Re: [v6ops] I-D Action: draft-ietf-v6ops-unique-ipv6-prefix-per-host-07.txt

Mark Smith <markzzzsmith@gmail.com> Thu, 17 August 2017 05:07 UTC

Return-Path: <markzzzsmith@gmail.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 27B1413234B for <v6ops@ietfa.amsl.com>; Wed, 16 Aug 2017 22:07:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.197
X-Spam-Level:
X-Spam-Status: No, score=-2.197 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, FROM_LOCAL_NOVOWEL=0.5, HK_RANDOM_ENVFROM=0.001, HK_RANDOM_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1mesi9CLMvIi for <v6ops@ietfa.amsl.com>; Wed, 16 Aug 2017 22:07:32 -0700 (PDT)
Received: from mail-vk0-x22a.google.com (mail-vk0-x22a.google.com [IPv6:2607:f8b0:400c:c05::22a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BF3CE124E15 for <v6ops@ietf.org>; Wed, 16 Aug 2017 22:07:32 -0700 (PDT)
Received: by mail-vk0-x22a.google.com with SMTP id u133so18888909vke.3 for <v6ops@ietf.org>; Wed, 16 Aug 2017 22:07:32 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=U12NkM9HXY1Xfe+uAlba/RF9qjaf68hhY5/PPJjwQy4=; b=Y9NnCaVFKMLEhlCIi7UIo2ygoRvEZ3LNiRdzIBLElMFAS/pNJu0pns5HiOjGfJgiYF OKP4g+IICpLIfgv814BTF0w6wPsIpwq/hUlDl6x36OmUzRVdc1A/2LwZD0hD58UvXNu5 vNZq5i1o760czadMB9LPScKjofFKjhiEPf+Doi5djkQJNPkYJsdVbDKHUZ1yqGpTygtR ynDcaxPSYlHXi9v7thYhspcOdpbSNl6ZN/ES1Q9kuPykUtu8k7AEDqBpnXnFiU5rN8N2 Fly8Z6VJ2ho6ek7gZglGEvvzaAUgvCmXkJvQag5ZrvbuE3GyoBx7yqVV9ZGeUjgF8m39 B5Sg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=U12NkM9HXY1Xfe+uAlba/RF9qjaf68hhY5/PPJjwQy4=; b=HlH1kt57RoVGxQgNypiCq1/z+2iVZTDVowtDAcbKYt5TvAD3C0+jh9Bjd1f699iKVD uqyBypal49zF/WX5bt2vS9jgU5NgajfX5eJM3NjBsRJ8eH/sTLcHophd7OQNipIKRG7b j0McrOemWbtwwPBzyMV81RqwqWDK1CiKrxRqRbBjzqPPHiQmBwv6vzMsBFc2buiPxF6B DlZjckAXxM8QhtgrEyG8G+v/t/Msf/3DsU4My91XZqy83kKa0ojg11uhgfK42j8qVkGB kSvNdz9B/tIn7r/EpH2XpYOmzQXLp8jHTAhvLH0dEBNtFUlATFxu23D5tpT+RoisX4lQ kWmg==
X-Gm-Message-State: AHYfb5j9qAAeeq3ZmouLSUfoXeLpKZZBfw/zEa9Lc0rVJ4biH6CwuNwS FwIcRKL3RO1HmJWxCgkAqQohcMPBvg==
X-Received: by 10.31.155.88 with SMTP id d85mr2513134vke.88.1502946451796; Wed, 16 Aug 2017 22:07:31 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.176.7.209 with HTTP; Wed, 16 Aug 2017 22:07:00 -0700 (PDT)
In-Reply-To: <D34A7642-6E70-4FD7-9D71-D1C62D561FC4@gmail.com>
References: <CAO42Z2wJBCo1yjguWSy-jzSvndeZTPgtN71FfdEhvqrVAUhZUA@mail.gmail.com> <9bd9f886-f53b-109f-d998-1d4c7adaf3b1@gmail.com> <B6A257C9-7E8A-452D-9C0F-0B10A31990CB@thehobsons.co.uk> <796A0ED0-0F58-43FA-9F81-D4D736A35F3B@steffann.nl> <BD3B4153-2EEF-4BFB-832D-D126A75AEC11@thehobsons.co.uk> <CAN-Dau2jzbQPuE5diEz-XzfRBHY=O1znE8hfy8P-Eee=MVwC_w@mail.gmail.com> <7C6C4FCC-26B9-493D-9992-4663DE6EB9CE@jisc.ac.uk> <3A69468C-98E4-4631-A52F-3D8772646EEE@consulintel.es> <20170807110746.GG45648@Space.Net> <CAO42Z2xXXjKUZ8qQY+b1NgDagX2ZJkqL5gieD+_js59ucp0EMw@mail.gmail.com> <20170810055819.GQ45648@Space.Net> <CAO42Z2xtfsYbw+Wf=ZjyFCmnDbhL17QCkWWRJ7F1+BgGCRiipg@mail.gmail.com> <51268C23-40F4-4476-9025-A1DD3BA37BC3@thehobsons.co.uk> <CAKD1Yr0uBU-LczaZJ5SdNpb_FpB0qfZJ0kNnr=gEviD+F3DTZw@mail.gmail.com> <85DFAB58-149C-405E-A497-3CBB497828B4@gmail.com> <dec51b5e-09dc-6784-4edd-19392fdfbef1@gmail.com> <CAFgODJemiTEnHD1_Y1xfD0La=8PLAaZuNTGC27KMbKWasuEXmQ@mail.gmail.com> <CAO42Z2zh5HZGY=rxq9BcTFRbS+_tUWyJhm9p_JahL5M6hhfDgw@mail.gmail.com> <D34A7642-6E70-4FD7-9D71-D1C62D561FC4@gmail.com>
From: Mark Smith <markzzzsmith@gmail.com>
Date: Thu, 17 Aug 2017 15:07:00 +1000
Message-ID: <CAO42Z2y-0vZPQmr6COq6363ZAA0UfhzdToYocXVEbLwwiuzWYw@mail.gmail.com>
To: DaeYoung KIM <dykim6@gmail.com>
Cc: Brian E Carpenter <brian.e.carpenter@gmail.com>, Lorenzo Colitti <lorenzo@google.com>, Simon Hobson <linux@thehobsons.co.uk>, v6ops list <v6ops@ietf.org>
Content-Type: text/plain; charset="UTF-8"
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/oXXUU08VVLGJC4MlG1eNLLVkiew>
Subject: Re: [v6ops] I-D Action: draft-ietf-v6ops-unique-ipv6-prefix-per-host-07.txt
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 17 Aug 2017 05:07:35 -0000

On 17 August 2017 at 14:54, DaeYoung KIM <dykim6@gmail.com> wrote:
>
>
> Sent from my iPhone
>
>> On 17 Aug 2017, at 11:48, Mark Smith <markzzzsmith@gmail.com> wrote:
>>
>> Externally, it is not possible to determine whether a /64 is assigned
>> to a link or a host - consequently, it isn't possible to know if
>> source addresses from with a /64 represent a single device's traffic
>> (the /64 is assigned to a single device) or traffic from a range of
>> devices (a /64 is shared by many devices attached to a link.)
>
> Exactly.
>
> So, why would it bother you
>
>    - if a host given a /64 prefix assigns a 64-bit IID to each of its interfaces, or
>
>    - if the same host subdivides the /64 prefix into multiple /96 prefixes each of which be given to internal devices behind, wherein each device then assigns 32-bit IIDs to its own interfaces.
>
> Such domestic behaviors are not observable from outside, so why would you enforce 64 bits for whatever is classified as an IID?
>
>> Individual source addresses however always represent traffic from a
>> single device.
>
> Of course.
>

That is exactly why IID values matter. There is no hiding what they
are referring to. They're always referring to a individual end point,
there is no ambiguity.

Externally you cannot really tell if /64s are being used. If you
assume they are, you still cannot tell whether the /64 is assigned to
a link shared between a set of hosts, or assigned to an individual
host.

There is no such ambiguity with a single 128 bit IPv6 address. It's an
end-point identifier.

> The original question was about the feasibility of 32-bit length of IIDs for internal devices behind a /64 host, in regards to privacy.
>
> In a legacy IPv6 networking, the pool of 64-bit IIDs would be shared by hosts inside a subnet which may contain arbitrarily many hosts,
>
> whereas in my scenario of internal /96 devices behind a /64 host, the pool of 32-bit IIDs would be shared by interfaces of a single device.
>
> If obfuscation should be a measure of merit, the obfuscation of 32-bit IIDs across interfaces of a /96 device should not be terribly inferior to that of 64-bit IIDs across all interfaces of all hosts inside a /64 subnet.
>

Have you read

"Security and Privacy Considerations for IPv6 Address Generation Mechanisms"
https://tools.ietf.org/html/rfc7721

?


> My question then goes back to
>
>    - What's the point of mandating 64 bits for IIDs when behaviors internal to or behind a /64 are not observable from outside anyhow?
>

Urm, are you assuming NAT? Source addresses are visible to the
outside, because there isn't

>    - Are there any practical ways to police them and return penalties to ill-behaving hosts?
>