Re: [v6ops] I-D Action: draft-link-v6ops-6mops-00.txt

Mark Smith <markzzzsmith@gmail.com> Tue, 05 March 2024 22:39 UTC

Return-Path: <markzzzsmith@gmail.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 84AABC14F617 for <v6ops@ietfa.amsl.com>; Tue, 5 Mar 2024 14:39:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.602
X-Spam-Level:
X-Spam-Status: No, score=-6.602 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, FROM_LOCAL_NOVOWEL=0.5, HK_RANDOM_ENVFROM=0.001, HK_RANDOM_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Qu4GdwpiRSOd for <v6ops@ietfa.amsl.com>; Tue, 5 Mar 2024 14:39:35 -0800 (PST)
Received: from mail-ed1-x52a.google.com (mail-ed1-x52a.google.com [IPv6:2a00:1450:4864:20::52a]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0AF57C14F5EC for <v6ops@ietf.org>; Tue, 5 Mar 2024 14:39:35 -0800 (PST)
Received: by mail-ed1-x52a.google.com with SMTP id 4fb4d7f45d1cf-5645960cd56so1586484a12.1 for <v6ops@ietf.org>; Tue, 05 Mar 2024 14:39:34 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1709678373; x=1710283173; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=41r6QFOIhDO99TULu9TdPsuYr/jxzE4XK40c2z+KlEU=; b=TASg/RzScYv8Oo9rq9V3y1zIw90L+rqhfqbTBpGDgbfK8l+bFByJ0BCcKnN9XNiR0H v5eVIG4CvP+sKrD9llvstecwiTiS2vI/I7A6Y/yo+S3gL7+/K/r4T/pf0YanhNtF0Jfd /S5gJYlUY5GYEu3K2g5K2mDiIaY/XLsSyNKMRX9Ylv2vyVFjCD6hE4kYcWEHGAu1z1D1 6PWGpJSnUbCqqbuJXQgnIY9CyX7YfX/nXILmN8J/sZm8dO4yYFqWICD+p/bI8wIo6wBA yWQMP/wFzq6DJSvKOt3IuAJU0AU+Bc9+wYtIj8Zw8M2g2uzZ/VL75qCoJdj7hpSxCK0/ DTKA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1709678373; x=1710283173; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=41r6QFOIhDO99TULu9TdPsuYr/jxzE4XK40c2z+KlEU=; b=qJ3U6o+J99q03HQluWfghuvQPv8jCHNw8a9SxJC/KFFJ7VvtbMrTWTRIz4ZDpU5iKA RMgZkACeSiPOaWQFghDA6KCQx8DG1BxjNg95G4K7iCPpfcah83c3RFPKfsFrvv3Cu0cJ qPZ6xugry/DycamSlMJAch77zYrOTvMFY37a+O0C4jF0UAqLTBrFsxoO5PbAhBs6jmjR 4biGygX7ONf25hKzPwV4NTQ2bqcKhiVKDJB5VAnu7OQCJieG0hFGMs+rUl4eTL3KHIgd ERX8kXte7H7eHpyybA3Kk5jh+u5WcN2fO/tekZcAcg1XOoUCd6r9tVBYXH68KQ88RDxO ASoQ==
X-Forwarded-Encrypted: i=1; AJvYcCUbJELGkmeqjuJ7KJ0f58mU138lUQMXRfUxVb4OVsbAtjHkTbi/Wr+8l8F+/Vcy5ufDGyRgNjdLiR+YO9894A==
X-Gm-Message-State: AOJu0YwzfmRpgeg8Y+w9cf/G+W0po3WdwIEuxUuMjppltU8xSpv/jwlu sr8pK2VjfvngVyYgCBM2Iq8u1MHHkY3DxSeK+kMByOzJrZobgPIirLihEAk18w3jzHWZmZC/IRJ WFUSO/a2yFubDVy2xsm8txPluL9YzbIcT
X-Google-Smtp-Source: AGHT+IFk/NNGNsqiI22K4VH30e1UBkplvjHEdDHHzEXAcjsjFG+1sB84bduUr0xV11cssM3USWoeznnidnsX5abbpiM=
X-Received: by 2002:a50:8e45:0:b0:566:7250:9ea2 with SMTP id 5-20020a508e45000000b0056672509ea2mr9793843edx.34.1709678373085; Tue, 05 Mar 2024 14:39:33 -0800 (PST)
MIME-Version: 1.0
References: <170955522053.39685.10398176610934575947@ietfa.amsl.com> <d5cfd59b-6657-a212-66b4-5c907ee2a5b7@gmail.com> <CAFU7BARE6_ZDngaN5J4z4hUakFx+=6PUViS79dHByaSOgHmfdw@mail.gmail.com> <1973baa4-f6ed-696a-2935-952cb2806b00@gmail.com> <CALx6S36t7rRPe4u+OrgTWhmfn_9DhBFTJRMPA=g7=1YFnXCauw@mail.gmail.com>
In-Reply-To: <CALx6S36t7rRPe4u+OrgTWhmfn_9DhBFTJRMPA=g7=1YFnXCauw@mail.gmail.com>
From: Mark Smith <markzzzsmith@gmail.com>
Date: Wed, 06 Mar 2024 09:39:22 +1100
Message-ID: <CAO42Z2zArcZ77JE-7tBww4Pcj3jEDpmBBaQ0qoAfBSFUa29bXQ@mail.gmail.com>
To: Tom Herbert <tom=40herbertland.com@dmarc.ietf.org>
Cc: Brian E Carpenter <brian.e.carpenter@gmail.com>, IPv6 Operations <v6ops@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000001bab440612f1841e"
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/2BQ7J7Xhv1J2qjM-mvAsxSNLAZ8>
Subject: Re: [v6ops] I-D Action: draft-link-v6ops-6mops-00.txt
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 Mar 2024 22:39:40 -0000

On Wed, 6 Mar 2024, 06:16 Tom Herbert, <tom=40herbertland.com@dmarc.ietf.org>
wrote:

> On Tue, Mar 5, 2024 at 11:04 AM Brian E Carpenter
> <brian.e.carpenter@gmail.com> wrote:
> >
> > On 05-Mar-24 14:29, Jen Linkova wrote:
> > > On Tue, Mar 5, 2024 at 12:17 PM Brian E Carpenter
> > > <brian.e.carpenter@gmail.com> wrote:
> > >> This draft is an excellent start.
> > >
> > > Thank you!
> > >
> > >> The security considerations seem a bit short.
> > >
> > > It's a side effect of the draft submission deadline ;) Will be fixed
> in -01 ;)
> > >
> > >>> This document does not introduce any privacy considerations
> > >>
> > >> Are we sure about that? For example, some people (not me) will claim
> > >> that the privacy benefits of NAT are lost for the IPv6-only hosts.
> > >
> > > If we compare the proposed design with a dual-stack approach, the
> > > privacy considerations are the same:
> > > - if the destination is a dual-stack (or IPv6-only) IPv6 will be used
> > > in both cases;
> > > - if the destination is IPv4-only, the traffic will go through NAT44
> > > (dual-stack) or NAT64 (IPv6-mostly)
> > >
> > > Would adding a text that privacy considerations are inherited from a
> > > dual-stack design?
> >
> > What I realised when considering your question is that we have no generic
> > reference for IPv6 privacy considerations. RFC 7721 is specific to
> address
> > generation, RFC 7824 is specific to DHCPv6, RFC 8065 is specific to
> adaptation
> > layers, and that's about it. So I guess it is reasonable to say that
> "mostly"
> > adds no new privacy risks compared to dual stack, but the "only" hosts
> avoid
> > all IPv4-related risks and may benefit from IPv6-related protections
> such as
> > temporary addresses.
> >
> > The NAT lovers will disagree though, because they believe that NAT is a
> > privacy feature.
>
> Brian,
>
> It's less about being a NAT lover, but more just realizing that CGNAT
> offers better privacy in addressing that IPv6 without NAT (this has
> been confirmed by LE,
>
> https://www.internetsociety.org/blog/2018/03/cgn-ipv6-fighting-online-crime/
> ).
>

Just like security, privacy is relative.

Claims of better privacy need to be in the context of from whom you're
trying to be private from and from which privacy breaching methods you're
attempting to mitigate against.

For example, IP address privacy from a remote website that could be
provided by CGNAT is easily defeated by HTTP cookies or web browser
fingerprinting.

It's impossible to remain absolutely anonymous and yet participate in
bidirectional communication. Either identities have to be disclosed to each
party directly or to trusted intermediaries.

In this scenario the CGNAT would be the trusted intermediary, because it is
anonymising the addresses. However, then the CGNAT becomes the point of
potential privacy failure, and cannot be mitigated very well by the privacy
seeking end user, because they don't control or operate the CGNAT.

How much can you trust the CGNAT operator to protect your privacy when you
don't operate it? How do you know that the CGNAT operator (perhaps under
mandate from a government who considers you to be an enemy) isn't the party
you should be actively trying to be private from? You can only assure what
you can control.

Increasing the default anonymity of IPv6 addresses has some value e.g.
temporary IPv6 addresses or RFC 7217 addresses, however I think the
perceived privacy that NAT/GCNAT provides is over estimated because it's so
easily defeated at higher layers and in the case of CGNAT you're
outsourcing your privacy measures to somebody else who may not have your
best privacy interests at heart.

Regards,
Mark.


> Tom
>
> >
> >      Brian
> >
> > >
> > >> Is there any interaction with site policies (dis)allowing temporary
> > >> addresses? Any interaction with randomized MAC addresses?
> > >
> > > It's all existing in any other IPv6 deployment, right? Nothing
> > > specific to IPv6-mostly. I didn't consider enumerating all IPv6
> > > privacy implications, but maybe I should..
> > >
> > >> On 05-Mar-24 01:27, internet-drafts@ietf.org wrote:
> > >>> Internet-Draft draft-link-v6ops-6mops-00.txt is now available.
> > >>>
> > >>>      Title:   IPv6-Mostly Networks: Deployment and Operations
> Considerations
> > >>>      Author:  Jen Linkova
> > >>>      Name:    draft-link-v6ops-6mops-00.txt
> > >>>      Pages:   16
> > >>>      Dates:   2024-03-04
> > >>>
> > >>> Abstract:
> > >>>
> > >>>      This document discusses an deployment scenario called "an
> IPv6-Mostly
> > >>>      network", when IPv6-only and IPv4-enabled endpoints coexist on
> the
> > >>>      same network (network segment, VLAN, SSID etc).
> > >>>
> > >>> The IETF datatracker status page for this Internet-Draft is:
> > >>> https://datatracker.ietf.org/doc/draft-link-v6ops-6mops/
> > >>>
> > >>> There is also an HTML version available at:
> > >>> https://www.ietf.org/archive/id/draft-link-v6ops-6mops-00.html
> > >>>
> > >>> Internet-Drafts are also available by rsync at:
> > >>> rsync.ietf.org::internet-drafts
> > >>>
> > >>>
> > >>> _______________________________________________
> > >>> I-D-Announce mailing list
> > >>> I-D-Announce@ietf.org
> > >>> https://www.ietf.org/mailman/listinfo/i-d-announce
> > >>>
> > >>
> > >> _______________________________________________
> > >> v6ops mailing list
> > >> v6ops@ietf.org
> > >> https://www.ietf.org/mailman/listinfo/v6ops
> > >
> > >
> > >
> > _______________________________________________
> > v6ops mailing list
> > v6ops@ietf.org
> > https://www.ietf.org/mailman/listinfo/v6ops
>
> _______________________________________________
> v6ops mailing list
> v6ops@ietf.org
> https://www.ietf.org/mailman/listinfo/v6ops
>