDsFf05qwM5+zaWC7lX6wJEwfDi+fOf5lqg==
X-Gm-Message-State: AOJu0Yz4l7uTYD6JX7SKoGvJoMblFgAWBwKOwFXtBSAQNEcC3pdk944S S7g6TkCdvC5Sgu/Cn+aS4G/lrq5bypLzjhGpYWGlhYMgCcMtpXWV2xFtOL0sm6pOlTIB50e2ZHU OAGC/uHZa5OuEPqWgtKRZ0f017Gqqc5lgX1J9kNDXoNSv6PTs
X-Google-Smtp-Source: AGHT+IF/bh30vDRVImHAXak+ITPY1/wm54oAfee6ACkMuADeqvQSDkjucvpwZ9aw1YlpNYqLULeMNIUVGLHXEj44qFg=
X-Received: by 2002:a05:622a:1d0:b0:42e:c634:8b3e with SMTP id t16-20020a05622a01d000b0042ec6348b3emr614843qtw.65.1709238256081; Thu, 29 Feb 2024 12:24:16 -0800 (PST)
MIME-Version: 1.0
References: <CAN-Dau3cMV8yXF=WVXrdD36oV+_FQELDsgP4cddjrFfsagpv2w@mail.gmail.com> <A51674A4-56CB-433F-BC7F-643C959B8DB3@gmail.com>
In-Reply-To: <A51674A4-56CB-433F-BC7F-643C959B8DB3@gmail.com>
From: Ted Lemon <mellon@fugue.com>
Date: Thu, 29 Feb 2024 15:23:39 -0500
Message-ID: <CAPt1N1=bpk8HV4ADcV5p2TUMgqg6d_DYQiazGDNgD9EPi0T_qw@mail.gmail.com>
To: Bernie Volz <bevolz@gmail.com>
Cc: David Farmer <farmer=40umn.edu@dmarc.ietf.org>, dhcwg <dhcwg@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000001734a406128b0ba5"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dhcwg/64NeiulpmwHsyDQSFx1hWeyvf68>
Subject: Re: [dhcwg] recommendation on DHCP6 source port numbers
X-BeenThere: dhcwg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Dynamic Host Configuration <dhcwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dhcwg/>
List-Post: <mailto:dhcwg@ietf.org>
List-Help: <mailto:dhcwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 29 Feb 2024 20:24:21 -0000

Not going through firewalls definitely seems like a feature to me. If it's
intended to go through the firewall, requiring the admin to explicitly
configure that makes a lot of sense.

On Thu, Feb 29, 2024 at 3:12 PM Bernie Volz <bevolz@gmail.com> wrote:

> We’re not starting from scratch - thus if you mandate this, you make
> existing implementations that are operating non-compliant. And if it cannot
> be mandated, you cannot rely on it.
>
> Also, dhcp is probably not a protocol that goes through firewalls?
> Firewalls likely block these ports.
>
> - Bernie (from iPhone)
>
> On Feb 29, 2024, at 2:03 PM, David Farmer <farmer=40umn.edu@dmarc.ietf.org>
> wrote:
>
> 
> Actually, given that return DHCP messages MUST be sent to their
> designated destination ports and not the source port used by the
> originating DHCP message, there is no advantage to using randomized
> source ports to prevent spoofing. Using randomized source ports only
> makes firewall traversal for DHCP messages more difficult.
>
> Thanks.
>
> On Thu, Feb 29, 2024 at 12:44 PM rob@deepdivenetworklng.com <
> rob@deepdivenetworking.com> wrote:
>
>> I think we are in the middle of the (no end in sight argument) of;  If we
>> make it completely predictable it is easy to monitor and punch holes for
>> firewalls vs if we make it easily predictable it is super easy to exploit.
>> Just look at DNS needing to randomize source ports to combat cache
>> poisoning. I think we don't have to say it “Should" be source and
>> destination port that is  forced. People can do that if they choose to
>> given the current text, but we don't paint them into a corner.
>>
>> Rob
>>
>>
>>
>> On Feb 29, 2024, at 10:39 AM, David Farmer <farmer=
>> 40umn.edu@dmarc.ietf.org> wrote:
>>
>> If we did, that would ensure DHCP messages will make it through typical
>> stateful firewalls without special rules.
>>
>> Clients receive DHCP messages on UDP (destination) port 546.  Servers and
>> relay agents receive DHCP messages on UDP (destination) port 547.
>>
>> Clients, servers, and relay agents SHOULD send DHCP messages from their
>> designated destination ports, as this will facilitate firewall traversal
>> for DHCP messages. Nevertheless, DHCP messages MUST be accepted from any
>> UDP (source) port, and regardless of the source port used, return DHCP
>> messages MUST be sent to their designated destination port.
>>
>>
>> On Thu, Feb 29, 2024 at 12:05 PM Ole Trøan <otroan=
>> 40employees.org@dmarc.ietf.org> wrote:
>>
>>> Should we also make it recommended to use the designated port as the
>>> source port? With the may to send arbitrary port and a must to accept an
>>> arbitrary port?
>>>
>>> O.
>>>
>>> On 29 Feb 2024, at 18:51, David Farmer <farmer=40umn.edu@dmarc.ietf.org>
>>> wrote:
>>>
>>> 
>>> Ok, it's a little less wordy this time.
>>>
>>> Clients receive DHCP messages on UDP (destination) port 546.  Servers
>>> and relay agents receive DHCP messages on UDP (destination) port 547.
>>>
>>> Clients, servers, and relay agents MAY send DHCP messages from any UDP
>>> (source) port they are allowed to use, including their designated
>>> destination ports. Nevertheless, regardless of the source port used, DHCP
>>> messages MUST be sent to their designated destination ports.
>>>
>>> Thanks
>>>
>>> On Thu, Feb 29, 2024 at 10:24 AM David Farmer <farmer@umn.edu> wrote:
>>>
>>>> Would this text clarify things?
>>>>
>>>> Clients receive DHCP messages on UDP (destination) port 546.  Servers
>>>> and relay agents receive DHCP messages on UDP (destination) port 547.
>>>>
>>>> Clients, servers, and relay agents MAY send DHCP messages from any UDP
>>>> (source) port they are allowed to use, including their designated
>>>> destination ports. Nevertheless, regardless of the source port the client
>>>> uses, the server or relay agent MUST send traffic to the designated
>>>> destination port of the client. And vice versa, regardless of the source
>>>> port used by the server or relay agent, the client MUST send traffic to the
>>>> designated destination port of the server or relay agent.
>>>>
>>>>
>>>> Thanks
>>>>
>>>> On Thu, Feb 29, 2024 at 10:03 AM Ole Troan <otroan=
>>>> 40employees.org@dmarc.ietf.org> wrote:
>>>>
>>>>> Bernie,
>>>>>
>>>>> > DHCPv6 has been successfully deployed and this is the first I recall
>>>>> of this kind of discussion/issue.
>>>>> > You would likely also invalidate a lot of implementations with such
>>>>> a change, which is not really in line with advancing this to Full Standard.
>>>>>
>>>>> It’s a lot more important to have the specification clear and
>>>>> unambiguous. I think it has been shown that it isn’t.
>>>>> Happy with whatever solution there is consensus for, but the ambiguity
>>>>> has to be resolved I think.
>>>>>
>>>>> O.
>>>>> _______________________________________________
>>>>> dhcwg mailing list
>>>>> dhcwg@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/dhcwg
>>>>>
>>>>
>>>>
>>>> --
>>>> ===============================================
>>>> David Farmer               Email:farmer@umn.edu
>>>> Networking & Telecommunication Services
>>>> Office of Information Technology
>>>> University of Minnesota
>>>> 2218 University Ave SE        Phone: 612-626-0815
>>>> Minneapolis, MN 55414-3029   Cell: 612-812-9952
>>>> ===============================================
>>>>
>>>
>>>
>>> --
>>> ===============================================
>>> David Farmer               Email:farmer@umn.edu
>>> Networking & Telecommunication Services
>>> Office of Information Technology
>>> University of Minnesota
>>> 2218 University Ave SE        Phone: 612-626-0815
>>> Minneapolis, MN 55414-3029   Cell: 612-812-9952
>>> ===============================================
>>>
>>>
>>
>> --
>> ===============================================
>> David Farmer               Email:farmer@umn.edu
>> Networking & Telecommunication Services
>> Office of Information Technology
>> University of Minnesota
>> 2218 University Ave SE        Phone: 612-626-0815
>> Minneapolis, MN 55414-3029   Cell: 612-812-9952
>> ===============================================
>> _______________________________________________
>> dhcwg mailing list
>> dhcwg@ietf.org
>> https://www.ietf.org/mailman/listinfo/dhcwg
>>
>>
>>
>
> --
> ===============================================
> David Farmer               Email:farmer@umn.edu
> Networking & Telecommunication Services
> Office of Information Technology
> University of Minnesota
> 2218 University Ave SE        Phone: 612-626-0815
> Minneapolis, MN 55414-3029   Cell: 612-812-9952
> ===============================================
> _______________________________________________
> dhcwg mailing list
> dhcwg@ietf.org
> https://www.ietf.org/mailman/listinfo/dhcwg
>
> _______________________________________________
> dhcwg mailing list
> dhcwg@ietf.org
> https://www.ietf.org/mailman/listinfo/dhcwg
>