Re: default-iids ready for WGLC? (Re: I-D Action: draft-ietf-6man-default-iids-10.txt)

Fernando Gont <fgont@si6networks.com> Thu, 17 March 2016 15:32 UTC

Return-Path: <fgont@si6networks.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B5C2312D98D for <ipv6@ietfa.amsl.com>; Thu, 17 Mar 2016 08:32:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1Shcd_jJsAZB for <ipv6@ietfa.amsl.com>; Thu, 17 Mar 2016 08:32:03 -0700 (PDT)
Received: from fgont.go6lab.si (fgont.go6lab.si [IPv6:2001:67c:27e4::14]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7A0D712D924 for <ipv6@ietf.org>; Thu, 17 Mar 2016 08:32:01 -0700 (PDT)
Received: from [172.20.15.144] (port-213-160-6-163.static.qsc.de [213.160.6.163]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by fgont.go6lab.si (Postfix) with ESMTPSA id 918E3802A4; Thu, 17 Mar 2016 16:31:58 +0100 (CET)
Subject: Re: default-iids ready for WGLC? (Re: I-D Action: draft-ietf-6man-default-iids-10.txt)
To: Lorenzo Colitti <lorenzo@google.com>
References: <20160217110334.12586.6254.idtracker@ietfa.amsl.com> <56C454F3.30003@si6networks.com> <CAKD1Yr2=vK8_txebpUQD1=Ha1aLoBLqMb3HQpvum1js4ODbQGQ@mail.gmail.com>
From: Fernando Gont <fgont@si6networks.com>
X-Enigmail-Draft-Status: N1110
Message-ID: <56EACDE3.3020708@si6networks.com>
Date: Thu, 17 Mar 2016 12:31:47 -0300
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.6.0
MIME-Version: 1.0
In-Reply-To: <CAKD1Yr2=vK8_txebpUQD1=Ha1aLoBLqMb3HQpvum1js4ODbQGQ@mail.gmail.com>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/ipv6/NV2lfUUO7LTX0J3-kgVcuFQNo98>
Cc: "6man-chairs@tools.ietf.org" <6man-chairs@tools.ietf.org>, "draft-ietf-6man-default-iids@tools.ietf.org" <draft-ietf-6man-default-iids@tools.ietf.org>, IETF IPv6 Mailing List <ipv6@ietf.org>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 17 Mar 2016 15:32:05 -0000

On 03/17/2016 10:19 AM, Lorenzo Colitti wrote:
> On Wed, Feb 17, 2016 at 8:09 PM, Fernando Gont <fgont@si6networks.com
> <mailto:fgont@si6networks.com>> wrote:
> 
>     This rev addresses the feedback received on-list, mostly y Alex, Brian,
>     and Ray.
> 
>     I personally think that this one should be ready for WGLC.
> 
> 
> I have various objections to this document.
> 
> First: I don't see why the document require that the link layers MUST
> provide stable identifiers. What if a link layer or a host does not want
> a stable identifier? What about privacy threats?

Are you are arguing in favor of RFC4941-only, o what?



> I do not support the recommendation to use RFC7217 because doing so
> creates a false sense of security.

So... fixing a bug/hole creates a false sense of security?



> RFC 7217 and similar schemes provide
> protection against some threats but not others. Randomizing the
> link-layer provides much better protection, and is what other parts of
> the IETF are moving towards - see for example
> draft-ietf-dhc-anonymity-profile, which pretty much takes MAC address
> randomization as a given.

MAC address randomization is going to break many of the security
controls currently employed. -- including simple captive portals that
allow connectivity based on your MAC address.

Besides, many devices may not even be capable of doing MAC address
randomization.

Besides, MAC addresses are IEEE's turf, not IETF's. And, the logic of
keeping some vulnerable part blaming the layer bellow is simply flawed.

The traditional SLAAC addresses have security and privacy implications,
as explained in RFC7721, and it's our job to address them.


> In various places, the document talks about "the interface identifier".
> This does not match reality because most IPv6 hosts have more than one
> IPv6 address formed using more than one IID.

"the interface identifier [of the ipv6 address in question]".



> I don't see how it's useful or constructive to suddenly declare billions
> of implementations no longer compliant with specs that have been current
> for nearly 20 years (e.g., RFC2464 is from 1998).

Firstly, some implementations that have cared about sec/priv have been
"non-compliant" for years.

Secondly, an update obviously means that implementations need to be
updated to comply with the newly published specs. Otherwise the new spe
would be a noop, and we wouldn't be publishing it, right?



> Instead of a sweeping update to lots of IPv6-over-foo documents, I'd
> much rather see a best current practice that suggests that hosts do
> something sane to address this sort of threat. "Something sane" should
> probably be MAC address randomization, but could also be
> RFC7217+RFC4941, etc.

Embedding the MAC address in the IID is part of such specs. Obviously,
if we want that to change, we need to update them.

Besides, what we're saying here is that the traditional SLAAC addresses
should be replaced with RFC7217. Use of RFC4941 is orthogonal.

-- 
Fernando Gont
SI6 Networks
e-mail: fgont@si6networks.com
PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492