Re: I-D Action: draft-gont-6man-non-stable-iids-00.txt

Lorenzo Colitti <lorenzo@google.com> Tue, 31 May 2016 08:04 UTC

Return-Path: <lorenzo@google.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D0D2512D153 for <ipv6@ietfa.amsl.com>; Tue, 31 May 2016 01:04:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.126
X-Spam-Level:
X-Spam-Status: No, score=-4.126 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RP_MATCHES_RCVD=-1.426, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hsLlkftYjA3s for <ipv6@ietfa.amsl.com>; Tue, 31 May 2016 01:04:31 -0700 (PDT)
Received: from mail-yw0-x233.google.com (mail-yw0-x233.google.com [IPv6:2607:f8b0:4002:c05::233]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E821C12D140 for <ipv6@ietf.org>; Tue, 31 May 2016 01:04:30 -0700 (PDT)
Received: by mail-yw0-x233.google.com with SMTP id x189so180929460ywe.3 for <ipv6@ietf.org>; Tue, 31 May 2016 01:04:30 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=MLh2RAuMIBX8fQ24QDwWrySR1TYsw713s0y2M7H46YM=; b=SaBRizuUXL0gX7NAewLBI3c9pgX3y8kSKfOonRCTcCdTZs94z3wUp9hai1+CyciGoJ jVsX4onMguYiEakBVi+TeeWTdvSkjsVvtl3OfZV8Kfi29jIv1IAApszT4e2kSohB4IO2 jl5qjhBmt3ixqNlrsienC9AdazoWsKP/SGzsCGewT/61lR1iY3FcvIDKGbSuxtJKwyun udp287AbptsQF8gtduVL27MGT/mGE8msF+2OogYW2muZcUa1hE6va4k9aiCqMSfLUUlh HqiBVoLW+Rf0Xh0inS8ZcWiBHuhsi8vFJxJJb7D5DjymiuZFP2IeG7YCGKHw/7g2gw2h i8Nw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=MLh2RAuMIBX8fQ24QDwWrySR1TYsw713s0y2M7H46YM=; b=R2k1A71zh3wA3IvQjS6DIbfVaAp0VGhbIPHMAD0q4ZE4+aecLFUef0oJFx5oQpd9zO jo5oRCcgubfwNQfTE2ybLMdXC7ED4+3BQQjbJSDU/BN7D05g6dGG2N0o6hzRHF96DY2v AVOGhh5WunbomCvyiLoqtLAm6fEM6Up3FEoyO4wv8AYcPl84irs02XD4/+b5akxaYPO+ BxQVvxCyFNK7ih50uu7sHrgncnl4vblUGDuWOz07lwRcxX3EA1TYht4xuuKslFHEbhi3 PJfTOiwVSvdGQKYziFQQ/s6czJDUOr1HnlNwYVFT2e3dnbqQdnR4u9N45fqnapSSZNmZ K2Lg==
X-Gm-Message-State: ALyK8tL2Su4zQFUjXZ2P+ATsbznXTh+/O1d7XV+VSRxlyv3x0TQssOd0dadO2qeFK8Lecb393f1hefXcsfQeN/bc
X-Received: by 10.13.220.69 with SMTP id f66mr21822622ywe.132.1464681870040; Tue, 31 May 2016 01:04:30 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.37.198.210 with HTTP; Tue, 31 May 2016 01:04:10 -0700 (PDT)
In-Reply-To: <02BC17C8-35B8-4BC4-9A3B-D7DF61C84CAA@employees.org>
References: <20160523150736.10739.19307.idtracker@ietfa.amsl.com> <de70bacb-40f2-0684-897f-8a5167b68c36@gmail.com> <85D7A11B-03B1-4570-8F4B-EA533FF2CAEA@employees.org> <CAKD1Yr0c0R3zO+ejcLKCqize8ncQVmV_Cgy1F_JO4UdoDi=_Ng@mail.gmail.com> <3F8CA752-D0B9-4516-9C93-C736BF9946CF@employees.org> <CAKD1Yr1OMWyksyt7m50AuVFQcAsa3xqfn4BytHUA0HjpuG8MNw@mail.gmail.com> <02BC17C8-35B8-4BC4-9A3B-D7DF61C84CAA@employees.org>
From: Lorenzo Colitti <lorenzo@google.com>
Date: Tue, 31 May 2016 17:04:10 +0900
Message-ID: <CAKD1Yr3trrLEziadqxSKC2QzFOSS6=45b4j4b1Zc-53Q-kQsJw@mail.gmail.com>
Subject: Re: I-D Action: draft-gont-6man-non-stable-iids-00.txt
To: Ole Troan <otroan@employees.org>
Content-Type: multipart/alternative; boundary="94eb2c0815c893227105341ed245"
Archived-At: <http://mailarchive.ietf.org/arch/msg/ipv6/bYcZAu_xWqkt9luI_YcyBOTNpKg>
Cc: 6man WG <ipv6@ietf.org>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 31 May 2016 08:04:33 -0000

On Tue, May 31, 2016 at 4:23 PM, <otroan@employees.org> wrote:

> > What are you suggesting? That RFC4941 addresses don't provide any useful
> privacy? Or that hosts can't use only RFC4941 addresses? Something else?
>
> I'm making the observation that if you have a host with only RFC4941
> addresses, you will end up using 4941 addresses as public addresses.


Your statement does not mean much unless you define "public". The
difference between RFC 4941 addresses and other addresses is not are that
RFC 4941 addresses are not persistent.


> and that you cannot reuse an address you have coupled identity with for
> any other connection.
>

Can you explain the threat you're trying to counter? From what you say I
assume it has to involve some party with realtime access to part of your
communications that is able to correlate temporary addresses before they
change, but I'm not sure exactly what the threat model is. There is one
party that can always track 100% of what you do at the IP layer, and that
is the first-hop router. Is that what you're talking about?


> > there is no standardised way for a host to know if it is getting a
> unique /64 is it?
> >
> > No, and I think it would be useful to have one.
>
> DHCP PD?
>

PD works, but most "/64 per host" deployments today do not use DHCPv6 PD
because they are 3GPP networks that use RAs. I would expect /64 per host
deployments to continue to be mostly RA-based, as discussed
in draft-ietf-v6ops-unique-ipv6-prefix-per-host. I think a "this prefix is
dedicated to you" flag in the RA would be useful.

we also need a mechanism to inform hosts that the network is out of
> addresses.
>

That's NOT RECOMMENDED by draft-ietf-v6ops-host-addr-availability.