Re: [dhcwg] recommendation on DHCP6 source port numbers

Tomoyuki Sahara <tsahara@iij.ad.jp> Thu, 29 February 2024 07:19 UTC

Return-Path: <tsahara@iij.ad.jp>
X-Original-To: dhcwg@ietfa.amsl.com
Delivered-To: dhcwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9834CC151078 for <dhcwg@ietfa.amsl.com>; Wed, 28 Feb 2024 23:19:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.107
X-Spam-Level:
X-Spam-Status: No, score=-7.107 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=iij.ad.jp
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1tYfGyAox6ID for <dhcwg@ietfa.amsl.com>; Wed, 28 Feb 2024 23:19:50 -0800 (PST)
Received: from omgo.iij.ad.jp (mo1821.iij.ad.jp [202.32.171.215]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0712DC14F5F4 for <dhcwg@ietf.org>; Wed, 28 Feb 2024 23:19:49 -0800 (PST)
DKIM-Signature: v=1;a=rsa-sha256;c=relaxed/simple;d=iij.ad.jp;h=Date: Message-Id:To:Cc:Subject:From:In-Reply-To:References:Mime-Version: Content-Type:Content-Transfer-Encoding;i=tsahara@iij.ad.jp;s=omgo2;t= 1709191169; x=1710400769; bh=e0pk8V0VsliON/cU/DavA4nn8CN6RmugrGh0ynWQ9kE=; b=dul Fx1kjyS8zGcxctOreFKrY0j33h37Pw2NlZjuSRP+F+6+wt6kmD9N/oCQX8t5RY9feWfs0zF7KwgBh sOlvpNnGBNnJQGrwxOjVc2Lkm0mOnV+EufoZ6TFq4zEUlszalOwIbds4SoUi1dPcPoYZ11IsJgyUu wJgr+vZ6yhljk4p++fPQlZNSCEATdCN8I9Uoe0NyjrIp9hHIPJCooh7GAOgtBssL2CDsYU7TSMdt8 JA23waYeTD2VWYsBikYTSt7kHtiJ+jUMgwXh/BH6N8b+dp7SiftkIm9nEswqYzZRgUvV0t9QEoZWG VoLcdsH0tA90Zf9cxKBBEM1ZCnHiE1Q==;
Received: by omgo.iij.ad.jp (of-mo1821) id 41T7JTQX3417068; Thu, 29 Feb 2024 16:19:29 +0900
X-ENVID: IIJ
X-Iguazu-Qid: C8OKLnEOH1sX3QVomH
X-Iguazu-QSIG: v=2; s=0; t=1709191169; q=C8OKDsljnfoFzM0GHY; m=GxMQcfcMIBn96FhF+pcmQmEP9F+8+PJN2mSfxKWu2yk=
Date: Thu, 29 Feb 2024 16:19:25 +0900
Message-Id: <20240229.161925.1809625754663434930.tsahara@iij.ad.jp>
To: bevolz@gmail.com
Cc: lorenzo@google.com, otroan@employees.org, dhcwg@ietf.org
From: Tomoyuki Sahara <tsahara@iij.ad.jp>
In-Reply-To: <CB30D204-AC74-44EF-9002-8FEABF981B0F@gmail.com>
References: <CAKD1Yr0zxy2xbe8H7gMs+8N5v9UMQX9KSct0OghQ+wodAJeQUw@mail.gmail.com> <CB30D204-AC74-44EF-9002-8FEABF981B0F@gmail.com>
X-Mailer: Mew version 6.9 on Emacs 28.2
Mime-Version: 1.0
Content-Type: Text/Plain; charset="utf-8"
Content-Transfer-Encoding: base64
Archived-At: <https://mailarchive.ietf.org/arch/msg/dhcwg/tpGvb0yr8QZz0q49b3SKowCRxmk>
Subject: Re: [dhcwg] recommendation on DHCP6 source port numbers
X-BeenThere: dhcwg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Dynamic Host Configuration <dhcwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dhcwg/>
List-Post: <mailto:dhcwg@ietf.org>
List-Help: <mailto:dhcwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 29 Feb 2024 07:19:54 -0000

The clarification text should be helpful for new DHCP6 implementers 
and network operators who write firewall rules.

But when client/server received a request message from a random port,
which port should they send a response message to?  There are two types
of implementations on the market (and on my desk):

  (a) returns to 546/547.
  (b) returns to the source port of the request message.

(a) follows the text in RFC8415 strictly.  (b) follows normal UDP
communication rules.  To interoperaate with both (a) and (b), we should
send request messages from the standard source port number 546/547.
That is not obvious and I think it is worth mentioning that in the spec.


Thanks,
Tomoyuki

>Yes, I got it wrong. Been a while since that part of the code was done.
>
>I agree with Lorenzo:
>
> I do think the current text is ambiguous. In practice it allows
> arbitrary source ports, but because this is unusual, implementers might
> assume that the other side is using the same port to send and receive.
> Such an implementation might not interoperate. So if we think the
> behaviour is OK, then we should clarify the text to say that the source
> port is not specified and clients and servers need to be prepared to
> receive messages from arbitrary source ports.
>
>We do allow arbitrary source ports and as there are lots if implementations
>in existence with that behavior, we should just clarify it: "The source
>port is not specified and clients, servers, and relay agents need to be
>prepared to receive messages from arbitrary source ports."
>
>- Bernie
>
> On Feb 28, 2024, at 3:28 AM, Lorenzo Colitti <lorenzo@google.com> wrote:
>
> FWIW the Android client binds to port 546 and does not connect() the
> socket but uses sendto(). So it will send packets from port 546 and it
> will receive any packet to port 546 regardless of the source port used
> by the server. So I guess that happens to be correct.
>
> Having the client send from 12345 -> 547 and the server send from 33333
> -> 546 is sort of unusual - usually each party in a connection will use
> the same source port for sending and receiving - but DHCPv6 is not a
> connected protocol (e.g., some of the messages are multicast and some
> are unicast), so...
>
> I do think the current text is ambiguous. In practice it allows
> arbitrary source ports, but because this is unusual, implementers might
> assume that the other side is using the same port to send and receive.
> Such an implementation might not interoperate. So if we think the
> behaviour is OK, then we should clarify the text to say that the source
> port is not specified and clients and servers need to be prepared to
> receive messages from arbitrary source ports.
>
> On Wed, Feb 28, 2024 at 4:47 PM Ole Troan
> <otroan=40employees.org@dmarc.ietf.org> wrote:
>
> Bernie,
>
> > No. Normal UDP communication rules apply. A client sends traffic
> to a well-known destination port and it is free to select whatever
> port number it likes as the source port. The server’s response is
> sent from that well known port (as source port) and sent to the
> client’s selected port (as destination port). This is normal
> communication and dhcpv6 follows it. That is why nothing is said or
> needs to be said about the client source port.
>
> I’m with Tomoyuki here.
>
> "
> 7.2. UDP Ports
>
> Clients listen for DHCP messages on UDP port 546. Servers and relay
> agents listen for DHCP messages on UDP port 547.
>
> “
>
> Just checked my little scapy based DHCPv6 server and I do:
>
>        reply = (Ether(src=self.interface_info.mac, dst=request
> [Ether].src) /
>                     IPv6(src=self.interface_info.ip6ll, dst=request
> [IPv6].src) /
>                     UDP(sport=547, dport=546) /
>                     DHCP6_Reply(trid=trid) /
>                     DHCP6OptServerId(duid=self.duid) /
>                     DHCP6OptClientId(duid=clientduid) /
>                     DHCP6OptIA_NA(iaid=request[DHCP6OptIA_NA].iaid,
> T1=t1, T2=t2,
>                                   ianaopts = DHCP6OptIAAddress
> (addr=ipv6,
>
> preflft=self.preflft,
>
> validlft=self.validlft)
>                     )
>
> I couldn’t find any text supporting your position Bernie. Although
> I would be fine if that was also the outcome.
> As another implementor I cannot figure out what the correct
> behaviour is from the RFC.
>
> Cheers,
> Ole
>
> > - Bernie Volz
> >
> >> On Feb 26, 2024, at 1:00 AM, Tomoyuki Sahara
> <tsahara=40iij.ad.jp@dmarc.ietf.org> wrote:
> >>
> >> Hi, DHC wg members:
> >>
> >> Can we make recommendations on source port numbers of DHCP6
> messages
> >> in rfc8415bis?
> >>
> >> DHCP6 specification says that DHCP6 clients and servers listen on
> UDP
> >> port 546 and 547 respectively, in RFC8415 section 7.2.  It
> implies
> >> that DHCP6 clients MUST send messages to UDP port 547 (server
> port) and
> >> servers MUST send messages to UDP port 546 (client port) to work
> with
> >> their counterpart correctly (though restrictions can be relaxed
> with
> >> RFC8357 for relays).
> >>
> >> But it says nothing about source port numbers.  Without any
> >> restrictions, some implementations use ephemeral source port
> >> (e.g. 12345) to send their messages.  DHCP6 conversations look
> like:
> >>
> >> 1. client send Solicit    fe80::2#49876    -> ff02::1:2#547
> >> 2. server send Advertise  fe80::1#547      -> fe80::2#546 (!)
> >> 3. client send Request    fe80::2#49877(?) -> ff02::1:2#547
> >> 4. server send Confirm    fe80::1#547      -> fe80::2#546
> >>
> >> This behavior is not prohibited by the specification but makes
> >> confusions for DHCP6 implementer and network/firewall operators
> (*1).
> >> Most Internet protocols nowadays assume that servers send
> response
> >> messages from the port number they received on.
> >> (*1 e.g. https://bugzilla.redhat.com/show_bug.cgi?id=952126 )
> >>
> >> In my humble opinion, it is too late to require that DHCP6 client
> and
> >> server MUST send messages from the fixed port number (546/547)
> because
> >> there are too many DHCP6 implementations in the wild.  But making
> a
> >> recommendation is helpful for new implementations/deployments of
> DHCP6.
> >>
> >> An idea to make such recommendation is adding a text in
> rfc8415bis:
> >>
> >> OLD:
> >>   7.2. UDP Ports
> >>     Clients listen for DHCP messages on UDP port 546.  Servers
> and
> >>     relay agents listen for DHCP messages on UDP port 547.
> >>
> >> NEW:
> >>   7.2. UDP Ports
> >>     Clients listen for DHCP messages on UDP port 546.  Servers
> and
> >>     relay agents listen for DHCP messages on UDP port 547.
> >>
> >>     Clients are RECOMMENDED to send DHCP messages from UDP port
> 546.
> >>     Servers and relay agents are RECOMMENDED to send DHCP
> messages
> >>     from UDP port 547 (unless relay agent includes Relay Source
> Port
> >>     Option for DHCP6 [RFC8357]).
> >>
> >> I know WGLC has been concluded but I believe the recommendations
> above
> >> encourage new implementations to use the standard DHCP6 port
> numbers
> >> on UDP source port.
> >>
> >>
> >> Best regards,
> >> Tomoyuki Sahara
> >>
> >>
> >> _______________________________________________
> >> dhcwg mailing list
> >> dhcwg@ietf.org
> >> https://www.ietf.org/mailman/listinfo/dhcwg
> >
> > _______________________________________________
> > dhcwg mailing list
> > dhcwg@ietf.org
> > https://www.ietf.org/mailman/listinfo/dhcwg
>
> _______________________________________________
> dhcwg mailing list
> dhcwg@ietf.org
> https://www.ietf.org/mailman/listinfo/dhcwg