Re: [dhcwg] Stephen Farrell's Discuss on draft-ietf-dhc-dhcpv6-active-leasequery-03: (with DISCUSS and COMMENT)

Christian Huitema <huitema@microsoft.com> Thu, 09 July 2015 23:57 UTC

Return-Path: <huitema@microsoft.com>
X-Original-To: dhcwg@ietfa.amsl.com
Delivered-To: dhcwg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EA6D81A701C; Thu, 9 Jul 2015 16:57:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level:
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id V-ClglUH4ole; Thu, 9 Jul 2015 16:57:52 -0700 (PDT)
Received: from na01-bn1-obe.outbound.protection.outlook.com (mail-bn1on0761.outbound.protection.outlook.com [IPv6:2a01:111:f400:fc10::761]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8A9841A7018; Thu, 9 Jul 2015 16:57:49 -0700 (PDT)
Received: from DM2PR0301MB0655.namprd03.prod.outlook.com (10.160.96.17) by DM2PR0301MB0654.namprd03.prod.outlook.com (10.160.96.16) with Microsoft SMTP Server (TLS) id 15.1.207.19; Thu, 9 Jul 2015 23:57:30 +0000
Received: from DM2PR0301MB0655.namprd03.prod.outlook.com ([10.160.96.17]) by DM2PR0301MB0655.namprd03.prod.outlook.com ([10.160.96.17]) with mapi id 15.01.0207.004; Thu, 9 Jul 2015 23:57:30 +0000
From: Christian Huitema <huitema@microsoft.com>
To: Kim Kinnear <kkinnear@cisco.com>, Stephen Farrell <stephen.farrell@cs.tcd.ie>
Thread-Topic: [dhcwg] Stephen Farrell's Discuss on draft-ietf-dhc-dhcpv6-active-leasequery-03: (with DISCUSS and COMMENT)
Thread-Index: AQHQuXMjSUX+lO+LJkuuEKCwm+GoJ53TrXSAgAAawDA=
Date: Thu, 09 Jul 2015 23:57:29 +0000
Message-ID: <DM2PR0301MB0655BE34232DCF3CAC09906CA8900@DM2PR0301MB0655.namprd03.prod.outlook.com>
References: <20150708114206.28697.67541.idtracker@ietfa.amsl.com> <74130B2E-D0EC-4263-9403-421EED783B92@cisco.com>
In-Reply-To: <74130B2E-D0EC-4263-9403-421EED783B92@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: cisco.com; dkim=none (message not signed) header.d=none;
x-originating-ip: [131.107.160.254]
x-microsoft-exchange-diagnostics: 1; DM2PR0301MB0654; 5:RufzDlrRg4+gshVKNLVlL8sZsh0q/S//Wp5BueVDoS+YfK0w7aSIbVVRIi8F5NaoSZhjcQpgBatSpb4nemwNZv91OIoA6kDrtXvv2JGW3qKaDbsJ/DxcyALmC2tuosN20s3EiXqalR9WQ0fgUNDa6Q==; 24:0Rh03fsd/W7qtMl88uzHkKDBXUKENNSZYhHlOHPIyBNSxABQwB+pAWabPHdpWE0rM+pNugGbI+13oVgdaindtMXR047fQ4EzN4ddpwyS4FI=; 20:s/VV6rMeKxfgwBF/3+c3ioMDV1CjSq9sIYgIlPq8YTwqaqhPOEhKk0ylGxea9SWRs+P8VkXneGfRoFO2ZuvYGw==
x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:DM2PR0301MB0654;
x-o365ent-eop-header: Message processed by - O365_ENT: Allow from ranges (Engineering ONLY)
x-microsoft-antispam-prvs: <DM2PR0301MB06544840D9C2033E45ECC2B7A8900@DM2PR0301MB0654.namprd03.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:;
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(601004)(2401001)(5005006)(3002001); SRVR:DM2PR0301MB0654; BCL:0; PCL:0; RULEID:; SRVR:DM2PR0301MB0654;
x-forefront-prvs: 0632519F33
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(6009001)(51704005)(5001770100001)(92566002)(46102003)(230783001)(87936001)(2656002)(76576001)(76176999)(54356999)(86362001)(50986999)(66066001)(40100003)(189998001)(106116001)(122556002)(77096005)(99286002)(5003600100002)(102836002)(5001960100002)(33656002)(86612001)(74316001)(5002640100001)(2950100001)(2900100001)(62966003)(77156002); DIR:OUT; SFP:1102; SCL:1; SRVR:DM2PR0301MB0654; H:DM2PR0301MB0655.namprd03.prod.outlook.com; FPR:; SPF:None; MLV:sfv; LANG:en;
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-originalarrivaltime: 09 Jul 2015 23:57:29.5398 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM2PR0301MB0654
Archived-At: <http://mailarchive.ietf.org/arch/msg/dhcwg/sevPQoruqbBmcprQDDF854B8CAQ>
Cc: "dhc-chairs@ietf.org" <dhc-chairs@ietf.org>, "draft-ietf-dhc-dhcpv6-active-leasequery@ietf.org" <draft-ietf-dhc-dhcpv6-active-leasequery@ietf.org>, The IESG <iesg@ietf.org>, "dhcwg@ietf.org" <dhcwg@ietf.org>
Subject: Re: [dhcwg] Stephen Farrell's Discuss on draft-ietf-dhc-dhcpv6-active-leasequery-03: (with DISCUSS and COMMENT)
X-BeenThere: dhcwg@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: <dhcwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dhcwg/>
List-Post: <mailto:dhcwg@ietf.org>
List-Help: <mailto:dhcwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Jul 2015 23:57:55 -0000

> 	Service providers often need to know the client-id/MAC to IP
> 	binding information as part of their online provisioning
> 	capability and their client troubleshooting capabilities.
> 
> 	They have historically been scraping log files to glean this
> 	information, or creating extensions to our servers to
> 	broadcast this information to the elements in their
> 	provisioning ensemble that need to know this information.  We
> 	have actually implemented a capability similar to what is
> 	documented in this draft and it is in use by a number of large
> 	service providers -- and we implemented it in no small part
> 	because we got tired of trying to help people debug their
> 	extensions to our DHCP server, since implementing this is a
> 	hard problem.

To add my two cents there: I believe that the Security Section should be updated to point out the "information disclosure" risk. Information disclosure happens when unauthorized clients connect to the server and manage to extract sensitive information, such as leases, time of connection, or delegation of prefixes to specific customers. The main mitigation proposed in RFC 5460 is to reject connections from unauthorized customers, and that mitigation shall be explicitly mentioned in the security section. 

Here are the details of the reasoning:

1) Privacy analyses already assume that the DHCP server knows the relation between MAC Address and IP address, and that network management systems can obtain this information from the DHCP server.

2) Privacy analyses also assume that any "on-link" party can find the relation between MAC Address and IP Address, using ARP or network discovery.

3) Privacy analyses assume that the mapping of prefix delegation to ISP customer identity is only known by the ISP, and is only disclosed on a case by case basis using some formal channels.

The proposed extensions allow for real time monitoring of DHCP leases, including in particular prefix delegations. This clearly changes some of our privacy assumptions. With this protocol, the lease information can be accessed in real time by any party that manages to establish a connection to the DHCP server -- not just parties on the same link as the target, and not just devices managed directly by the ISP.

The draft does specify some access control mechanism to protect the information. Namely, section 9.1. Accepting connection states that:

   DHCPv6 servers that implement DHCPv6 Active Leasequery listen for
   incoming TCP connections.  Approach used in accepting the requestor
   connection is same as specified in DHCPv6 Bulk Leasequery [RFC5460].

The corresponding text in section 7.1. of RFC 5460 states that:

   Servers MAY restrict Bulk Leasequery connections and LEASEQUERY
   messages to certain clients.  Connections that are not from permitted
   clients SHOULD BE closed immediately, to avoid server connection
   resource exhaustion.  Servers MAY restrict some clients to certain
   query types.  Servers MAY reply to queries that are not permitted
   with the NotAllowed status code [RFC5007], and/or close the
   connection.

That's pretty weak, because there is no good detail here of how the "certain clients" are identified. The STARTTLS option does not appear to infer Client Authentication. I assume that when the access control is implemented, it is done via IP address, but that seems weak.

-- Christian Huitema