RE: Stephen Farrell's Discuss on draft-ietf-6man-stable-privacy-addresses-16: (with DISCUSS and COMMENT)
Christian Huitema <huitema@microsoft.com> Sun, 26 January 2014 00:53 UTC
Return-Path: <huitema@microsoft.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B59D31A00BE; Sat, 25 Jan 2014 16:53:52 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.602
X-Spam-Level:
X-Spam-Status: No, score=-2.602 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id U8n6FCM3sBOq; Sat, 25 Jan 2014 16:53:50 -0800 (PST)
Received: from na01-by2-obe.outbound.protection.outlook.com (mail-by2lp0239.outbound.protection.outlook.com [207.46.163.239]) by ietfa.amsl.com (Postfix) with ESMTP id 8748D1A00BB; Sat, 25 Jan 2014 16:53:50 -0800 (PST)
Received: from BLUPR03CA030.namprd03.prod.outlook.com (10.141.30.23) by SN2PR03MB061.namprd03.prod.outlook.com (10.255.175.149) with Microsoft SMTP Server (TLS) id 15.0.859.15; Sun, 26 Jan 2014 00:53:47 +0000
Received: from BN1AFFO11FD021.protection.gbl (2a01:111:f400:7c10::199) by BLUPR03CA030.outlook.office365.com (2a01:111:e400:879::23) with Microsoft SMTP Server (TLS) id 15.0.868.8 via Frontend Transport; Sun, 26 Jan 2014 00:53:47 +0000
Received: from mail.microsoft.com (131.107.125.37) by BN1AFFO11FD021.mail.protection.outlook.com (10.58.52.81) with Microsoft SMTP Server (TLS) id 15.0.856.14 via Frontend Transport; Sun, 26 Jan 2014 00:53:46 +0000
Received: from TK5EX14MBXC301.redmond.corp.microsoft.com ([169.254.1.182]) by TK5EX14HUBC106.redmond.corp.microsoft.com ([157.54.80.61]) with mapi id 14.03.0174.002; Sun, 26 Jan 2014 00:53:24 +0000
From: Christian Huitema <huitema@microsoft.com>
To: Fernando Gont <fgont@si6networks.com>, Brian E Carpenter <brian.e.carpenter@gmail.com>
Subject: RE: Stephen Farrell's Discuss on draft-ietf-6man-stable-privacy-addresses-16: (with DISCUSS and COMMENT)
Thread-Topic: Stephen Farrell's Discuss on draft-ietf-6man-stable-privacy-addresses-16: (with DISCUSS and COMMENT)
Thread-Index: AQHPFsD+YOme/d80rkOODnhQM2zvF5qPW/6AgAAHZACAABetgIAAD+UAgALhwYCAACUMgIADW7wAgAANpICAADOKgA==
Date: Sun, 26 Jan 2014 00:53:24 +0000
Message-ID: <C91E67751B1EFF41B857DE2FE1F68ABA3DF7D3C3@TK5EX14MBXC301.redmond.corp.microsoft.com>
References: <20140121155253.23475.70004.idtracker@ietfa.amsl.com> <52DE9E63.5050404@si6networks.com> <52DEA496.9000000@viagenie.ca> <52DEB873.1080500@cs.tcd.ie> <52DEC5C8.7080903@si6networks.com> <52E130A7.5050102@cisco.com> <52E14FBB.1070901@si6networks.com> <52E420EE.8090104@gmail.com> <52E42C5F.9050601@si6networks.com>
In-Reply-To: <52E42C5F.9050601@si6networks.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [157.54.51.37]
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-EOPAttributedMessage: 0
X-Forefront-Antispam-Report: CIP:131.107.125.37; CTRY:US; IPV:NLI; EFV:NLI; SFV:NSPM; SFS:(10009001)(6009001)(51704005)(199002)(189002)(50986001)(47976001)(80022001)(51856001)(6806004)(74706001)(66066001)(83322001)(47736001)(49866001)(33656001)(92566001)(65816001)(44976005)(77982001)(59766001)(94316002)(74502001)(74366001)(81816001)(47446002)(50466002)(92726001)(93516002)(74662001)(31966008)(79102001)(69226001)(85806002)(90146001)(56816005)(86362001)(20776003)(63696002)(47776003)(85306002)(54356001)(87266001)(56776001)(2656002)(74876001)(4396001)(81342001)(81686001)(76482001)(76796001)(76786001)(80976001)(23746002)(46102001)(53806001)(87936001)(77096001)(83072002)(54316002)(85852003)(93136001)(81542001)(55846006); DIR:OUT; SFP:1101; SCL:1; SRVR:SN2PR03MB061; H:mail.microsoft.com; CLIP:131.107.125.37; FPR:; InfoDomainNonexistentA:1; MX:1; LANG:en;
X-O365ENT-EOP-Header: Message processed by - O365_ENT: Allow from ranges (Engineering ONLY)
X-Forefront-PRVS: 01039C93E4
X-OriginatorOrg: microsoft.com
Cc: "6man-chairs@tools.ietf.org" <6man-chairs@tools.ietf.org>, "ipv6@ietf.org" <ipv6@ietf.org>, Lloyd Wood <L.Wood@surrey.ac.uk>, Eliot Lear <lear@cisco.com>, The IESG <iesg@ietf.org>, "draft-ietf-6man-stable-privacy-addresses@tools.ietf.org" <draft-ietf-6man-stable-privacy-addresses@tools.ietf.org>, Stephen Farrell <stephen.farrell@cs.tcd.ie>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 26 Jan 2014 00:53:52 -0000
>> Nobody could conceivably object to that, but I do wonder whether the >> statement "Secret keys should be kept secret" doesn't belong in a much >> more generic document than this one. Actually a BCP on pitfalls surrounding >> secret keys and how to protect them would be very valuable, but doesn't >> belong in this WG. > > I agree with you. > > I'd say I would have probably objected against adding this (with the > argument "well, this should be obvious to everyone"). But then I recall > having a conversation with a folk working on TCP SEQ randomization > (using a similar scheme) for a popular OS, and apparently they were > employing a constant secret key for all their systems. Hence, "sometimes > it's not bad to clarify what you might deem as obvious". That's actually a tradeoff in Fernando's algorithm. In order to guarantee reuse of the same IPv6 address at the same location, the system only has to remember the secret key. But if the secret key is disclosed to an attacker, the attacker can predict the IPv6 address that will be used by that system at any future location. There are other possible designs that don't make the same tradeoff. For example, systems could maintain a list of visited locations and associated IPv6 addresses. When they visit a location not in the list, they can pick a random number for their IID. The system will require more memory, but will have the property that future addresses will be unpredictable, even if an attacker manages to obtain the list of previously used addresses and locations. -- Christian Huitema
- Stephen Farrell's Discuss on draft-ietf-6man-stab… Stephen Farrell
- Re: Stephen Farrell's Discuss on draft-ietf-6man-… Fernando Gont
- Re: Stephen Farrell's Discuss on draft-ietf-6man-… Simon Perreault
- Re: Stephen Farrell's Discuss on draft-ietf-6man-… Hannes Frederic Sowa
- Re: Stephen Farrell's Discuss on draft-ietf-6man-… Fernando Gont
- Re: Stephen Farrell's Discuss on draft-ietf-6man-… Fernando Gont
- Re: Stephen Farrell's Discuss on draft-ietf-6man-… Stephen Farrell
- Re: Stephen Farrell's Discuss on draft-ietf-6man-… Fernando Gont
- Stephen Farrell's Discuss on draft-ietf-6man-stab… Stephen Farrell
- Re: Stephen Farrell's Discuss on draft-ietf-6man-… Thomas Narten
- Re: Stephen Farrell's Discuss on draft-ietf-6man-… Stephen Farrell
- Re: Stephen Farrell's Discuss on draft-ietf-6man-… Eliot Lear
- Re: Stephen Farrell's Discuss on draft-ietf-6man-… Fernando Gont
- Re: Stephen Farrell's Discuss on draft-ietf-6man-… Fernando Gont
- Re: Stephen Farrell's Discuss on draft-ietf-6man-… Brian E Carpenter
- Re: Stephen Farrell's Discuss on draft-ietf-6man-… Fernando Gont
- RE: Stephen Farrell's Discuss on draft-ietf-6man-… Christian Huitema
- RE: Stephen Farrell's Discuss on draft-ietf-6man-… l.wood
- RE: Stephen Farrell's Discuss on draft-ietf-6man-… l.wood
- RE: Stephen Farrell's Discuss on draft-ietf-6man-… Christian Huitema
- Re: Stephen Farrell's Discuss on draft-ietf-6man-… Doug Barton