Re: [Fwd: I-D Action: draft-carpenter-6man-why64-00.txt]

Alexandru Petrescu <alexandru.petrescu@gmail.com> Fri, 10 January 2014 08:54 UTC

Return-Path: <alexandru.petrescu@gmail.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 976A91ACCEC for <ipv6@ietfa.amsl.com>; Fri, 10 Jan 2014 00:54:08 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.983
X-Spam-Level:
X-Spam-Status: No, score=-4.983 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_ADSP_CUSTOM_MED=0.001, FREEMAIL_FROM=0.001, HELO_EQ_FR=0.35, NML_ADSP_CUSTOM_MED=0.9, RCVD_IN_DNSWL_HI=-5, SPF_SOFTFAIL=0.665] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id v4GVGq6vWTTJ for <ipv6@ietfa.amsl.com>; Fri, 10 Jan 2014 00:54:06 -0800 (PST)
Received: from sainfoin-out.extra.cea.fr (sainfoin-out.extra.cea.fr [132.167.192.145]) by ietfa.amsl.com (Postfix) with ESMTP id 0150A1A9313 for <ipv6@ietf.org>; Fri, 10 Jan 2014 00:54:05 -0800 (PST)
Received: from pisaure.intra.cea.fr (pisaure.intra.cea.fr [132.166.88.21]) by sainfoin.extra.cea.fr (8.14.2/8.14.2/CEAnet-Internet-out-2.3) with ESMTP id s0A8rtZj026079 for <ipv6@ietf.org>; Fri, 10 Jan 2014 09:53:55 +0100
Received: from pisaure.intra.cea.fr (localhost [127.0.0.1]) by localhost (Postfix) with SMTP id CA61020324C for <ipv6@ietf.org>; Fri, 10 Jan 2014 09:54:57 +0100 (CET)
Received: from muguet2.intra.cea.fr (muguet2.intra.cea.fr [132.166.192.7]) by pisaure.intra.cea.fr (Postfix) with ESMTP id C0C70202091 for <ipv6@ietf.org>; Fri, 10 Jan 2014 09:54:57 +0100 (CET)
Received: from [127.0.0.1] (is010446-4.intra.cea.fr [10.8.33.116]) by muguet2.intra.cea.fr (8.13.8/8.13.8/CEAnet-Intranet-out-1.2) with ESMTP id s0A8rocn005415 for <ipv6@ietf.org>; Fri, 10 Jan 2014 09:53:55 +0100
Message-ID: <52CFB51E.60501@gmail.com>
Date: Fri, 10 Jan 2014 09:53:50 +0100
From: Alexandru Petrescu <alexandru.petrescu@gmail.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:24.0) Gecko/20100101 Thunderbird/24.2.0
MIME-Version: 1.0
To: ipv6@ietf.org
Subject: Re: [Fwd: I-D Action: draft-carpenter-6man-why64-00.txt]
References: <52C9D788.8060606@gmail.com> <F0C49F28-42D5-49CD-AF4E-DFE65CF8B911@sekil.fr>
In-Reply-To: <F0C49F28-42D5-49CD-AF4E-DFE65CF8B911@sekil.fr>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 8bit
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 10 Jan 2014 08:54:08 -0000

Hello,

Thanks for the post.

I could understand the need to spam block an entire /64 instead (a
single line in a configuration file) rathern than 2^64 lines each
telling an address in that file.

Yes, this is relevant when writing other firewalling rules as well.

In this sense it is good to have an 'overall' number - like a /64 - to
designate one particular link and subnet.

And one may like to use other such overall numbers such as a /65 or a
/63 to designate these links.

And yes, the privacy extensions RFC4941 makes that attacker may use that
overall number /64 to generate addresses, and defender may need to use
same number /64 to comfortably protect against it.  A smarter attacker
would use a /63 and a smarter defender too.

Alex

Le 09/01/2014 18:51, Emmanuel Thierry a écrit :
> Hello,
>
> (first message on these lists, hope it is accurate)
>
> I'm generally thinking that the /64 limit helps to structure the
> address space from the receiver point of view. Let's say i'm running
> a mail server which tries to reduce spam by temporarily blacklisting
> some senders. if i'm facing spammers who use their IPv6 address
> space in a smart way, they will just have to generate RFC 4941
> addresses to exhaust a firewall memory. The pragmatic way to face
> such attacks is to blacklist the whole /64, never a unique /128.
>
> I don't know if it is to be considered as a best practice, but for
> these reasons, as a receiver, i personally consider a /64 to be
> assigned to a unique link, or at least a network managed by a unique
> network administrator. Enforcing this limit in protocol standards
> strengthen this assumption. This might be an additional argument for
> the "please keep /64 for unique links".
>
> As a consequence, subdivide a /64 into several prefixes in order to
> assign it on several networks might create a risk for devices on one
> network to be blacklisted by actions performed by some devices on
> another network, in case the whole /64 have been blacklist by a
> "pragmatic" receiver.
>
> Best regards Emmanuel Thierry
>
> Le 5 janv. 2014 à 23:07, Brian E Carpenter a écrit :
>
>> Hi,
>>
>> A group of us put this together following a discussion some weeks
>> ago on the v6ops list about the 64-bit boundary in IPv6 addresses.
>>  Discussion belongs in 6man, please.
>>
>> This draft is incomplete but we'd welcome input. Let me underline
>> an important comment in the introduction:
>>
>> _The purpose of this document is to analyse the issues around this
>>  question.  We make no proposal for change, but we do analyse the
>> possible effects of a change._
>>
>>
>> Brian + co-authors
>>
>> -------- Original Message -------- Subject: I-D Action:
>> draft-carpenter-6man-why64-00.txt Date: Sun, 05 Jan 2014 13:59:17
>> -0800 From: internet-drafts@ietf.org Reply-To:
>> internet-drafts@ietf.org To: i-d-announce@ietf.org
>>
>>
>> A New Internet-Draft is available from the on-line Internet-Drafts
>> directories.
>>
>>
>> Title           : Analysis of the 64-bit Boundary in IPv6
>> Addressing Authors         : Brian Carpenter Tim Chown Fernando
>> Gont Sheng Jiang Alexandru Petrescu Andrew Yourtchenko Filename :
>> draft-carpenter-6man-why64-00.txt Pages           : 14 Date :
>> 2014-01-05
>>
>> Abstract: The IPv6 unicast addressing format includes a separation
>> between the prefix used to route packets to a subnet and the
>> interface identifier used to specify a given interface connected
>> to that subnet. Historically the interface identifier has been
>> defined as 64 bits long, leaving 64 bits for the prefix.  This
>> document discusses the reasons for this fixed boundary and the
>> issues involved in treating it as a variable boundary.
>>
>>
>> The IETF datatracker status page for this draft is:
>> https://datatracker.ietf.org/doc/draft-carpenter-6man-why64/
>>
>> There's also a htmlized version available at:
>> http://tools.ietf.org/html/draft-carpenter-6man-why64-00
>>
>>
>>
>>
>>
>>
>>
>>
>>
>> --------------------------------------------------------------------
>>
>>
>>
IETF IPv6 working group mailing list
>> ipv6@ietf.org Administrative Requests:
>> https://www.ietf.org/mailman/listinfo/ipv6
>> --------------------------------------------------------------------
>
>>
>>
> --------------------------------------------------------------------
>  IETF IPv6 working group mailing list ipv6@ietf.org Administrative
> Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------
>
>