Re: [Madinas] I-D Action: draft-ietf-madinas-mac-address-randomization-10.txt

Bob Hinden <bob.hinden@gmail.com> Fri, 12 January 2024 00:38 UTC

Return-Path: <bob.hinden@gmail.com>
X-Original-To: madinas@ietfa.amsl.com
Delivered-To: madinas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 40D81C14F68C for <madinas@ietfa.amsl.com>; Thu, 11 Jan 2024 16:38:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.104
X-Spam-Level:
X-Spam-Status: No, score=-7.104 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id liRdPGcpprxA for <madinas@ietfa.amsl.com>; Thu, 11 Jan 2024 16:38:52 -0800 (PST)
Received: from mail-yw1-x1135.google.com (mail-yw1-x1135.google.com [IPv6:2607:f8b0:4864:20::1135]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6C2CEC14F5EC for <madinas@ietf.org>; Thu, 11 Jan 2024 16:38:52 -0800 (PST)
Received: by mail-yw1-x1135.google.com with SMTP id 00721157ae682-5e7bb1e0db8so53740177b3.0 for <madinas@ietf.org>; Thu, 11 Jan 2024 16:38:52 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1705019931; x=1705624731; darn=ietf.org; h=references:to:cc:in-reply-to:date:subject:mime-version:message-id :from:from:to:cc:subject:date:message-id:reply-to; bh=Zlo0BRxh0TqYpX3m+nzobWRZx0exv03fPHC/k8pp5Gk=; b=eOXPqbXYAIVgD78h+Si2TCjXY2030dsvRf0I4GLr7804RAFb6EPtNIB0tjFbbQfeWb XOEsK3VGjrjzh9SXU8YRuQO+18YkpUjkurXAAFNMvi+bhNpqmxn+PjuxWmXP8ji0x5m2 QrRWnXFPwW/e99bv9k0VxRvcLgqTT3BhWoaExLkFIt1w96bqzPIoW3eKOBCBf0WDHIHZ r+UvljOm8mV4XjxvotEi1kIgjk/Vqnme80AEv+geEWgIZqzwptekKMNEagToZ0ylDubr 7CxOONgvBHDhbzCT1Un/VqjyH7/y+H4kW2Jg30vApaacUNkmMGFBi8lWRgxFQwOpOi0e RkfA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1705019931; x=1705624731; h=references:to:cc:in-reply-to:date:subject:mime-version:message-id :from:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=Zlo0BRxh0TqYpX3m+nzobWRZx0exv03fPHC/k8pp5Gk=; b=FHPED3BA4vxXajgLpcJ+UCCeQGCRkx4ijbK8jWo51PRsBhff3c7fphopX8PYvRrMBu evrymc6pY10tN0VHf4s66wgfMeLinOOxtMrtPDVu6zjFlxR2KlAG1a3ud5s8LaI2Jljt ZVvwAOV/1bsvo3FYNwfeqzefQtrEkCeSzwNzdTpPDZmalkxN/w7wA6+T4BvtEKdtXS7/ q0Reh5j4ImsKElpJ1IicN/DxSwvbiUtqOgwz6i4EDsuJ2P6ImoTLWgtyFKZNIIjeDK6m SlI5cYccUXWtXImbwQVMIZFX3gvahOzSectnMZtSdLIpSYcpJiEY0tD6G9xmTdyqj7sc yrIg==
X-Gm-Message-State: AOJu0YwwCGK2lEuvGTMnv0+Ug1raLUPFTX7YAkcKS68feDF9CClNavLu tEUjon+W64OtYCnEir1vii3kO09ZDsk=
X-Google-Smtp-Source: AGHT+IGCVrtmg6vL7cz0USO1hpD26P9BdZB8duNWb8qVPTgqXrg2f00VUXCXVi3nRVMpjmH4J2m2+w==
X-Received: by 2002:a0d:d681:0:b0:5f0:c159:8177 with SMTP id y123-20020a0dd681000000b005f0c1598177mr687326ywd.19.1705019931203; Thu, 11 Jan 2024 16:38:51 -0800 (PST)
Received: from smtpclient.apple (99-31-208-116.lightspeed.sntcca.sbcglobal.net. [99.31.208.116]) by smtp.gmail.com with ESMTPSA id w16-20020a81a210000000b005e5e15f07dfsm862711ywg.51.2024.01.11.16.38.50 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Thu, 11 Jan 2024 16:38:50 -0800 (PST)
From: Bob Hinden <bob.hinden@gmail.com>
Message-Id: <E8162B32-363A-4B7C-86D6-5D7B2AD1F03E@gmail.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_E999690A-4163-4F6F-8356-31F542CF9D27"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3774.300.61.1.2\))
Date: Thu, 11 Jan 2024 16:38:29 -0800
In-Reply-To: <170497095275.13340.12464306135239574020@ietfa.amsl.com>
Cc: Bob Hinden <bob.hinden@gmail.com>
To: madinas@ietf.org
References: <170497095275.13340.12464306135239574020@ietfa.amsl.com>
X-Mailer: Apple Mail (2.3774.300.61.1.2)
Archived-At: <https://mailarchive.ietf.org/arch/msg/madinas/O2VjYqO2z72CI-S4RihEz9ye1x4>
Subject: Re: [Madinas] I-D Action: draft-ietf-madinas-mac-address-randomization-10.txt
X-BeenThere: madinas@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: MAC Address Device Identification for Network and Application Services <madinas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/madinas>, <mailto:madinas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/madinas/>
List-Post: <mailto:madinas@ietf.org>
List-Help: <mailto:madinas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/madinas>, <mailto:madinas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 12 Jan 2024 00:38:56 -0000

I believe I made similar comments a while back.   Repeating myself.

6. MAC randomization-related activities at the IETF

This title is ambiguous (and Section 4 and 5 the same problem).   “at the IETF” sounds like at an IETF meeting and “activities” isn’t clear.  Protocols are not “activities”   This should be something like:

          MAC randomization in IETF Protocol Standards

The text in this section starts with:

Several IP address assignment mechanisms such as the IPv6 stateless autoconfiguration techniques (SLAAC) [RFC4862] generate the Interface Identifier (IID) of the address from its MAC address (via EUI64), which then becomes visible to all IPv6 communication peers. This potentially allows for global tracking of a device at L3 from any point on the Internet. Besides, the prefix part of the address provides meaningful insights of the physical location of the device in general, which together with the MAC address-based IID, makes it easier to perform global device tracking.

This is wrong and out dated.   RFC 8064 "Recommendation on Stable IPv6 Interface Identifiers” published in 2017 formally updated IPv6 IID selection to prefer RFC 7217 IIDs and recommends against embedding stable link-layer address in IPv6 IIDS.

This section needs a serious rewrite.

Today, I also noted in third paragraph of this section a reference to [RFC4191].  The text is:

[RFC4191] identifies and describes the privacy issues associated with embedding MAC stable addressing information into the IPv6 addresses (as part of the IID) and describes some mechanisms to mitigate the associated problems.

RFC4191 is "Default Router Preferences and More-Specific Routes”.  This has nothing to do with embedding MAC stable addresss.

Bob


> On Jan 11, 2024, at 3:02 AM, internet-drafts@ietf.org wrote:
> 
> Internet-Draft draft-ietf-madinas-mac-address-randomization-10.txt is now
> available. It is a work item of the MAC Address Device Identification for
> Network and Application Services (MADINAS) WG of the IETF.
> 
>   Title:   Randomized and Changing MAC Address state of affairs
>   Authors: Juan Carlos Zuniga
>            Carlos J. Bernardos
>            Amelia Andersdotter
>   Name:    draft-ietf-madinas-mac-address-randomization-10.txt
>   Pages:   18
>   Dates:   2024-01-11
> 
> Abstract:
> 
>   Internet privacy has become a major concern over the past few years.
>   Users are becoming more aware that their online activity leaves a
>   vast digital footprint, that communications are not always properly
>   secured, and that their location and actions can be easily tracked.
>   One of the main factors for the location tracking issue is the wide
>   use of long-lasting identifiers, such as MAC addresses.
> 
>   There have been several initiatives at the IETF and the IEEE 802
>   standards committees to overcome some of these privacy issues.  This
>   document provides an overview of these activities, with the intention
>   to inform the technical community about them, and help coordinate
>   between present and future standardization activities.
> 
> The IETF datatracker status page for this Internet-Draft is:
> https://datatracker.ietf.org/doc/draft-ietf-madinas-mac-address-randomization/
> 
> There is also an HTMLized version available at:
> https://datatracker.ietf.org/doc/html/draft-ietf-madinas-mac-address-randomization-10
> 
> A diff from the previous version is available at:
> https://author-tools.ietf.org/iddiff?url2=draft-ietf-madinas-mac-address-randomization-10
> 
> Internet-Drafts are also available by rsync at:
> rsync.ietf.org::internet-drafts
> 
> 
> -- 
> Madinas mailing list
> Madinas@ietf.org
> https://www.ietf.org/mailman/listinfo/madinas