[OPSEC] Fwd: [v6ops] draft-ietf-opsec-v6

Fred Baker <fredbaker.ietf@gmail.com> Sat, 30 March 2019 10:33 UTC

Return-Path: <fredbaker.ietf@gmail.com>
X-Original-To: opsec@ietfa.amsl.com
Delivered-To: opsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 709721200FB for <opsec@ietfa.amsl.com>; Sat, 30 Mar 2019 03:33:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level:
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wgCoUE-pFumB for <opsec@ietfa.amsl.com>; Sat, 30 Mar 2019 03:33:19 -0700 (PDT)
Received: from mail-wm1-x32c.google.com (mail-wm1-x32c.google.com [IPv6:2a00:1450:4864:20::32c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CCD3C120026 for <opsec@ietf.org>; Sat, 30 Mar 2019 03:33:18 -0700 (PDT)
Received: by mail-wm1-x32c.google.com with SMTP id v14so5596873wmf.2 for <opsec@ietf.org>; Sat, 30 Mar 2019 03:33:18 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:mime-version:subject:date:references:cc:to:message-id; bh=rGK2yfXy1CZ0k6UHkZ0kzNVwOQUbFG2DR4kBtyr+FVI=; b=iIn4UjH52SXfD6ybZ32awUPhoLfg9ACJx4dav2uMPMv1HwQWw7rFJCif4xbyTgG5Ef Mc7pW+GCXcjLNGjbUqsJE0jMpxv3sbdzjawHWpGuh0AA+FKvkn820ETTaaFPJc9i/weG m6+f5uiZABo652wixuwhdV/QmXecaV1bPSi3C/W+TyasctXNRUFwqc/WEb/i/qFaNwDP ZD7/9ofFj+OQoRAN/xCl/12KRpRizRl9AT1gyFbNPIbpzLdy7UTbORScBgRDhRiPEH+b XOHuutNE2V1/xre4zZ4+icHN6tqNA6dgBZYWQlbw1WuvJD3q/xQZhxr+akqcC1Q/J4Ka EcQQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:mime-version:subject:date:references:cc:to :message-id; bh=rGK2yfXy1CZ0k6UHkZ0kzNVwOQUbFG2DR4kBtyr+FVI=; b=ImMuwAxJ/yPykFOlNn/mgr8taD6GCUmkHpfh0ztCZfzC0hAIVKKKhC4PRm8nQQQHq6 MUuERrzI7DNH+j8uZ2okB+o44LA2do5ezboWc/ZT5TOTqclzyAGZqEvFLS03iQKg2lxC XiqMXgmtLXazb2ky5rLC9XzQ9hFwboHK4bNE6MplJvXGu+F27vpaZmBEmFm1sfFG6GK1 9y5k3t7x3Plp0RXa8NtyrsjfssfjPM6e+y0nIHLw+GQ3hwVMZMWmGI4DK2mHrxIgGRL3 kOvjuTwe01LhrvwSWrBtWThV0Ubmn9mWkUf3O1MJ2FSKIYJcmF+U8i8mUydhgGQkaXId e/kw==
X-Gm-Message-State: APjAAAUna+yxlkhaBLzjWVEAopao4KlgtLkVh3B0pOQi9pnbUa9pSCyl 4qzQb46jaetR9LA3LLzz2r41hEKxySY=
X-Google-Smtp-Source: APXvYqzcSCZvXlwP2y/x/R1PqIjB9byj4YB3t5N3LA+3bvf3xfAQDx62zLmXxn6xsvg2m8JRVGds6g==
X-Received: by 2002:a1c:4187:: with SMTP id o129mr6072608wma.57.1553941996990; Sat, 30 Mar 2019 03:33:16 -0700 (PDT)
Received: from [10.0.6.52] ([80.188.36.206]) by smtp.gmail.com with ESMTPSA id y8sm4685315wrm.8.2019.03.30.03.33.15 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Sat, 30 Mar 2019 03:33:15 -0700 (PDT)
From: Fred Baker <fredbaker.ietf@gmail.com>
Content-Type: multipart/signed; boundary="Apple-Mail=_C72B5315-7AC7-45FC-B670-417018D2613E"; protocol="application/pgp-signature"; micalg="pgp-sha512"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.8\))
Date: Sat, 30 Mar 2019 11:33:13 +0100
References: <74D0026C-9DB6-43E1-8674-6AEF84D4DFF8@consulintel.es>
To: opsec@ietf.org
Message-Id: <3A7EB7FA-EBA4-4BD8-9E62-116641C66AE6@gmail.com>
X-Mailer: Apple Mail (2.3445.104.8)
Archived-At: <https://mailarchive.ietf.org/arch/msg/opsec/xzRLX9qWQCpPD0eHgMUCrDlymgo>
Subject: [OPSEC] Fwd: [v6ops] draft-ietf-opsec-v6
X-BeenThere: opsec@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: opsec wg mailing list <opsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsec>, <mailto:opsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/opsec/>
List-Post: <mailto:opsec@ietf.org>
List-Help: <mailto:opsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsec>, <mailto:opsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 30 Mar 2019 10:33:23 -0000

This was sent to v6ops instead of opsec

> From: JORDI PALET MARTINEZ <jordi.palet=40consulintel.es@dmarc.ietf.org>
> Subject: Re: [v6ops] draft-ietf-opsec-v6
> Date: March 29, 2019 at 5:13:32 PM GMT+1
> To: IPv6 Operations <v6ops@ietf.org>
> 
> Hi all,
> 
> Thanks for the reminder, overdue task for me for a while ... So here is it (partially, as I'm working in the plane, so more in following emails).
> 
> 2.1.  Addressing Architecture
> 
>   Once an address allocation has been assigned, there should be some
>   thought given to an overall address allocation plan.  With the
>   abundance of address space available, an address allocation may be
>   structured around services along with geographic locations, which
>   then can be a basis for more structured security policies to permit
>   or deny services between geographic regions.
> 
> One of MOST frequent issues when you start implementing IPv6 is that people tend to go to their RIR for a default allocation/assignment, and then try to make the addressing plan with what they have, instead of planning correctly and then going to the RIR. The result is many cases is ISPs providing a single /64 to customers, which is really bad.
> 
> Also, if the document is for operators and enterprises, you need to differentiate among allocation and assignment.
> 
> So, I will like to suggest rewording as:
> "A key task before starting an IPv6 deployment, once the sufficient knowledge has been acquired, is to prepare an addressing plan. With the abundance of address space available, an addressing plan may be structured around services along with geographic locations, which then can be a basis for more structured security policies to permit or deny services between geographic regions.
> 
> This may be seen as a simple task, but it is an activity within the IPv6 deployment project, that requires a very in depth thinking and it makes sense to invest as much time as required on it. Only once that addressing plan has been designed is the right time to go to the relevant Regional Internet Registry (RIR) to ask for an allocation or an assignment."
> 
> Then, in the next p.:
> 
>   A common question is whether companies should use Provider
>   Independent (PI) vs Provider Allocated (PA) space [RFC7381], but from
>   a security perspective there is little difference.
> 
> Replace with
> 
> "A common question is whether companies should use Provider Independent (PI) vs Provider Allocated (PA) space [RFC7381], but from a security perspective there is little difference. From the RIRs policies perspective, PI space is assigned to organizations if they don't need to sub-assign to third parties, while PA is allocated to operators or organizations that will sub-assign to third parties. For example, a big corporation may have different subsidiaries and they are legally different entities, so in this case each one need their own PI space, or the responsible for the network need to get allocated PA space. A public institution such as a Ministry, may get a PI, if is only for their own use and not for other government institutions, however if it is the government entity managing the network that interconnects several institutions and provide each one their own space, they need to obtain PA space."
> 
> And continue with "However, one ..." in a new p.
> 
> 2.1.1.  Statically Configured Addresses
> 
> Nit:
> The use of well-known(such
> The use of well-known (such
> 
> There are many scanning techniques and more to
>   come possible, hence, operators should never relly on the 'impossible
>   to find because my address is random' paradigm.
> 
> I will say:
> 
> There are many scanning techniques and more to
>   come possible, hence, operators should never relly on the 'impossible
>   to find because my address is random' paradigm, even if it is a good practice to have the statically configured addresses randomly distributed across the /64 subnets and use always DNS.
> 
> 2.1.2.  Use of ULAs
> 
> I will add:
> 
> "Even if today a network is not connected to Internet, and it looks like it will not be in the future, things change and it is a considerable effort to renumber it. So it may be relevant to obtain an IPv6 PI assignment from the RIR and have a stable addressing space since day one."
> 
> 2.1.3.  Point-to-Point Links
> 
> I disagree with the mention that RFC6164 indicate that /127 is the way. RFC6164 is about "routers must support it". See draft-palet-v6ops-p2p-links (new version coming soon, so may be a reference to it). So I think some rewording is needed here, specially because router vendors sorted out those bugs long time ago.
> 
> 2.1.4.  Temporary Addresses - Privacy Extensions for SLAAC
> 
> I will add, that "In those cases where accounting/auditing/extreme granular security is required, because is impractical to use DHCPv6 due to the lack of support in Android based OSs, link-layer security such as IEEE802.1x may be used."
> 
> 2.1.6.  DHCP/DNS Considerations
> 
> This probably belongs to another section (may be a specific one for DNS), but related:
> 
> "If there is a need for Statically Configured Addresses, it should considered using DNS to refer to them, so no hard-coded addresses are used by applications. This facilitates also debugging/troubleshooting as avoids remembering addresses. In may be advisable to have multiple-faced DNS ("views") in order to ensure that internal-only used hosts, aren't published globally and full zone transfers are disallowed."
> 
> 2.1.7.  Using a /64 per host
> 
> I will add:
> 
> "This also avoids the need to "proxy" or NAT-like operations if multiple VMs, containers, or similar ones, need their own IPv6 address from a single /64 ."
> 
> Regards,
> Jordi
> 
> 
> 
> El 29/3/19 6:19, "v6ops en nombre de Fred Baker" <v6ops-bounces@ietf.org en nombre de fredbaker.ietf@gmail.com> escribió:
> 
>    Yesterday, the authors of an opec draft asked us for comments on their draft, which is in a second WGLC in opec (opsec@ietf.org). You may have missed the character string:
> 
>    https://datatracker.ietf.org/doc/draft-ietf-opsec-v6
>    https://tools.ietf.org/html/draft-ietf-opsec-v6
>      "Operational Security Considerations for IPv6 Networks", Eric Vyncke,
>      Chittimaneni Kk, Merike Kaeo, Enno Rey, 2019-03-11,
> 
>    I'd encourage people to read it and comment on the opec list.
> 
>    --------------------------------------------------------------------------------
>    Victorious warriors win first and then go to war,
>    Defeated warriors go to war first and then seek to win.
>         Sun Tzu
> 
>    _______________________________________________
>    v6ops mailing list
>    v6ops@ietf.org
>    https://www.ietf.org/mailman/listinfo/v6ops
> 
> 
> 
> 
> **********************************************
> IPv4 is over
> Are you ready for the new Internet ?
> http://www.theipv6company.com
> The IPv6 Company
> 
> This electronic message contains information which may be privileged or confidential. The information is intended to be for the exclusive use of the individual(s) named above and further non-explicilty authorized disclosure, copying, distribution or use of the contents of this information, even if partially, including attached files, is strictly prohibited and will be considered a criminal offense. If you are not the intended recipient be aware that any disclosure, copying, distribution or use of the contents of this information, even if partially, including attached files, is strictly prohibited, will be considered a criminal offense, so you must reply to the original sender to inform about this communication and delete it.
> 
> 
> 
> _______________________________________________
> v6ops mailing list
> v6ops@ietf.org
> https://www.ietf.org/mailman/listinfo/v6ops

--------------------------------------------------------------------------------
The fact that there is a highway to hell and a stairway to heaven is an interesting comment on projected traffic volume...