Re: [OPSEC] [v6ops] ULAs [was WGLC for draft-ietf-opsec-v6]

Ted Lemon <mellon@fugue.com> Wed, 19 April 2017 13:27 UTC

Return-Path: <mellon@fugue.com>
X-Original-To: opsec@ietfa.amsl.com
Delivered-To: opsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E5B5A129504 for <opsec@ietfa.amsl.com>; Wed, 19 Apr 2017 06:27:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level:
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=fugue-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cQ7vJSjeBjn0 for <opsec@ietfa.amsl.com>; Wed, 19 Apr 2017 06:27:15 -0700 (PDT)
Received: from mail-qk0-x22b.google.com (mail-qk0-x22b.google.com [IPv6:2607:f8b0:400d:c09::22b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2FA1212957F for <opsec@ietf.org>; Wed, 19 Apr 2017 06:27:08 -0700 (PDT)
Received: by mail-qk0-x22b.google.com with SMTP id h67so19713181qke.0 for <opsec@ietf.org>; Wed, 19 Apr 2017 06:27:08 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fugue-com.20150623.gappssmtp.com; s=20150623; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=NaiZCxXPQ4mqykwTSBS7Y2NfyTkTfZtIUDm4TEDRZZY=; b=M9zKJPhsqnK8XNWEIzvBfJUXP6S+47Nf6ziojRxNMLmY1v6NCvYNjkTdrAs14dGcT4 zyu7+CE/01crye0d2c3c13i36O5cKipw5pX+3mVvLBnDojIFLmX5q2mQ/6HJe36bB/eQ o/ZkGA+EZygwkT3v+7qGcGrwRuK6KyccAsTzBJ+kBwdMoQrF+yh3ik+QpEc0n+be7LWV zksTWd6V9f7+2iuKn2GRT1YWGOvvoy3et5w/Kt9f5BNe+7eLt4yJQK5d6wads0klVTQt W4+oRnx945PqEeL61VCuSsvaRw7BDkYu4O6IgRGAXSiVoA3J0obEIcm9R5GNhZZXEXiG EEBg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=NaiZCxXPQ4mqykwTSBS7Y2NfyTkTfZtIUDm4TEDRZZY=; b=uRWCQ6RXWnoN5wmwK/6+16v6vtzt0hAW9LyfGvrpif6LYaVMZO7JfkIIoZbPwq3twP lxLGMQyByqvA5n/HF0BCFtm2BEr3mnPvCz7eIhiAKxPI37lWgq4ywvtsnWAPEJogVefn HQL5thK1lGAfDZhxUr3n8u3BTTN5Aa2YmNLgK7EfjCqzF7ojEXBWVhAJsxeLKklqh9GS B2YFR6mgsLDzfeb5a9tZaMe4kUgmdL2FYRTGjFEq1TpKOziNt1Y3JZFKTiobg9OXdRDO yMWwnMOVNKJD2i3Z2yQNbMlqYB36abjAXNXKIEArdZtWEz2jif03UI7ZefghygpX+wet aDog==
X-Gm-Message-State: AN3rC/6MP1TrPQd0g6g2BgCMph1QHPjkK+kmknJYVnaQfCb4pDwyIyI+ ZU73M8VoV3Ajpw==
X-Received: by 10.55.115.67 with SMTP id o64mr2349407qkc.216.1492608427286; Wed, 19 Apr 2017 06:27:07 -0700 (PDT)
Received: from [10.0.30.228] (c-73-167-64-188.hsd1.ma.comcast.net. [73.167.64.188]) by smtp.gmail.com with ESMTPSA id t45sm236437qtt.9.2017.04.19.06.27.06 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 19 Apr 2017 06:27:06 -0700 (PDT)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 10.3 \(3273\))
From: Ted Lemon <mellon@fugue.com>
In-Reply-To: <098b84a4-80d4-2404-72a1-5d1cd32a9968@gmail.com>
Date: Wed, 19 Apr 2017 09:27:04 -0400
Cc: "opsec@ietf.org" <opsec@ietf.org>, "v6ops@ietf.org WG" <v6ops@ietf.org>, "6man@ietf.org" <6man@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <D5366FC0-94CB-4113-963C-A2F972888F05@fugue.com>
References: <55cb757e-ee2d-4818-9fc2-67d559006f34@me.com> <3E179F05-ACCD-4290-A65F-57E4202FAA15@icloud.com> <CAKD1Yr019Ga4jg6gVUHnTwh89hWArXKdAcAYEcW0m4gskrO7Ow@mail.gmail.com> <098b84a4-80d4-2404-72a1-5d1cd32a9968@gmail.com>
To: Brian E Carpenter <brian.e.carpenter@gmail.com>
X-Mailer: Apple Mail (2.3273)
Archived-At: <https://mailarchive.ietf.org/arch/msg/opsec/elGGQnzwXQh7XRPhjiWAlzlqQ28>
Subject: Re: [OPSEC] [v6ops] ULAs [was WGLC for draft-ietf-opsec-v6]
X-BeenThere: opsec@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: opsec wg mailing list <opsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsec>, <mailto:opsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/opsec/>
List-Post: <mailto:opsec@ietf.org>
List-Help: <mailto:opsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsec>, <mailto:opsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Apr 2017 13:27:18 -0000

This would be a huge improvement on the existing text—thanks for writing it!

> On Apr 19, 2017, at 12:02 AM, Brian E Carpenter <brian.e.carpenter@gmail.com> wrote:
> 
> There are several issues in this section, not just the NAT:
> 
>> 2.1.2.  Use of ULAs
>> 
>>   ULAs are intended for scenarios where IP addresses will not have
>>   global scope so they should not appear in the global BGP routing
>>   table. 
> 
> We need to align that with the clarification in draft-bchv-rfc6890bis:
> 
> ULAs are intended for scenarios where IP addresses are not globally
> reachable, despite formally having global scope. They must not appear
> in the routing system outside the administrative domain where they
> are considered valid. Therefore, packets with ULA source and/or
> destination addresses MUST be filtered at the domain boundary.
> 
>>   ULAs could be useful for infrastructure hiding as described in
>>   RFC4864 [RFC4864].  Alternatively Link-Local addresses RFC7404
>>   [RFC7404] could also be used.
> 
> LL addresses don't help if you have multiple LANs. I suggest simply
> deleting the second sentence; it will confuse people.
> 
>> Although ULAs are supposed to be used
>> in conjunction with global addresses for hosts that desire external
>> connectivity
> 
> Change that to
> 
> ULAs may be used for internal communication, in conjunction with
> globally reachable unicast addresses (GUAs) for hosts that also
> require external connectivity through a firewall. For this reason,
> no form of address translation is required in conjunction with ULAs.
> 
> Then I suggest deleting *all* the rest of the section, but add this
> at the end:
> 
> Using ULAs as described here might simplify the filtering rules
> needed at the domain boundary, by allowing a regime in which
> only hosts that require external connectivity possess a globally
> reachable address. However, this does not remove the need for
> careful design of the filtering rules.
> 
> Thus the whole section would read (with a little more editing):
> 
> 2.1.2.  Use of Unique Local Addresses
> 
> Unique Local Addresses (ULAs) [RFC4193] are intended for scenarios
> where IP addresses are not globally reachable, despite formally
> having global scope. They must not appear in the routing system
> outside the administrative domain where they are considered valid.
> Therefore, packets with ULA source and/or destination addresses
> MUST be filtered at the domain boundary.
> 
> ULAs are assigned within pseudo-random /48 prefixes created as
> specified in [RFC4193]. They could be useful for infrastructure
> hiding as described in [RFC4864].
> 
> ULAs may be used for internal communication, in conjunction with
> globally reachable unicast addresses (GUAs) for hosts that also
> require external connectivity through a firewall. For this reason,
> no form of address translation is required in conjunction with ULAs.
> 
> Using ULAs as described here might simplify the filtering rules
> needed at the domain boundary, by allowing a regime in which
> only hosts that require external connectivity possess a globally
> reachable address. However, this does not remove the need for
> careful design of the filtering rules.
> 
>     Brian
> 
> 
> 
> 
> 
> 
> 
> _______________________________________________
> v6ops mailing list
> v6ops@ietf.org
> https://www.ietf.org/mailman/listinfo/v6ops