[Int-dir] Re: Intdir telechat review of draft-ietf-dhc-addr-notification-11

CARLOS JESUS BERNARDOS CANO <cjbc@it.uc3m.es> Tue, 14 May 2024 10:19 UTC

Return-Path: <cjbc@it.uc3m.es>
X-Original-To: int-dir@ietfa.amsl.com
Delivered-To: int-dir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E1FA8C14F60F for <int-dir@ietfa.amsl.com>; Tue, 14 May 2024 03:19:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.995
X-Spam-Level:
X-Spam-Status: No, score=-1.995 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=it.uc3m.es
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VzRwSm8tLd7p for <int-dir@ietfa.amsl.com>; Tue, 14 May 2024 03:19:11 -0700 (PDT)
Received: from mail-lj1-x22d.google.com (mail-lj1-x22d.google.com [IPv6:2a00:1450:4864:20::22d]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BCB45C14F68B for <int-dir@ietf.org>; Tue, 14 May 2024 03:19:11 -0700 (PDT)
Received: by mail-lj1-x22d.google.com with SMTP id 38308e7fff4ca-2e564cad1f1so45617641fa.0 for <int-dir@ietf.org>; Tue, 14 May 2024 03:19:11 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=it.uc3m.es; s=google; t=1715681949; x=1716286749; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=ym3oEevTLfDHeILHAuN2mRt9iakvHCVDW2FFGZaePWk=; b=g//hi41noPVHaHZBuHLwMllT+DSNyUxIZKX6Ph5D34IqIHQA0HhU73tYfSelqXkHav Sk4T38RVHhAf0wmNWOWy3IpFhug7Sd6zEKM3LEDQ6ir0CrPy8HOEf0sH5iw3MtDItCv3 s8NP0d8gAYmZftsKg1S8u0517fzjV5Rq/OAWwT+4Bd/ME3RPs3LPjv+agUhp478CcC1i modSlF+P9oMmla0mwyFU1cPha8adSD0Qdz8O7p/qbGCicuUClMCx86mc1zw0w6PSlML8 fU3sdPhiPh/drHvXGcaQjZgMo0FIkRcGrJETUiYPAChkenyivYTzko4gZMaaGRkPviR5 SWBg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1715681949; x=1716286749; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=ym3oEevTLfDHeILHAuN2mRt9iakvHCVDW2FFGZaePWk=; b=tDtTvMZYSC40cRaz+PR3UELQ7ZLZdX26YXmKunx9RkVwLJE9+vKGUGcp4towReapoV BApdJRITRDuuH64Eh8C0LtNVHueMFr+sfhMpomxTe22b5jSIiYa/J9AN1FH4MAVJwU7g QeRqq6oUJSxioVObaWV1wbElxsnbXIGVBJkkw7tBCF0UNqvaOJ36JD3bmiZdJv5HHU8c CKyVpzPGrXOnySAH3nJIWemyVlnzonF1B62aqudeN9K2gvDB48LUzTjY1CGd1TZMwzLd WKjtuAzE69tUKUZJZqxuosixSFagft8nqHxQnQEwVFu9Il+QpuoEVozJ4Q7ePexO0Der 9pAg==
X-Forwarded-Encrypted: i=1; AJvYcCWqNbIy18a0tmspId27w+fEuzEzHBi7zuSRIvDs8j8p081eJ8aLIbQGZiQbBnBB/hZg/Hm5r6xwUrOIQGVMiQTP
X-Gm-Message-State: AOJu0YwRghoK6Toj8alYuNFgnb7nk8qoWiiDnrxjwWo5DhJbSKW6P6xj CdUyK29FUSXYZcwe0EHWlkfm0AXFDtXNMhW2/4lkII4JeC1m15qxdgjXnukf8vi3oagtQeew85D FWX8h4lssbk3phC90PJnmVLa8loplJmboY3fLrg==
X-Google-Smtp-Source: AGHT+IHBCMJx/TQw290QB7x1Nvv2fgnD1hmEDTHYDnmsO3N6MwKA+SxRTg4D3G8cKbHJP2EyBsRbQ8udKSXDJ16a0Jw=
X-Received: by 2002:a2e:b168:0:b0:2d8:9d8c:9533 with SMTP id 38308e7fff4ca-2e5204b1c3cmr74299001fa.53.1715681948596; Tue, 14 May 2024 03:19:08 -0700 (PDT)
MIME-Version: 1.0
References: <CALypLp_+pSHye07wToKGwciO9C5cY6cwX1M=zGSrpg2Mc3Jsvg@mail.gmail.com> <1C7C07C3-E7D3-4142-8B61-72DDA60C0452@gmail.com>
In-Reply-To: <1C7C07C3-E7D3-4142-8B61-72DDA60C0452@gmail.com>
From: CARLOS JESUS BERNARDOS CANO <cjbc@it.uc3m.es>
Date: Tue, 14 May 2024 12:18:52 +0200
Message-ID: <CALypLp-q36MJF0_eQxEP3w8+LNA804tP1NRUNEQLud4k95JNzg@mail.gmail.com>
To: Bernie Volz <bevolz@gmail.com>
Content-Type: multipart/alternative; boundary="000000000000182d0a0618675551"
Message-ID-Hash: G6XINU6HJMF756MBR3YTSJERF7J3UFPM
X-Message-ID-Hash: G6XINU6HJMF756MBR3YTSJERF7J3UFPM
X-MailFrom: cjbc@it.uc3m.es
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-int-dir.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Jen Linkova <furry13@gmail.com>, int-dir@ietf.org, dhcwg@ietf.org, draft-ietf-dhc-addr-notification.all@ietf.org, last-call@ietf.org
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [Int-dir] Re: Intdir telechat review of draft-ietf-dhc-addr-notification-11
List-Id: "This list is for discussion between the members of the Internet Area directorate." <int-dir.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/int-dir/dTG-Bltov1YHOfMgM8Hs66W0EWE>
List-Archive: <https://mailarchive.ietf.org/arch/browse/int-dir>
List-Help: <mailto:int-dir-request@ietf.org?subject=help>
List-Owner: <mailto:int-dir-owner@ietf.org>
List-Post: <mailto:int-dir@ietf.org>
List-Subscribe: <mailto:int-dir-join@ietf.org>
List-Unsubscribe: <mailto:int-dir-leave@ietf.org>

Thanks Bernie!

On Tue, May 14, 2024 at 12:16 PM Bernie Volz <bevolz@gmail.com> wrote:

> FYI:
>
> Regarding the privacy issue (Client Identifier), you could reference RFC
> 7844 (Anonymity Profiles for DHCP Clients), section 4.3.
>
> - Bernie
>
> On May 14, 2024, at 6:11 AM, CARLOS JESUS BERNARDOS CANO <cjbc@it.uc3m.es>
> wrote:
>
> 
> Hi Jen,
>
> Thanks for the updates. Some quick comments inline below.
>
>
> On Tue, May 14, 2024 at 8:48 AM Jen Linkova <furry13@gmail.com> wrote:
>
>> Hi Carlos,
>>
>> On Fri, May 10, 2024 at 7:51 AM Carlos Jesús Bernardos via Datatracker
>> <noreply@ietf.org> wrote:
>> > Based on my review, if I was on the IESG I would ballot this document
>> as YES.
>>
>> Thank you! ;)
>>
>> > - At the end of section 1, it is mentioned that the mechanism described
>> in the
>> > document provides parity with IPv4, by allowing a device to inform the
>> DHCPv6
>> > server about a self-configured or statically configured address.
>> Apologies for
>> > my ignorance on this in advance, but, is there a mechanism in IPv4 to
>> do so for
>> > statically configured addresses? If so, I think adding a reference
>> would be
>> > useful. If not, maybe the text can be rewritten a bit, as I would find
>> it a bit
>> > unclear.
>>
>> We've just submitted -12 which now says:
>> "This operational practice relies on the DHCP server knowing the IP
>> address assignments. This works quite well for IPv4 addresses, as most
>> addresses are either assigned by DHCP [RFC2131] or statically
>> configured by the network operator. For IPv6, however, this practice
>> is much harder to implement, as devices often self-configure IPv6
>> addresses via SLAAC [RFC4862].
>>
>> This document provides a mechanism for a device to inform the DHCPv6
>> server that the device has a self-configured IPv6 address (or has a
>> statically configured address), and thus provides parity with IPv4, by
>> making DHCPv6 infrastructure aware of self-assigned IPv6 addresses."
>>
>> I hope it's more clear now, pls let us know if you think further
>> improvements are needed.
>>
>
>  [Carlos] Fine with me, thanks!
>
>
>>
>> > - It is mentioned that the client MUST include the Client Identifier
>> option in
>> > the ADDRESS-REG-INFORM messages. I think this might deserve some text
>> regarding
>> > how this might imply (or not) a potential privacy issue for hosts
>> implementing
>> > some kind of MAC address randomization and rotation of IPv6
>> self-assigned
>> > addresses, as an observer could easily track the addresses being used
>> and match
>> > those to the same device.
>>
>> We don’t think this is a concern, because on-link attackers do not
>> need to use the client identifier to match self-assigned addresses to
>> devices, they can use the MAC address for that purpose.
>> Privacy-sensitive clients that randomize their MAC addresses should
>> obviously randomize their DHCPv6 Client Identifiers too. We’re not
>> sure this document is the right place to say so, though?
>>
>
> [Carlos] While I agree that this is not the document to specify how to use
> DHCPv6 Client Identifiers, I think adding notifications that can allow an
> on-link attacker to match a MAC-changing device with the addresses it might
> be using would deserve at least a reference to the documents that have
> tackled the privacy issues in the past (I think there is one specifically
> tackling the aspects of DHCPv6).
>
>
>>
>> > - It is not completely clear to me if the spec requires a client to use
>> the
>> > mechanism on ALL interfaces. I mean, can a client use it just on some
>> > interfaces, but not all, by having configuration policies indicating on
>> which
>> > ones to use it? As I read the document, it seems to imply that if it is
>> used on
>> > one interface, it MUST be used on all of them.
>>
>> Oh very good point, I didn't realize we are not making that part
>> clear. No, as the registration messame must be sent from the address
>> being registered (section 4.2 does say that), and the registration
>> support is network-specific, the client should (must) enable this on
>> per-interface basis.
>> We have added the following text to Section 4.4:
>> "A client with multiple interfaces MUST discover address registration
>> support for each interface independently. The client MUST NOT send
>> address registration messages on a given interface unless the client
>> has discovered that the interface is connected to a network which
>> supports address registration."
>>
>
> [Carlos] Great, thanks!
>
>
>>
>>
>> > - Minor nit (or maybe just nothing at it is just that I’m not a native
>> English
>> > speaker): “to specify the address to being registered” -> I guess the
>> “to”
>> > should be removed.
>>
>> Yeah, a typo, fixed!
>>
>
> [Carlos] Thanks!
>
>
>>
>> --
>> Cheers, Jen Linkova
>>
>