Re: [Int-area] [homenet] Evaluate impact of MAC address randomization to IP applications

Brian Dickson <brian.peter.dickson@gmail.com> Wed, 23 September 2020 00:13 UTC

Return-Path: <brian.peter.dickson@gmail.com>
X-Original-To: int-area@ietfa.amsl.com
Delivered-To: int-area@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AE3B83A0406; Tue, 22 Sep 2020 17:13:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FOQMUzsUrUtf; Tue, 22 Sep 2020 17:13:54 -0700 (PDT)
Received: from mail-vk1-xa33.google.com (mail-vk1-xa33.google.com [IPv6:2607:f8b0:4864:20::a33]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D85423A0403; Tue, 22 Sep 2020 17:13:53 -0700 (PDT)
Received: by mail-vk1-xa33.google.com with SMTP id q13so4741787vkd.0; Tue, 22 Sep 2020 17:13:53 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=puxRxrleIwYibkAGyIbEu1o6hjCWcirbWrGnYtAJisg=; b=krEc0l8ffzRkUt7tgyDpSjabo6cYONUjQH9WvlkyocDaOpP5k998C5tuB5aq2z4F6W hwDY01hLr8paTK+WrBI0Ss6xBoJY58RuPwDUauILqdcy9EmuJAQecO0p5+xcGYUH+opZ C4vMDPHFnj3mP24alXStCCA0PcKarowvFMx3BkgM8eeNcZACeR/4DVwRHQ/QbGLQYg/H ewRzO0qBVvC11ECJSxpFvG0nbqyW7mSfY9g76MjBPYCq7jit9LJfi8Ej1DB6I1ElsVmN eRo47GCw+Brta1bSNaSnfpe+AH1jbI1JvjG0zM8urKDOmTUmCQnTsFGdBmLA3Y/7XDvc LokQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=puxRxrleIwYibkAGyIbEu1o6hjCWcirbWrGnYtAJisg=; b=HSw54amezEJz7VL/qooq4oKFgfEOtIlccszXE7DcO5jPLoXlKfnynphZXRtlXtzlnP NKCD2qr44i38TLpW0WGyj4roznlhQruEL+nUAgZXUkEBldbtHo6/ycFjPkeLS08+/nkz ZP5cPC2sTaMi3DvnH9B3MZ4adAf2qV2gfmkxUTGnVlDEG1U2Z0Hc93WLs0Gklftl3Z9y +666fSkmRAYc1kX+HC9oUv9hWhOhCRpgTJW7CQVLeafICSUhd45c4ufb0V3DFiyOpo6e 6mIiVNPfxlqWdLJlpdNn+Sf7aym6O4PMrAOeocNfTCZjyhU4WdrX6Jfy2Ly3ADPJ+TNL WwQg==
X-Gm-Message-State: AOAM533f8KSQv5unvuOpRsd0629ogJ2sZtgWZba01ixzOkgOHV1HxhPy 8YZwl+yED58rsTZovUG8/+M7e4onXvSvSvYALRk=
X-Google-Smtp-Source: ABdhPJz8Gu67mV5k8zhPGnbce0zWdyOeL3foMepF614NJe5vDZOuoBMblyeVINK5XPCkZYlj65vYBcWudRLtiZNtrHE=
X-Received: by 2002:a1f:3849:: with SMTP id f70mr5530722vka.0.1600820032739; Tue, 22 Sep 2020 17:13:52 -0700 (PDT)
MIME-Version: 1.0
References: <20200922201317.097C3389D4@tuna.sandelman.ca> <15660.1600807202@localhost> <902400f2-9172-9581-25ab-59ad08e67bee@cs.tcd.ie> <09A7F884-F102-4081-BB1D-F7760B2DCE9B@gmail.com> <20953.1600817118@localhost>
In-Reply-To: <20953.1600817118@localhost>
From: Brian Dickson <brian.peter.dickson@gmail.com>
Date: Tue, 22 Sep 2020 17:13:41 -0700
Message-ID: <CAH1iCipaRD=DQe7G_+EuXg=svVu6hzCicyKgzYrQszW243FaPQ@mail.gmail.com>
To: Michael Richardson <mcr+ietf@sandelman.ca>
Cc: Bob Hinden <bob.hinden@gmail.com>, captive-portals@ietf.org, HOMENET <homenet@ietf.org>, Internet Area <int-area@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000669e8105afeff55d"
Archived-At: <https://mailarchive.ietf.org/arch/msg/int-area/vQqPWFlsItLJOcIxTq93mS8egsg>
Subject: Re: [Int-area] [homenet] Evaluate impact of MAC address randomization to IP applications
X-BeenThere: int-area@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF Internet Area Mailing List <int-area.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/int-area>, <mailto:int-area-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/int-area/>
List-Post: <mailto:int-area@ietf.org>
List-Help: <mailto:int-area-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/int-area>, <mailto:int-area-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 23 Sep 2020 00:13:56 -0000

On Tue, Sep 22, 2020 at 4:25 PM Michael Richardson <mcr+ietf@sandelman.ca>
wrote:

>
> Bob Hinden <bob.hinden@gmail.com> wrote:
>     > I have read the emails and the draft
> <draft-lee-randomized-macaddr-ps-01>.   I am not clear what the goal of the
> BOF is.
>
>     > Could the proponents state it clearly?
>
> I can't speak for the proponents, but at the simplest, one could add:
>   "how can we do X if the MAC cannot be used as identity"
>
>     > • LAN gateway NAPT forwarding - (PRESENTER TBD)
>     > • Static NAPT policies - (PRESENTER TBD)
>     > • Persistent DHCP IP address assignments - (PRESENTER TBD)
>     > • Device-to-user or group association for malware protection -
> (PRESENTER TBD)
>     > • Device-to-user or group association for parental controls -
> (PRESENTER TBD)
>     > • Device-to-user or group association to restrict or authorize
> unwanted
>     > or unverified device connections to the LAN - (PRESENTER TBD)
>
> I don't get the NAPT issue though.
> The NAPT issues are because DHCP gave the device a different IP(v4), right?
> If you solve persistent DHCP, then you solve those, don't you?
>

I think there are some environments where that isn't technically accurate,
or might not be 100% accurate.
E.g. The difference between DHCP6 and that other wacky thing that is doing
random self-assigned IPv6 addresses.

Basically if MAC addresses change during the lifetime of any assignment
(externally provided or self-assigned), the L3/L2 mapping itself also needs
to be updated or redone.

And how that is done can break security and/or connectivity and/or privacy,
or possibly all three.

(E.g. maintaining the IP address when the MAC changes, defeats at least one
possible purpose of changing the MAC.)

I sense a potential rat-hole, but also the possibility of finding common
ground to fix a bunch of things that are problematic to some degree or
another.

I'm hopeful that something like 802.1x can be made use of effectively, but
again a lot depends on the use cases and will likely require pretty deep
dives on each of the relevant technologies and implementations.

IMNSHO, MACs should be relegated to the role reflected in their name: Media
Access Control, basically a disambiguator, not an identity.

Maybe MACs should be used the way the initial values selected by the two
parties doing DH key exchange are used, just as a stepping stone in
establishing a cryptographically-strong "thing" that only they know.
I.e. use the initial MAC (regardless of what it is) as an initial layer-2
communications things, during the set-up of {whatever the BOF/WG output
is}, after which the MAC gets changed to {something else}.

The work being done by the exposure notification may be a good reference
model.
(Google Apple Exposure Notification, aka GAEN, for the SARS-CoV-2 aka
Covid-19 protocols for privacy-first automatic exposure notification over
BLE).
That too uses identifiers that are non-linkable and rotate periodically (on
the order of 10 minutes IIRC).

Brian