Re: [dhcwg] WGLC for draft-ietf-dhc-addr-notification - Respond by September 13, 2023

Nick Buraglio <buraglio@forwardingplane.net> Mon, 25 September 2023 19:24 UTC

Return-Path: <buraglio@forwardingplane.net>
X-Original-To: dhcwg@ietfa.amsl.com
Delivered-To: dhcwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 014A3C14F74E for <dhcwg@ietfa.amsl.com>; Mon, 25 Sep 2023 12:24:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.106
X-Spam-Level:
X-Spam-Status: No, score=-2.106 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=forwardingplane.net
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YQM3VeuBdLHj for <dhcwg@ietfa.amsl.com>; Mon, 25 Sep 2023 12:24:20 -0700 (PDT)
Received: from mail-qt1-x831.google.com (mail-qt1-x831.google.com [IPv6:2607:f8b0:4864:20::831]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 116E7C14CE46 for <dhcwg@ietf.org>; Mon, 25 Sep 2023 12:24:20 -0700 (PDT)
Received: by mail-qt1-x831.google.com with SMTP id d75a77b69052e-4180f5c51f8so18626021cf.1 for <dhcwg@ietf.org>; Mon, 25 Sep 2023 12:24:19 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=forwardingplane.net; s=google; t=1695669859; x=1696274659; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=UriZKUT9l96h/ywVBn26RA1JVqC4iCh5SOjX6GulwBU=; b=ApfxBpvt1IWtpIew4Q8gLAeZmdJurkb1qWu172xSH0c/fgIa1y545IlMaBnPE5uRRO 3qsZXdIEprLJ0zgpy6T/kl01EaWq+MtZqYFSaiJl/Aoqjpt/xhp1KBzKuYaxq3V3AIzZ 03uoobAZFcdnt9TWzX1DNWogEH4VJkwCVnWrs=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1695669859; x=1696274659; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=UriZKUT9l96h/ywVBn26RA1JVqC4iCh5SOjX6GulwBU=; b=QlxHhwWcChkV3MzkQuHJxoBu1mLnXOXNNokKDRpTf3f4qaq6rWkm0cv/Sp5iQCEWCj exQ59KCa570xkXnSgqZHWSu0ms4GCs19Ite5F1xrG92lZTwaybiD5MAp0018qe6qgnPl 9bAOH3YjeaOoCsorJaHEwXfIOX+sGC8gA510ZzOjXpxtIWWPlKU+gVmNfLrGoqleE1gZ 0fWSi0Xsvm67Lvv0OadgjQYsBhL0WHrOnqSZEggahEuxD+qqZUrIEM3lR+4ebic0gTRV FbS/MmQIAbz2EmcWLdr5bbFGixEOL2uTEcjQ7yhfkaqEXpaHmW7Z2cR2Onzncbv3tpgR oISQ==
X-Gm-Message-State: AOJu0Yxg3jWTzNYLYMdnXXwImz2ZLwss2HYFqjfyTOxjxyXG3szBotwI o5RChdHX1K2kug+crhwYv/luAJh0MdWKcMsCj/ZFRs6I6d7WruNymg0=
X-Google-Smtp-Source: AGHT+IEtNxcjyYdDH1ihOWXV4NOelQ7G5LiOccGqj+neddMHFL5IdbR7WVR72jIp441jAkWAt0DcOCGnxNUNx2KGpIs=
X-Received: by 2002:a05:622a:4c9:b0:417:b53d:a898 with SMTP id q9-20020a05622a04c900b00417b53da898mr825818qtx.9.1695669858751; Mon, 25 Sep 2023 12:24:18 -0700 (PDT)
MIME-Version: 1.0
References: <CAJgLMKvATJP78ONPc8f6kG2eNWq83XCTSdvRLVGKWB26JGrANQ@mail.gmail.com> <1E185C09-B45E-4B1E-81F8-3CB6141B9881@employees.org> <CAJgLMKtYy2U1vScQoW4eWD3sLipeUTak7BqkELXZ61=6_cKJDQ@mail.gmail.com> <1418C8C0-DBCA-4222-B1C4-604E4B389DEA@employees.org> <CAO42Z2yUT628xbyi9hA_adxtVNm17spgVsb=LRhVK2KXuqP=2g@mail.gmail.com> <42B88277-2A0B-402E-8F85-474C61C30220@employees.org>
In-Reply-To: <42B88277-2A0B-402E-8F85-474C61C30220@employees.org>
From: Nick Buraglio <buraglio@forwardingplane.net>
Date: Mon, 25 Sep 2023 14:24:07 -0500
Message-ID: <CACMsEX9ZVTkssqx-5=V0CACMDAxgj-Gc9FJa_mPm9hHwTwcODw@mail.gmail.com>
To: Ole Troan <otroan=40employees.org@dmarc.ietf.org>
Cc: Mark Smith <markzzzsmith@gmail.com>, dhcwg <dhcwg@ietf.org>, Ted Lemon <mellon@fugue.com>
Content-Type: multipart/alternative; boundary="000000000000968066060633e7fb"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dhcwg/crVMvtqLrvIHkhvlVgn0bqzgiBA>
Subject: Re: [dhcwg] WGLC for draft-ietf-dhc-addr-notification - Respond by September 13, 2023
X-BeenThere: dhcwg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Dynamic Host Configuration <dhcwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dhcwg/>
List-Post: <mailto:dhcwg@ietf.org>
List-Help: <mailto:dhcwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 25 Sep 2023 19:24:24 -0000

On Mon, Sep 25, 2023 at 9:27 AM Ole Troan <otroan=
40employees.org@dmarc.ietf.org> wrote:

> Mark,
>
> > On Mon, 25 Sept 2023, 23:55 Ole Troan, <otroan=
> 40employees.org@dmarc.ietf.org> wrote:
> > > We have had some operators' interests in this solution over scrapping
> switches and routers.   I think it would be helpful to hear from network
> operators or DHCPv6 server solutions about how viable and deployable this
> solution is.
> >
> > I hope we are not suggesting scrapping all switches and routers.
> > Wouldn’t be much of a network then! :-D
> >
> > It would be useful to hear from enterprise network operators indeed.
> > We need to make it clear to them that this mechanism depends on hosts
> (voluntarily) notifying the DHCP server about it’s addresses. And unless
> that’s also enforced through the network in other ways, the information
> given is “just another datapoint with some probability of being correct”).
> >
> > “Scraping” of routers and switches isn’t the direct alternative to DHCP
> address notification. Although some level of first hop security functions
> is likely required. I would think DHCPv6 address assignment is the obvious
> solution instead of this.
> >
> > DHCPv6 isn't a solution when you think about what the security
> requirements are.
>
> It’s a significant building block.
>
> > The Stateful DHCPv6 Myth. No, it doesn't record IPv6 addresses in use.
> Neither does DHCPv4.
> >
> https://ipv6tao.blogspot.com/2021/09/the-stateful-dhcpv6-myth-no-it-doesnt.html?m=1
>
> That was a dreadfully opinionated blogpost…
>
> DHCPv6 would give the network enough information to enforce which
> addresses a host is permitted to use. Using mechanisms like FHS (first-hop
> security) / SAVI.
>

Agreed. With the inclusion of tools like RA Guard and DHCP Snooping, one
can get pretty far down the path.  Pie in the sky desirable would be a
device manufacturer adding a DHCP snooping mechanism that requires the
inform to be reported before access is granted much like the DHCPv4
transaction function.

>
> With SLAAC there isn’t an equally robust mechanism available. And I’m not
> sure this helps.
>

It's certainly more than what is available now, and it fits within the
current use practices that many LANs currently use, which greases the
wheels of adoption of a technology that is already eliciting a notable
amount of apprehension for lots of LANs.


> As an DHCPv6 address assignment alternative the ARO option might have been
> better.
>
> To emphasise, this is for the use case of a network operator requires
> control of addresses in use by which device. Allowing IPv6 to support that
> use case does not mean there are many other use cases where SLAAC is
> perfectly fine.
>

I don't see it as control, per se, it's more about information for future
triage or forensics.  In concert with RA-guard, one could minimize the
rogue RAs, further reducing the blast radius. That's what this really reads
as to me is a blast radius container providing visibility when the
inevitability of a system with SLAAC address does something unsavory.  As a
data point, my looking at a very large scale network telescope / tarpit /
honeypot has shown 90%+ of IPv6 devices (which admittedly is not a lot of
IPv6 hosts comparatively speaking) that are caught by the honeypot / tarpit
are SLAAC addresses.
Being able to run those down to at the very least a device manufacturer and
the last known L2 location would go pretty far in the threat hunting
process.


>
> O.
> _______________________________________________
> dhcwg mailing list
> dhcwg@ietf.org
> https://www.ietf.org/mailman/listinfo/dhcwg
>