Re: [Fwd: I-D Action: draft-carpenter-6man-why64-00.txt]

Tim Chown <tjc@ecs.soton.ac.uk> Thu, 09 January 2014 16:32 UTC

Return-Path: <tjc@ecs.soton.ac.uk>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 497821ADFB9 for <ipv6@ietfa.amsl.com>; Thu, 9 Jan 2014 08:32:35 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.759
X-Spam-Level:
X-Spam-Status: No, score=-1.759 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RP_MATCHES_RCVD=-0.538, SPF_NEUTRAL=0.779] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 22Y-MT0djBww for <ipv6@ietfa.amsl.com>; Thu, 9 Jan 2014 08:32:33 -0800 (PST)
Received: from falcon.ecs.soton.ac.uk (falcon.ecs.soton.ac.uk [IPv6:2001:630:d0:f102::25e]) by ietfa.amsl.com (Postfix) with ESMTP id 26AA71ADFA7 for <ipv6@ietf.org>; Thu, 9 Jan 2014 08:32:33 -0800 (PST)
Received: from falcon.ecs.soton.ac.uk (localhost [127.0.0.1]) by falcon.ecs.soton.ac.uk (8.13.8/8.13.8) with ESMTP id s09GWEt2028212; Thu, 9 Jan 2014 16:32:14 GMT
X-DKIM: Sendmail DKIM Filter v2.8.2 falcon.ecs.soton.ac.uk s09GWEt2028212
DKIM-Signature: v=1; a=rsa-sha1; c=simple/simple; d=ecs.soton.ac.uk; s=201304; t=1389285134; bh=Meq6sAIFbKkyyLlgXp1Ob7BGDww=; h=Mime-Version:Subject:From:In-Reply-To:Date:Cc:References:To; b=1qhdP6LY1CZe+h0lTVisY1dyG/apc3LAdWi2+S42zkmNhHjwGXNfPqfvWcRoROnFk K6kBin608pmaIVPxEuIuwVo230KSuSQl3/lPkmak3vJ2dfL0v8sEeGbH5jBU88xtk5 9BTB4dnosa8y/j9b+g7TUVNxodLM9vua/Xq6pDHc=
Received: from gander.ecs.soton.ac.uk ([2001:630:d0:f102:250:56ff:fea0:401]) by falcon.ecs.soton.ac.uk (falcon.ecs.soton.ac.uk [2001:630:d0:f102:250:56ff:fea0:68da]) envelope-from <tjc@ecs.soton.ac.uk> with ESMTP (valid=N/A) id q08GWE0959656019J8 ret-id none; Thu, 09 Jan 2014 16:32:14 +0000
Received: from tjc-vpn.ecs.soton.ac.uk (tjc-vpn.ecs.soton.ac.uk [152.78.236.241]) (authenticated bits=0) by gander.ecs.soton.ac.uk (8.13.8/8.13.8) with ESMTP id s09GWCUl030522 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Thu, 9 Jan 2014 16:32:12 GMT
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 6.6 \(1510\))
Subject: Re: [Fwd: I-D Action: draft-carpenter-6man-why64-00.txt]
From: Tim Chown <tjc@ecs.soton.ac.uk>
In-Reply-To: <52CECC76.1030706@globis.net>
Date: Thu, 09 Jan 2014 16:32:16 +0000
Content-Transfer-Encoding: quoted-printable
Message-ID: <EMEW3|093678d74fd5b69942d9d1db9e01d550q08GWE03tjc|ecs.soton.ac.uk|79D8AF81-2D90-4FF6-A513-4E4D89429E87@ecs.soton.ac.uk>
References: <52C9D788.8060606@gmail.com> <52CBE0E6.5020107@globis.net> <CAKD1Yr2yPzQHCJHUWBa9-+=nn9BbjLhBB4e896NPWne_Unnwgg@mail.gmail.com> <52CECC76.1030706@globis.net> <79D8AF81-2D90-4FF6-A513-4E4D89429E87@ecs.soton.ac.uk>
To: Ray Hunter <v6ops@globis.net>
X-Mailer: Apple Mail (2.1510)
X-ECS-MailScanner: Found to be clean, Found to be clean
X-smtpf-Report: sid=q08GWE095965601900; tid=q08GWE0959656019J8; client=relay,forged,no_ptr,ipv6; mail=; rcpt=; nrcpt=3:0; fails=0
X-ECS-MailScanner-Information: Please contact the ISP for more information
X-ECS-MailScanner-ID: s09GWEt2028212
X-ECS-MailScanner-From: tjc@ecs.soton.ac.uk
Cc: 6man <ipv6@ietf.org>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Jan 2014 16:32:35 -0000

On 9 Jan 2014, at 16:21, Ray Hunter <v6ops@globis.net> wrote:

>> Lorenzo Colitti <mailto:lorenzo@google.com>
>> 9 January 2014 03:27
>> 
>>    It may not be a widely held belief, but I remain concerned about
>>    the potential for resource exhaustion for any number of processes
>>    due to the "massive over sizing" of prefixes to /64: any number of
>>    untested processes that track state based on /128 IPv6 address
>>    could be attacked. The flip side of expanding privacy through
>>    address obfuscation at IID level is that the source space
>>    available for attacks also increases. ND cache exhaustion is
>>    probably just the first issue we've discovered of many that exist.
>>    This may have knock on operational consequences, which in the IPv4
>>    world have relied on the scarcity of IPv4 address space to be able
>>    to operate correctly under stress scenarios. We're going to
>>    discover who has been swimming naked when the tide goes out. Call
>>    that FUD, or operational expediency, whichever you like. BCP38 has
>>    saved me on a number of occasions when all else has failed.
>> 
>> 
>> It's true that some implementations may have made incorrect assumptions about IPv6 attacks based on their IPv4 knowledge. But on the other hand, a /64 provides plentiful space, freedom from renumbering, and operational simplicity because "you will always have enough subnet space" and "you can pick your own IID because a /64 provides enough space for everyone".
>> 
>> I don't think it's a good trade-off to give up those advantages just because of some implementations may temporarily have made insecure choices. By the same token, we didn't design IPv4 to be partitioned into security zones, even though I'm sure that when IPv4 rolled around, people were shocked - and I'm sure some got burnt - by the fact that enabling IPv4 on a machine suddenly meant that the machine was suddenly accessible from anywhere in the world. I think it's much better to start with a flexible, full-featured, simple architecture and them secure it.
>> 
>> It's not that securing it is hard to do: in first instance, make the abuse systems just track /64s instead of tracking /128s, and problem solved. Of course, you still have the problem that there are too many /64s to keep track of, but there's no way around that except to stick with IPv4, or make a new protocol that has more address space than IPv4 but less address space than IPv6... but why would you want that?
>> 
>> I know that smaller subnets are consistent with IPv4. But "different from IPv4" doesn't mean "worse than IPv4". In many cases, it means "better than IPv4".
>> 
>> ------------------------------------------------------------------------
> Most organisations I know have way less than 100K hosts globally, and typically 10's or 100s of hosts per LAN.
> 
> We seem to agree that people can't track at /64 because 2^64 is too big to track.
> 
> Why then would we suggest that people track at /64 level when you already admit there's equally too many /64's to track (also 2^64)?
> 
> The point is that people *could* trivially track and filter at /128 within an enterprise *if* we give network infra people the ability to control/register which /128(s) the end host uses.
> 
> Ideally, that ability to control/register active /128's should not rely on cooperation of L2 switches or other LAN functionality that requires purchasing new switches, or constant MIB scanning.
> 
> I think that's a valid problem statement, and assigning >>/64 (purposefully breaking SLAAC, whilst deploying stateful DHCPv6, or static addressing) is one way to address that problem.

I;m not sure you're defining what your problem is fully enough here.

What's wrong with polling network devices to maintain a database of IP/MAC/port bindings?  Some reasonably sized campuses with IPv6 deployed do just that, on the assumption devices can effectively pick their own addresses and/or change them over time.

Tim