Re: [dhcwg] seDHCPv6 update and next steps ...

"Bernie Volz (volz)" <> Thu, 13 July 2017 02:04 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id A058C131803 for <>; Wed, 12 Jul 2017 19:04:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -14.521
X-Spam-Status: No, score=-14.521 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: (amavisd-new); dkim=pass (1024-bit key)
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id aK-MwYA8E3W7 for <>; Wed, 12 Jul 2017 19:04:03 -0700 (PDT)
Received: from ( []) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by (Postfix) with ESMTPS id C5B481316EB for <>; Wed, 12 Jul 2017 19:04:02 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple;;; l=27127; q=dns/txt; s=iport; t=1499911442; x=1501121042; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=BxFQJweF4xDJ697f+9j5NUdjvsSWQL6kA79nr7nea7A=; b=GLOeh5zCE0KQN78apsMIi7U4h3ksGPbhjjPk5hy6/Iwral2xh0sn1HkR rr0ympXWuxGkCqHo6EeKi0cPtyy+LofA59i3xWT21tK9z9q6bXsaALJkM wYtWkN3NEEvu8ug4xUBdYvvBGvjltwGa9lDFRQJeBZVvqYuJc6PU0JW+2 c=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.40,352,1496102400"; d="scan'208,217";a="258933483"
Received: from ([]) by with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 13 Jul 2017 02:04:01 +0000
Received: from ( []) by (8.14.5/8.14.5) with ESMTP id v6D24149000484 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 13 Jul 2017 02:04:01 GMT
Received: from ( by ( with Microsoft SMTP Server (TLS) id 15.0.1210.3; Wed, 12 Jul 2017 21:04:00 -0500
Received: from ([]) by ([]) with mapi id 15.00.1210.000; Wed, 12 Jul 2017 21:04:00 -0500
From: "Bernie Volz (volz)" <>
To: Ted Lemon <>
CC: "Templin, Fred L" <>, "" <>, "" <>
Thread-Topic: [dhcwg] seDHCPv6 update and next steps ...
Thread-Index: AdL7TPjzgLDuRsMjTzK32MYQ2IpqqAAAv6lwAABm4DAAAOIiwAACWWHQAA56rIAAClu3IP//tsGA//++IO4=
Date: Thu, 13 Jul 2017 02:04:00 +0000
Message-ID: <>
References: <> <> <> <> <> <> <>, <>
In-Reply-To: <>
Accept-Language: en-US
Content-Language: en-US
x-ms-exchange-transport-fromentityheader: Hosted
Content-Type: multipart/alternative; boundary="_000_9AA1C8F3E16F4B23B3287EE7C62EC5B8ciscocom_"
MIME-Version: 1.0
Archived-At: <>
Subject: Re: [dhcwg] seDHCPv6 update and next steps ...
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Thu, 13 Jul 2017 02:04:05 -0000

Yes, you are correct that if relay includes link-layer option and specifies ERO option for it to be returned, it would be there in Relay-Reply. But there may be reasons for relay to "need" Client-ID.

- Bernie (from iPad)

On Jul 12, 2017, at 9:00 PM, Ted Lemon <<>> wrote:

The relay-reply should contain the client link-layer address.

On Wed, Jul 12, 2017 at 8:30 PM, Bernie Volz (volz) <<>> wrote:
I mean for something to identify who made the request for the address or delegated prefix. Otherwise, the relay may not have much other than the link layer address (if it extracts it from the original client message, which would kind of nasty since it requires matching up the reply with the request). It could always encode something in the interface-identifier or some other option.

And, yes, so it might be able to match up information obtained from other sources, such as Leasequery.

-          Bernie

From: Ted Lemon [<>]
Sent: Wednesday, July 12, 2017 8:25 PM
To: Bernie Volz (volz) <<>>
Cc: Templin, Fred L <<>>;<>;<>
Subject: Re: [dhcwg] seDHCPv6 update and next steps ...

You mean for leasequery?   We should probably scope that out.   It's not clear to me that there's an overlap in the use cases, though.

On Wed, Jul 12, 2017 at 6:30 PM, Bernie Volz (volz) <<>> wrote:
Ok, thanks for your use case. We'll hopefully get more.

since there may be a LDRA, the DHCPv6 parameters must be available
in-the-clear so that the LDRA can snoop any IA_NA/IA_PD assignments.

I think this can be solved in other ways, such as via the RAAN work. Though one issue with that is we need to figure out how to provide client details (i.e., client-id) that might be needed by relays.

- Bernie (from iPad)

On Jul 12, 2017, at 5:36 PM, Templin, Fred L <<>> wrote:
Hi Bernie,

My scenario is very simple. The client and server are connected to the same
link, and the link already supports link-layer security (e.g., IEEE 802.1X).

The client knows that it can trust the server because the server’s address
is in a list of known server addresses for the link that cannot be subverted
by an adversary and there is no opportunity for source address spoofing.

The server knows that the client is authorized to connect to the link
(e.g., due to 802.1X) but the server does not know whether the client
is authorized to use the DUID it is claiming in its DHCPv6 messages.
For example, trusted client ‘A’ could use trusted client ‘B’s DUID to
steal client ‘B’s service – an “insider attack”.

So, what is needed from seDHCPv6 is for the client to authenticate itself
to the server so that it cannot steal the services of another client. And,
since there may be a LDRA, the DHCPv6 parameters must be available
in-the-clear so that the LDRA can snoop any IA_NA/IA_PD assignments.

Thanks - Fred

From: Bernie Volz (volz) []
Sent: Wednesday, July 12, 2017 2:06 PM
To: Templin, Fred L <<>>;<>;<>
Subject: RE: seDHCPv6 update and next steps ...

Hi Fred:

Thanks for your interest.

Could you clarify what you mean by authentication-only? As I see if in terms of authentication there is:

1.       Authenticate the server to the client

2.       Authenticate the client to the server

3.       Or both

There are also various degrees of authentication – for example, TOFU (Trust on First Use) to trusted third party (and what that might impose on certificate distribution / validation).

And, if you have a specific use model in mind (for example, if this is for AERO), having a brief summary of this and the authentication requirements would be useful.

I’d also suggest that understanding why other techniques, such as 802.1X, would not be appropriate could provide added value in understanding the requirements.

-          Bernie

From: Templin, Fred L []
Sent: Wednesday, July 12, 2017 4:49 PM
To: Bernie Volz (volz) <<>>;<>;<>
Subject: RE: seDHCPv6 update and next steps ...

Hi Bernie,

Unfortunately, my plane does not arrive until ~16:00 CEST on Sunday. But, if
this work is going back to first principles I would like to express an interest in
an authentication-only mode of operation (i.e., no encryption). It would
avoid a “double-encryption” when encryption is already provided by the
link layer between the client and server (or first-hop relay) and there are
already other securing mechanisms in place between relays and servers.

Thanks - Fred

From: dhcwg [] On Behalf Of Bernie Volz (volz)
Sent: Wednesday, July 12, 2017 1:30 PM
Subject: [dhcwg] seDHCPv6 update and next steps ...


There has been some discussion (most recently off the dhcwg mailing list) about the sedhcpv6 draft.

Previously, as discussed on the dhcwg mailing list a while back, there are some issues with the current draft (including the encryption issue; the key can’t be used to encrypt more data than the size of the key). And, while some of the co-authors have communicated recently, others have been quiet and it is not clear what the level of interest for each is in continuing. This work has sadly had a long road with several turns already.

The discussion raised the question as to what the goals of this work should be. Some feel that we need to step back and first develop a “requirements document” to clearly detail what the goals of a securing DHCPv6 should be (for example, was the fairly recent push to add encryption appropriate?).

Thus, Tomek and I feel that it would be worth having an interested group meet before the IETF-99 DHC WG session (which is on Wednesday, 7/19 afternoon) to discuss this so that we could formulate a strategy. If you have interest, let us know. We propose to meet on Sunday at 14:00 (CEST) in Chez Louis (Hackathon) room – we can find a table there, or look for another place. (If there is remote participation interest, let us know and we’ll see what we might be able to accommodate.)

We may also have extra time in the DHC WG session to discuss in detail there, but it could be helpful to have one or more proposals and, if we get the slides out quickly, give people some time to think about it before the WG session.

-          Bernie and Tomek

dhcwg mailing list<>