Re: Feedback on draft-gont-6man-stable-privacy-addresses-01

Fernando Gont <fgont@si6networks.com> Sun, 15 April 2012 02:16 UTC

Return-Path: <fgont@si6networks.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6284D21F8569 for <ipv6@ietfa.amsl.com>; Sat, 14 Apr 2012 19:16:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xloAGmxgodDI for <ipv6@ietfa.amsl.com>; Sat, 14 Apr 2012 19:16:44 -0700 (PDT)
Received: from srv01.bbserve.nl (unknown [IPv6:2a02:27f8:1025:18::232]) by ietfa.amsl.com (Postfix) with ESMTP id 6DE6B21F8559 for <ipv6@ietf.org>; Sat, 14 Apr 2012 19:16:22 -0700 (PDT)
Received: from 222.160.102.84.rev.sfr.net ([84.102.160.222] helo=[10.192.168.68]) by srv01.bbserve.nl with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.77) (envelope-from <fgont@si6networks.com>) id 1SJF0j-00072F-5j; Sun, 15 Apr 2012 04:16:17 +0200
Message-ID: <4F8A2F6D.7060203@si6networks.com>
Date: Sun, 15 Apr 2012 04:16:13 +0200
From: Fernando Gont <fgont@si6networks.com>
Organization: SI6 Networks
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.2.28) Gecko/20120313 Thunderbird/3.1.20
MIME-Version: 1.0
To: Christian Huitema <huitema@microsoft.com>
Subject: Re: Feedback on draft-gont-6man-stable-privacy-addresses-01
References: <E7607B61-9889-43A9-B86B-133BD4238BA2@gmail.com> <1334276068.3945.408.camel@karl> <4F882A44.3080305@si6networks.com> <1334363774.3945.541.camel@karl> <CAAuHL_BCv2q=hDjTLmiviLoRRTbbyU+aSSQ0ETbDDQk==YfmLQ@mail.gmail.com> <C5B723A8-8A24-46BD-94E5-0BA2D8CCB460@cisco.com> <4F89DEE7.1080205@si6networks.com> <C91E67751B1EFF41B857DE2FE1F68ABA03CFD484@TK5EX14MBXC274.redmond.corp.microsoft.com>
In-Reply-To: <C91E67751B1EFF41B857DE2FE1F68ABA03CFD484@TK5EX14MBXC274.redmond.corp.microsoft.com>
X-Enigmail-Version: 1.1.2
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit
Cc: "ipv6@ietf.org 6man" <ipv6@ietf.org>, Fred Baker <fred@cisco.com>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipv6>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 15 Apr 2012 02:16:45 -0000

On 04/15/2012 01:20 AM, Christian Huitema wrote:
> I agree with Fred that we only need to specify "please somehow get a
> suitable 64 bit number."  There are a couple of requirements that
> have to be met -- or at least considered:
> 
> 1) Uniqueness: the number must be unique within the scope of the
> subnet. 2) Non traceability: the number should be different for
> different subnet, so hosts cannot be readily traced as they move to
> different locations. 3) Privacy: the number should vary over time, to
> make it harder for Internet services to correlate sessions started by
> the same host. 4) Stability: the number should remain stable over
> time, so administrators can more easily manage which host is using
> what network service.

If this is about a fixup for RFC4291 (kind of orthogonal to
draft-gont-6man-stable-privacy-addresses), then I'd argue that the only
requirement to be specified is that of uniqueness. If anything,
different algorithms would make trade-offs among aspects #1-4.



> Of course, stability and privacy are contradictory, so there must be
> a way for arbitraging that. That's the big issue to be dealt with by
> the specification of privacy addresses, i.e. whatever successor we
> write for RFC 3484. The arbitration will be resolving about how often
> host generate addresses, how many addresses they generate, 

I think that the issue of how many addresses you generate is depending
of the addrsel policy. Gnerating addresses is "step 1". Address
selection (step #2) deals with selecting from the addresses generated in
the pervious step.



> In principle, there are two ways to meet the unique per subnet
> requirement: use a number that is guaranteed to be unique by design;
> or use a large random number that is unlikely to collide with an
> existing allocation. 

While in theory this is correct, in practice it isn't: Think about
virtual machines: most implementations use a fixed OUI, and randmize the
Ethernet address from there. Which means that you could have the SLAAC
addresses of two different VMs collide, even if they are supposedley
being generated with globally-unique identifiers.


> The problem of course is that random numbers
> will sometime collide. It may be a low probability event, but it will
> eventually happen. In fact, even the "unique by design" numbers like
> EUI64 can collide occasionally, if some management error occurred.
> That's why we do DAD. So, we have another requirement in the address
> allocation:
> 
> 5) Retry: host must be able to detect potential collisions and retry,
> i.e. generate a different random number.

The question here is whether this is something that should be dealt with
in each specific algorithm (e.g.,
draft-gont-6man-stable-privacy-addresses-01), or this is something that
should be algorithm-agnostic.

For example, the specification for the generation of tradicional MAC
addresses does not deal with this issue in detail -- and in practice,
implementations do not try a different address when DAD fails.

As noted to Karl in this thread, I'd probably deal with the potential
address collisions (i.e., DAD failures) within the algorithm, Just add a
one-byte or two-byte counter to the hash, that e.g. is initialized to 0,
and incremented each time DAD fails.


> Fernando's algorithm has several advantages. It uses a hash of a
> pre-allocated random number, and thus mitigates the issue of weak
> random number generators in some hosts. It incorporates the subnet
> prefix, and thus meets the "non-traceability" requirement. But
> Fernando's algorithm has no provision for "retry", and thus misses a
> key requirement. 

This could be trivially added as noted above (for instance, I asked
others to weigh in :-) ).

There's also the issue fo whether even in the presence of Ethernet, one
should include the Modified-EUI-64 as a paramenter to the hash function,
or whether one should rather use the interface index: in that case, we'd
gain an additiona benefit -- even for Ethernet, you could replace the
NIC, and the resulting address wouldn't change.

Thanks,
-- 
Fernando Gont
SI6 Networks
e-mail: fgont@si6networks.com
PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492