Re: [dhcwg] Next step(s) for draft-ietf-dhc-stable-privacy-addresses -> abandon work? / IA_NA applicability

"Bernie Volz (volz)" <volz@cisco.com> Wed, 08 April 2015 21:48 UTC

Return-Path: <volz@cisco.com>
X-Original-To: dhcwg@ietfa.amsl.com
Delivered-To: dhcwg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F1C581A89AF for <dhcwg@ietfa.amsl.com>; Wed, 8 Apr 2015 14:48:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.511
X-Spam-Level:
X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FcZuiN-sbkrz for <dhcwg@ietfa.amsl.com>; Wed, 8 Apr 2015 14:48:26 -0700 (PDT)
Received: from alln-iport-6.cisco.com (alln-iport-6.cisco.com [173.37.142.93]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CE1091A89A7 for <dhcwg@ietf.org>; Wed, 8 Apr 2015 14:48:21 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=3199; q=dns/txt; s=iport; t=1428529701; x=1429739301; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=8Vgsa4sJqVW/4LRaQTTUEngSW5KvUX4xyZqtiaE9xHg=; b=FBwXgtvtkj6dfnmEaIET1cdul78Y2FiuWqAFeH1o85Y4Kbk7FH1AKFus LY3Fzzz+DLI0GjmOcvtSp4JDlhIyb2Y/ulr82mRf9cQiBAl9TOC2N6BY+ Yj6lGhS/Nu7FiE1xM455OVcwxJSmV++ew6bwa4ju+E1PJXbHKBF2ZI6cb A=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0B6BAA3oSVV/5BdJa1cgwhSXAXDZwmBUoV9AoEuOBQBAQEBAQEBfYQfAQEBAwEnEz8FBwQCAQgRBAEBAQoUBQQHMhQJCAIEAQ0FCBOIBwgNzSMBAQEBAQEBAQEBAQEBAQEBAQEBAQEXiyuEMQYUJgsHBoMRgRYFhRCLZIN4hyw6iXqFQINKIoIDHBSBPG8BgUN/AQEB
X-IronPort-AV: E=Sophos;i="5.11,546,1422921600"; d="scan'208";a="139486143"
Received: from rcdn-core-8.cisco.com ([173.37.93.144]) by alln-iport-6.cisco.com with ESMTP; 08 Apr 2015 21:48:21 +0000
Received: from xhc-rcd-x14.cisco.com (xhc-rcd-x14.cisco.com [173.37.183.88]) by rcdn-core-8.cisco.com (8.14.5/8.14.5) with ESMTP id t38LmKSP021633 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Wed, 8 Apr 2015 21:48:20 GMT
Received: from xmb-rcd-x04.cisco.com ([169.254.8.112]) by xhc-rcd-x14.cisco.com ([173.37.183.88]) with mapi id 14.03.0195.001; Wed, 8 Apr 2015 16:48:20 -0500
From: "Bernie Volz (volz)" <volz@cisco.com>
To: Christian Huitema <huitema@microsoft.com>, Fernando Gont <fgont@si6networks.com>, Lorenzo Colitti <lorenzo@google.com>
Thread-Topic: [dhcwg] Next step(s) for draft-ietf-dhc-stable-privacy-addresses -> abandon work? / IA_NA applicability
Thread-Index: AQHQbKUWByZTAVuV8ESYM5tVpMLK4p04ge2AgABZ+YD//7DXMIAKWypfgABgb4CAAAcrgIAAANmAgAAE+ACAAAV/AIAADs8AgAAEvQCAACGHAIAAcaQA//+u96A=
Date: Wed, 08 Apr 2015 21:48:20 +0000
Message-ID: <489D13FBFA9B3E41812EA89F188F018E1CA45882@xmb-rcd-x04.cisco.com>
References: <489D13FBFA9B3E41812EA89F188F018E1CA32071@xmb-rcd-x04.cisco.com> <8C4E055C-ED1D-4951-8473-6166109ACE69@nominum.com> <489D13FBFA9B3E41812EA89F188F018E1CA321EE@xmb-rcd-x04.cisco.com> <6D7A465E-6EBE-4B69-9B65-BAC7BF2A9873@nominum.com> <489D13FBFA9B3E41812EA89F188F018E1CA3229F@xmb-rcd-x04.cisco.com> <55214802.1070305@si6networks.com> <CAKD1Yr3UYT0yPEqftEXpN8zmk=-dka_NMcu3rbb_GG+YSnk2ZQ@mail.gmail.com> <5524D09B.3090706@si6networks.com> <CAKD1Yr2Ztzoys+xKBzsEHU5hqJmfGpn-GeWPEqNCHRuWOTgsJQ@mail.gmail.com> <55250911.30100@si6networks.com> <CAKD1Yr0ojVmk-ctUO313zvAx01P=B-A2zVuwDm73+dLgVwDLOw@mail.gmail.com> <55250DF2.8050001@si6networks.com> <CAKD1Yr33wFmjjqjYu8YEpqYvnn=kh9oJhe1YAC7UEzacQFBaWg@mail.gmail.com> <55251EFA.4000204@si6networks.com> <CAKD1Yr0XK-DQkcJKwTYmiWzCzZs4pubCme9rAgoZ_ig-P5MgsQ@mail.gmail.com> <55253F14.6000706@si6networks.com> <DM2PR0301MB0655FDB31066DE7E1CA809A4A8FC0@DM2PR0301MB0655.namprd03.prod.outlook.com>
In-Reply-To: <DM2PR0301MB0655FDB31066DE7E1CA809A4A8FC0@DM2PR0301MB0655.namprd03.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.131.36.114]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/dhcwg/G22MDYWdgPldjPmykel2DQWXYAA>
Cc: "dhcwg@ietf.org" <dhcwg@ietf.org>, Ted Lemon <Ted.Lemon@nominum.com>
Subject: Re: [dhcwg] Next step(s) for draft-ietf-dhc-stable-privacy-addresses -> abandon work? / IA_NA applicability
X-BeenThere: dhcwg@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: <dhcwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dhcwg/>
List-Post: <mailto:dhcwg@ietf.org>
List-Help: <mailto:dhcwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 Apr 2015 21:48:28 -0000

There is already some text in draft-ietf-dhc-dhcpv6-privacy, section 4.3, on DHCP server allocation strategies, so it the question is whether that is sufficient or whether perhaps something is needed in the draft-huitema-dhc-anonymity-profile ... though I think that is more focused on the client. If there was existing text, the 3315bis document can refer to it in the Security/Privacy Considerations section. Note that I suspect that these privacy documents will be RFCs long before 3315bis will be.

I think your text is fine. And, it is recorded in the ticket on this issue, http://trac.tools.ietf.org/group/dhcpv6bis/ticket/145.

I also think your conclusion is fine :).

- Bernie

-----Original Message-----
From: Christian Huitema [mailto:huitema@microsoft.com] 
Sent: Wednesday, April 08, 2015 5:32 PM
To: Fernando Gont; Lorenzo Colitti
Cc: dhcwg@ietf.org; Bernie Volz (volz); Ted Lemon
Subject: RE: [dhcwg] Next step(s) for draft-ietf-dhc-stable-privacy-addresses -> abandon work? / IA_NA applicability

To comment further on this discussion between Fernando and Lorenzo

> On 04/08/2015 09:45 AM, Lorenzo Colitti wrote:
> > On Wed, Apr 8, 2015 at 9:28 PM, Fernando Gont <fgont@si6networks.com 
> > <mailto:fgont@si6networks.com>> wrote:
> >
> >     ...
> >     The intent is that if you're going to use this scheme, for leasing
> >     addreses, you use this scheme for all prefixes: at the end of the day,
> >     if *one* of your addresses is predictable, that's enough for the
> >     attacker to track you or scan you.
> >
> >
> > No, it's not enough. The attacker can only track or scan you if you 
> > use a stupid algorithm to generate the IIDs. Yours is not stupid, 
> > but neither are many others such as "random". You can perfectly well 
> > use random assignment on some subnets and your algorithm on other subnets.

I think there is value in having some part of the DHCPv6 spec specify the "don't be stupid" logic. My personal preference would be to add the list of privacy attacks in the "security considerations" of DHCPv6bis. Something like:

Some address allocation schemes are known to be harmful, because they facilitate scanning, allow for information leakage, or fail to maintain the address stability required by many applications. In particular:
* Assigning addresses using some kind of sequential algorithm (prefix::1, prefix:2, prefix::3,...) greatly facilitate scanning of the network;
* Deriving the IID part of addresses from the link layer address of the client exposes information about the client hardware and enables tracking the client across multiple subnets;
* Using memory-less random allocation schemes fails to maintain enough stability for many applications; The algorithm presented in [RFC7217] provides a solution to this problem for nodes using IPv6 Stateless Address Autoconfiguration. Similar algorithms could be used by DHCPv6 servers to avoid the aforementioned issues.

If we added that to the main DHCPv6 spec, there would be no need for a separate RFC presenting a variant of the 7217 algorithm.

-- Christian Huitema