Re: [v6ops] Fwd: New Version Notification for draft-collink-v6ops-ent64pd-01.txt

Fernando Gont <fernando@gont.com.ar> Thu, 12 January 2023 10:48 UTC

Return-Path: <fernando@gont.com.ar>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 74399C14CE28 for <v6ops@ietfa.amsl.com>; Thu, 12 Jan 2023 02:48:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, NICE_REPLY_A=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1eEuG4qqwzgl for <v6ops@ietfa.amsl.com>; Thu, 12 Jan 2023 02:48:48 -0800 (PST)
Received: from fgont.go6lab.si (fgont.go6lab.si [91.239.96.14]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 91B1CC14CEFD for <v6ops@ietf.org>; Thu, 12 Jan 2023 02:48:48 -0800 (PST)
Received: from [10.0.0.133] (unknown [186.19.8.47]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by fgont.go6lab.si (Postfix) with ESMTPSA id 6DC1D2802A3; Fri, 30 Dec 2022 21:01:30 -0300 (-03)
Message-ID: <b069b751-ff7a-6389-3fe4-f06275fd1e89@gont.com.ar>
Date: Fri, 30 Dec 2022 21:01:23 -0300
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.4.2
Content-Language: en-US
To: Martin Huněk <martin.hunek@tul.cz>, Brian E Carpenter <brian.e.carpenter@gmail.com>, v6ops@ietf.org
References: <167107554671.48477.568330207202509840@ietfa.amsl.com> <ac2b11e3-1860-abf9-1f7f-f2f0cae22db3@tul.cz> <2aa6b925-f88f-69fc-70ef-926a68fea4af@gont.com.ar> <1915264.fIoEIV5pvu@asclepius.adm.tul.cz>
From: Fernando Gont <fernando@gont.com.ar>
In-Reply-To: <1915264.fIoEIV5pvu@asclepius.adm.tul.cz>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/x4MeFbTDUGIIvUzF_24cCgw-Pcg>
Subject: Re: [v6ops] Fwd: New Version Notification for draft-collink-v6ops-ent64pd-01.txt
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 12 Jan 2023 10:48:49 -0000

Hello, Martin,

On 22/12/22 18:40, Martin Huněk wrote:
[...]
>>>> 
>>>> Completely understood. But the bad old days of using the MAC
>>>> address to create the IID are gone, and numbering hosts from 1
>>>> upwards would be extremely helpful for some kinds of attack.
>>> 
>>> Again, I do not suggest that it should, by default, number 
>>> hosts/services from 1 upwards. I'm saying that when (and only
>>> when) the device is providing service to the Internet, the IID on
>>> which the service is listening should be predictable.
>> 
>> No. It does not need to be predictable -- that's one of the reasons
>> for which you have the DNS. If anything, it needs to be stable, to
>> avoid the hassle (and glitches) to perform DNS updates regularly.
> 
> That's precisely why it must be predictable, so the admin is actually
> able to put it into the DNS. Or at least it needs to be predictable
> to the admin.

It doesn't need to be predictable, If anything, it has to be stable
(indeed, these two characteristics are design goals of RFC7217).


> As a network admin, I know the following: - Client's DUID - Client's
> Link-local address - Delegated prefix - Maybe the MAC address
> 
> I do not know the IID, so I cannot know the IPv6 address needed to
> make an AAAA record. This I know with DHCPv6, and I knew that back in
> the days when only EUI-64 was used with SLAAC. Also, in the draft,
> there is no stability requirement.

If you use DHCPv6, then you know the addresses, because you're leasing them.

OTOH, if you use SLAAC, you're somehow advocating for hosts to do their 
own thing -- so it shouldn't be you registering addresses in the DNS, 
but the hosts tehmselves should do it with Dynamic DNS updates.



> Long story short, if we keep overlooking the need for
> autoconfiguration predictability in the name of privacy, we will end
> up with hosts with privately generated addresses that will use IPv4
> only, as there would be no IPv6 autoconfigured services in the DNS.

If you want managed configuration, you do DHCPv6, not SLAAC -- slaac is, 
in a way, configuaration anarchy.



> Even with stable privacy addresses, I cannot know the IID generated
> by the host with SLAAC (it uses internal values for generating IID).
> Currently, I have got just three options: 1) Force clients to use
> EUI-64. 2) Use DHCPv6 and force users to report DUID manually. 3) Use
> static configuration, losing all benefits autoconfiguration has.

#1 has been known to be bad for a long time, so I hope you don't even 
consider it. ;-)

With SLAAC, hosts do their own thing, such as generating addresses. If 
you don't like SLAAC because you cannot predict addresses, then... don't 
use SLAAC. ;-)



> What happened at our university (fully dual-stack) was that when the
> IPv6 was deployed, there was only EUI-64 we had made, for every
> registered device in the network, both A and AAAA records. When the
> privacy extension came, we had to abandon the idea of making
> automated EUI-64-based AAAA records.

If you wanted, you could map MAC <--> IPv6 address, and create DNS names 
from there.


> I'm not saying that IID has to be a fixed value known to everybody.
> It can be, for example (just to illustrate an idea): SHA256(Client
> DUID + Delegated prefix) and use first n bits where n is length of
> IID.

I think we have had enough lessons suggesting: do not employ predictable 
IDs.

Thanks,
-- 
Fernando Gont
e-mail: fernando@gont.com.ar
PGP Fingerprint: 7F7F 686D 8AC9 3319 EEAD C1C8 D1D5 4B94 E301 6F01