Re: [v6ops] I-D Action: draft-ietf-v6ops-unique-ipv6-prefix-per-host-07.txt

DY Kim <dykim6@gmail.com> Thu, 17 August 2017 02:33 UTC

Return-Path: <dykim6@gmail.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EBE45132359 for <v6ops@ietfa.amsl.com>; Wed, 16 Aug 2017 19:33:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.749
X-Spam-Level:
X-Spam-Status: No, score=-1.749 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0s_Xje8dfUeV for <v6ops@ietfa.amsl.com>; Wed, 16 Aug 2017 19:33:53 -0700 (PDT)
Received: from mail-wr0-x22f.google.com (mail-wr0-x22f.google.com [IPv6:2a00:1450:400c:c0c::22f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6646413217D for <v6ops@ietf.org>; Wed, 16 Aug 2017 19:33:53 -0700 (PDT)
Received: by mail-wr0-x22f.google.com with SMTP id z91so21800118wrc.4 for <v6ops@ietf.org>; Wed, 16 Aug 2017 19:33:53 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=MB8z+Q4KvuUKnIpCaA6x0oToQLmZN6ZauKFEZZfTOfk=; b=d0qeN6VpkNaGCX7EXnJP/ar8t31MD76jDtW3/HQSEQ+Ybb/MGS/XGXaT+Y+mxGBPt8 1tx+s3Kw9ydKYphlvITT+D7uJ083UFHA7oDuK7kE+0IW4GfARAyvUzWNWjBU/8MlxvXZ Ch7DBpJ1/1AYCypmFLPS6TDcYmxOER19iRVBkgZqMRHZF5jpGg7/SzG29gxx/BMvoEVh tH0WHRbcbV7RnQLqmCiApZj7gj6mR3FR0IQxfaCrEgMNxEEqLJfdNLp6NnNaM332Dpyg NHz7FatcbUQsA5FZTTHMqxJn6hnWH/eB2mkhnfDI8NXMDZm7JlWyPAWcV6rOg69DcWXx TADQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=MB8z+Q4KvuUKnIpCaA6x0oToQLmZN6ZauKFEZZfTOfk=; b=kKeyzxM04cDhTMyDQECcgBh6bXdu3mOwYQVlH+HFKZz/Q8DY7j09YraCFQSqSw8XOl bF0c8tALMM3Bcjf/O9vDXAUbpmk4czh3vOq8ffTzFy7J6j1IZcHki2XI3mTBMiy+opXR 5Lu6rHO2/8n+GGvBcNjdfC/Iv3YIEUQQdSxtgqEdI+nYNz9eCXn2cUU3D3Wxx8SPXNpa AIOxMXM/IDt6binXIMqMRTDDg436VfZ7zmjH6X0a1Zq4acu0QADywbMvih6wVDmzTGQC TVqpOrJYsO/337mPZ1aDvfhNsa5x3xkjQYM+qk1IOXXgxbNaAobyCL7Axn1l8zuFLHHi VD4A==
X-Gm-Message-State: AHYfb5hKIzAJ2Fj8MQrCGwgIhUNWuOeF7655k0cp96ZkR8VlNg+uEo4V BUeFUPDoi0Ok+t+lIQADqf4GaaOKpA==
X-Received: by 10.223.142.168 with SMTP id q37mr275971wrb.254.1502937231818; Wed, 16 Aug 2017 19:33:51 -0700 (PDT)
MIME-Version: 1.0
References: <CAO42Z2wJBCo1yjguWSy-jzSvndeZTPgtN71FfdEhvqrVAUhZUA@mail.gmail.com> <9bd9f886-f53b-109f-d998-1d4c7adaf3b1@gmail.com> <B6A257C9-7E8A-452D-9C0F-0B10A31990CB@thehobsons.co.uk> <796A0ED0-0F58-43FA-9F81-D4D736A35F3B@steffann.nl> <BD3B4153-2EEF-4BFB-832D-D126A75AEC11@thehobsons.co.uk> <CAN-Dau2jzbQPuE5diEz-XzfRBHY=O1znE8hfy8P-Eee=MVwC_w@mail.gmail.com> <7C6C4FCC-26B9-493D-9992-4663DE6EB9CE@jisc.ac.uk> <3A69468C-98E4-4631-A52F-3D8772646EEE@consulintel.es> <20170807110746.GG45648@Space.Net> <CAO42Z2xXXjKUZ8qQY+b1NgDagX2ZJkqL5gieD+_js59ucp0EMw@mail.gmail.com> <20170810055819.GQ45648@Space.Net> <CAO42Z2xtfsYbw+Wf=ZjyFCmnDbhL17QCkWWRJ7F1+BgGCRiipg@mail.gmail.com> <51268C23-40F4-4476-9025-A1DD3BA37BC3@thehobsons.co.uk> <CAKD1Yr0uBU-LczaZJ5SdNpb_FpB0qfZJ0kNnr=gEviD+F3DTZw@mail.gmail.com> <85DFAB58-149C-405E-A497-3CBB497828B4@gmail.com> <dec51b5e-09dc-6784-4edd-19392fdfbef1@gmail.com>
In-Reply-To: <dec51b5e-09dc-6784-4edd-19392fdfbef1@gmail.com>
From: DY Kim <dykim6@gmail.com>
Date: Thu, 17 Aug 2017 02:33:39 +0000
Message-ID: <CAFgODJemiTEnHD1_Y1xfD0La=8PLAaZuNTGC27KMbKWasuEXmQ@mail.gmail.com>
To: Brian E Carpenter <brian.e.carpenter@gmail.com>, Lorenzo Colitti <lorenzo@google.com>
Cc: Simon Hobson <linux@thehobsons.co.uk>, v6ops list <v6ops@ietf.org>
Content-Type: multipart/alternative; boundary="f403045f5786d283d70556e9d715"
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/qMAy4pEslpQe2K3ja-ojjJDqVwA>
Subject: Re: [v6ops] I-D Action: draft-ietf-v6ops-unique-ipv6-prefix-per-host-07.txt
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 17 Aug 2017 02:33:55 -0000

In 'Unique-IPv6-Prefix-per-Host', IIDs given by a host are given to its own
interfaces. Should there be any privacy concern about the IIDs which are
confined to a single host?

As I think, privacy concerns might be more related to /64 prefixes rather
than IIDs. Therefore, the IID length might not bear much implication in
regard to privacy.

SLAAC by itself does not put any restrictions on the IID length. Unless the
SLAAC software is hard-coded to 64-bit IIDs, it should be able to process
configure 32-bit IIDs.

If the available SLAAC is really hard-coded to 64-bit, then I mght write
and enforce, onto the internal devices (behind my host), a simple code to
assign 32-bit (or whatever bits shorter than 64) IIDs, since the devices
might be under my control.

Would this be policed not ever to happen?

On Thu, 17 Aug 2017 at 10:32 Brian E Carpenter <brian.e.carpenter@gmail.com>
wrote:

> On 17/08/2017 12:24, DY Kim wrote:
> > Does this ‘unlimited devices behind the host’ include the following case?
> >
> >   - A host gets a /64 prefix.
> >
> >   - The host runs for itself an internal ‘Unique-IPv6-Prefix-per-Host’
> so that it hands out a /96 prefix to each internal device.
> >
> >   - In effect, this comes down to /96 prefixes and 32-bit IIDs.
> >
> > Technically, there’s no reason why this cannot be done, I’d assume.
> However, would this be forbidden in the sense of the current and related
> std track documents?
>
> It's forbidden by the fact that RFC4291 states that the IID length is 64.
> Clearly that applies to SLAAC; it's a bit less clear whether it applies to
> DHCPv6. But the privacy related RFCs make it pretty clear that 32 bits is
> too small.
>
>      Brian
>
> --
----
DY