Re: Confirmation to advance: draft-ietf-6man-ipv6only-flag-05

Brian E Carpenter <brian.e.carpenter@gmail.com> Fri, 03 May 2019 20:15 UTC

Return-Path: <brian.e.carpenter@gmail.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 64E2F1200F8 for <ipv6@ietfa.amsl.com>; Fri, 3 May 2019 13:15:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rWewtGHJbu8V for <ipv6@ietfa.amsl.com>; Fri, 3 May 2019 13:15:27 -0700 (PDT)
Received: from mail-pf1-x42d.google.com (mail-pf1-x42d.google.com [IPv6:2607:f8b0:4864:20::42d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F0BBF120052 for <ipv6@ietf.org>; Fri, 3 May 2019 13:15:26 -0700 (PDT)
Received: by mail-pf1-x42d.google.com with SMTP id z26so3410467pfg.6 for <ipv6@ietf.org>; Fri, 03 May 2019 13:15:26 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=ZMsO+9fTqw/JSfJlBosziqVNhRYV7nDR8qh/SIaZMqQ=; b=XYPIHpsE3akUaxO7zm/9Az78Op+6+MqdvPnQni/cfCUpfqUPzi3K8FtDM5NSFtMvls M+Ul7yklzcTEt0I6iGuQ3LKSxaKb+SEQuVcBdULs+UD3043xtF8IQOKVhmjyFGgMjI/C v0K40G1Mz9YcHYQxQpzrZFpJB5ZAVYJhdj1dvwIEYO5SjrJbidqJrngK0gjTwt4KTGU1 l0YnC/IUgIVrL6Zqnl1Z3169+2D7zxuLLA3jaJIH3QQjIS0fHuIupZk9u06cXtd1RaCq oBy1uQD/GAaeNcz2EVb92tR07Qcn8i+Jxtsss+PdaDU9HCZ9fIf3G4McQMn91JVgP8zv dMrw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=ZMsO+9fTqw/JSfJlBosziqVNhRYV7nDR8qh/SIaZMqQ=; b=CW/xYtGu/Ym2+WJ8F2H5eNV3wte3i8KUJPym2gg17aSZCyySjzjS4gFnepoFrQzdgT fGpToEgkyuHBEHoec4fFYdtwzhed4Kqdjr32IAwzr5bP7yBx/YOWF3gNyVMJ+2Q4vUG+ 1MoNI0LQl0RQ/YixF3lr2YKY+mx9sdIvHc7351pTwvGOT60RqOYxVNz7Ka4NAqyrQx2n 6vIHESo45gwN6Dc+nuMeCqFnVREQyeJrszwyHvNPD8B8S8SJDlsiSsqlGRuDcHo2QApO jHJxPHRpNDJphnVs/RrLu23KnwMSp/H+SlRvv2xFZWhiY9mjCyPzybtmcGoCpxx6rOlk Bi3g==
X-Gm-Message-State: APjAAAVxIVn7jf/yZhWfo2wUq+iN27cHKpZYmgzUnYl6LDn0VOxQG6di GTLdaWL6+7PgQZN8Rmzk1rVij2Xv
X-Google-Smtp-Source: APXvYqyOfiTyLVsR6/YI98Gh8rEi6ijL/fo0ybjEt3wKsdG2Gs3FDyVbVIt7lzgrNhtCzjeqUaFV4A==
X-Received: by 2002:a62:479b:: with SMTP id p27mr14145118pfi.111.1556914526046; Fri, 03 May 2019 13:15:26 -0700 (PDT)
Received: from [192.168.178.30] ([118.148.72.205]) by smtp.gmail.com with ESMTPSA id q128sm4137135pfb.164.2019.05.03.13.15.23 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 03 May 2019 13:15:25 -0700 (PDT)
Subject: Re: Confirmation to advance: draft-ietf-6man-ipv6only-flag-05
To: Gyan Mishra <hayabusagsm@gmail.com>
Cc: Nick Hilliard <nick@foobar.org>, 6man WG <ipv6@ietf.org>
References: <F8BFFCAD-E58E-4736-8A1C-56579B6F6032@employees.org> <a2465e81-a17f-ab48-efda-20fe12a70077@foobar.org> <30239E0C-C444-4A7E-8342-AEE47BF8A2BB@employees.org> <8b9fd743-bfcc-525c-98f6-154f3fa713cc@foobar.org> <CAO42Z2zEWvt9NyemMb8H0AEvPvmNSDGa4wcXiS6n5yRxNFCHQg@mail.gmail.com> <c7e18765-be04-6494-8193-984dbccb520b@foobar.org> <CANMZLAYh+V57yrWOzmUyjSMK0g95u1D5_GZmyZBMOMKAZnrnCg@mail.gmail.com> <3F474511-6FE3-4A0A-9B84-7C37F08FBB5D@steffann.nl> <E352C226-C708-4418-BCDE-10525CAB109A@jisc.ac.uk> <652fb10e-b8ce-0151-a9a0-62d2378caed2@gmail.com> <0079c716-d56c-7199-f493-f5e56e1307ae@foobar.org> <b33de303-eaca-f7f6-804e-2c9343eb92a1@gmail.com> <6C4ABEF1-2565-4BA9-9FC5-5B3C45A719AD@gmail.com> <8750C633-C2AF-48B2-A96D-1A571B55613E@gmail.com>
From: Brian E Carpenter <brian.e.carpenter@gmail.com>
Message-ID: <1a255a35-4909-3adf-13df-eec7c825bf11@gmail.com>
Date: Sat, 04 May 2019 08:15:23 +1200
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.6.1
MIME-Version: 1.0
In-Reply-To: <8750C633-C2AF-48B2-A96D-1A571B55613E@gmail.com>
Content-Type: text/plain; charset="utf-8"
Content-Language: en-US
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/_KLkhXOaXZSuJUPa6Z3AZ_kAfNY>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 May 2019 20:15:30 -0000

I don't expect to see Send in widespread use anytime soon, but again it's irrelevant. That's a general defence against a wide range of malicious attacks, all of which are easier than attacking the ipv6only flag.

Regards
   Brian

On 04-May-19 04:25, Gyan Mishra wrote:
> 
> I forgot to mention that Send RFC 3971 is now being supported after a long time by routers but for the endpoint OS support may be a a lot further off and no roadmap to support like Microsoft the last I heard does not plan to support which is a major player with desktop OS and not sure about Linux and I am not sure about  Google Chromebooks and other desktop flavors.
> 
> Really all desktop OSs would have to support Send for this to be even viable from a security standpoint.
> 
> Gyan
> 
> Sent from my iPhone
> 
>> On May 3, 2019, at 12:17 PM, Gyan Mishra <hayabusagsm@gmail.com> wrote:
>>
>> Brian
>>
>> IPv6 penetration is honestly really defined by the percentage of content on the internet that is dual stacked which is still pretty far off and has a long ways to go to even get to a tipping point 50/50 mark.
>>
>> As far as cable and broadband providers for end users they are now starting to dual stack but it will be a long time as I said not until we hit the 100% mark that all content on the internet is dual stacked would broadband providers start thinking about pulling back and disabling IPv6.  
>>
>> The internet really drives the local corporations and intranet which lags behind so that would be even further down the pike.
>>
>> All broadband providers small and the big ones like Comcast Verizon Time Warner etc would not want to risk losing customers to their competitors if they pulled back IPv4 early and the internet content was not 100% IPv6.
>>
>> If they did so god forbid they may be in for a a lot of class action suits as the entire internet majority being IPv4 would now not be accessible.
>>
>> So bottom line here is that until the internet content is 100% IPv6 there is no way any broadband provider would pull back IPv6 thus in essence making this IPv6 flag literally useless and added on way to early in the game which brings me to my next point.
>>
>> With regard to security ICMPv6 is not secure and with a SEND secure neighbor discovery that could be secure the iCMPv6 RFC 4861 RS/RA type 133/134 and NS/NA type 135/136.
>>
>> So the RA that has the reserved field 2 flag bits now allocated to the IPv6 only flag can be subject to a man in the middle attack easily with a sniffer and spoofing the packet from the router manipulation of the the bird setting from all sending routers to 0 and now basically you have a massive outage.  Thinking about this on a larger scale let’s say If a router was exposed to an attack that someone gained accesses via a stack overflow or glitch the the attacker could not manipulate the flag to set the IPv6 only flag on all routers and now you have an IPv4 meltdown and a massive outage.
>>
>> There are many scenarios of which this is only a few off the top of my head but maybe on a more grand scale since all hosts are talking ICMPv6 let’s say their was malware ddos virus that hit internet wise and was via email or any other type of delivery mechanism that was able to compromise all hosts gain root access and now on the host itself can set this IPv6 only flag to 1 and now you have an internet wide meltdown the  worst in history.
>>
>> So I a nutshell this IPv6 only flag in my opinion is way ahead of its time and is a good thought but at this point is way jumping the gun as the entire internet community is not ready for this flag as our penetration numbers are not there yet.
>>
>> I really think we should defer this RFC and put on hold for the future.
>>
>> Gyan
>>
>> Sent from my iPhone
>>
>>> On May 2, 2019, at 7:52 PM, Brian E Carpenter <brian.e.carpenter@gmail.com> wrote:
>>>
>>> Nick,
>>>>> On 01-May-19 09:55, Nick Hilliard wrote:
>>>>> Brian E Carpenter wrote on 30/04/2019 21:48:
>>>>> So I'd rather understand *why* the costs outweigh the benefits. One 
>>>>> more thing for an operator to configure and check in each first-hop 
>>>>> router, vs reduction of pointless traffic on updated hosts. I'm not 
>>>>> sure how to make that an objective rather than a subjective 
>>>>> trade-off.
>>>> Hi Brian,
>>>>
>>>> Email is being a serious barrier to communication in this discussion :-(
>>>>
>>>> The problem statement just isn't there:
>>>>
>>>> https://mailarchive.ietf.org/arch/msg/ipv6/GCGYTXhg0V9mQBrcO7zhC5wtnp0
>>>>
>>>> The contents of this email largely still apply to the current text in -05.
>>>
>>> It's a judgment call. IMHO the problem statement is adequate. In your opinion, it isn't.
>>>
>>>> The cost is too high:
>>>>
>>>> https://mailarchive.ietf.org/arch/msg/ipv6/NIJ194PI8CLkuZT8U_jKEOY01QI
>>>>
>>>> You've shown no analysis of realistic use cases.
>>>>
>>>> For something standards track, and this far down the protocol stack and 
>>>> with such a large security considerations section, the proposal ought to 
>>>> be thoroughly compelling for a wide variety of deployment scenarios, but 
>>>> it isn't.  There are better ways of skinning this cat.
>>>
>>> Again, a judgment call. We do refer to Layer 2 solutions and this is clearly positioned as a complementary approach.
>>>
>>> The authors aren't going to make the final judgment call, obviously.
>>>
>>>  Brian
>>>
>>> --------------------------------------------------------------------
>>> IETF IPv6 working group mailing list
>>> ipv6@ietf.org
>>> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
>>> --------------------------------------------------------------------
>