Re: I-D Action: draft-ietf-6man-ipv6only-flag-03.txt

Alexandre Petrescu <alexandre.petrescu@gmail.com> Thu, 01 November 2018 17:06 UTC

Return-Path: <alexandre.petrescu@gmail.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 66D131286D9 for <ipv6@ietfa.amsl.com>; Thu, 1 Nov 2018 10:06:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.632
X-Spam-Level:
X-Spam-Status: No, score=-2.632 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_ADSP_CUSTOM_MED=0.001, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, NML_ADSP_CUSTOM_MED=0.9, RCVD_IN_DNSWL_MED=-2.3, SPF_SOFTFAIL=0.665] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WImVoJjotmRr for <ipv6@ietfa.amsl.com>; Thu, 1 Nov 2018 10:06:17 -0700 (PDT)
Received: from sainfoin-smtp-out.extra.cea.fr (sainfoin-smtp-out.extra.cea.fr [132.167.192.228]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3BE211277BB for <ipv6@ietf.org>; Thu, 1 Nov 2018 10:06:17 -0700 (PDT)
Received: from pisaure.intra.cea.fr (pisaure.intra.cea.fr [132.166.88.21]) by sainfoin-sys.extra.cea.fr (8.14.7/8.14.7/CEAnet-Internet-out-4.0) with ESMTP id wA1H6Fg7038731 for <ipv6@ietf.org>; Thu, 1 Nov 2018 18:06:15 +0100
Received: from pisaure.intra.cea.fr (localhost [127.0.0.1]) by localhost (Postfix) with SMTP id 8038E203610 for <ipv6@ietf.org>; Thu, 1 Nov 2018 18:06:15 +0100 (CET)
Received: from muguet1-smtp-out.intra.cea.fr (muguet1-smtp-out.intra.cea.fr [132.166.192.12]) by pisaure.intra.cea.fr (Postfix) with ESMTP id 7433B20360B for <ipv6@ietf.org>; Thu, 1 Nov 2018 18:06:15 +0100 (CET)
Received: from [10.8.68.90] ([10.8.68.90]) by muguet1-sys.intra.cea.fr (8.14.7/8.14.7/CEAnet-Internet-out-4.0) with ESMTP id wA1H6EnQ027213 for <ipv6@ietf.org>; Thu, 1 Nov 2018 18:06:14 +0100
Subject: Re: I-D Action: draft-ietf-6man-ipv6only-flag-03.txt
To: ipv6@ietf.org
References: <CAFU7BASO_ByzbanhLKnWV280O_fASd-8W+ujpj3sN6d2-whw2w@mail.gmail.com> <CACWOCC-u7aAPwAOcixYvt2On=-o_8X25GhqdXTfA+tWRC1o2XA@mail.gmail.com> <3beca72e-19c5-10af-02e5-c21a90d77100@gmail.com> <20181019.223739.271916573.sthaug@nethelp.no> <CAO42Z2z3zMcQSG2QpEhKByRr73BnEFC7xwayHe7p86TQpUvQYg@mail.gmail.com> <82E7C4FD-AD73-4697-9FC6-F61FBCB50375@employees.org> <38c6f05a-349a-2124-0052-aed032e450eb@nlogic.no> <66EDCD17-A1BA-4765-812C-231992FF1D60@bogus.com>
From: Alexandre Petrescu <alexandre.petrescu@gmail.com>
Message-ID: <6f961e2e-e1ca-d669-e206-43875a3858ee@gmail.com>
Date: Thu, 01 Nov 2018 18:06:14 +0100
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1
MIME-Version: 1.0
In-Reply-To: <66EDCD17-A1BA-4765-812C-231992FF1D60@bogus.com>
Content-Type: multipart/alternative; boundary="------------DBBCA1C34EEF4DF65C991959"
Content-Language: fr
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/mzu9O1m-8g0cbKUzF2GLGS2q5zo>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 01 Nov 2018 17:06:21 -0000


Le 01/11/2018 à 13:19, Joel Jaeggli a écrit :
>
>
>> On Oct 20, 2018, at 10:34, Ola Thoresen <ola@nlogic.no 
>> <mailto:ola@nlogic.no>> wrote:
>>
>> On 20/10/2018 00:12, Ole Troan wrote:
>>
>>>
>>>
>>> In my view, I don’t see much purpose in the bit unless it’s 
>>> prescriptive. As in the last category.
>>>
>>
>> On this, we can agree. Having a flag as a "hint" does not make much 
>> sense.  You can't trust it, so you would STILL need to verify if the 
>> flag is actually telling the truth, or if it is just set - either 
>> malicious, or by mistake.
>>
> I can’t really trust (ND, RAs, ARP, DHCP, DHCPv6, MDNS).

It should not be difficult to slightly secure the RA that contains the 
IPv6-only flag.  A check of the existing L2 address in NC for the GW of 
the default route, against the L2 source address of the L2 header of the 
RA containing IPv6-only flag, should add some insurance.  On cellular 
links, the reliance on SIM cards should be sufficient.

Alex

> Lack of trust here extends to most of the signals one might receive in 
> the process of bootstrapping. Of those signals some of them I accept 
> because as part of a faustian bargain I made when attaching to the 
> network, I actually need some of that information. The stuff that I 
> don’t have to accept in order to achieve basic functionality I ignore.
>
> As  case in point all the operating systems I use allow me to specify 
> my own nameserver despite receiving such information  via DHCP/DHCPv6, 
> doing so may come at the expense of some local funcationality but it’s 
> worth it as far as I’m concerned.
>>
>> On the other hand, I do not see how this can be a hard requirement.  
>> Or at least I can not see operating systems actually obyeing such a 
>> flag. IF the client administrator has configured IPv4 dhcp client 
>> settings, why should the OS trust a flag in an RA-packet more than 
>> the OS-admins configuration?
>>
>> Just look at the already defined flags "O" and "M" - which are not 
>> even breaking the barrier between the IP-protocols.  I know at least 
>> a couple of implementations which will send a DHCPv6-request no 
>> matter what the RA is signaling in its M and O-flags.  And I know 
>> implementations that will not automatically send dhcp-requests no 
>> matter what flags are set in the RA-packets.
>>
>> We don't need even more flags that might or might not be ignored by 
>> the operating systems. And which have a somewhat vague definition.
>>
> And which is not absolutely necessary for bootstrapping.
>>
>> We don't have a flag to tell the OS to not run DECnet, Appletalk or 
>> IPX.  We simply disable these on the clients.  And even if we had 
>> such a flag in DHCPv4 or RA, I - as an admin - would prefer the 
>> clients to not rely on such a flag, but try to get some kind of 
>> network access on any enabled network protocol in the client.
>>
>>
>> Rgds.
>>
>> Ola (T)
>>
>>
>> --------------------------------------------------------------------
>> IETF IPv6 working group mailing list
>> ipv6@ietf.org <mailto:ipv6@ietf.org>
>> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
>> --------------------------------------------------------------------
>
>
>
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------