Re: [v6ops] Implementation Status of PREF64

Lorenzo Colitti <lorenzo@google.com> Tue, 28 September 2021 02:48 UTC

Return-Path: <lorenzo@google.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AAF883A1695 for <v6ops@ietfa.amsl.com>; Mon, 27 Sep 2021 19:48:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -18.097
X-Spam-Level:
X-Spam-Status: No, score=-18.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.499, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, ENV_AND_HDR_SPF_MATCH=-0.5, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5, USER_IN_DEF_SPF_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Jn4vBUPgdQwx for <v6ops@ietfa.amsl.com>; Mon, 27 Sep 2021 19:48:19 -0700 (PDT)
Received: from mail-il1-x130.google.com (mail-il1-x130.google.com [IPv6:2607:f8b0:4864:20::130]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5A3093A1690 for <v6ops@ietf.org>; Mon, 27 Sep 2021 19:48:19 -0700 (PDT)
Received: by mail-il1-x130.google.com with SMTP id b15so21615238ils.10 for <v6ops@ietf.org>; Mon, 27 Sep 2021 19:48:19 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=nSO8mfTTfZZrtXgE8ecdm3+UYqrdBg/6lEJx/PK8COc=; b=TwNuhYGsxDiDbu2AfZHphKTaPQcKMRIwQIsEZQlc7UqZ2N1I/qIaquM4d06S20X9zG 9MwW1shg09yaf5LcEdMP4QApjjMB4JRWjDOVz1sXvs8etIC2h0cFsWM8BsY0eb0IeDui wAYoYnNoaTfyRrlhxZjmjdtzegZj4nD735SlaQZcsHn3RYN3GDBjjlvS9hhNksp03Ekv UBMmAJQWdRVpDVJa8TPVEyQoD+Q0uH+PqgM7U5dj/XR/eMPV/0vq+5pRflp0gPQoZInL mnEopXDStvCCnrMmsSwOLh5vFQiHHsPQIdQLtf1xWGlsnUNNGsCvT5rQQ7G8LLljQ0m/ IklQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=nSO8mfTTfZZrtXgE8ecdm3+UYqrdBg/6lEJx/PK8COc=; b=rnldF7i3kfqzTPARBzzzdiX+H3aSWAq0RyDX5EKzcnLD8+nW/n2UOI6W329gIN1W3z U9bvp+gZyscWVtz+YoE9DTEKl5vmrio5sSv/UCE4K5vaxtGe8MqmiSbg7BrFDRDL4i2M zQdrVyX4ybtTsJSFG2Qrz6aQaZ286NH9br9QXUeNQFQUvFz5YQJ0Nen2bBBc1I3apVlM DmEadnUpXAHrMoDV06w5vlA+4KpWuA9m99bpMa42ONEz34rryprD6OEcd5Oht2VdAlPy LQkKlG9RGNYlsWlfRk3d1FQWM22qEwAOn/+nsUaQx7i9qoUkXfpw5xmhV2D1zWDHmuHG kTNQ==
X-Gm-Message-State: AOAM530gUFjCgy2FK3I8Xqav9hZgJ7qQhA6iUYHRHmTI3/s0yOszwPsS 6aDMSZAV+scP8lDY9SkOYSa1QsQqWM4lFAGAtsUKAOZWep31Wg==
X-Google-Smtp-Source: ABdhPJw8pGFcGcLdjxR9jpbS9BFZu2pUyScneAaeb0y3zEA3gG9Lr/gkfqVpe5FmOu427+/OI6zCtm9td0RjCTPFqYU=
X-Received: by 2002:a05:6e02:4a4:: with SMTP id e4mr2531654ils.232.1632797298317; Mon, 27 Sep 2021 19:48:18 -0700 (PDT)
MIME-Version: 1.0
References: <CAN-Dau2in52xSUkqKEXu=2AAiR4O_jLhna7hY-hshYDORfGtcQ@mail.gmail.com> <CAMGpriWFp4JPtqDK5tEj1RkS-SzEfvscfUUnxgK+o6qP2pusRA@mail.gmail.com> <6E95834D-12B3-447B-8326-8EDE9DC6FFB1@delong.com> <CAO42Z2zA-4cK489nxKsWUN8vvU0eAiz-jS0e-_eWPg+OmP8wLw@mail.gmail.com> <DDA36020-90CC-471B-83AD-3D98950F1164@delong.com> <CAO42Z2wdoSdJDOB2Zo0=ZK0ecOARRsdg2nbHZGSDOhryPbLfDw@mail.gmail.com> <F2BD0A42-E9AD-45DD-999A-638E73BE1177@delong.com> <CAKD1Yr2K3Gd3JD=NJFOoH6GYgs-8ACxRQB9-sKJ7cbF4_hxsow@mail.gmail.com> <CAO42Z2zc8S2iTM+rB-GJv3XJZHJwQXovVwdDOZkXS1SjNXsDig@mail.gmail.com>
In-Reply-To: <CAO42Z2zc8S2iTM+rB-GJv3XJZHJwQXovVwdDOZkXS1SjNXsDig@mail.gmail.com>
From: Lorenzo Colitti <lorenzo@google.com>
Date: Tue, 28 Sep 2021 11:48:05 +0900
Message-ID: <CAKD1Yr1wQvOZkh-gVBxNPb3gL-KOzF0FF1xbJCjO3kDHYJX4NQ@mail.gmail.com>
To: Mark Smith <markzzzsmith@gmail.com>, Enno Rey <erey@ernw.de>
Cc: Owen DeLong <owen=40delong.com@dmarc.ietf.org>, Jen Linkova <furry@google.com>, V6 Ops List <v6ops@ietf.org>, David Farmer <farmer=40umn.edu@dmarc.ietf.org>
Content-Type: multipart/alternative; boundary="000000000000f52fb705cd053e8e"
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/e1tPq6C7v_MQatXFUe0h8BeHd1Y>
Subject: Re: [v6ops] Implementation Status of PREF64
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 28 Sep 2021 02:48:25 -0000

You're right. 802.1x is L2 only, and authenticates the entire MAC address
(with all its IPv4 and IPv6 addresses).

But Owen: the conclusion is the same. If you have 802.1x you don't need
DHCPv6 for tracking, all you need to do is to be able to track which IPv6
addresses were assigned to a given client over time. Basically, the
neighbour binding logging that many vendors alreay support. +Enno Rey
<erey@ernw.de> provided a good summary in his blog post Does One Need
DHCP(v6)?
<https://theinternetprotocolblog.wordpress.com/2020/03/14/does-one-need-dhcpv6/>

On Tue, Sep 28, 2021 at 11:18 AM Mark Smith <markzzzsmith@gmail.com> wrote:

> I'm broadly quite confused by both of these scenarios, in the sense that I
> thought 802.1X just used layer 2 frames (because it's an IEEE protocol),
> and authentication needed to be completed successfully on a host's
> interface before IP could be used. No pre-existing IPv4 or IPv6
> connectivity was required to successfully perform 802.1X.
>
> In other words, 802.1X is layer 2 access control to the network, at the
> device's layer 2 point of attachment, that either grants or denies
> permission to send and receive layer 2 frames other than 802.1X frames.
>
> Since 802.1X authentication is per layer 2 point of attachment, that then
> creates the handle for the layer 2 device to do things like record layer 3
> addresses used by the 802.1X authenticated entity, regardless of how the
> IPv4 and/or IPv6 addresses are acquired, generated or configured.
>
> Regards,
> Mark.
>
> On Tue, 28 Sep 2021, 11:11 Lorenzo Colitti, <lorenzo@google.com> wrote:
>
>> On Tue, Sep 28, 2021 at 6:04 AM Owen DeLong <owen=
>> 40delong.com@dmarc.ietf.org> wrote:
>>
>>>
>>> In the tightest forms, it goes something like this (oversimplified and
>>> generic):
>>>
>>> 0. Port starts out locked down to communicating with DHCPv6 server and
>>> NAC authenticator only.
>>> 1. Use LL address to send DHCPv6 request.
>>> 2. Get DHCPv6 address and use that for 802.1x authentication. There are
>>> a variety of options
>>> here including authentication of not only the machine, but also the
>>> individual currently
>>> using the machine and the classification of network privileges based on
>>> either or both
>>> of these factors, etc.
>>> 3. A filter is added to your port permitting your presented DHCPv6
>>> address (which the NAC authenticator
>>> has validated matches to your MAC and LL address) that permits your LL
>>> and DHCPv6 addresses
>>> to communicate with the rest of the network. Any additional policies can
>>> also be added at this
>>> point if the administrator chooses.
>>>
>>
>> I don't see how DHCPv6 is required for any of this. What you describe
>> above boils down to, "a machine is allowed to use the network only if its
>> MAC address is acceptable to the network". That can be done with SLAAC just
>> as well. Let me reword for SLAAC:
>>
>> 0. Port starts out locked down to communicating with NAC authenticator
>> only.
>> 1. Use LL address to send RS.
>> 2. Get IPv6 address from SLAAC and use that for 802.1x authentication.
>> There are a variety of options
>> here including authentication of not only the machine, but also the
>> individual currently
>> using the machine and the classification of network privileges based on
>> either or both
>> of these factors, etc.
>> 3. A filter is added to your port permitting your presented MAC address
>> to to communicate with the
>> rest of the network. Any additional policies can also be added at this
>> point if the administrator chooses.
>>
>> This is better than the DHCP version above because it allows the client
>> to use multiple IP addresses and does not need to be re-done when the IP
>> address changes.
>>
>