Re: [secdir] secdir review of draft-ietf-6man-why64-05
Brian E Carpenter <brian.e.carpenter@gmail.com> Sun, 28 September 2014 22:56 UTC
Return-Path: <brian.e.carpenter@gmail.com>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D29B51A6EFE; Sun, 28 Sep 2014 15:56:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CYo6n9PeaQbA; Sun, 28 Sep 2014 15:56:55 -0700 (PDT)
Received: from mail-pd0-x232.google.com (mail-pd0-x232.google.com [IPv6:2607:f8b0:400e:c02::232]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2B3571A6EFC; Sun, 28 Sep 2014 15:56:55 -0700 (PDT)
Received: by mail-pd0-f178.google.com with SMTP id y10so1482892pdj.37 for <multiple recipients>; Sun, 28 Sep 2014 15:56:54 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=message-id:date:from:organization:user-agent:mime-version:to:cc :subject:references:in-reply-to:content-type :content-transfer-encoding; bh=gqSLr5MxNfLM1kQFcfhM2n46LxKFIyCFjUaRW9ZODrE=; b=SumQoFYEWgj/cM6iR/VADgZSfrOY8VhjbfyrqKc0SyFidefypfXOe7I5yyi5DKF12W AAK1tn7/Tev7BUgQvC/VjPfr899u7Q7eFWQvZdVvULLChFVofoczmV4jXDZRPB3ILvDb vtjr3qFHb3dSPYN3OY6kBIEN7+hJpbxgcfCNaydrHk+aB8HHNbTIntmIyr+N4+YBfov3 VH81VXKRCMe/dtdFYMWRAyEnsvNleBr6WIVLBMFfK1Jn4Pbl5BAQqyPb9svo2TNvnRkp wYkI9DmQLIR78LQQuplFyW7UcJMv4r9UQ8klP9ILZ+A8OF74/WORfw6jpVyKWN4ek2wt CNmw==
X-Received: by 10.70.55.5 with SMTP id n5mr7675252pdp.148.1411945014737; Sun, 28 Sep 2014 15:56:54 -0700 (PDT)
Received: from [192.168.178.23] (41.197.69.111.dynamic.snap.net.nz. [111.69.197.41]) by mx.google.com with ESMTPSA id x13sm10591530pdk.22.2014.09.28.15.56.51 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Sun, 28 Sep 2014 15:56:53 -0700 (PDT)
Message-ID: <54289232.90207@gmail.com>
Date: Mon, 29 Sep 2014 11:56:50 +1300
From: Brian E Carpenter <brian.e.carpenter@gmail.com>
Organization: University of Auckland
User-Agent: Thunderbird 2.0.0.6 (Windows/20070728)
MIME-Version: 1.0
To: Melinda Shore <melinda.shore@gmail.com>
References: <542865B1.6070004@gmail.com>
In-Reply-To: <542865B1.6070004@gmail.com>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 7bit
Archived-At: http://mailarchive.ietf.org/arch/msg/secdir/lpdy_cDtvPb8c6g_vuj8QLfi-MQ
Cc: IESG <iesg@ietf.org>, draft-ietf-6man-why64.all@tools.ietf.org, secdir@ietf.org
Subject: Re: [secdir] secdir review of draft-ietf-6man-why64-05
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 28 Sep 2014 22:56:57 -0000
Thanks Melinda. > A nits check picked up an outdated reference (draft-templin-aerolink > is now at version -40), and choked on the '+' in "draft-odell-8+8.00" > (bug in the nits checker draft name parser). It's hard to avoid a nit when citing drafts by Fred Templin, since he updates them faster than the refresh cycle in Henrik's archive ;-). The odell draft is actually missing from Henrik's archive, perhaps because all his tools choke on the "+", but since it's a genuine singularity I just hand-crafted the reference in the XML. Regards Brian On 29/09/2014 08:46, Melinda Shore wrote: > I have reviewed this document as part of the security directorate's > ongoing effort to review all IETF documents being processed by the > IESG. These comments were written primarily for the benefit of the > security area directors. Document editors and WG chairs should treat > these comments just like any other last call comments. > > Summary: This document is clearly written, appears to be > comprehensive with respect to the problem being considered, and > is ready for publication. > > This draft is intended for publication as an informational document > describing the possible implications of allowing a variable-length > interface ID in IPv6 addresses. Basically, it is addressing and > dismantling arguments against a fixed-length 64-bit IID, and > describing the introduction of new failure modes should the IID > length be allowed to vary. > > There are also results from various popular operating systems > from processing neighbor discovery options when the prefixes are > shorter than /64 and longer than /64, as well as a discussion of > potential impacts on other published IETF specifications should > the IID length be allowed to vary or be changed. > > The draft includes a privacy issues subsection: Big ups for that. > > Specific security concerns: there may be situations in which the > IID is intended to be hard to guess, and a 64-bit length increases > the cost of finding the identifier: > > It is hard to > state in general how many bits are enough to protect privacy, since > this depends on the resources available to the attacker, but it seems > clear that a privacy solution needs to resist an attack requiring > billions rather than millions of guesses. Trillions would be better, > suggesting that at least 40 bits should be available. Thus we can > argue that subnet prefixes longer than say /80 might raise privacy > concerns by making the IID guessable. > > Security considerations are largely operational, with very clear > discussion of implications of address formats for resistance to > scanning attacks and DOS attacks, acknowledging that there may be > other resource exhaustion attacks available that could possibly > be exacerbated by sparsely populated subnets. > > A nits check picked up an outdated reference (draft-templin-aerolink > is now at version -40), and choked on the '+' in "draft-odell-8+8.00" > (bug in the nits checker draft name parser). > > Melinda >
- [secdir] secdir review of draft-ietf-6man-why64-05 Melinda Shore
- Re: [secdir] secdir review of draft-ietf-6man-why… Brian E Carpenter