Re: Giving up security & privacy when manually configuring addresses - rfc4291bis text (Re: draft-bourbaki-6man-classless-ipv6-00)

Nick Hilliard <nick@foobar.org> Thu, 08 June 2017 10:27 UTC

Return-Path: <nick@foobar.org>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E4F4512EA53 for <ipv6@ietfa.amsl.com>; Thu, 8 Jun 2017 03:27:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level:
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ypoGjh1_EKcI for <ipv6@ietfa.amsl.com>; Thu, 8 Jun 2017 03:27:22 -0700 (PDT)
Received: from mail.netability.ie (mail.netability.ie [IPv6:2a03:8900:0:100::5]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 66AA512E91F for <ipv6@ietf.org>; Thu, 8 Jun 2017 03:27:12 -0700 (PDT)
X-Envelope-To: ipv6@ietf.org
Received: from crumpet.local ([194.88.241.230]) (authenticated bits=0) by mail.netability.ie (8.15.2/8.15.2) with ESMTPSA id v58AR3mb005034 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 8 Jun 2017 11:27:04 +0100 (IST) (envelope-from nick@foobar.org)
X-Authentication-Warning: cheesecake.ibn.ie: Host [194.88.241.230] claimed to be crumpet.local
Message-ID: <59392678.1080000@foobar.org>
Date: Thu, 08 Jun 2017 11:27:04 +0100
From: Nick Hilliard <nick@foobar.org>
User-Agent: Postbox 5.0.14 (Macintosh/20170515)
MIME-Version: 1.0
To: Mark Smith <markzzzsmith@gmail.com>
CC: 6man WG <ipv6@ietf.org>
Subject: Re: Giving up security & privacy when manually configuring addresses - rfc4291bis text (Re: draft-bourbaki-6man-classless-ipv6-00)
References: <CAO42Z2ziUZnK+n2f9N_Xvb5TZBppApXgNSmDsRLxaT1_taLvFw@mail.gmail.com>
In-Reply-To: <CAO42Z2ziUZnK+n2f9N_Xvb5TZBppApXgNSmDsRLxaT1_taLvFw@mail.gmail.com>
X-Enigmail-Version: 1.2.3
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/_6OHVUrgVgLN3l0ihkcHTv-ftog>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 08 Jun 2017 10:27:24 -0000

Mark Smith wrote:
> Large addresses can be of value in infrastructure addressing too. If a
> network operator wants to significantly mitigate if not prevent an
> attack such as a BGP listener TCP SYN attack from the Internet, they
> can hide the router's interface address somewhere inside a /64 so that
> the attacker can't find it via unsolicited inbound probing.

this is a non argument and obscure addresses are of no value to network
operators:

1. most routers will answer traceroute probes, so it's trivial to find
out the address of a bgp-enabled router.

2. if you are serious about protecting infrastructure, you install
infrastructure ACLs which actually fix the problem.

Nick