Re: [homenet] I-D.ietf-homenet-prefix-assignment

Pierre Pfister <pierre.pfister@darou.fr> Wed, 08 October 2014 07:50 UTC

Return-Path: <SRS0=W1if=67=darou.fr=pierre.pfister@bounces.m4x.org>
X-Original-To: homenet@ietfa.amsl.com
Delivered-To: homenet@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B51C71A009E for <homenet@ietfa.amsl.com>; Wed, 8 Oct 2014 00:50:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level:
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sSTp2LAqIBLx for <homenet@ietfa.amsl.com>; Wed, 8 Oct 2014 00:50:22 -0700 (PDT)
Received: from mx1.polytechnique.org (mx1.polytechnique.org [129.104.30.34]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9A88E1A0089 for <homenet@ietf.org>; Wed, 8 Oct 2014 00:50:22 -0700 (PDT)
Received: from [10.61.162.75] (173-38-208-169.cisco.com [173.38.208.169]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ssl.polytechnique.org (Postfix) with ESMTPSA id 6E8011408EEE6; Wed, 8 Oct 2014 09:50:20 +0200 (CEST)
Content-Type: multipart/alternative; boundary="Apple-Mail=_C50B75DE-06FB-45C5-B5A1-E9473A912614"
Mime-Version: 1.0 (Mac OS X Mail 7.3 \(1878.6\))
From: Pierre Pfister <pierre.pfister@darou.fr>
In-Reply-To: <54348606.7010507@gmail.com>
Date: Wed, 08 Oct 2014 09:50:22 +0200
Message-Id: <A250131C-6D1B-4054-A8AE-EBC1BD899B7E@darou.fr>
References: <CADhXe52TRJy0MA861bCnWY8LjLZnGQiPbb=qXQhxCirm_DHQ0Q@mail.gmail.com> <54348606.7010507@gmail.com>
To: Brian E Carpenter <brian.e.carpenter@gmail.com>
X-Mailer: Apple Mail (2.1878.6)
X-AV-Checked: ClamAV using ClamSMTP at svoboda.polytechnique.org (Wed Oct 8 09:50:21 2014 +0200 (CEST))
Archived-At: http://mailarchive.ietf.org/arch/msg/homenet/IydopzHH-FGIjEjLI3-OcX4sBHU
Cc: HOMENET Working Group <homenet@ietf.org>, James Woodyatt <jhw@nestlabs.com>
Subject: Re: [homenet] I-D.ietf-homenet-prefix-assignment
X-BeenThere: homenet@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: <homenet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/homenet>, <mailto:homenet-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/homenet/>
List-Post: <mailto:homenet@ietf.org>
List-Help: <mailto:homenet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/homenet>, <mailto:homenet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 Oct 2014 07:50:26 -0000

Hello Brian

Please find my answer inline.

Le 8 oct. 2014 à 02:32, Brian E Carpenter <brian.e.carpenter@gmail.com> a écrit :

> On 08/10/2014 12:14, James Woodyatt wrote:
> 
> (quoting draft-ietf-homenet-prefix-assignment-00)
> 
>>   prefix.  If no ULA prefix can be found in stable storage, it MUST be
>>   randomly generated, or generated from hardware specific values.
> 
> That sentence is not OK. It should be:
> 
> If no ULA prefix can be found in stable storage, it MUST be generated
> as specified in [RFC4193].

The point was to have a pseudo-random algorithm that always generates the same ULA.
Stable storage can be used, but on most crappy home routers, writing on the SSD too much will kill it in a few thousands writes.

[RFC4193] states:
3.2.1.  Locally Assigned Global IDs

   Locally assigned Global IDs MUST be generated with a pseudo-random
   algorithm consistent with [RANDOM].

If remembering the ULA prefix and using it again and again (using stable storage) is OK, I don’t see why we would need cryptographic pseudo-randomness here.
And actually that’s even worse. Why would a cryptographic pseudo-random function would be used with a *known* seed. 
The ULA doesn’t need to be secret. It just needs to be random enough to avoid collisions.

My point here is that if we conform to RFC4193, we lose the stability of the generated ULA, and IMHO we win nothing.
Correct me if I’m wrong, but I think using hardware specific values as seed is perfectly fine with the collision-avoidance requirement.

Cheers,

Pierre

> 
>> The requirements keywords in this section make for a pretty serious interop
>> clash with Thread networks <http://threadgroup.org/>, which generate their
>> own ULA prefix based on a method defined by its current conventions.
> 
> I sincerely hope that method conforms to RFC4193.
> 
>    Brian
> 
> _______________________________________________
> homenet mailing list
> homenet@ietf.org
> https://www.ietf.org/mailman/listinfo/homenet