Re: Next step for draft-ietf-6man-rfc6874bis

Bob Hinden <bob.hinden@gmail.com> Tue, 14 June 2022 15:08 UTC

Return-Path: <bob.hinden@gmail.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 94A09C15AAC2 for <ipv6@ietfa.amsl.com>; Tue, 14 Jun 2022 08:08:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.108
X-Spam-Level:
X-Spam-Status: No, score=-2.108 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fGK6PskzzNCc for <ipv6@ietfa.amsl.com>; Tue, 14 Jun 2022 08:08:56 -0700 (PDT)
Received: from mail-qk1-x734.google.com (mail-qk1-x734.google.com [IPv6:2607:f8b0:4864:20::734]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 158BFC15AAC1 for <ipv6@ietf.org>; Tue, 14 Jun 2022 08:08:56 -0700 (PDT)
Received: by mail-qk1-x734.google.com with SMTP id g15so5182219qke.4 for <ipv6@ietf.org>; Tue, 14 Jun 2022 08:08:56 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=mime-version:subject:from:in-reply-to:date:cc:message-id:references :to; bh=KM6OvZ6LJjP8JhJ7s9N70iZM0Arjd+B+VOSKx5lxWBY=; b=Q0h58RRZaneM7Tuk7DEWa12TCUkxE3SgFgN5o0AEEXfMw8L0W9gjiXHLi5KX01wiJR 8F8DABgv10ToOa2Qzm7f6nS9MlZXlpwGvy812swB/vi0Zd9rqh5nXzDZjPdWAkOLEaO+ M7Hzeh/Gfj2dhNTS2DoaDamTCKyz6/X5vtajLneo7rjeFRJtudgVTI+Ym38EoUyu+3eB 2r7u61wnewh8eHFkRwNlcbstF4BiuTEui/cosnsne0NHpO4EDg7+Mh0kROcwBI7LY2tj KQsLMAldx46p8vDJmyEho7Ckge4YLx0rDcqGZyVkmCPHNS8RiXBUh6vwgkhzMvdRdZ5U rq2g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :message-id:references:to; bh=KM6OvZ6LJjP8JhJ7s9N70iZM0Arjd+B+VOSKx5lxWBY=; b=gNojt0LeQpYwZImq4s/zTJbbg0/jzsAQisym1E03NGkJcb4zSOVyKkleuLMEfcxA1T JGhbKhGgkyXcgJpgUlJEvnObyTjYxViMt+d7D9wRtRBe1h0tlWQCtfJW+TxETJqxWbvx RWDK2GqvOxS7LP9Jw7LoZOg6lvYLAk49GpqPNN4dBLzg+oK3tlAJ89vYIciKglICL0oL LDpPraPLHZvbQghSSNWw8ngP2REseKyZxfBOwxdmUY3WIPsLkRU2hCgAFEEGvKqvsdsp +otTjoPSxU1TS0a5y+UBt1zDYRAu/Qb3Bj9Sz/XNL5Olvt3bcnLmej468G59pHP1cwIH Q0IQ==
X-Gm-Message-State: AOAM530dLEXir9MQFK0Xk1iYQ1IfYc5013B8RCzxc4lTqlvLTrV6NpqS dkSfp/hoIqQLXUPRf7RHv4XCP1BswqeWAA==
X-Google-Smtp-Source: ABdhPJxhJJaJpfEFTDDGQTGNFVwuB5fOxZD5SUBjUvGX42y4rdHGQMD8aSlHr71ofQUwJu052BIzGQ==
X-Received: by 2002:a05:620a:1a98:b0:6a5:cdb:a918 with SMTP id bl24-20020a05620a1a9800b006a50cdba918mr4313594qkb.532.1655219334745; Tue, 14 Jun 2022 08:08:54 -0700 (PDT)
Received: from smtpclient.apple ([2600:1700:4383:c05f:a4a0:d98a:cbcd:b237]) by smtp.gmail.com with ESMTPSA id k4-20020a05620a414400b006a743b360bcsm10149367qko.136.2022.06.14.08.08.53 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Tue, 14 Jun 2022 08:08:54 -0700 (PDT)
Content-Type: multipart/signed; boundary="Apple-Mail=_A25C34E6-F686-4397-BE52-E6C1D18DCCA7"; protocol="application/pgp-signature"; micalg="pgp-sha512"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3696.100.31\))
Subject: Re: Next step for draft-ietf-6man-rfc6874bis
From: Bob Hinden <bob.hinden@gmail.com>
In-Reply-To: <5BEFA97B-CF09-44D7-8C10-017FEAE4C3A8@tiesel.net>
Date: Tue, 14 Jun 2022 08:08:52 -0700
Cc: Bob Hinden <bob.hinden@gmail.com>, Brian Carpenter <brian.e.carpenter@gmail.com>, IPv6 List <ipv6@ietf.org>, Stuart Cheshire <cheshire@apple.com>
Message-Id: <FA5480B0-C817-4253-8F69-F010825F69AB@gmail.com>
References: <164938402532.17740.11717866110301931501@ietfa.amsl.com> <b1780128-2069-b32e-7ca5-86977c119f0c@gmail.com> <11d4e419-11a9-8768-abf2-1335e5f1c3d8@gmail.com> <149924f9-da30-fa79-0509-c01c439d1796@gmail.com> <5BEFA97B-CF09-44D7-8C10-017FEAE4C3A8@tiesel.net>
To: "Philipp S. Tiesel" <philipp@tiesel.net>
X-Mailer: Apple Mail (2.3696.100.31)
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/TWH9sLOybnm1mgIkjjsvgA8SkJU>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 14 Jun 2022 15:08:59 -0000

Philipp,

Thanks for your comments on the draft.

Please note that Brian has requested a w.g. last call, there is not an active w.g. last call at this point in time.

Bob


> On Jun 14, 2022, at 6:54 AM, Philipp S. Tiesel <philipp@tiesel.net> wrote:
> 
> Dear authors and WG,
> 
> based on this WG last call, I reviewed the document. Overall, it is well written and mostly ready to publish,
> but I have a) one issue with the Security considerations section and b) a possibly stupid question on usefulness in web context:
> 
> a) The Security Considerations Section states:
>>   It is conceivable that this format could be misused to probe a local
>>   network configuration in some way.  However, that would only be
>>   possible for an attacker that had already gained sufficient control
>>   of a host to originate HTTP messages.  Such an attacker could more
>>   easily probe using basic mechanisms such as the "ping" command.
>   Is this true? What prevents an attack from embedding scoped IPv6 addresses in HTML documents, e.g., as part of an AD.
>   While the security model of the browser/device should prevent abusing it from taking action REST calls to your home router, including a well-known image from such a device should be possible and could be used to verify an identity by linking to the EUI64 address of your home router and verifying the image was loaded. This is far easier than “pinging” the router.
> 
> b) Assuming a device has only link-local connectivity and a web interface, is there a way to reference “same interface as used for this connection”? If not, such a web interface could only use relative links and things like re-direction to https will become hard.
> 
> AVE!
>  Philipp
> 
>> On 11. Jun 2022, at 03:56, Brian E Carpenter <brian.e.carpenter@gmail.com> wrote:
>> 
>> Dear 6man-chairs (especially Jen),
>> 
>> The authors believe that this draft is now stable and we request a WG Last Call. It would be nice to get this done before the IETF meeting.
>> 
>> Regards
>>  Brian Carpenter
>> 
>> On 19-May-22 12:52, Brian E Carpenter wrote:
>>> There's been no more discussion for several weeks. Can we move
>>> on to a WG Last Call?
>>> Regards
>>>    Brian Carpenter
>>> On 08-Apr-22 14:29, Brian E Carpenter wrote:
>>>> Hi,
>>>> 
>>>> This version reflects comments at the IETF and on the list.
>>>> Change log:
>>>> * Extended use cases (added Microsoft WSD)
>>>> * Clarified relationship with RFC3986 language
>>>> * Allow for legacy use of RFC6874 format
>>>> * Augmented security considerations
>>>> * Editorial and reference improvements
>>>> 
>>>> Note that some of the text about RFC3986 that Shang Ye
>>>> suggested to remove has been retained, but modified. Further
>>>> comments about this, or any other aspect, are very welcome.
>>>> 
>>>> Regards
>>>>     Brian + co-authors
>>>> 
>>>> On 08-Apr-22 14:13, internet-drafts@ietf.org wrote:
>>>>> 
>>>>> A New Internet-Draft is available from the on-line Internet-Drafts directories.
>>>>> This draft is a work item of the IPv6 Maintenance WG of the IETF.
>>>>> 
>>>>>          Title           : Representing IPv6 Zone Identifiers in Address Literals and Uniform Resource Identifiers
>>>>>          Authors         : Brian Carpenter
>>>>>                            Stuart Cheshire
>>>>>                            Robert M. Hinden
>>>>> 	Filename        : draft-ietf-6man-rfc6874bis-01.txt
>>>>> 	Pages           : 13
>>>>> 	Date            : 2022-04-07
>>>>> 
>>>>> Abstract:
>>>>>     This document describes how the zone identifier of an IPv6 scoped
>>>>>     address, defined as <zone_id> in the IPv6 Scoped Address Architecture
>>>>>     (RFC 4007), can be represented in a literal IPv6 address and in a
>>>>>     Uniform Resource Identifier that includes such a literal address.  It
>>>>>     updates the URI Generic Syntax and Internationalized Resource
>>>>>     Identifier specifications (RFC 3986, RFC 3987) accordingly, and
>>>>>     obsoletes RFC 6874.
>>>>> 
>>>>> 
>>>>> The IETF datatracker status page for this draft is:
>>>>> https://datatracker.ietf.org/doc/draft-ietf-6man-rfc6874bis/
>>>>> 
>>>>> There is also an HTML version available at:
>>>>> https://www.ietf.org/archive/id/draft-ietf-6man-rfc6874bis-01.html
>>>>> 
>>>>> A diff from the previous version is available at:
>>>>> https://www.ietf.org/rfcdiff?url2=draft-ietf-6man-rfc6874bis-01
>>>>> 
>>>>> 
>>>>> Internet-Drafts are also available by rsync at rsync.ietf.org::internet-drafts
>>>>> 
>>>>> 
>>>>> _______________________________________________
>>>>> I-D-Announce mailing list
>>>>> I-D-Announce@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/i-d-announce
>>>>> Internet-Draft directories: http://www.ietf.org/shadow.html
>>>>> or ftp://ftp.ietf.org/ietf/1shadow-sites.txt
>>>>> 
>> 
>> --------------------------------------------------------------------
>> IETF IPv6 working group mailing list
>> ipv6@ietf.org
>> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
>> --------------------------------------------------------------------
>> 
> 
> --
> Philipp S. Tiesel
> https://philipp.tiesel.net/
>