Re: [homenet] Firewall hole punching [was: About Ted's naming architecture...]

james woodyatt <jhw@google.com> Tue, 22 November 2016 23:23 UTC

Return-Path: <jhw@google.com>
X-Original-To: homenet@ietfa.amsl.com
Delivered-To: homenet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F250212961F for <homenet@ietfa.amsl.com>; Tue, 22 Nov 2016 15:23:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.498
X-Spam-Level:
X-Spam-Status: No, score=-3.498 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RP_MATCHES_RCVD=-1.497, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Bk2GNQHYQiET for <homenet@ietfa.amsl.com>; Tue, 22 Nov 2016 15:23:42 -0800 (PST)
Received: from mail-pg0-x236.google.com (mail-pg0-x236.google.com [IPv6:2607:f8b0:400e:c05::236]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E6726129470 for <homenet@ietf.org>; Tue, 22 Nov 2016 15:23:41 -0800 (PST)
Received: by mail-pg0-x236.google.com with SMTP id x23so12339983pgx.1 for <homenet@ietf.org>; Tue, 22 Nov 2016 15:23:41 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:subject:from:in-reply-to:date :content-transfer-encoding:message-id:references:to; bh=ypPHOqi12IP8vXsZ+TxnOONfphdGFtl7J2mblQI2WxY=; b=RdaxMYgVyFtlB63ifx9ODV0vI2WEUgq9Gc9b5R4jgKrkvCixFMKY+2X+VC6x2F/QY/ 8yFLIE843R7qwwjQ3xN8VoO+IBEL9tg1OBWOipvwUxJb+avx8rfGYsw/NNY30t8HIWbr CqFqSLX3/bxZyCWZCaKoE+ILHz8xWS6B/w6f0CGY67MzktGInYfUtXc2QI0kOg/Pk1tb yBa0Ad7B2xpjSnTq6UE47aInrS8Rb5FwT2ac0fsagoXtxXF+iAOl+cYOLAEVZWqkJ6eO TcpM7QwhJYl9ZuzPjV33ij4GtfiaR+rBT3rDBhYVV83cFfMFCt2U7Wwit5PuUt92uleQ 4vVg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date :content-transfer-encoding:message-id:references:to; bh=ypPHOqi12IP8vXsZ+TxnOONfphdGFtl7J2mblQI2WxY=; b=Tc2T/JsY8ffR+51YBYc5oLCFeIX3KxRQjNz8D/+G8U5QD2wZ7KpA1zDFz9j6uSCQqD mmbGjJTZfwfzPLEUnRIgSzBgj9FrpfdQ4jL7sxJIzVxAs6QXp/7mByHnOGQr3DGry0fO d3JWQRj8rWHRQ2TPlDHTAFw3/IgWKf/ALHlQgtxkx8rpAfBaBj3b9arSq3H6zTcGWXbj 1IZe7nEJuCCJy3YGejTLVvI+oR5HMPrb73B4aQ1SAGnTKxOg61xHj4DK9BFj+CyG+EO4 sooYpWxAIGDk1UgmKYsz5GVK+2uov4ElVQBBv8q0xaJrv8WW1eyOO9LlybAiSao0Trty 6gPg==
X-Gm-Message-State: AKaTC03Mo4hltsWBN3nipjsixPUi20cpX9NFWNR91/f3yZ+L9wxNVf1dVxDT7a5q51a9tE+I
X-Received: by 10.98.19.137 with SMTP id 9mr138107pft.150.1479857020938; Tue, 22 Nov 2016 15:23:40 -0800 (PST)
Received: from ?IPv6:2620::10e7:10:241b:3a19:bdf7:e7cb? ([2620:0:10e7:10:241b:3a19:bdf7:e7cb]) by smtp.gmail.com with ESMTPSA id b71sm47514818pfj.62.2016.11.22.15.23.39 for <homenet@ietf.org> (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Tue, 22 Nov 2016 15:23:40 -0800 (PST)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: james woodyatt <jhw@google.com>
In-Reply-To: <87oa17i9eq.wl-jch@irif.fr>
Date: Tue, 22 Nov 2016 15:23:40 -0800
Content-Transfer-Encoding: quoted-printable
Message-Id: <AC037817-F1F6-46E1-AC07-6C3D787C494F@google.com>
References: <871syc54d1.wl-jch@pps.univ-paris-diderot.fr> <CAPt1N1=eXRBh6UqGGqUSK9cH_jY5MvPcE4MFZUPe2Z48LF7bkA@mail.gmail.com> <87lgwj504t.wl-jch@irif.fr> <CAPt1N1kDCMDBEpt7QYhHtPYjaMJAzw8G81=2y2f=y0ZProeCPA@mail.gmail.com> <13675.1479346312@dooku.sandelman.ca> <3B35AF68-4792-4B2A-8277-A7B49206581F@google.com> <74143607-B81E-4D4C-89D3-4754E0DA7DE1@jisc.ac.uk> <790beb67-a62e-b7dc-b64e-a3fcecfbdb12@mtcc.com> <87zikrihl7.wl-jch@irif.fr> <2EEB3CCD-3C25-4844-95B5-DDE31F982EA2@iki.fi> <87oa17i9eq.wl-jch@irif.fr>
To: HOMENET <homenet@ietf.org>
X-Mailer: Apple Mail (2.3124)
Archived-At: <https://mailarchive.ietf.org/arch/msg/homenet/ApP2bbjLzdWr55y9hd5Vdcu1bqs>
Subject: Re: [homenet] Firewall hole punching [was: About Ted's naming architecture...]
X-BeenThere: homenet@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: IETF Homenet WG mailing list <homenet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/homenet>, <mailto:homenet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/homenet/>
List-Post: <mailto:homenet@ietf.org>
List-Help: <mailto:homenet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/homenet>, <mailto:homenet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 22 Nov 2016 23:23:44 -0000

On Nov 22, 2016, at 11:47, Juliusz Chroboczek <jch@irif.fr> wrote:
> 
> Assuming you want to allow hole punching, PCP makes sense.

It only makes sense if the distinguished hole punched by the recommendations in Section 3.2.4 IPsec and Internet Key Exchange (IKE) [RFC 6092] are insufficient or unsuitable for the given application.

> Whether you want to allow hole punching in the first place is a separate discussion.

A separate, closely related discussion is whether hole punching should continue to be “opt-in” or if it should be changed to be “opt-out” (assuming it’s even possible to make such a change at this late date, but the roll-out of HOMENET systems might bring an opportunity, should we choose to take it).

I mean, it’s really quite revealing in Section 3.6 in "IPv6 Home Networking Architecture Principles" [RFC7368], which includes a long disquisition about the architecture expressly not taking any opinion on the “opt-in” or “opt-out” question, that the whole discussion gets reduced down to this fairly ambiguous sentence in Section 5.1 of “Home Networking Control Protocol” [RFC7788] to this rather unambiguous positive recommendation for filtering:

>> Accessing internal resources from external interfaces is restricted, i.e., the use of Recommended Simple Security Capabilities in Customer Premises Equipments (CPEs) [RFC6092] is RECOMMENDED.


On Nov 22, 2016, at 08:28, Michael Thomas <mike@mtcc.com> wrote:
> 
> Right. Since Homenet is predicated on ipv6, we should never bake in expectations of doglegging that have their justifications in v4/nat. […]

I think we can safely observe that the expectation for passive listeners on unmanaged home networks to be protected by IPv6 Simple Security from receiving inbound flows from arbitrary hosts on the public Internet is not merely due to the legacy of IPv4/NAT.

During the long and heated debate over RFC 4864 and the even longer and more heated debate over RFC 6092, I would say that the IETF community really did come to the consensus that eliminating the need for NAT to provide address amplification does not entail eliminating the need for simple security at the borders of unmanaged networks. That’s pretty clear in RFC 4864, and we had the opportunity to revisit in RFC 6092, and we did not.

This argument that passive listener protection on unmanaged networks is an obsolescence left over from IPv4/NAT just doesn’t work. We had plenty of opportunities to leave it behind with IPv6 and we quite deliberately kept it. We can’t claim we didn’t know what we were doing.

> There are perfectly good reasons I don't want to hand over control to some dogleg servers […] thankyouverymuch.


And yet, we have the Internet as it has been constructed in the real world according to its deliberately planned architecture, in which most if not all passive listeners on unmanaged residential networks are expected to be protected directly by security packet filters from receiving inbound flows directly from arbitrary initiators over public routes. The architecture instead expressly calls for them to make outbound flows to some exterior service that facilitates their communications or proxies on their behalf at application layers.

That’s your dog-leg. We have it because IETF experts are afraid of the chaos entailed by allowing the riffraff to do without it too easily.

Maybe the IETF community will revisit this architecture in the next version of the Internet Protocol, but with IPv6 I have to say the matter seems well and truly decided at this point. In the meantime, with the Internet we have, it doesn’t make sense to me why we should spend our time specifying protocols for registering names of services in the global domain name system unless we have a realistic usage scenario that shows how they will be reachable directly by arbitrary public hosts.

I just don’t see how there is any such realistic scenario. Hence, I’m not sold that adopting this draft is a good idea.


--james woodyatt <jhw@google.com>