Re: [v6ops] v6ops-host-addr-availability: A Little Pushback

"STARK, BARBARA H" <bs7652@att.com> Wed, 23 September 2015 14:57 UTC

Return-Path: <bs7652@att.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C8A3E1A6F60 for <v6ops@ietfa.amsl.com>; Wed, 23 Sep 2015 07:57:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.265
X-Spam-Level:
X-Spam-Status: No, score=-2.265 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, IP_NOT_FRIENDLY=0.334, RCVD_IN_DNSWL_LOW=-0.7] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NuXvX75aToUW for <v6ops@ietfa.amsl.com>; Wed, 23 Sep 2015 07:57:52 -0700 (PDT)
Received: from mx0b-00191d01.pphosted.com (mx0b-00191d01.pphosted.com [67.231.157.136]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 162FB1A6F5D for <v6ops@ietf.org>; Wed, 23 Sep 2015 07:57:52 -0700 (PDT)
Received: from pps.filterd (m0049458.ppops.net [127.0.0.1]) by m0049458.ppops.net-00191d01. (8.15.0.59/8.15.0.59) with SMTP id t8NEt090030835; Wed, 23 Sep 2015 10:57:50 -0400
Received: from alpi154.enaf.aldc.att.com (sbcsmtp6.sbc.com [144.160.229.23]) by m0049458.ppops.net-00191d01. with ESMTP id 1x3v78h9dm-1 (version=TLSv1/SSLv3 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 23 Sep 2015 10:57:50 -0400
Received: from enaf.aldc.att.com (localhost [127.0.0.1]) by alpi154.enaf.aldc.att.com (8.14.5/8.14.5) with ESMTP id t8NEvnJG009503; Wed, 23 Sep 2015 10:57:49 -0400
Received: from alpi133.aldc.att.com (alpi133.aldc.att.com [130.8.217.3]) by alpi154.enaf.aldc.att.com (8.14.5/8.14.5) with ESMTP id t8NEvj0M009220 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Wed, 23 Sep 2015 10:57:46 -0400
Received: from GAALPA1MSGHUBAD.ITServices.sbc.com (GAALPA1MSGHUBAD.itservices.sbc.com [130.8.218.153]) by alpi133.aldc.att.com (RSA Interceptor); Wed, 23 Sep 2015 14:57:36 GMT
Received: from GAALPA1MSGUSRBF.ITServices.sbc.com ([169.254.5.18]) by GAALPA1MSGHUBAD.ITServices.sbc.com ([130.8.218.153]) with mapi id 14.03.0248.002; Wed, 23 Sep 2015 10:57:36 -0400
From: "STARK, BARBARA H" <bs7652@att.com>
To: Lorenzo Colitti <lorenzo@google.com>
Thread-Topic: [v6ops] v6ops-host-addr-availability: A Little Pushback
Thread-Index: AdD1Qz3jXWgqKaqHS3ecNEGJMXADQgA1IPuAAAMCgKA=
Date: Wed, 23 Sep 2015 14:57:35 +0000
Message-ID: <2D09D61DDFA73D4C884805CC7865E6113AA15C83@GAALPA1MSGUSRBF.ITServices.sbc.com>
References: <2D09D61DDFA73D4C884805CC7865E6113AA102BC@GAALPA1MSGUSRBF.ITServices.sbc.com> <CAKD1Yr0cGrY1bGHcbcPZZnZ97PDaT7cx17BqtJ45HKo6HoSj-Q@mail.gmail.com>
In-Reply-To: <CAKD1Yr0cGrY1bGHcbcPZZnZ97PDaT7cx17BqtJ45HKo6HoSj-Q@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [135.70.32.223]
Content-Type: multipart/alternative; boundary="_000_2D09D61DDFA73D4C884805CC7865E6113AA15C83GAALPA1MSGUSRBF_"
MIME-Version: 1.0
X-RSA-Inspected: yes
X-RSA-Classifications: public
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:, , definitions=2015-09-23_06:, , signatures=0
X-Proofpoint-Spam-Details: rule=outbound_policy_notspam policy=outbound_policy score=0 spamscore=0 suspectscore=0 malwarescore=0 phishscore=0 adultscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1507310000 definitions=main-1509230205
Archived-At: <http://mailarchive.ietf.org/arch/msg/v6ops/E7fTydryAaoJ3PBYoUcRrPxSHAs>
Cc: v6ops list <v6ops@ietf.org>
Subject: Re: [v6ops] v6ops-host-addr-availability: A Little Pushback
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 23 Sep 2015 14:57:55 -0000

In-line, marked with <bhs>.
Barbara

1. Privacy. Changing tracking requirements from needing to track a /128 to only needing to track a /64 does not provide for any sort of improved privacy against tracking. We need to stop perpetuating this myth. draft-ietf-dhc-dhcp-privacy already describes how to provide a single address that doesn't give away the MAC address. Other than not giving away the MAC, there is no privacy benefit I can see to more easily allowing tracking systems to track at the /64 instead of the /128.

Here's one privacy benefit that requires the ability to form multiple addresses: change your privacy address as often as you want, instead of how often the operator wants. Or, use different addresses to talk to different sites (e.g., a web server and an advertising server). These are both useful benefits if the network is trustworthy but the the attack is pervasive monitoring outside the network (e.g., by a national security agency).

<bhs> Privacy addresses can help with 2 privacy functions: (1) they obscure the MAC address; (2) self-generated SLAAC privacy addresses reduce the ability to do external-to-the-local network tracking down to the /64 prefix level. When the /64  is shared among multiple devices, there can potentially be a little bit of additional privacy from tracking – but even that depends, given all the info browsers hand out to HTTP servers. When a /64 is dedicated to a device, and the /64 never changes, the benefit of privacy addresses is reduced to obscuring the MAC address. A single unchanging privacy address within the unchanging prefix provides exactly the same obscuring of the MAC address as dozens of constantly changing privacy addresses. We need to stop perpetuating this privacy myth.

These aren't in the draft, but we could add them.

<bhs> If you want to list improved tracking as a benefit (i.e., reduced privacy), I would have no problem with that. Many people would indeed see that as a benefit.

2. Several of the listed benefits involve potential use by multiple processors on a host, virtual machines on a host, future applications, and identifier-locator addressing (ILA). In listing these, there was nothing that said "this is incredibly useful, but hosts are prevented from doing it (or run into a lot of complexity) if the host is restricted to a single DHCPv6-assigned IPv6 address". I didn't read that hosts would have a hard time having multiple processors or future applications in the absence of multiple addresses, and I didn't get out of the discussion that virtual machines and ILAs that require their own address are incredibly compelling and hosts and users can't live without them.

As someone who has worked on the ePDG implementation on Android devices, I can assure you that the architecture that's used to ensure that the baseband processor and the application processor could share an IP address is pretty contorted - you might even say nightmarish.

<bhs> But it’s been done? Now if you said that not using this nightmarish code would improve battery life of the devices, that would be a real benefit (from an operator perspective – who is your target audience). But if the code is done and works, then I don’t see why an operator should care how nightmarish it was for the OS implementation.

And VMs do require their own addresses - no host OS I'm aware of supports sharing an IP address with another host. The sharing has to be done by performing NAT on the upstream.

<bhs> I didn’t say VMs didn’t need their own addresses. What I said was I wasn’t convinced that all hosts needed VMs in order to do whatever it was the user wanted them to do. You haven’t provided a compelling reason why VMs are beneficial in hosts. Without that, I don’t understand why I should care whether or not  all hosts can run VMs.

... which is really the point here. What we're trying to say here is not that these use cases are hard or impossible without multiple addresses. What we're trying to say is that they exist, and that they can either be met using multiple addresses or (in most cases) by performing NAT66 in the host. We're recommending that we do not go to an architecture where hosts need to implement NAT66, and thus we recommend that the network should assign enough addresses that NAT66 is not necessary.

<bhs> NAT66 is not something that hosts inside enterprise networks need to be worried about. Yes, I can see that it’s a problem for UEs in a wireless network.

Also, I'm not sure exactly what you're trying to say here. Are you saying that:

  1.  You disagree that if the network assigns a single /128, hosts will implement and use NAT66; that they will instead reduce or disable (possibly user-visible) functionality.
  2.  You believe that it's fine if networks assign a single /128 to a device, even if it means that hosts will (possibly widely) implement NAT66.
  3.  Something else?
<bhs> I’m saying that you haven’t presented your case in a very compelling manner. The case for (the interior of) enterprise networks is non-existent. The case for wireline networks is unnecessary. I think it’s possible for you to make a compelling case for 3GPP wireless networks, but that needs work. I think it would be easier for you to make that case if you focused on that audience and that case. I also think that you would make the case better if you provided benefits worded in a way that cause the operator to care (i.e., by appealing to their self-interest). And “benefits” that are not real benefits detract from the argument because they provide an easy target for detractors to attack, and draw attention away from the real benefits.
Barbara