Re: [Madinas] I-D Action: draft-ietf-madinas-mac-address-randomization-10.txt

Bob Hinden <bob.hinden@gmail.com> Fri, 12 January 2024 19:03 UTC

Return-Path: <bob.hinden@gmail.com>
X-Original-To: madinas@ietfa.amsl.com
Delivered-To: madinas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BA301C14F682 for <madinas@ietfa.amsl.com>; Fri, 12 Jan 2024 11:03:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.107
X-Spam-Level:
X-Spam-Status: No, score=-1.107 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, FREEMAIL_REPLY=1, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id p1Vmdkd7jo8g for <madinas@ietfa.amsl.com>; Fri, 12 Jan 2024 11:03:49 -0800 (PST)
Received: from mail-yw1-x1134.google.com (mail-yw1-x1134.google.com [IPv6:2607:f8b0:4864:20::1134]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E9117C14F5F6 for <madinas@ietf.org>; Fri, 12 Jan 2024 11:03:44 -0800 (PST)
Received: by mail-yw1-x1134.google.com with SMTP id 00721157ae682-5f07f9d57b9so68076317b3.1 for <madinas@ietf.org>; Fri, 12 Jan 2024 11:03:44 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1705086223; x=1705691023; darn=ietf.org; h=references:to:cc:in-reply-to:date:subject:mime-version:message-id :from:from:to:cc:subject:date:message-id:reply-to; bh=eXQMPWWU0QyZ1b763DCLVw9wACFDf+yEQxX2V1lWgPM=; b=ScZyuIju9fgkWOaaut/oF8++y+t4SJtVtUtOZ9Zfy0iLq1EWSZWCxGiSIScwnlu6C+ De8mSXvKJb+chOwqag6r1jI8rOjLJMh/esMH0Wgv4WxCVk7xOBsiP1GDbj6jFnF4f/3h 7ni22Zh3BFvyW07xiBs4RXHF90AoM/LMzVZSeRq+FDonrCnQ4TiPQT329jSpHCE+UgTN +XmqdNtDgaBdZy6FGqxIIo+qgoxvmQmQM4BzR3/Gp338Htb5Nn+5JabO0GoaWLvK2lup iG3Om/nn2EBy41et2uIZr7xfQMGsToRaYDvpo7J8802dzefSPZI9WN4h11udW5JKw/Qo fZbA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1705086223; x=1705691023; h=references:to:cc:in-reply-to:date:subject:mime-version:message-id :from:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=eXQMPWWU0QyZ1b763DCLVw9wACFDf+yEQxX2V1lWgPM=; b=maCR3IrASXn+VW4ld632PglmoMBm5wB4lHV8QkC6ppuF8SEBUgmd8TOI1f6khxu4n4 +BPtzdNvwP4wIPgRDxorEYK43bZN9oQBv54O98F6eSKBapqd8UI400rOdHPNidzF22QE ux6ZHjtl42yf0sJFcic+egRHin/lw7LmE9ESfKFb17EIbePcyVCQheo9bU/AYKJl89ZG MoRDRo9nqqoDanvv+ZZPLIQIjHM/oQfNLcShfj424zJdAry99eDuXGc6BsQHmsIcFia4 N/HjB/MyiWbc3AnMKjcWBz9HV6Tih7GWr5BD2BmJFwckRXVSrf6rPAQfc16I/zuVteNS xsnw==
X-Gm-Message-State: AOJu0YyRYLTM8K7MH3/ne4EqCd5x4pPq8Y8yOSMjDzo63D67Oaw2uk4t lxZVidohS2fWhru7HVU4NQ2rinc1bbk=
X-Google-Smtp-Source: AGHT+IGlD+pEblGU9F//tYPzSF74y7FVNDxDC+alaP9IK1uTO08OtcZB3H5MLvZRmqVrG5hdkp2nYg==
X-Received: by 2002:a0d:dbc7:0:b0:5fb:9deb:d464 with SMTP id d190-20020a0ddbc7000000b005fb9debd464mr295304ywe.83.1705086223544; Fri, 12 Jan 2024 11:03:43 -0800 (PST)
Received: from smtpclient.apple (99-31-208-116.lightspeed.sntcca.sbcglobal.net. [99.31.208.116]) by smtp.gmail.com with ESMTPSA id m131-20020a0dca89000000b005d40a826831sm1572625ywd.115.2024.01.12.11.03.42 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Fri, 12 Jan 2024 11:03:43 -0800 (PST)
From: Bob Hinden <bob.hinden@gmail.com>
Message-Id: <D0236D57-07BB-45B4-B79D-DE614387AC6C@gmail.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_BA6E44A5-045D-47E3-8914-48A07D7D6437"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3774.300.61.1.2\))
Date: Fri, 12 Jan 2024 11:03:21 -0800
In-Reply-To: <CAN-Dau2BXr=44-Tc4=EwzXsjkpOeocCAziJCq_wa4J6uEdYUxg@mail.gmail.com>
Cc: Bob Hinden <bob.hinden@gmail.com>, sarikaya@ieee.org, madinas@ietf.org
To: David Farmer <farmer@umn.edu>
References: <170497095275.13340.12464306135239574020@ietfa.amsl.com> <E8162B32-363A-4B7C-86D6-5D7B2AD1F03E@gmail.com> <CAC8QAcec5oU=+xMzw4GFn7gyypLsWy4Eu2ybVE3pg3eGp_5GSg@mail.gmail.com> <CAN-Dau2BXr=44-Tc4=EwzXsjkpOeocCAziJCq_wa4J6uEdYUxg@mail.gmail.com>
X-Mailer: Apple Mail (2.3774.300.61.1.2)
Archived-At: <https://mailarchive.ietf.org/arch/msg/madinas/qQZHUuzLXYQ4LgYJStq2__ZA73U>
Subject: Re: [Madinas] I-D Action: draft-ietf-madinas-mac-address-randomization-10.txt
X-BeenThere: madinas@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: MAC Address Device Identification for Network and Application Services <madinas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/madinas>, <mailto:madinas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/madinas/>
List-Post: <mailto:madinas@ietf.org>
List-Help: <mailto:madinas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/madinas>, <mailto:madinas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 12 Jan 2024 19:03:51 -0000


> On Jan 12, 2024, at 10:10 AM, David Farmer <farmer@umn.edu> wrote:
> 
> 
> 
> On Fri, Jan 12, 2024 at 11:31 AM Behcet Sarikaya <sarikaya2012@gmail.com <mailto:sarikaya2012@gmail.com>> wrote:
>> Hi Bob,
>> 
>> 
>> On Thu, Jan 11, 2024 at 6:39 PM Bob Hinden <bob.hinden@gmail.com <mailto:bob.hinden@gmail.com>> wrote:
>>> I believe I made similar comments a while back.   Repeating myself.
>>> 
>>> 6. MAC randomization-related activities at the IETF
>>> 
>>> This title is ambiguous (and Section 4 and 5 the same problem).   “at the IETF” sounds like at an IETF meeting and “activities” isn’t clear.  Protocols are not “activities”   This should be something like:
>>> 
>>>           MAC randomization in IETF Protocol Standards
>>> 
>>> The text in this section starts with:
>>> 
>>> Several IP address assignment mechanisms such as the IPv6 stateless autoconfiguration techniques (SLAAC) [RFC4862] generate the Interface Identifier (IID) of the address from its MAC address (via EUI64), which then becomes visible to all IPv6 communication peers. This potentially allows for global tracking of a device at L3 from any point on the Internet. Besides, the prefix part of the address provides meaningful insights of the physical location of the device in general, which together with the MAC address-based IID, makes it easier to perform global device tracking.
>>> 
>>> This is wrong and out dated.   RFC 8064 "Recommendation on Stable IPv6 Interface Identifiers” published in 2017 formally updated IPv6 IID selection to prefer RFC 7217 IIDs and recommends against embedding stable link-layer address in IPv6 IIDS.
>>> 
>>> This section needs a serious rewrite.
>>> 
>>> Today, I also noted in third paragraph of this section a reference to [RFC4191].  The text is:
>>> 
>>> [RFC4191] identifies and describes the privacy issues associated with embedding MAC stable addressing information into the IPv6 addresses (as part of the IID) and describes some mechanisms to mitigate the associated problems.
>>> 
>>> RFC4191 is "Default Router Preferences and More-Specific Routes”.  This has nothing to do with embedding MAC stable addresss.
>>> 
>> 
>> 
>> It seems like RFC 4191 was a typo, it should have been 
>> RFC 4941 Privacy Extensions for Stateless Address Autoconfiguration in IPv6 
> 
> Yes, that seems likely. However, RFC 4941 has been obsoleted by RFC 8981, Temporary Address Extensions for Stateless Address Autoconfiguration in IPv6

+1

Bob


>  
> Thanks
> --
> ===============================================
> David Farmer               Email:farmer@umn.edu <mailto:Email%3Afarmer@umn.edu>
> Networking & Telecommunication Services
> Office of Information Technology
> University of Minnesota   
> 2218 University Ave SE        Phone: 612-626-0815
> Minneapolis, MN 55414-3029   Cell: 612-812-9952
> ===============================================