Re: Disabling temporary addresses by default?

otroan@employees.org Wed, 29 January 2020 11:48 UTC

Return-Path: <otroan@employees.org>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C91DD120273 for <ipv6@ietfa.amsl.com>; Wed, 29 Jan 2020 03:48:59 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PUvr28QZpC0Q for <ipv6@ietfa.amsl.com>; Wed, 29 Jan 2020 03:48:58 -0800 (PST)
Received: from clarinet.employees.org (clarinet.employees.org [IPv6:2607:7c80:54:3::74]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3923B1200DF for <ipv6@ietf.org>; Wed, 29 Jan 2020 03:48:58 -0800 (PST)
Received: from astfgl.hanazo.no (76.84-234-131.customer.lyse.net [84.234.131.76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by clarinet.employees.org (Postfix) with ESMTPSA id B7F874E11A6D for <ipv6@ietf.org>; Wed, 29 Jan 2020 11:48:57 +0000 (UTC)
Received: from [IPv6:::1] (localhost [IPv6:::1]) by astfgl.hanazo.no (Postfix) with ESMTP id B9B552A616DE for <ipv6@ietf.org>; Wed, 29 Jan 2020 12:48:54 +0100 (CET)
From: otroan@employees.org
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Mime-Version: 1.0 (Mac OS X Mail 13.0 \(3608.40.2.2.4\))
Subject: Re: Disabling temporary addresses by default?
Date: Wed, 29 Jan 2020 12:48:54 +0100
References: <56BD2286-D761-44EF-812B-82BAFB380992@employees.org> <0163A2F7-7874-43BF-B0CE-E83D62A92123@puck.nether.net>
To: 6man WG <ipv6@ietf.org>
In-Reply-To: <0163A2F7-7874-43BF-B0CE-E83D62A92123@puck.nether.net>
Message-Id: <B72F96B6-9B19-4832-8636-B86A6ED01402@employees.org>
X-Mailer: Apple Mail (2.3608.40.2.2.4)
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/sHLmKOuvX0QAE9gGbNL-kkglGNo>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 29 Jan 2020 11:49:00 -0000

>> Enterprises use web proxies and SSL intercepting gateways anyway, don't they (sigh).
> 
> Some do. I've worked places that did for non-SSL. Keep in mind the operator of that network tends to only allow devices managed by them so they are not user devices. A user generally has no right to privacy on equipment they do not own. 
> 
> (This is a controversial position to state in the IETF but is still valid). 

And just to be clear. I am not against a document specifying temporary addresses.
The IETF published RFC3041 back in 2001, as a response to information leakage caused by EUI-64 based IIDs.
Quite a lot has changed since then. I am trying to get some answers to the following questions:

 - what are the operational consequences of temporary addresses
 - how effective are temporary addresses in making correlation harder?
 - are applications clever enough to not re-use tainted addresses for example?
 - do protocols like ICE, MPTCP, QUIC bundle together stable and temporary addresses?
 - implementations that allow for the use of many addresses might get into trouble with the network,
   can they deal with those failure cases in an acceptable way?

4941bis is being demoted to proposed standard. Which means we might live with these questions being unanswered, but I think we need to have some of the discussion around these in the deployment considerations.
And the issues with temporary addresses might still warrant that we keep the general recommendation of off by default. TBD.

Best regards,
Ole