Re: [v6ops] NAT debate (Re: A common problem with SLAAC in "renumbering" scenarios)

Kristian McColm <kristianmccolm@hotmail.com> Fri, 22 February 2019 05:15 UTC

Return-Path: <kristianmccolm@hotmail.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9649F12E04D; Thu, 21 Feb 2019 21:15:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.125
X-Spam-Level:
X-Spam-Status: No, score=-1.125 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FORGED_HOTMAIL_RCVD2=0.874, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=hotmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id A5pZzlA2IvU3; Thu, 21 Feb 2019 21:15:56 -0800 (PST)
Received: from NAM01-BN3-obe.outbound.protection.outlook.com (mail-oln040092000055.outbound.protection.outlook.com [40.92.0.55]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4BD9C129532; Thu, 21 Feb 2019 21:15:56 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=hotmail.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=vQY4kfaDoDBNgxAa+kOsptZUpSdI+o4wp7T/cTeJaL0=; b=nmMOf/ehNHLG1PxHedOz11r+PJRe5eTWfux9YUwcWzlJtjp7NONs/ZVgTGAf8Gr71b25z3hMaMq0Lai0Kie7dA7siH0BZ5bvuQhXdrteWVuqVWdeMdaz0i2a246XVVAmNzJVvMTDsHPPTio9Y9CmEIvaw7ZeDeZqHRZsk/q85imEzEEXLTA8wKDmXpSv0uGu5MjxtqKsy3rCRi7VM4p/WMZKq+rIeepwbfsSeja7zcUlBJeyTJMTlsuzUfrrwCA0MHeDvUWHTxueSzCMuXI28cL7MjX95GJlMcPSg95Y2OT38TQROJ0UMm4i9QBCIY1wnMDw+Wt1JwYe51sQJNDKFg==
Received: from SN1NAM01FT008.eop-nam01.prod.protection.outlook.com (10.152.64.59) by SN1NAM01HT178.eop-nam01.prod.protection.outlook.com (10.152.65.171) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.1643.11; Fri, 22 Feb 2019 05:15:54 +0000
Received: from DM6PR04MB4009.namprd04.prod.outlook.com (10.152.64.60) by SN1NAM01FT008.mail.protection.outlook.com (10.152.64.199) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.1643.11 via Frontend Transport; Fri, 22 Feb 2019 05:15:54 +0000
Received: from DM6PR04MB4009.namprd04.prod.outlook.com ([fe80::11d2:230b:c319:5968]) by DM6PR04MB4009.namprd04.prod.outlook.com ([fe80::11d2:230b:c319:5968%5]) with mapi id 15.20.1643.016; Fri, 22 Feb 2019 05:15:54 +0000
From: Kristian McColm <kristianmccolm@hotmail.com>
To: Tom Herbert <tom@herbertland.com>, Raymond Burkholder <ray@oneunified.net>
CC: Fernando Gont <fgont@si6networks.com>, IPv6 Operations <v6ops@ietf.org>, "6man@ietf.org" <6man@ietf.org>, JORDI PALET MARTINEZ <jordi.palet=40consulintel.es@dmarc.ietf.org>
Thread-Topic: [v6ops] NAT debate (Re: A common problem with SLAAC in "renumbering" scenarios)
Thread-Index: AQHUylQ7xClo1pMmD0qbB4iWLKyk0aXrFpQAgAAAlH2AAAfcAIAACn2DgAAXDwCAAASJ4w==
Date: Fri, 22 Feb 2019 05:15:54 +0000
Message-ID: <DM6PR04MB40099E6E9BE59DFD48091AE2DD7F0@DM6PR04MB4009.namprd04.prod.outlook.com>
References: <6D78F4B2-A30D-4562-AC21-E4D3DE019D90@consulintel.es> <20190220113603.GK71606@Space.Net> <28fbc2c305c640c9afb3704050f6e8d7@boeing.com> <20190220213107.GS71606@Space.Net> <019c552eb1624d348641d6930829fd1f@boeing.com> <CAKD1Yr0HBG+rhyFWg9zh0t3mW486Mjx9umjn+CRqAZg4z9r0dg@mail.gmail.com> <20190221073530.GT71606@Space.Net> <CAO42Z2wmB2W52b4MZ2h9sW5E9cQKm-HRjyf--q8C26jezS7LXQ@mail.gmail.com> <a73818d31db7422b99a524bc431b00ed@boeing.com> <CAO42Z2z9-48Gbb_Exf+oWUqDO=axSLpZBtqeDcxkAoFq5OziGw@mail.gmail.com> <CALx6S3624hnGauG1HaSWPMvQw0t2Q5R3gb8W4R8w3kuK7dcrWQ@mail.gmail.com> <1F07F2BB-2F37-4D12-9731-7892DF4E3D88@consulintel.es> <1470063a-db4b-d2fc-a709-68e30736fbed@si6networks.com> <CALx6S36K5v9gusorEvj_uJjW4YwgERGdoWZOABREMpnqhJWJPw@mail.gmail.com> <DM6PR04MB4009E6096E8CF525931D46A5DD7F0@DM6PR04MB4009.namprd04.prod.outlook.com> <CALx6S36_aOy3273zGM+26z+04xF2q4_iBfj6LkFjX3qvuJZERw@mail.gmail.com> <DM6PR04MB40096241EB14D0526F7131CDDD7F0@DM6PR04MB4009.namprd04.prod.outlook.com>, <e08695a1-6735-46c3-e85a-be349dde1811@oneunified.net>
In-Reply-To: <e08695a1-6735-46c3-e85a-be349dde1811@oneunified.net>
Accept-Language: en-CA, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-incomingtopheadermarker: OriginalChecksum:360562332F71CD752C38F3B7EBD16037DF82F5AFF4CB1B1F2ECC91EC6B2CB581; UpperCasedChecksum:D15305AC4C1EA4317BC212C8F0181E240C94E4BF643915583B4613754E5547A5; SizeAsReceived:8167; Count:45
x-ms-exchange-messagesentrepresentingtype: 1
x-tmn: [X1EPqcdtH4TtrwsKP2oIda7mW1CLGCd/]
x-ms-publictraffictype: Email
x-incomingheadercount: 45
x-eopattributedmessage: 0
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(201702061078)(5061506573)(5061507331)(1603103135)(2017031320274)(2017031323274)(2017031324274)(2017031322404)(1601125500)(1603101475)(1701031045); SRVR:SN1NAM01HT178;
x-ms-traffictypediagnostic: SN1NAM01HT178:
x-microsoft-antispam-message-info: qhrvvJSCpyHCNz6Ex4QQLY0AMqHN7yAXN6uoTyaI2/8nvjZaz01xtw2esC9HkK6o
Content-Type: multipart/alternative; boundary="_000_DM6PR04MB40099E6E9BE59DFD48091AE2DD7F0DM6PR04MB4009namp_"
MIME-Version: 1.0
X-OriginatorOrg: hotmail.com
X-MS-Exchange-CrossTenant-RMS-PersistedConsumerOrg: 00000000-0000-0000-0000-000000000000
X-MS-Exchange-CrossTenant-Network-Message-Id: df537aa8-b34a-4130-2b49-08d69884d1c0
X-MS-Exchange-CrossTenant-rms-persistedconsumerorg: 00000000-0000-0000-0000-000000000000
X-MS-Exchange-CrossTenant-originalarrivaltime: 22 Feb 2019 05:15:54.0650 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Internet
X-MS-Exchange-CrossTenant-id: 84df9e7f-e9f6-40af-b435-aaaaaaaaaaaa
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN1NAM01HT178
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/mGeXg5ghX0XhskKVKqbv2NA0eeM>
Subject: Re: [v6ops] NAT debate (Re: A common problem with SLAAC in "renumbering" scenarios)
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 22 Feb 2019 05:15:58 -0000

What you describe is, unless I missed something, network segmentation. I absolutely agree that network segmentation, either physical or virtual, is an important concept in network security. Separating customer facing interfaces from management interfaces is one example that comes to mind.

But I believe in the context of this discussion we are taking about layer 3 and up, deep packet inspection, flow analysis, and packet filtering, etc.

Even still, one could argue layer 1 and 2 segmentation is still done at the host level. The host has different physical or virtual interfaces that can have different policy in terms of routing/switching. The switches provide the different segments but the host ultimately decides which interface to put an ethernet frame onto, and if one arrives, how it should be processed. Likewise, the owner of the host requests a port that will put the interface into an appropriate network segment.

In other words, the host still decides what resources it needs and how it uses them.

An important concept to understand is that networks do not create data, they are merely the conduit that hosts use to communicate with each other. So then, in my view, the creators and consumers of the data flowing across a given network should be the ultimate point of access control and auditing, not the conduit itself.


From: Raymond Burkholder <ray@oneunified.net>
Sent: Friday, February 22, 2019 4:53:54 AM
To: Kristian McColm; Tom Herbert
Cc: Fernando Gont; IPv6 Operations; 6man@ietf.org; JORDI PALET MARTINEZ
Subject: Re: [v6ops] NAT debate (Re: A common problem with SLAAC in "renumbering" scenarios)

On 2019-02-21 8:31 p.m., Kristian McColm wrote:
Then by that same token, can the end user devices, network services and network devices not provide their own packet filtering and other security mechanisms rather than forcing all network traffic to traverse centralized security devices?

It won't be a popular opinion with network security folks and security appliance vendors, but I am a believer that the endpoint device is the right place to implement network security. Intermediary network devices should not, in my opinion be doing anything other than forwarding packets to their destination.

There is a grey area here, from my experience.  With virtualization and containers, hosts are becoming routers, with the host thus being an intermediary device.  And there is tooling available which allows the host to apply protection policies as well as segregation policies to the virtualized functions it hosts.

In other configurations, in a traditional vein, 'switches' connect hosts of various sorts, and in that same traditional vein, are intermediary devices and just forward packets.

But there are security flavours out 'there' where the switch is no longer just a switch.  For those end-points which are unable or are unwilling to handle their own security, there is a form of network topology where  the 'switch' becomes more intelligent and can perform security functions on ingress/egress at the port level.  This provides a form of distributed nonSPOF style protection mechanisms.

In combining the concepts of the virtualization host I mentioned initially, and this edge 'protection switch', they are both sharing the concept of distributed nonSPOF security functionality (which I suppose is part of what Network Function Virtualization does).  As one specific example, I'll mention Cillium, which is highly IPv6 aware, and excels at providing this distributed routing/security/forwarding function in a distributed fashion.

So I think there is a happy medium: some end points devices just can't do their own security, and for paranoid network operators, you can't trust that they can, as well as from an endpoint developer perspective (think microservices), you don't want them to.  Providing those services at the connecting port level is the next best thing for the consistent, distributed and reliable application of protection rules?