Re: 6man w.g. last call for <draft-ietf-6man-default-iids-11.txt>

Alexandre Petrescu <alexandre.petrescu@gmail.com> Thu, 19 May 2016 07:51 UTC

Return-Path: <alexandre.petrescu@gmail.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6023F12B029 for <ipv6@ietfa.amsl.com>; Thu, 19 May 2016 00:51:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.353
X-Spam-Level:
X-Spam-Status: No, score=-5.353 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_ADSP_CUSTOM_MED=0.001, FREEMAIL_FROM=0.001, NML_ADSP_CUSTOM_MED=0.9, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_SOFTFAIL=0.665] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fGPkhRbDm8CF for <ipv6@ietfa.amsl.com>; Thu, 19 May 2016 00:50:59 -0700 (PDT)
Received: from oxalide-out.extra.cea.fr (oxalide-out.extra.cea.fr [132.168.224.8]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8FF6712B017 for <ipv6@ietf.org>; Thu, 19 May 2016 00:50:59 -0700 (PDT)
Received: from pisaure.intra.cea.fr (pisaure.intra.cea.fr [132.166.88.21]) by oxalide.extra.cea.fr (8.15.2/8.15.2/CEAnet-Internet-out-2.4) with ESMTP id u4J7ovNU023239 for <ipv6@ietf.org>; Thu, 19 May 2016 09:50:57 +0200
Received: from pisaure.intra.cea.fr (localhost [127.0.0.1]) by localhost (Postfix) with SMTP id A236020246D for <ipv6@ietf.org>; Thu, 19 May 2016 09:50:59 +0200 (CEST)
Received: from muguet2.intra.cea.fr (muguet2.intra.cea.fr [132.166.192.7]) by pisaure.intra.cea.fr (Postfix) with ESMTP id 98135201BC4 for <ipv6@ietf.org>; Thu, 19 May 2016 09:50:59 +0200 (CEST)
Received: from [10.8.34.184] (is227335.intra.cea.fr [10.8.34.184]) by muguet2.intra.cea.fr (8.15.2/8.15.2/CEAnet-Intranet-out-1.4) with ESMTP id u4J7oux7005612 for <ipv6@ietf.org>; Thu, 19 May 2016 09:50:57 +0200
Subject: Re: 6man w.g. last call for <draft-ietf-6man-default-iids-11.txt>
To: ipv6@ietf.org
References: <20160428004904.25189.43047.idtracker@ietfa.amsl.com> <89CA2C18-AE61-4D40-8997-221201835944@gmail.com> <CAJE_bqdZ_D7jsDdWQ2FJpLH9cXveYfcye0W2J_mSi-7bYBrOKA@mail.gmail.com> <B849F263-9F99-48E8-B903-8FE7D2CDF277@cooperw.in> <CAJE_bqd1AWOuwvQcGzHg+dAWoump29g14HEA1BoVErXDXSMxaw@mail.gmail.com> <573BCFD0.8090801@si6networks.com> <CAJE_bqfKUbO7C6LnxOOUCVBU9e679_=159Yu6Ti0zhOGDuw98Q@mail.gmail.com>
From: Alexandre Petrescu <alexandre.petrescu@gmail.com>
Message-ID: <5349d862-1920-3137-617d-11ad75209e73@gmail.com>
Date: Thu, 19 May 2016 09:50:56 +0200
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.1.0
MIME-Version: 1.0
In-Reply-To: <CAJE_bqfKUbO7C6LnxOOUCVBU9e679_=159Yu6Ti0zhOGDuw98Q@mail.gmail.com>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/ipv6/_jT75Cg9jPNVrEuNvllxaRYKYno>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 May 2016 07:51:01 -0000


Le 19/05/2016 à 01:22, 神明達哉 a écrit :
> At Tue, 17 May 2016 22:13:36 -0400, Fernando Gont
> <fgont@si6networks.com> wrote:
>
>>> From this one, and your response to the next point, it seems you
>>>  are saying the decision was to refuse to address that concern.
>>> Am I understanding it correctly?
>>
>> No. My take is that the concern is flawed. Please read
>> draft-gont-predictable-protocol-ids, and even RFC4941, which talks
>>  at length about security and privacy issues regarding reusing
>> identifiers in different context, for different scopes, etc.
>>
>> Let's call a lemon a lemon: Asking to embed a layer-2
>> identifier/address in a layer-3 address is extremely bad.
>
> I don't have a strong position on this matter itself, but my
> understanding of the sense of the wg is that this is controversial,
> and at least far from a clear consensus.  To repeat myself, *my*
> concern on this last call is that it's not even clear, at least to
> me, if this draft tries to say embedding a link-layer address is,
> whether it's randomized or not, "extremely bad" (and must therefore
> be prohibited).

This explanation makes me think of the following.

A true link-layer address, or a randomized link-layer address, embedded
(or not) in an Interface ID - is a matter of Ethernet only.  That could
lead to update "IPv6 over Ethernet" RFC 2464, and not create a new RFC
default-iids.

Moreover, it may be that people on cable Ethernet in Enterprise have
less privacy concern.  It's people on WiFi who do because they're more
mobile and no subject to internal codes of conduct.  And, unfortunately,
there is no "IPv6 over WiFi" RFC to update with this true link-layer vs
randomized link-layer address.  First, one should write an "IPv6 over
802.11" RFC.  Then we can talk about link-layer vs randomized in IID for
WiFi.

Second, this (true link-layer or radomized link-layer address in IID)
is not relevant for other link layers such as USB, or cellular wireless
access links, or others.  There is no worry here about 'true' vs
'random' link-layer address in the first place (whether in IID or not),
because there is no 'true' (i.e. IEEE-assisgned) link-layer address.  In
addition, on cellular links the prefix advertised in RA is unique per
terminal - so _that_ could be a privacy issue (not the IID).

Before privacy concerns, there is an issue to make IPv6 does run on
these links: people struggle to create 48bit addresses which can fill
the structures needed in IPv6 programming.  These addresses may look
random, but are actually based on hints, thus creating something
predictable.  The issue here is that is not standardized and may lead to
conflicts.  _After_ that conflict issue is solved, can we talk about
IID privacy issues of true-vs-random link-layer address in these links.

Alex