Re: Stephen Farrell's Discuss on draft-ietf-6man-stable-privacy-addresses-16: (with DISCUSS and COMMENT)

Stephen Farrell <stephen.farrell@cs.tcd.ie> Tue, 21 January 2014 18:12 UTC

Return-Path: <stephen.farrell@cs.tcd.ie>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DB2961A011D; Tue, 21 Jan 2014 10:12:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.435
X-Spam-Level:
X-Spam-Status: No, score=-2.435 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.535] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nSzxwfwo69KF; Tue, 21 Jan 2014 10:12:04 -0800 (PST)
Received: from mercury.scss.tcd.ie (mercury.scss.tcd.ie [134.226.56.6]) by ietfa.amsl.com (Postfix) with ESMTP id 0725A1A00C8; Tue, 21 Jan 2014 10:12:04 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mercury.scss.tcd.ie (Postfix) with ESMTP id 3F8F3BE2F; Tue, 21 Jan 2014 18:12:03 +0000 (GMT)
Received: from mercury.scss.tcd.ie ([127.0.0.1]) by localhost (mercury.scss.tcd.ie [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dHtusXzW8mtF; Tue, 21 Jan 2014 18:12:03 +0000 (GMT)
Received: from [134.226.36.180] (stephen-think.dsg.cs.tcd.ie [134.226.36.180]) by mercury.scss.tcd.ie (Postfix) with ESMTPSA id E17DFBE1C; Tue, 21 Jan 2014 18:12:02 +0000 (GMT)
Message-ID: <52DEB873.1080500@cs.tcd.ie>
Date: Tue, 21 Jan 2014 18:12:03 +0000
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Thunderbird/24.2.0
MIME-Version: 1.0
To: Simon Perreault <simon.perreault@viagenie.ca>, Fernando Gont <fgont@si6networks.com>, The IESG <iesg@ietf.org>
Subject: Re: Stephen Farrell's Discuss on draft-ietf-6man-stable-privacy-addresses-16: (with DISCUSS and COMMENT)
References: <20140121155253.23475.70004.idtracker@ietfa.amsl.com> <52DE9E63.5050404@si6networks.com> <52DEA496.9000000@viagenie.ca>
In-Reply-To: <52DEA496.9000000@viagenie.ca>
X-Enigmail-Version: 1.6
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 8bit
Cc: 6man-chairs@tools.ietf.org, ipv6@ietf.org, Lloyd Wood <L.Wood@surrey.ac.uk>, draft-ietf-6man-stable-privacy-addresses@tools.ietf.org
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 21 Jan 2014 18:12:08 -0000

On 01/21/2014 04:47 PM, Simon Perreault wrote:
> It said "DISCUSS" at the top, so I'll do just that...
> 
> Le 2014-01-21 11:20, Fernando Gont a écrit :
>> On 01/21/2014 12:52 PM, Stephen Farrell wrote:
>>> (1) Section 5: Why mention only MD5 and SHA1? Why not
>>> HMAC-SHA256?
>>
>> They are just examples. I guess we could add HMAC-SHA256, too. I have no
>> objections to that.
> 
> On all the platforms I know there would be no practical reason to pick
> MD5. Something better is always available and just as easy to use. I
> don't want new code to use MD5 "because it was given as an example in
> the RFC". Removing MD5 from the examples list would make me happy.

Right - give good examples and don't give bad ones is the
easy fix. HMAC-SHA1 and HMAC-SHA256 would be good ones to
give. (And if you have sha1 then you can easily use HMAC-SHA1.)

>>> (2) Why might a sys admin want to display the
>>> secret key?
>>
>> e.g., you want a replacement system to generate the same addresses.
> 
> Good reason IMHO.

Was that mentioned in the requirements? Seems a little less
likely but I guess it could be one.

If keeping it, I'd say give the example and then add a
security consideration that that interface might be
vulnerable (e.g. 'cat /proc/net/eth0/rfcxxx-secret'
doesn't give me a nice warm security fuzzy feeling:-)
and needs to be protected.

Another easy fix if needed. (Apologies if that's there
already and I missed it.)

S.



> 
> Simon