[Int-dir] Re: Intdir telechat review of draft-ietf-dhc-addr-notification-11

CARLOS JESUS BERNARDOS CANO <cjbc@it.uc3m.es> Wed, 15 May 2024 22:53 UTC

Return-Path: <cjbc@it.uc3m.es>
X-Original-To: int-dir@ietfa.amsl.com
Delivered-To: int-dir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D654DC18DBA1 for <int-dir@ietfa.amsl.com>; Wed, 15 May 2024 15:53:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.996
X-Spam-Level:
X-Spam-Status: No, score=-1.996 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=it.uc3m.es
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KZ-kKV32npaL for <int-dir@ietfa.amsl.com>; Wed, 15 May 2024 15:53:07 -0700 (PDT)
Received: from mail-lf1-x136.google.com (mail-lf1-x136.google.com [IPv6:2a00:1450:4864:20::136]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0CDE2C18DB9F for <int-dir@ietf.org>; Wed, 15 May 2024 15:53:06 -0700 (PDT)
Received: by mail-lf1-x136.google.com with SMTP id 2adb3069b0e04-52232d0e5ceso146927e87.0 for <int-dir@ietf.org>; Wed, 15 May 2024 15:53:06 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=it.uc3m.es; s=google; t=1715813584; x=1716418384; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=SL/lzaOiyxYS2CyXxq1qkk9raind4Aw1B/1TiNRJ6Rk=; b=P9nXrzSi2ilPWTkuvKxhYljLBpC5zUY8jgcJIt4GuA6fRxHm7xgVoEc53wm1aUsVAm 2k34oSA5YC8aerkOebSPJOu5nC7XHo1x9s6uorKydpyuPeMfy2RqFLCOhpSiw0ZZJBTF ksycJjHv8zbIsCY0kNODqK1JjpAdD+g8EJSU3E9YTX1u7lbHsQy/qaTBBMn4G5hFs+xc PSJaOnayWYL6thrWFsphikg9LNRMmFx+VQAO9FNYQOSb3LterLpYoQXk0GVoL7FC2sxS OYdU5bhDljMt4fM22K2GDL1K1huG4CsX4lKUwR2Vwqe9Pzo6G927S3jaKpWT1xKQBoxz zpdg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1715813584; x=1716418384; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=SL/lzaOiyxYS2CyXxq1qkk9raind4Aw1B/1TiNRJ6Rk=; b=iz3EVN0xmZMEiHU/z2nS7sfi6pvyzR1ITLjA6S4Wk/WYMlojC2sg3FNdG7NGqz5S2U 2XtmTpCtB+NYR8v8FvzJ2TlFoYeUsJ19xHVTIzfh44QK4UCxCVIvxsifnrutmruUCzV7 krbM6VIiTFWbIHTlm7pInHUQIxngdmZGgkhyLwJLVwZzCokOHupz6Ipj2pBPZJfssjkk DdHbOF6ZLsqp/9xvIWI8WpPgvkxwLcMaboyl9EjeCZ1J9na0VOf2pIuFIoAUnWBPpGXy tBfpBzf3WTNy/Da9KNA5/UUeHjsUd/yX1Y7v0uJSps95fmVF1hsp0c30PNwLS0nlodz9 iKHg==
X-Forwarded-Encrypted: i=1; AJvYcCUsIAoYItBLNx/yTbGHLe3puUnPFG8AreRva5qd3Vh2Yie6GVCB/XnMW3PhRYBOnP/tRIrlaYMUBu9Nrd/FfFm7
X-Gm-Message-State: AOJu0YzGiQwoDzKbTLRrxIgpA73ZFZqfUqaW8nE2CWoYd8VWXqfQhPzR Kh8pyswziTESA1jqBBxLJ27sUsrQjA2bOaTAHzxnyzY10lrNvmQu2ZdcqEnEqwOdTq2LjA7XxMw DD9SmZgZG4N/oCKq7narZkUMZtmAEYU8uLsgrKw==
X-Google-Smtp-Source: AGHT+IGaX9oyvb8oj2TXon+lnB+ot4LZaFei7Tr4m9elJ+SeHfHGVqH3QBrlgPZBwo+XbEvTLpxI0ljpFiRtpRTu9S0=
X-Received: by 2002:a05:6512:a84:b0:523:b261:3ddf with SMTP id 2adb3069b0e04-523b2613ebdmr565434e87.32.1715813583619; Wed, 15 May 2024 15:53:03 -0700 (PDT)
MIME-Version: 1.0
References: <CALypLp_+pSHye07wToKGwciO9C5cY6cwX1M=zGSrpg2Mc3Jsvg@mail.gmail.com> <1C7C07C3-E7D3-4142-8B61-72DDA60C0452@gmail.com> <CALypLp-q36MJF0_eQxEP3w8+LNA804tP1NRUNEQLud4k95JNzg@mail.gmail.com> <CAFU7BAR0Mm+JR4dqTne=0u1Wf0W=Zkjmbpo6OEWHR==RQArbMA@mail.gmail.com>
In-Reply-To: <CAFU7BAR0Mm+JR4dqTne=0u1Wf0W=Zkjmbpo6OEWHR==RQArbMA@mail.gmail.com>
From: CARLOS JESUS BERNARDOS CANO <cjbc@it.uc3m.es>
Date: Thu, 16 May 2024 00:52:46 +0200
Message-ID: <CALypLp8_ExwPkhfpePioCgwr2mgQQhrt-Tkdd4D5Fj52SMqpdw@mail.gmail.com>
To: Jen Linkova <furry13@gmail.com>
Content-Type: multipart/alternative; boundary="0000000000002767ed061885fbc1"
Message-ID-Hash: MBRZD3ISFD7DV5AUGYEOORIZ6G5TRX3V
X-Message-ID-Hash: MBRZD3ISFD7DV5AUGYEOORIZ6G5TRX3V
X-MailFrom: cjbc@it.uc3m.es
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-int-dir.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Bernie Volz <bevolz@gmail.com>, int-dir@ietf.org, dhcwg@ietf.org, draft-ietf-dhc-addr-notification.all@ietf.org, last-call@ietf.org
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [Int-dir] Re: Intdir telechat review of draft-ietf-dhc-addr-notification-11
List-Id: "This list is for discussion between the members of the Internet Area directorate." <int-dir.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/int-dir/EYJAMMgQJvtJDx6WJCOibEZq_lU>
List-Archive: <https://mailarchive.ietf.org/arch/browse/int-dir>
List-Help: <mailto:int-dir-request@ietf.org?subject=help>
List-Owner: <mailto:int-dir-owner@ietf.org>
List-Post: <mailto:int-dir@ietf.org>
List-Subscribe: <mailto:int-dir-join@ietf.org>
List-Unsubscribe: <mailto:int-dir-leave@ietf.org>

Hi Jen,

The updates look good to me. Thanks!

Carlos

On Wed, May 15, 2024 at 12:21 PM Jen Linkova <furry13@gmail.com> wrote:

> Thank you Carlos and Bernie!
>
> The Security section already had some text about an on-link observer
> tracking IPv6 addresses belonging to a host.
> Based on this discussion we made the following changes:
>
> - 3 paragraphs are moved out of Security Considerations to a new
> Privacy Consideration section.
> - that text is updated so it now mentions DUID as an unique identifier
> which can be used for tracking
> - reference to  Section 4.3 of [RFC7844] added.
>
> You can see the new text (not submitted to Datatracker yet) at
>
> https://wkumari.github.io/draft-wkumari-dhc-addr-notification/draft-ietf-dhc-addr-notification.html#name-privacy-considerations
>
> Please let me know if you'd like to see more changes.
>
> Thank you!
>
> On Tue, May 14, 2024 at 8:19 PM CARLOS JESUS BERNARDOS CANO
> <cjbc@it.uc3m.es> wrote:
> >
> > Thanks Bernie!
> >
> > On Tue, May 14, 2024 at 12:16 PM Bernie Volz <bevolz@gmail.com> wrote:
> >>
> >> FYI:
> >>
> >> Regarding the privacy issue (Client Identifier), you could reference
> RFC 7844 (Anonymity Profiles for DHCP Clients), section 4.3.
> >>
> >> - Bernie
> >>
> >> On May 14, 2024, at 6:11 AM, CARLOS JESUS BERNARDOS CANO <
> cjbc@it.uc3m.es> wrote:
> >>
> >> 
> >> Hi Jen,
> >>
> >> Thanks for the updates. Some quick comments inline below.
> >>
> >>
> >> On Tue, May 14, 2024 at 8:48 AM Jen Linkova <furry13@gmail.com> wrote:
> >>>
> >>> Hi Carlos,
> >>>
> >>> On Fri, May 10, 2024 at 7:51 AM Carlos Jesús Bernardos via Datatracker
> >>> <noreply@ietf.org> wrote:
> >>> > Based on my review, if I was on the IESG I would ballot this
> document as YES.
> >>>
> >>> Thank you! ;)
> >>>
> >>> > - At the end of section 1, it is mentioned that the mechanism
> described in the
> >>> > document provides parity with IPv4, by allowing a device to inform
> the DHCPv6
> >>> > server about a self-configured or statically configured address.
> Apologies for
> >>> > my ignorance on this in advance, but, is there a mechanism in IPv4
> to do so for
> >>> > statically configured addresses? If so, I think adding a reference
> would be
> >>> > useful. If not, maybe the text can be rewritten a bit, as I would
> find it a bit
> >>> > unclear.
> >>>
> >>> We've just submitted -12 which now says:
> >>> "This operational practice relies on the DHCP server knowing the IP
> >>> address assignments. This works quite well for IPv4 addresses, as most
> >>> addresses are either assigned by DHCP [RFC2131] or statically
> >>> configured by the network operator. For IPv6, however, this practice
> >>> is much harder to implement, as devices often self-configure IPv6
> >>> addresses via SLAAC [RFC4862].
> >>>
> >>> This document provides a mechanism for a device to inform the DHCPv6
> >>> server that the device has a self-configured IPv6 address (or has a
> >>> statically configured address), and thus provides parity with IPv4, by
> >>> making DHCPv6 infrastructure aware of self-assigned IPv6 addresses."
> >>>
> >>> I hope it's more clear now, pls let us know if you think further
> >>> improvements are needed.
> >>
> >>
> >>  [Carlos] Fine with me, thanks!
> >>
> >>>
> >>>
> >>> > - It is mentioned that the client MUST include the Client Identifier
> option in
> >>> > the ADDRESS-REG-INFORM messages. I think this might deserve some
> text regarding
> >>> > how this might imply (or not) a potential privacy issue for hosts
> implementing
> >>> > some kind of MAC address randomization and rotation of IPv6
> self-assigned
> >>> > addresses, as an observer could easily track the addresses being
> used and match
> >>> > those to the same device.
> >>>
> >>> We don’t think this is a concern, because on-link attackers do not
> >>> need to use the client identifier to match self-assigned addresses to
> >>> devices, they can use the MAC address for that purpose.
> >>> Privacy-sensitive clients that randomize their MAC addresses should
> >>> obviously randomize their DHCPv6 Client Identifiers too. We’re not
> >>> sure this document is the right place to say so, though?
> >>
> >>
> >> [Carlos] While I agree that this is not the document to specify how to
> use DHCPv6 Client Identifiers, I think adding notifications that can allow
> an on-link attacker to match a MAC-changing device with the addresses it
> might be using would deserve at least a reference to the documents that
> have tackled the privacy issues in the past (I think there is one
> specifically tackling the aspects of DHCPv6).
> >>
> >>>
> >>>
> >>> > - It is not completely clear to me if the spec requires a client to
> use the
> >>> > mechanism on ALL interfaces. I mean, can a client use it just on some
> >>> > interfaces, but not all, by having configuration policies indicating
> on which
> >>> > ones to use it? As I read the document, it seems to imply that if it
> is used on
> >>> > one interface, it MUST be used on all of them.
> >>>
> >>> Oh very good point, I didn't realize we are not making that part
> >>> clear. No, as the registration messame must be sent from the address
> >>> being registered (section 4.2 does say that), and the registration
> >>> support is network-specific, the client should (must) enable this on
> >>> per-interface basis.
> >>> We have added the following text to Section 4.4:
> >>> "A client with multiple interfaces MUST discover address registration
> >>> support for each interface independently. The client MUST NOT send
> >>> address registration messages on a given interface unless the client
> >>> has discovered that the interface is connected to a network which
> >>> supports address registration."
> >>
> >>
> >> [Carlos] Great, thanks!
> >>
> >>>
> >>>
> >>>
> >>> > - Minor nit (or maybe just nothing at it is just that I’m not a
> native English
> >>> > speaker): “to specify the address to being registered” -> I guess
> the “to”
> >>> > should be removed.
> >>>
> >>> Yeah, a typo, fixed!
> >>
> >>
> >> [Carlos] Thanks!
> >>
> >>>
> >>>
> >>> --
> >>> Cheers, Jen Linkova
>
>
>
> --
> Cheers, Jen Linkova
>