Re: [Fwd: I-D Action: draft-carpenter-6man-why64-00.txt]

Alexandru Petrescu <alexandru.petrescu@gmail.com> Wed, 08 January 2014 16:08 UTC

Return-Path: <alexandru.petrescu@gmail.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3BD251ADF8C for <ipv6@ietfa.amsl.com>; Wed, 8 Jan 2014 08:08:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.983
X-Spam-Level:
X-Spam-Status: No, score=-4.983 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_ADSP_CUSTOM_MED=0.001, FREEMAIL_FROM=0.001, HELO_EQ_FR=0.35, NML_ADSP_CUSTOM_MED=0.9, RCVD_IN_DNSWL_HI=-5, SPF_SOFTFAIL=0.665] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4TarNMQ5riNA for <ipv6@ietfa.amsl.com>; Wed, 8 Jan 2014 08:08:53 -0800 (PST)
Received: from oxalide-out.extra.cea.fr (oxalide-out.extra.cea.fr [132.168.224.8]) by ietfa.amsl.com (Postfix) with ESMTP id 319261AD68A for <ipv6@ietf.org>; Wed, 8 Jan 2014 08:08:53 -0800 (PST)
Received: from pisaure.intra.cea.fr (pisaure.intra.cea.fr [132.166.88.21]) by oxalide.extra.cea.fr (8.14.2/8.14.2/CEAnet-Internet-out-2.3) with ESMTP id s08G8dlp004803; Wed, 8 Jan 2014 17:08:39 +0100
Received: from pisaure.intra.cea.fr (localhost [127.0.0.1]) by localhost (Postfix) with SMTP id 1F24820641A; Wed, 8 Jan 2014 17:09:39 +0100 (CET)
Received: from muguet2.intra.cea.fr (muguet2.intra.cea.fr [132.166.192.7]) by pisaure.intra.cea.fr (Postfix) with ESMTP id 11581206319; Wed, 8 Jan 2014 17:09:39 +0100 (CET)
Received: from [127.0.0.1] (is010446-4.intra.cea.fr [10.8.33.116]) by muguet2.intra.cea.fr (8.13.8/8.13.8/CEAnet-Intranet-out-1.2) with ESMTP id s08G8ZZ9017745; Wed, 8 Jan 2014 17:08:39 +0100
Message-ID: <52CD7803.5050008@gmail.com>
Date: Wed, 08 Jan 2014 17:08:35 +0100
From: Alexandru Petrescu <alexandru.petrescu@gmail.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:24.0) Gecko/20100101 Thunderbird/24.2.0
MIME-Version: 1.0
To: Ray Hunter <v6ops@globis.net>, Brian E Carpenter <brian.e.carpenter@gmail.com>
Subject: Re: [Fwd: I-D Action: draft-carpenter-6man-why64-00.txt]
References: <52C9D788.8060606@gmail.com> <52CBE0E6.5020107@globis.net>
In-Reply-To: <52CBE0E6.5020107@globis.net>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 8bit
Cc: 6man <ipv6@ietf.org>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 Jan 2014 16:08:55 -0000

Le 07/01/2014 12:11, Ray Hunter a écrit :
[...]
> It should be perfectly feasible to allocate a /64 to a router interface
> in an IPAM tool, but then configure the equivalent of n prefixes each
> containing 1 or 2 address with prefix length /128 or /127 (depending on
> the implementation)

Would these hosts use some form of address auto-configuration?

But yes, I agree with the point that this should be possible.

[...]
> Anyway, in the majority of modern day wired deployments, the delta cost
> of L3 over L2 is minimal, as the most dominant form of wired LAN
> (Ethernet) are commonly switched in silicon, and multicast has to be
> emulated. Wired Ethernet has in effect become a point to point protocol.
> So deploying a dedicated L3 connection per end host is both technically
> and financially feasible, and may have significant operational benefits
> in certain scenarios. Allocating a /64 for each such port on a L3 switch
> is sub optimal IMHO. And by the same privacy argument, allocating n
> hosts sparsely over a single /64 of address space spread over multiple
> L3 interfaces would have the same net effect for off-net attackers as n
> hosts sharing a flat L2 LAN using a single /64, with the added advantage
> that even locally the individual end nodes would not be able to
> passively observe each other's traffic or addresses (advantageous in
> shared hosting environments).

I agree that with large switches and VLANs often the links look very 
much as point to point links.

> An attacker that happens to discover the address of node A would not
> find this information helpful in attempts to locate node B, any more
> than if it were a flat /64.
>
> So to me it's a non-relevant argument one way or the other.
>
> Section 2.2
>
> It may not be a widely held belief, but I remain concerned about the
> potential for resource exhaustion for any number of processes due to the
> "massive over sizing" of prefixes to /64: any number of untested
> processes that track state based on /128 IPv6 address could be attacked.

Right.

Alex

> The flip side of expanding privacy through address obfuscation at IID
> level is that the source space available for attacks also increases. ND
> cache exhaustion is probably just the first issue we've discovered of
> many that exist. This may have knock on operational consequences, which
> in the IPv4 world have relied on the scarcity of IPv4 address space to
> be able to operate correctly under stress scenarios. We're going to
> discover who has been swimming naked when the tide goes out. Call that
> FUD, or operational expediency, whichever you like. BCP38 has saved me
> on a number of occasions when all else has failed.
>
>