Re: [Fwd: I-D Action: draft-carpenter-6man-why64-00.txt]

Tim Chown <tjc@ecs.soton.ac.uk> Tue, 07 January 2014 19:36 UTC

Return-Path: <tjc@ecs.soton.ac.uk>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C0BC81AE167 for <ipv6@ietfa.amsl.com>; Tue, 7 Jan 2014 11:36:48 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.759
X-Spam-Level:
X-Spam-Status: No, score=-1.759 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RP_MATCHES_RCVD=-0.538, SPF_NEUTRAL=0.779] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id B_Cl2Rdpot2E for <ipv6@ietfa.amsl.com>; Tue, 7 Jan 2014 11:36:45 -0800 (PST)
Received: from falcon.ecs.soton.ac.uk (falcon.ecs.soton.ac.uk [IPv6:2001:630:d0:f102::25e]) by ietfa.amsl.com (Postfix) with ESMTP id 3DBA81AE15F for <ipv6@ietf.org>; Tue, 7 Jan 2014 11:36:45 -0800 (PST)
Received: from falcon.ecs.soton.ac.uk (localhost.ecs.soton.ac.uk [127.0.0.1]) by falcon.ecs.soton.ac.uk (8.13.8/8.13.8) with ESMTP id s07JaWFO002544; Tue, 7 Jan 2014 19:36:32 GMT
X-DKIM: Sendmail DKIM Filter v2.8.2 falcon.ecs.soton.ac.uk s07JaWFO002544
DKIM-Signature: v=1; a=rsa-sha1; c=simple/simple; d=ecs.soton.ac.uk; s=201304; t=1389123392; bh=14eHPJMHs74/RFydH+tn0WUSk7k=; h=Mime-Version:Subject:From:In-Reply-To:Date:Cc:References:To; b=eD9+aXbARqUAcp7zQoFeR8Gb9mbgxzXQ8EvL9iMbEXKIA53Ke18c2qnHd4zsKvwtM Mjh61/Ats+cBdxm87tpR0m9kDInH1YjUi7QcZMXFFyvK1KVnyqn/lXt/LZxQKP9GA6 73QU+7aW7CNPv9oCp73sajF+uBBLhXDtVPsFNvaU=
Received: from gander.ecs.soton.ac.uk ([2001:630:d0:f102:250:56ff:fea0:401]) by falcon.ecs.soton.ac.uk (falcon.ecs.soton.ac.uk [2001:630:d0:f102:250:56ff:fea0:68da]) envelope-from <tjc@ecs.soton.ac.uk> with ESMTP (valid=N/A) id q06JaW0959634824Gz ret-id none; Tue, 07 Jan 2014 19:36:32 +0000
Received: from [192.168.1.101] (host213-123-213-183.in-addr.btopenworld.com [213.123.213.183]) (authenticated bits=0) by gander.ecs.soton.ac.uk (8.13.8/8.13.8) with ESMTP id s07JZI7Z018038 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Tue, 7 Jan 2014 19:36:04 GMT
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 7.1 \(1827\))
Subject: Re: [Fwd: I-D Action: draft-carpenter-6man-why64-00.txt]
From: Tim Chown <tjc@ecs.soton.ac.uk>
In-Reply-To: <52CBE0E6.5020107@globis.net>
Date: Tue, 07 Jan 2014 19:36:06 +0000
Content-Transfer-Encoding: quoted-printable
Message-ID: <EMEW3|44d53226cd903b03025fb193eb9fc355q06JaW03tjc|ecs.soton.ac.uk|BF9209B6-958E-4AF2-8AFC-0BDD38B85F52@ecs.soton.ac.uk>
References: <52C9D788.8060606@gmail.com> <52CBE0E6.5020107@globis.net> <BF9209B6-958E-4AF2-8AFC-0BDD38B85F52@ecs.soton.ac.uk>
To: Ray Hunter <v6ops@globis.net>
X-Mailer: Apple Mail (2.1827)
X-ECS-MailScanner: Found to be clean, Found to be clean
X-smtpf-Report: sid=q06JaW095963482400; tid=q06JaW0959634824Gz; client=relay,forged,no_ptr,ipv6; mail=; rcpt=; nrcpt=3:0; fails=0
X-ECS-MailScanner-Information: Please contact the ISP for more information
X-ECS-MailScanner-ID: s07JaWFO002544
X-ECS-MailScanner-From: tjc@ecs.soton.ac.uk
Cc: 6man <ipv6@ietf.org>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 07 Jan 2014 19:36:49 -0000

Hi Ray,

It would be good to suggest specific text/edits.

Tim

On 7 Jan 2014, at 11:11, Ray Hunter <v6ops@globis.net> wrote:

> Brian E Carpenter wrote:
>> Hi,
>> 
>> A group of us put this together following a discussion some weeks
>> ago on the v6ops list about the 64-bit boundary in IPv6 addresses.
>> Discussion belongs in 6man, please.
>> 
>> This draft is incomplete but we'd welcome input. Let me underline
>> an important comment in the introduction:
>> 
>>   _The purpose of this document is to analyse the issues around this
>>    question.  We make no proposal for change, but we do analyse the
>>    possible effects of a change._
>> 
>> 
>>    Brian + co-authors
>> 
>> -------- Original Message --------
>> Subject: I-D Action: draft-carpenter-6man-why64-00.txt
>> Date: Sun, 05 Jan 2014 13:59:17 -0800
>> From: internet-drafts@ietf.org
>> Reply-To: internet-drafts@ietf.org
>> To: i-d-announce@ietf.org
>> 
>> 
>> A New Internet-Draft is available from the on-line Internet-Drafts directories.
>> 
>> 
>>         Title           : Analysis of the 64-bit Boundary in IPv6 Addressing
>>         Authors         : Brian Carpenter
>>                           Tim Chown
>>                           Fernando Gont
>>                           Sheng Jiang
>>                           Alexandru Petrescu
>>                           Andrew Yourtchenko
>> 	Filename        : draft-carpenter-6man-why64-00.txt
>> 	Pages           : 14
>> 	Date            : 2014-01-05
>> 
>> Abstract:
>>    The IPv6 unicast addressing format includes a separation between the
>>    prefix used to route packets to a subnet and the interface identifier
>>    used to specify a given interface connected to that subnet.
>>    Historically the interface identifier has been defined as 64 bits
>>    long, leaving 64 bits for the prefix.  This document discusses the
>>    reasons for this fixed boundary and the issues involved in treating
>>    it as a variable boundary.
>> 
>> 
>> The IETF datatracker status page for this draft is:
>> https://datatracker.ietf.org/doc/draft-carpenter-6man-why64/
>> 
>> There's also a htmlized version available at:
>> http://tools.ietf.org/html/draft-carpenter-6man-why64-00
>> 
>> 
> I have read this draft.
> 
> some comments:
> 
> Where exactly is the requirement that IPv6 has to use /64 prefix length really enshrined?
> I think the draft can help clarify that, and that alone makes it worthwhile proceeding.
> 
> 
> I humbly disagree with the conclusions in Section 9.
> 
> The argument seems to assume that all n hosts must be allocated within one single prefix with a prefix length >> 64.
> Therefore it assumes that increasing prefix length reduces attack search space (given some knowledge of one or more active IPv6 addresses)
> 
> IMHO Address space is address space. Allocation density is allocation density. IPv6 supports multiple prefixes per link and the concept of determining "on link prefixes" via rfc5942 (unlike the "subnet mask" mechanism of IPv4).
> 
> It should be perfectly feasible to allocate a /64 to a router interface in an IPAM tool, but then configure the equivalent of n prefixes each containing 1 or 2 address with prefix length /128 or /127 (depending on the implementation) for n hosts and which are equally sparsely assigned across the /64, and all sharing a single L2 link. Even end node to end node communication should flow directly (avoiding the router) as these prefixes could be marked "on link" via the AdvOnLinkFlag = L flag.
> 
> Anyway, in the majority of modern day wired deployments, the delta cost of L3 over L2 is minimal, as the most dominant form of wired LAN (Ethernet) are commonly switched in silicon, and multicast has to be emulated. Wired Ethernet has in effect become a point to point protocol. So deploying a dedicated L3 connection per end host is both technically and financially feasible, and may have significant operational benefits in certain scenarios. Allocating a /64 for each such port on a L3 switch is sub optimal IMHO. And by the same privacy argument, allocating n hosts sparsely over a single /64 of address space spread over multiple L3 interfaces would have the same net effect for off-net attackers as n hosts sharing a flat L2 LAN using a single /64, with the added advantage that even locally the individual end nodes would not be able to passively observe each other's traffic or addresses (advantageous in shared hosting environments).
> 
> An attacker that happens to discover the address of node A would not find this information helpful in attempts to locate node B, any more than if it were a flat /64.
> 
> So to me it's a non-relevant argument one way or the other.
> 
> Section 2.2
> 
> It may not be a widely held belief, but I remain concerned about the potential for resource exhaustion for any number of processes due to the "massive over sizing" of prefixes to /64: any number of untested processes that track state based on /128 IPv6 address could be attacked. The flip side of expanding privacy through address obfuscation at IID level is that the source space available for attacks also increases. ND cache exhaustion is probably just the first issue we've discovered of many that exist. This may have knock on operational consequences, which in the IPv4 world have relied on the scarcity of IPv4 address space to be able to operate correctly under stress scenarios. We're going to discover who has been swimming naked when the tide goes out. Call that FUD, or operational expediency, whichever you like. BCP38 has saved me on a number of occasions when all else has failed.
> 
> 
> -- 
> Regards,
> RayH
> 
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------