Re: [v6ops] Please review the No IPv4 draft

Ted Lemon <ted.lemon@nominum.com> Tue, 22 April 2014 15:17 UTC

Return-Path: <Ted.Lemon@nominum.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 110AD1A063C for <v6ops@ietfa.amsl.com>; Tue, 22 Apr 2014 08:17:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.172
X-Spam-Level:
X-Spam-Status: No, score=-2.172 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.272] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kVndTGg2SQXm for <v6ops@ietfa.amsl.com>; Tue, 22 Apr 2014 08:17:36 -0700 (PDT)
Received: from shell-too.nominum.com (shell-too.nominum.com [64.89.228.229]) by ietfa.amsl.com (Postfix) with ESMTP id 9E94C1A04F1 for <v6ops@ietf.org>; Tue, 22 Apr 2014 08:17:36 -0700 (PDT)
Received: from archivist.nominum.com (archivist.nominum.com [64.89.228.108]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client CN "*.nominum.com", Issuer "Go Daddy Secure Certification Authority" (verified OK)) by shell-too.nominum.com (Postfix) with ESMTP id 6B8961B8062 for <v6ops@ietf.org>; Tue, 22 Apr 2014 08:17:31 -0700 (PDT)
Received: from webmail.nominum.com (cas-02.win.nominum.com [64.89.228.132]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (Client CN "mail.nominum.com", Issuer "Go Daddy Secure Certification Authority" (verified OK)) by archivist.nominum.com (Postfix) with ESMTP id 4F5BE19005C; Tue, 22 Apr 2014 08:17:31 -0700 (PDT)
Received: from [10.0.10.40] (192.168.1.10) by CAS-02.WIN.NOMINUM.COM (192.168.1.101) with Microsoft SMTP Server (TLS) id 14.3.158.1; Tue, 22 Apr 2014 08:17:31 -0700
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0 (Mac OS X Mail 7.2 \(1874\))
From: Ted Lemon <ted.lemon@nominum.com>
In-Reply-To: <m1WcbPl-0000COC@stereo.hq.phicoh.net>
Date: Tue, 22 Apr 2014 11:17:27 -0400
Content-Transfer-Encoding: quoted-printable
Message-ID: <118D079B-FC99-4606-B289-4201137A5815@nominum.com>
References: <534BF5A5.5010609@viagenie.ca> <20140415083615.GB43641@Space.Net> <534D3672.3060702@viagenie.ca> <3446106.k0lm12lQ8b@linne> <alpine.DEB.2.02.1404161034220.10236@uplift.swm.pp.se> <CAKD1Yr2D+ZMi-UctuvrMzyqoHqgBy5O26GODT=bRwq0PsvLgLw@mail.gmail.com> <alpine.DEB.2.02.1404161053110.10236@uplift.swm.pp.se> <20140416155714.GB64039@ricotta.doit.wisc.edu> <alpine.DEB.2.02.1404162310050.10236@uplift.swm.pp.se> <B21C1073-ABBE-44FE-964F-65AD7849CD31@delong.com> <alpine.DEB.2.02.1404170658440.10236@uplift.swm.pp.se> <4EABCE38-7CBA-4C95-84EE-686A2300F26E@delong.com> <8E450CDC-FFC5-4649-89FE-387836C8E40B@nominum.com> <CAEmG1=oNyotn6tcKyxUuLCW0of-MxVrvUB08jsygjo8kidgt0g@mail.gmail.com> <CF7BDD91.1911D%wesley.george@twcable.com> <m1Wcb5y-0000FMC@stereo.hq.phicoh.net> <BD6D04D4-AD31-462D-A0C7-AD74DBCF23AD@nominum.com> <m1WcbPl-0000COC@stereo.hq.phicoh.net>
To: Philip Homburg <pch-v6ops-3a@u-1.phicoh.com>
X-Mailer: Apple Mail (2.1874)
X-Originating-IP: [192.168.1.10]
Archived-At: http://mailarchive.ietf.org/arch/msg/v6ops/-Z1wga6Su-oOV69V-HWR3fM8kFc
Cc: "v6ops@ietf.org WG" <v6ops@ietf.org>
Subject: Re: [v6ops] Please review the No IPv4 draft
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 22 Apr 2014 15:17:41 -0000

On Apr 22, 2014, at 10:11 AM, Philip Homburg <pch-v6ops-3a@u-1.phicoh.com> wrote:
> "   -  When the goal is to turn off IPv4, having to maintain and operate
> "      an IPv4 infrastructure (routing, ACLs, etc.) just to be able to
> "      send negative responses to DHCPv4 requests is not productive.
> "      Having the option transported in IPv6 allows the ISP to focus on
> "      operating an IPv6-only network.
> 
> This one makes sense. So what do we want? A very small amount of code can
> can send and receive DHCPv4 messages or all of the security problems
> associated with the alternatives?

You are saying this as if there are no security problems associated with DHCPv4, but of course DHCPv4 has very similar security problems.   In order to prevent DHCPv4-based attacks on the local wire, you must filter bad DHCPv4 packets.   If you are filtering bad DHCPv4 packets on the wire, filtering bad RA packets is doable as well.  And you should be doing it, because RAs on an IPv4-only wire are a dead simple way to set up MiTM attacks.

I already addressed this point and the others you made in previous comments.   This conversation has gotten extremely repetitive.  I think if you want to make these points again and make sure they have been addressed, the way to do it is to open up an issue tracker for this draft, and continue the discussion on the sunset4 mailing list.   Otherwise we're just spamming v6ops, and I'm sure the people on v6ops who don't care about sunset4 would really like it if we stopped doing that.