[v6ops] Enterprise policies: :WAS Implementation Status of PREF64

"Pascal Thubert (pthubert)" <pthubert@cisco.com> Thu, 30 September 2021 17:23 UTC

Return-Path: <pthubert@cisco.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E15273A07C3 for <v6ops@ietfa.amsl.com>; Thu, 30 Sep 2021 10:23:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.595
X-Spam-Level:
X-Spam-Status: No, score=-9.595 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=UAzaYKZI; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=XO3B9v6o
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id q1a_z4W8UnQ0 for <v6ops@ietfa.amsl.com>; Thu, 30 Sep 2021 10:22:57 -0700 (PDT)
Received: from rcdn-iport-5.cisco.com (rcdn-iport-5.cisco.com [173.37.86.76]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B737D3A0DD7 for <v6ops@ietf.org>; Thu, 30 Sep 2021 10:22:56 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=27690; q=dns/txt; s=iport; t=1633022576; x=1634232176; h=from:to:cc:subject:date:message-id:mime-version; bh=exRxGy72SA6ywFipa5JnPbPYV4p1nRwwdzySpYoEa00=; b=UAzaYKZIfxgxA8D2AgcBishHoMh0qFXeJr/jX13lYICnubqhEUjIEL9o tqKVjhx3F0ncEJpWjLTBTKw/y7P3JqIVz/YwgzqhpMV5zmoxTF+4eufZ6 8FAGqnGwi/awTXrMloCF9KuwcXVJ/IXnfqLHrq7BgXbw7Vec+7gXe6COa 0=;
IronPort-PHdr: A9a23:R4YIdhAJrMo+h+RvlcMxUyQViBdPi9zP1kY95p8ukbkIc6m/8dLlJkOMrflujVqcW4Ld5roEjufNqKnvVCQG5orJq3ENdpFAFnpnwcUblgAtGoiJXEv8KvO5YykzBs8EVVJ58Te8K0cGUMr7bkfZ93u16zNaEx7jNA1zc+LyHIOaj8m+2+2ovZPJZAAdjzumarQ0JxKz/m3s
IronPort-Data: A9a23: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
IronPort-HdrOrdr: A9a23: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
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0B3BwBk8VVh/5xdJa1agmKBITAjLgd3WhMkMQKERYNIA4U5iAiBFo5nim+BLoElA1QLAQEBDQEBNwoEAQGEfQIXgigCJTQJDgECBAEBARIBAQUBAQECAQYEgREThTsBBQIlDYZCAQEBARURChMBATcBEQEZBAEBKAMCBDAUCQkBBA4FCBEJglCBflcDLwEOpmUBgToCih96gTGBAYIIAQEGBASBSkGCfxiCNQMGgTqDAIJ2VEkBAYRDglQcgUlEgRQBQ4FmSnWCYwEBAgGBNRAaJAcJgmI3gi6JVgIBKj5HJzgDFgJgGwoVKQIICgMpJBAGC5IugxGIc59sCoMvBYo+lD0Upw00jyeTEZNpBASFAQIEAgQFAg4BAQaBYTs5DYETcBU7gmlRGQ+DOoREhikFFoNQhRSFSnQCCysCBgEKAQEDCY1IgkUBAQ
X-IronPort-AV: E=Sophos;i="5.85,336,1624320000"; d="scan'208,217";a="670359871"
Received: from rcdn-core-5.cisco.com ([173.37.93.156]) by rcdn-iport-5.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 30 Sep 2021 17:22:53 +0000
Received: from mail.cisco.com (xbe-aln-006.cisco.com [173.36.7.21]) by rcdn-core-5.cisco.com (8.15.2/8.15.2) with ESMTPS id 18UHMrLk015437 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Thu, 30 Sep 2021 17:22:53 GMT
Received: from xfe-rtp-001.cisco.com (64.101.210.231) by xbe-aln-006.cisco.com (173.36.7.21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15; Thu, 30 Sep 2021 12:22:53 -0500
Received: from xfe-rcd-002.cisco.com (173.37.227.250) by xfe-rtp-001.cisco.com (64.101.210.231) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15; Thu, 30 Sep 2021 13:22:52 -0400
Received: from NAM12-DM6-obe.outbound.protection.outlook.com (72.163.14.9) by xfe-rcd-002.cisco.com (173.37.227.250) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15 via Frontend Transport; Thu, 30 Sep 2021 12:22:52 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ezpnBA0sB0ZlhOhXKRUUulxCX2xpiafzQNhBE0rC5HEM77DLKCjvNiDzPppb16amyMe3zwewi3fmpZ/46EbalWdSz+KDu2vRzmo/sE1dvf7nu3bp/S70/udN+yd6J8ohI7IJ/Hn1ntKBovxPccjxX9l55oPC6jl6XkPJqKXVMakKauI/O/iHLePcL+t5/3wHD8KFX1g6qcNzrwzl4CRVjgPzQAO0eWxyjYgRkmwiad11EptJXk66z5Bj8e49yTaABveBzSrgsRVRmqQRxK21aJ185aYHT16ZMt3siU0GOP8EQ+h5JJd6WvmoqztaXGY2r7HvnpQ0FWolAif5o2c8HQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=exRxGy72SA6ywFipa5JnPbPYV4p1nRwwdzySpYoEa00=; b=XqacA9OG8HpW3gxK4Tk474DHCVS2E3kubkZGDEw2e3oUUTZ0Mp3u+EFCMK4w62o4gtGi4UFe7+wKvK4SdZfFlhmuTiw+BDz0oy0Cwipw6817AJLv0yPTjI18kwU4EaD2+QtgK4/XEqjM9JNQ771uyHf4naNrdAz6Mkw5PuIg+63vNz41koumPi9Q+eZjKR7x5Wtu7EKLjgiYVd3fmBfnwf7CvzUcz4xGlN/HXvG9BK5ULXEPFgTR0CaKJIDGkom3JO2qDcks1OZWsjPpOKkrGcN6gli3cYuECFmm4YUSQPXMY/1L5p4aeT8xaBdy62ozLDw/wS8aY1vKx6LVzM3rxA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=exRxGy72SA6ywFipa5JnPbPYV4p1nRwwdzySpYoEa00=; b=XO3B9v6ovbn9eTfm+jYmqQy5BBRWGcuqke8RlRnyA+ea6DzJJcTH3Dp0NiPYw68mTKalwyrQ1wXn1EkbEe5gzuAxu4VDUmIkJsTuwjYXQ/Har1/cFdcjuSzGPzp4gRSFLBJNCDUVIDJbx4QuIRHYqkml5iX649rCqV0YyfproLI=
Received: from CO1PR11MB4881.namprd11.prod.outlook.com (2603:10b6:303:91::20) by CO1PR11MB5155.namprd11.prod.outlook.com (2603:10b6:303:95::8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4566.15; Thu, 30 Sep 2021 17:22:50 +0000
Received: from CO1PR11MB4881.namprd11.prod.outlook.com ([fe80::1493:cc59:eb78:7302]) by CO1PR11MB4881.namprd11.prod.outlook.com ([fe80::1493:cc59:eb78:7302%7]) with mapi id 15.20.4566.015; Thu, 30 Sep 2021 17:22:50 +0000
From: "Pascal Thubert (pthubert)" <pthubert@cisco.com>
To: Owen DeLong <owen=40delong.com@dmarc.ietf.org>
CC: Lorenzo Colitti <lorenzo@google.com>, v6ops list <v6ops@ietf.org>
Thread-Topic: Enterprise policies: :WAS Implementation Status of PREF64
Thread-Index: Ade2F2i+DqEMOmUbSsmK+MQXRJC8GQ==
Date: Thu, 30 Sep 2021 17:22:27 +0000
Deferred-Delivery: Thu, 30 Sep 2021 17:21:52 +0000
Message-ID: <CO1PR11MB48819C4DC3C8C17C975E9EC2D8AA9@CO1PR11MB4881.namprd11.prod.outlook.com>
Accept-Language: fr-FR, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dmarc.ietf.org; dkim=none (message not signed) header.d=none;dmarc.ietf.org; dmarc=none action=none header.from=cisco.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: a62eb73a-5900-4f28-5db2-08d98436ede7
x-ms-traffictypediagnostic: CO1PR11MB5155:
x-microsoft-antispam-prvs: <CO1PR11MB5155112BA66C42514E8ED6E1D8AA9@CO1PR11MB5155.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:4941;
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CO1PR11MB4881.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(366004)(6506007)(53546011)(122000001)(54906003)(166002)(38100700002)(38070700005)(316002)(7696005)(2906002)(5660300002)(508600001)(33656002)(66476007)(66556008)(66446008)(86362001)(66574015)(9686003)(76116006)(71200400001)(8936002)(8676002)(6666004)(4326008)(83380400001)(55016002)(186003)(52536014)(64756008)(66946007); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_CO1PR11MB48819C4DC3C8C17C975E9EC2D8AA9CO1PR11MB4881namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CO1PR11MB4881.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: a62eb73a-5900-4f28-5db2-08d98436ede7
X-MS-Exchange-CrossTenant-originalarrivaltime: 30 Sep 2021 17:22:50.1898 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: rstNMysLdueh8jeEGYNrOuVII9IOZ1rTouP+WkBKtEryOHc7sZgJr1BUK/aVba0x2vICAifquv+s1pqwY2Cp1A==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO1PR11MB5155
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.21, xbe-aln-006.cisco.com
X-Outbound-Node: rcdn-core-5.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/VNsUYAgtSMWUQwo6inEJBfTul8s>
Subject: [v6ops] Enterprise policies: :WAS Implementation Status of PREF64
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 30 Sep 2021 17:23:01 -0000

Hello Owen

We cannot stay too vague here. Maybe there are things where we can progress. Can we elaborate on which policies you have in mind?

There are a number of policies that can still be enforced even with AAC, like the number of addresses per device. Some of us hate that it happens, but in some environments there’s an infrastructure cost to each address (like an auth flow, a TCAM entry, whatever) so there are cases where it is bounded by policy, want it or not, and already today. Say that number is 1, and say that ND pushes that information to the DHCP server to feed the existing tools, does that solve your use case? Or is it like the policy interested in defining a specific (semantic) IID for each node?


Notes:

I’m not calling people names, they are my customers. I’m trying (very hard) to make their life simpler, and I’m not trying to influence their policies. It is their job to decide what the best tool is for their case.  I see a hammer and a plier in the 25-years old  toolbox, and I can see many shapes of screws invented since for modern networks. You can manage something with both tools but that’s far from ideal, and not an incentive to go v6.

I’m not saying that I’m happy with the lack of DHCPv6 in Android. I think DHCP was the natural starting point in the evolution towards IPv6 in enterprise and I buy the argument that it is probably an impediment to the adoption of IPv6 in that space. I just think that ultimately it should phase out and be replaced by Ole’s universal RA and Stateful ND. Because that can bring more control and visibility –  screwdrivers in the tool box.

Note that it’s not DHCP or stateful ND. The node must register an address that was obtained from DHCP in stateful ND, like it must do DAD for it today. Just that you do not waste one second in the process, and do not broadcast over the whole enterprise Wi-Fi domain. The cool thing is  that the host can also unregister it when it ceases to use the address and free network resources.

Stateful AAC provides full visibility and protection, a lot more than what we have today, even with DHCP. E.g.,  DHCP can only be snooped by the on path switches, the other just learn indirect information from ND multicast. There is little to no control over the DHCP state and possibly a lot of stale state, think about the impact to MAC rotation for instance. There is no notion of having more than one address with different roles, privacy requirements, and life cycles. DHCP does not help distinguish mobility vs. duplication / attack. It does not pub/sub the binding to external services like proxy, routing, or LISP.

Think about the things we can do with stateful ND AAC:

- provide full visibility to the network administrator
- secure the address ownership with RFC 8928
- rotate MAC and IP for privacy with no stale state and/or silent node
- synchronize a state in the L3switch/AP/router for ND proxy (RFC 8929) and routing (RFC 9010, RIFT<https://datatracker.ietf.org/doc/html/draft-ietf-rift-rift>, eVPN<https://datatracker.ietf.org/doc/html/draft-thubert-bess-secure-evpn-mac-signaling>)

Keep safe;

Pascal

From: Owen DeLong <owen=40delong.com@dmarc.ietf.org>
Sent: jeudi 30 septembre 2021 17:59
To: Pascal Thubert (pthubert) <pthubert@cisco.com>
Cc: Lorenzo Colitti <lorenzo@google.com>; v6ops list <v6ops@ietf.org>
Subject: Re: [v6ops] Implementation Status of PREF64




On Sep 30, 2021, at 03:14 , Pascal Thubert (pthubert) <pthubert=40cisco.com@dmarc.ietf.org<mailto:pthubert=40cisco.com@dmarc.ietf.org>> wrote:

I have the same perception of that thread and the IPv6 woes one on NANOG as you do. For one thing we cannot extract DHCPv6 brutally as a rotten tooth.
We need to understand what it’s used for and provide a better replacement that will slowly take over. SLAAC cannot be that. The problem of SLAAC is not the AAC piece, it’s the SL. SL lacks observability, and that’s what prevent it from being a replacement to the database that the operators and network managers need, e.g., for forensics.

It’s both, actually. The AAC side interferes with certain aspects of policy enforcement that are important in some environments.


I think there’s a golden path where DHCP is pushed deeper in the infra so that at first it is no more visible to the end device but still available to the operations that require it, and then we move on to the point where it becomes fully redundant and ceases to exist, by the user’s own decision, on his own agenda.

This is the problem, right here… There are networks where the administrators do NOT WANT this to be up to the user. They want control over certain policy aspects on their network. You are free to call them whatever names you want, but their networks are part of the target audience for IPv6 and they aren’t going to deploy it unless they have at least equivalent policy enforcement tools to what they have in IPv4 and they’re going to have to be implemented in a way that provides at least some familiarity or clear roadmap of the transition.

Today, that’s IA_NA combined with other enforcement mechanisms such as NAC providing dynamic switch port ACLs. Yes, 802.1x is an L2 protocol, but contrary to earlier statements, the NAC server can pull data from multiple sources and push an ACL onto the switch port that will limit the client(s) attached to that port to the addresses and capabilities permitted by the NAC policy configured (including limiting the L3 addresses that can be forwarded to the one(s) assigned by the DHCPv6 server, if desired).

If you’ve got a better idea for enterprise-level policy enforcement than IA_NA and IA_PD (where permitted), by all means, present it.

If not, then yeah, support for IA_NA is essential to forward progress in the enterprise.

Owen