Re: IPv6 prefix lengths - how long?

Mark Smith <markzzzsmith@gmail.com> Sun, 09 June 2019 19:41 UTC

Return-Path: <markzzzsmith@gmail.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8B4AD1200D8 for <ipv6@ietfa.amsl.com>; Sun, 9 Jun 2019 12:41:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.499
X-Spam-Level:
X-Spam-Status: No, score=-0.499 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, FROM_LOCAL_NOVOWEL=0.5, HK_RANDOM_ENVFROM=0.001, HK_RANDOM_FROM=0.999, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EgrL5K2wweym for <ipv6@ietfa.amsl.com>; Sun, 9 Jun 2019 12:41:29 -0700 (PDT)
Received: from mail-ot1-x32c.google.com (mail-ot1-x32c.google.com [IPv6:2607:f8b0:4864:20::32c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A21B512002F for <ipv6@ietf.org>; Sun, 9 Jun 2019 12:41:29 -0700 (PDT)
Received: by mail-ot1-x32c.google.com with SMTP id l15so6417390otn.9 for <ipv6@ietf.org>; Sun, 09 Jun 2019 12:41:29 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=9UOnwGNfJd8To6hzUCKSuZ7YLdo61Rn5G6OXNrwStnI=; b=L14LtICSx7ToYgm63OFBPWZVAf+hamw1ql+F/GXHDr0QDgCUHaKf/uMmnGJ4Jb2biC dZp6f2RfBK+7ZZkNShBqsU/r1CpVJp6/KuW084JFTMletgdgcxOk6ym1lmc/SsUAO0fL +lx3OmSb6ta+r60/UpaKg2paNs7JT5ia/zBE+iX4wYZesGniVVMC3KfP9vkh5P9pzucE b0ldO5RAl9lmL32HxAKcExK8X+GVuGeFuf7bRTwtWRScrpNIuVngJx/kHHgyDdk2Olwi NFmmCC9gO4rD9iXQTBQXWKn2RIviPXZh0VdSgs0IVuwANK59zFCHw4KXRc/s8zghznMY qamg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=9UOnwGNfJd8To6hzUCKSuZ7YLdo61Rn5G6OXNrwStnI=; b=K6j2C+I9/nCQ5+Gm4j8Q20QeBAVeswwZGjySEmFwaMMgBNJfzRpvmAobrqLTzO9kbP 0glX1Y7QAIeuXa/GtQ3cYpfa/VJ2U6OCIjRgdfpyws9zS87gLLaHIED+kowB91vopBAa cLBtgHmhcg41AVIeDu2yHC9tF9WCgIzH9QVmtyd8LljRJ+aSXEmQ0lBBg347w13LWfZu I/y2CLAgi2AIuXk0xPIRotYSQghmPg209Yq7tm0iGYUC+8+3+t32Fl09RVssdehtIk3c b15+xxc8GtZSnlSXXlCz8q4MRm8HPYV+Jfsj4hcerXBddF77A4Ikx+Pel7PP+1GhhdzX fuLw==
X-Gm-Message-State: APjAAAXHU+rqLVw+jgJMt+I9B1PySjp0TvCWfQk81ckxJJXvxCxZPp/6 lihzsuz59Qz4TK2Lkw2HCiYX02s8f0K3q9npP4M=
X-Google-Smtp-Source: APXvYqwW3h2RTpTHVP24LT6+QqYqyqXGJ5l8c7MDMpx9/7eUv3DhxmNRx1GUb4gZ7kGyZLqQc0ODWkVNX49lOqJOyfs=
X-Received: by 2002:a9d:66c8:: with SMTP id t8mr10926039otm.94.1560109288918; Sun, 09 Jun 2019 12:41:28 -0700 (PDT)
MIME-Version: 1.0
References: <ee811897e2d2438e9c3592012b725ac3@boeing.com> <CAO42Z2xyenxV+z58VW_h4skbWz14hyVt2pUd32tLZ826UoZKZA@mail.gmail.com> <9826C993-3670-4D7B-8709-B3FDE2A79359@gmail.com>
In-Reply-To: <9826C993-3670-4D7B-8709-B3FDE2A79359@gmail.com>
From: Mark Smith <markzzzsmith@gmail.com>
Date: Mon, 10 Jun 2019 05:41:02 +1000
Message-ID: <CAO42Z2yDDamjszOM5xXp9W4VxU8_mZiAVQEJ_1d6qQxvdZqW8Q@mail.gmail.com>
Subject: Re: IPv6 prefix lengths - how long?
To: Gyan Mishra <hayabusagsm@gmail.com>
Cc: "Templin (US), Fred L" <Fred.L.Templin@boeing.com>, 6man WG <ipv6@ietf.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/7MUOYFL7-XyDue9e1kjoVIj3VdU>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 09 Jun 2019 19:41:32 -0000

On Mon, 10 Jun 2019 at 00:07, Gyan Mishra <hayabusagsm@gmail.com> wrote:
>
>
> All your concerns are duly noted.
>
> As far as changing the prefix length I understand that with IPV6 it seems and maybe true that IPv6 exhaustion is not possible but that is what we said about IPv4

Nobody said that.

>From Vint Cerf, about the IPv4 address structure before IPv4 became
popular. This addressing structure is described in RFC 760, before
classes were introduced. Classes were introduced in RFC 791, and were
the first of many hacks to squeeze more host and network addresses out
of IPv4's 32 bit address field.

"When the Internet design work began, there were only a few fairly large
networks around. ARPANET was one. The Packet Radio and Packet Satellite
networks were still largely nascent. Ethernet had been implemented in
one place: Xerox PARC. We had no way to know whether the Internet idea
was going to work. We knew that the NCP protocol was inadequate for
lossy network operation (think: PRNET and Ethernet in particular). This
was a RESEARCH project. We assumed that national scale networks were
expensive so there would not be too many of them.  And we certainly did
not think there would be many built for a proof of concept. So 8 bits
seemed reasonable. Later, with local networks becoming popular, we
shifted to the class A-D address structure and when class B was near
exhaustion, the NSFNET team (I think specifically Hans-Werner Braun but
perhaps others also) came up with CIDR and the use of masks to indicate
the size of the "network" part of the 32 bit address structure. ..."

https://mailman.nanog.org/pipermail/nanog/2010-April/020488.html




> but that does not give reason to be wasteful.  I believe 64 bits iid is wasteful.
>
> I understand the privacy extension and pseudo random id Understood is a double edge sword that the end user does not want their IP tracked but from the network administration perspective that is required for IP management and forensics to identify attackers.  So that does get tricky.
>
> I think if we shaved just one 16bit field from the station id we could still maintain the pseudo random privacy extensions and also would give 16 bits to the prefix so instead of ISPs dolling out /48’s as the Norm to customers that could be scaled way way down to now giving out a /64 per customer would amount to the same # of subnets /64 subnets in a /48 64k subnets a /64 would now have 64k /82’s.
>
> From an enterprise security perspective IT security requires the ability to track every IP address on the network both IPv4 and IPv6.
>
> So with IPv6 deployments with Verizon IT internally for security reasons to be able to track activities of any host we disable the random station id and temporary address set by default on hosts.
>
> For law enforcement to be able to track unlawful IP how is that combatted for required forensic when the IPv6 address changes makes it difficult.
>
> Network scanning with IPv6 is impossible so the need to a privacy extension where the IP changes on the same network is not as necessary as it makes forensics and troubleshoot impossible to track attackers which reading the link below which talks about rfc 7217 Symantec opaque interface IDentifiers which is stable non changing on the same network and only changes when moving between networks.
>
> https://www.internetsociety.org/blog/2015/02/ipv6-security-myth-5-privacy-addresses-fix-everything/
>
> Excerpt from the link above regarding privacy extension from ISC
>
> In response to this privacy threat, “Privacy Extensions for Stateless Address Autoconfiguration in IPv6” were developed and are now published in RFC 4941. Ultimately the idea documented here is to generate “privacy addresses” (also known as “temporary addresses”) that change over time. Unpredictable and short-lived, these addresses are meant to combat the threat of your devices being identified and tracked as you use the Internet.
>
> Myth: Privacy Addresses Fix Everything!
> Reality: It’s Complicated
>
> The first thing to note about privacy addresses is that they are created in addition to, not in place of, your “regular” SLAAC address. This means that for the purposes of scanning and locating hosts, privacy addresses are of little help.
>
> Another issue that should be considered with regard to privacy addresses is their short-lived nature and its affect on troubleshooting and forensics. It is very hard for network administrators to manage a network full of devices constantly changing their source addresses. Setting up filters, looking back at logs, and many other regular tasks become much more difficult when you can’t predict what address a node will be using, nor guess which address it was using.
>
> The obvious solution to both of these challenges is to use a single, stable address that is not based on the interface’s MAC address. Replacing the EUI-64 based SLAAC address with a randomized one does reduce the ability for an attacker to target OUI patterns or other heuristics. Making the address stable (across reboots and network moves) makes filtering, troubleshooting, and forensics much more possible than with truly temporary addresses. Unfortunately, an unchanging address does not address the privacy concerns that prompted the creation of privacy addresses in the first place – unchanging IIDs can be used to identify and track a given device.
>
> A more recent solution to this is being called “Semantically Opaque Interface Identifiers” and a method for generating them is documented in RFC 7217:
>
> This document specifies a method to generate Interface Identifiers that are stable for each network interface within each subnet, but that change as a host moves from one network to another. Thus, this method enables keeping the “stability” properties of the Interface Identifiers specified in [RFC4291], while still mitigating address-scanning attacks and preventing correlation of the activities of a host as it moves from one network to another.
>
> Not bad! I do note that on-network correlation is still possible, since the addresses only change when moving from one network to another. But that is of course what makes the address easier to manage from a network administrator point of view. It should also be noted that a device could use privacy addresses for outbound communication and opaque addresses for inbound communication, possibly frustrating network admins but improving privacy.
>
> The alternative to all of this would be to use properly configured DHCPv6 instead of SLAAC on your networks. Just be sure to take into account all the risks of scanning mentioned in the last myth, and consider using privacy/temporary addresses with your DHCP implementation for user privacy.
>
>
> Sent from my iPhone
>
> On Jun 8, 2019, at 11:20 PM, Mark Smith <markzzzsmith@gmail.com> wrote:
>
> Hi Fred,
>
> On Sat, 8 Jun 2019 at 03:44, Templin (US), Fred L
> <Fred.L.Templin@boeing.com> wrote:
>
>
> Hi, we all know about the tussle regarding the /64 boundary for IPv6 prefixes but
>
>
> assuming that we will one day want to allow longer prefixes the question is “how long”?
>
>
>
>
>
> <snip>
>
>
>
> Because of RFC7934, we see the value of Host Address Availability Recommendations.
>
>
> It makes the point that, due to the nature of multi-addressing supported by IPv6, it
>
>
> would be useful for each node to be able to configure multiple (perhaps even many)
>
>
> IPv6 addresses from an IPv6 prefix. But, “how many”?
>
>
>
>
> My assertion is that a multi-addressed host (or, an End User Network router) should
>
>
> support numbering for at least 1K IPv6 addresses. This would imply that (assuming
>
>
> at some point the /64 boundary is relaxed) the longest IPv6 prefix should be a /118.
>
>
>
>
> I think we really need to work out what a host is first.
>
> Is it the physical device? Virtual hosts within a physical device?
> Individual applications? Threads or processes within applications?
>
>
> "On Many Addresses per Host", S. Bellovin
> https://tools.ietf.org/html/rfc1681
>
>
> "Transient Addressing for Related Processes: Improved Firewalling by
> Using IPV6 and Multiple Addresses per Host", Peter M. Gleitz, Steven
> M. Bellovin
> https://www.cs.columbia.edu/~smb/papers/tarp/tarp.html
>
>
> "node" is probably better to use to describe a network attached entity
> that needs one or more addresses to be able to send or receive
> packets.
>
> The number of addresses a node needs depends on what it is, what it is
> doing and how it is going to use its addresses. In some cases 1K would
> be excessive for a node, for others it could be far too little.
>
> As others have said, there can be other properties of addresses, such
> as privacy, security, and plug-and-play operation. As an example, the
> choice in 1980 of 48 bit Ethernet addresses, rather than just 10 bit
> addresses as originally required to suit a maximum of 1024 nodes on a
> link, has paid off immensely for nearly 40 years.
>
> "Too many" addresses for a node, to the point where the unit of
> allocation starts to cost something where the cost is worth worrying
> about, is a much better answer than not enough.
>
> I'd say that cost threshold is at /64 today (e.g. RFC 8273, "Unique
> IPv6 Prefix per Host"), also placing value on it being the minimum
> link allocation convention we've had for more than 20 years (since RFC
> 2373), and that there is more than approximately 3/4 of the total IPv6
> address space unallocated for any purpose at all.
>
>
> Regards,
> Mark.
>
>
>
>
>
>
>
>
>
>
>
> Thoughts?
>
>
>
>
> Fred
>
>
> --------------------------------------------------------------------
>
> IETF IPv6 working group mailing list
>
> ipv6@ietf.org
>
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
>
> --------------------------------------------------------------------
>
>
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------