Re: [v6ops] Implementation Status of PREF64

Mark Smith <markzzzsmith@gmail.com> Tue, 28 September 2021 02:19 UTC

Return-Path: <markzzzsmith@gmail.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D74A83A1534 for <v6ops@ietfa.amsl.com>; Mon, 27 Sep 2021 19:19:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.597
X-Spam-Level:
X-Spam-Status: No, score=-0.597 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, FROM_LOCAL_NOVOWEL=0.5, HK_RANDOM_ENVFROM=0.001, HK_RANDOM_FROM=0.999, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QvIbY-QJyiL4 for <v6ops@ietfa.amsl.com>; Mon, 27 Sep 2021 19:18:57 -0700 (PDT)
Received: from mail-il1-x132.google.com (mail-il1-x132.google.com [IPv6:2607:f8b0:4864:20::132]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7D19F3A1535 for <v6ops@ietf.org>; Mon, 27 Sep 2021 19:18:57 -0700 (PDT)
Received: by mail-il1-x132.google.com with SMTP id h20so21522152ilj.13 for <v6ops@ietf.org>; Mon, 27 Sep 2021 19:18:57 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=ICx/dyB2gqotHKNCMdeQcskEwH56elJezVRgW/kp1oA=; b=buSqEKX596xQe3FeDNW4xm63zjk9xQnSuI0vVf15HJmNr+t6J7GxaBNo6EP5cSCRGI dtk7Gs4OXBVacxMnW41enEnLu6W62YP3HobQ3sK+hLNCcqpkmGliyKg5x8PE86d9cuYn S1kenAAt2F+2OOV8bHSMyEB7w5JlJqHhVTQD1FhscFMXfTW9AJTbAOZ2YF3PwhH/NSqX b0eDOCmobi93a5FHZUoa/dKv8JTVVOTzzXgQSDWNFcwnKDHEDE1eqDR6WN8yBSi+QnDc V37545mr3cCSYSvit3fXmS4eDGkPSgYk7y7swfHvdWNGJan/X/pIpgnHyLzuVM4/mD4E 7O9g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=ICx/dyB2gqotHKNCMdeQcskEwH56elJezVRgW/kp1oA=; b=UevxQEXXwZ0fpL5jkBTKjcbFYV+eBRo6QNqkEt5KWhT8G3Kzdn04BUI2nhioC6VfIN xQ1hH07zCMJT4bwvCXiqGXFe0b6hT1iBLFJz2F5LL9BlYftTeCzI7lrr6eX6aLu5If8O dxbkhncHs3IeFBAVGO25NY8tzS74Yv2CkkUnEdq427nsHjzCGwq0ZaBou0kHjbvZsr8y QFa3U6x6ereBxdW8JH9I8EjtLMysXNAdmWU48aFsthm6Gfp0JkAL62Yw/m61GebVOkEk mkYehxaSYfIxRdUPU6iUliN41q4s9lSg0MUqHxgNgkLVF4OL2743MYJfouSV8mFDplb7 qwCg==
X-Gm-Message-State: AOAM532+uKTyIfEt6c3z3tKccsnqu7eU0RREyo7nKExwsStXEwN6NDfO rXdcmxIvHqRtvtjJkF3DvkY+P+Xt+VGDvvHWa48=
X-Google-Smtp-Source: ABdhPJzW4mswTYo0kpM8UFUPxZZqlHW4R8DamnZBzkfd2po38vfyFzlZifJt4cVyZr3YaxJTyBwhyBtHuAKTp7c7KQk=
X-Received: by 2002:a05:6e02:16c5:: with SMTP id 5mr2493782ilx.133.1632795536514; Mon, 27 Sep 2021 19:18:56 -0700 (PDT)
MIME-Version: 1.0
References: <CAN-Dau2in52xSUkqKEXu=2AAiR4O_jLhna7hY-hshYDORfGtcQ@mail.gmail.com> <CAMGpriWFp4JPtqDK5tEj1RkS-SzEfvscfUUnxgK+o6qP2pusRA@mail.gmail.com> <6E95834D-12B3-447B-8326-8EDE9DC6FFB1@delong.com> <CAO42Z2zA-4cK489nxKsWUN8vvU0eAiz-jS0e-_eWPg+OmP8wLw@mail.gmail.com> <DDA36020-90CC-471B-83AD-3D98950F1164@delong.com> <CAO42Z2wdoSdJDOB2Zo0=ZK0ecOARRsdg2nbHZGSDOhryPbLfDw@mail.gmail.com> <F2BD0A42-E9AD-45DD-999A-638E73BE1177@delong.com> <CAKD1Yr2K3Gd3JD=NJFOoH6GYgs-8ACxRQB9-sKJ7cbF4_hxsow@mail.gmail.com>
In-Reply-To: <CAKD1Yr2K3Gd3JD=NJFOoH6GYgs-8ACxRQB9-sKJ7cbF4_hxsow@mail.gmail.com>
From: Mark Smith <markzzzsmith@gmail.com>
Date: Tue, 28 Sep 2021 12:18:44 +1000
Message-ID: <CAO42Z2zc8S2iTM+rB-GJv3XJZHJwQXovVwdDOZkXS1SjNXsDig@mail.gmail.com>
To: Lorenzo Colitti <lorenzo@google.com>
Cc: Owen DeLong <owen=40delong.com@dmarc.ietf.org>, Jen Linkova <furry@google.com>, V6 Ops List <v6ops@ietf.org>, David Farmer <farmer=40umn.edu@dmarc.ietf.org>
Content-Type: multipart/alternative; boundary="000000000000f1e4dc05cd04d54e"
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/ZAdBM6C8q7BOi8JmRsRo8D8BJeg>
Subject: Re: [v6ops] Implementation Status of PREF64
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 28 Sep 2021 02:19:02 -0000

I'm broadly quite confused by both of these scenarios, in the sense that I
thought 802.1X just used layer 2 frames (because it's an IEEE protocol),
and authentication needed to be completed successfully on a host's
interface before IP could be used. No pre-existing IPv4 or IPv6
connectivity was required to successfully perform 802.1X.

In other words, 802.1X is layer 2 access control to the network, at the
device's layer 2 point of attachment, that either grants or denies
permission to send and receive layer 2 frames other than 802.1X frames.

Since 802.1X authentication is per layer 2 point of attachment, that then
creates the handle for the layer 2 device to do things like record layer 3
addresses used by the 802.1X authenticated entity, regardless of how the
IPv4 and/or IPv6 addresses are acquired, generated or configured.

Regards,
Mark.

On Tue, 28 Sep 2021, 11:11 Lorenzo Colitti, <lorenzo@google.com> wrote:

> On Tue, Sep 28, 2021 at 6:04 AM Owen DeLong <owen=
> 40delong.com@dmarc.ietf.org> wrote:
>
>>
>> In the tightest forms, it goes something like this (oversimplified and
>> generic):
>>
>> 0. Port starts out locked down to communicating with DHCPv6 server and
>> NAC authenticator only.
>> 1. Use LL address to send DHCPv6 request.
>> 2. Get DHCPv6 address and use that for 802.1x authentication. There are a
>> variety of options
>> here including authentication of not only the machine, but also the
>> individual currently
>> using the machine and the classification of network privileges based on
>> either or both
>> of these factors, etc.
>> 3. A filter is added to your port permitting your presented DHCPv6
>> address (which the NAC authenticator
>> has validated matches to your MAC and LL address) that permits your LL
>> and DHCPv6 addresses
>> to communicate with the rest of the network. Any additional policies can
>> also be added at this
>> point if the administrator chooses.
>>
>
> I don't see how DHCPv6 is required for any of this. What you describe
> above boils down to, "a machine is allowed to use the network only if its
> MAC address is acceptable to the network". That can be done with SLAAC just
> as well. Let me reword for SLAAC:
>
> 0. Port starts out locked down to communicating with NAC authenticator
> only.
> 1. Use LL address to send RS.
> 2. Get IPv6 address from SLAAC and use that for 802.1x authentication.
> There are a variety of options
> here including authentication of not only the machine, but also the
> individual currently
> using the machine and the classification of network privileges based on
> either or both
> of these factors, etc.
> 3. A filter is added to your port permitting your presented MAC address to
> to communicate with the
> rest of the network. Any additional policies can also be added at this
> point if the administrator chooses.
>
> This is better than the DHCP version above because it allows the client to
> use multiple IP addresses and does not need to be re-done when the IP
> address changes.
>