Re: [v6ops] Update of RFC 7084 -- Re: Slides from AWS, SAP, ESnet, Dell in side meeting and call for volunteers on 3 research topics

Ted Lemon <mellon@fugue.com> Sun, 06 August 2023 18:19 UTC

Return-Path: <mellon@fugue.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 386ECC151536 for <v6ops@ietfa.amsl.com>; Sun, 6 Aug 2023 11:19:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.906
X-Spam-Level:
X-Spam-Status: No, score=-1.906 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=fugue-com.20221208.gappssmtp.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OeGi17JXsKl1 for <v6ops@ietfa.amsl.com>; Sun, 6 Aug 2023 11:19:04 -0700 (PDT)
Received: from mail-qv1-xf35.google.com (mail-qv1-xf35.google.com [IPv6:2607:f8b0:4864:20::f35]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 18515C15152F for <v6ops@ietf.org>; Sun, 6 Aug 2023 11:19:03 -0700 (PDT)
Received: by mail-qv1-xf35.google.com with SMTP id 6a1803df08f44-63cf69f3c22so27347236d6.3 for <v6ops@ietf.org>; Sun, 06 Aug 2023 11:19:03 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fugue-com.20221208.gappssmtp.com; s=20221208; t=1691345942; x=1691950742; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=d7RXBLi2zO2GDlO22rkG0QAB1u4uWUjw9scxVGJHfDo=; b=zWU2A+EXrVKVLp6/PQWbRf074RbmNBoOSMUV6VcrZWH1UfTry28ccD9ORxpc3z00bv KUrcjXU5qPGrt1F0HQ+zlaETp1LKwSQ3ME0UCAcJjwvUYY4fy52G92eCVvYowAQ7sq1F Y2UEDJIiGFpgSmk9yUKRX9Cp92BALK+F8vWiaq8AEan0mQafkYOD1H4x3CsFeRkSyBS9 NzYxR2ZkDepSpHp1gAW04GPaY1rmVNBbbErz09tyUhd7mEWfu+/88VzLQ3P+mhyF22FI iyTjT+TgNjAiEyhp8Wdd6Hc1BrUUz9x22tfE8ZnYO+HT1NbotTOsw+H7+21Bq7I3SNJs lP8g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1691345942; x=1691950742; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=d7RXBLi2zO2GDlO22rkG0QAB1u4uWUjw9scxVGJHfDo=; b=BDxLXeMzaZ5YxszyQDPgJ6umI2Hk700tR7usMODtGcfeTuoSlQMTxS5rRSC9zgnI/r BDTYj103KrM6llxaJXyPVWg508ilg0fmxahe5fjFBZCAt/9npiSPJcgXwobNjF5JBOT4 GyeoKDHOimrPz95iBivMaqjePEDL2Tc3ldL+r/gpbfRUjgXgXV1GWfj5X72ChVDFGvOb pXcvgnzNzHfkOlUTPcDbhEdLCSBXy7/3WqBWpLZMc43IVgEh8JMpEvW9yi1vWbmQd9In KLJO3bLkjev6RwmNIwPp4GIsOQbamO3gQDaoUMX4V5/RDkhdJCRyZ1/9VPkNuPaFVDkf 6CSQ==
X-Gm-Message-State: AOJu0YwRJge7pwx/57EoOzRw5MmjQ104Ut1pBC6O/PyJXeuRX6Cd3bwD VwGIY2Pv/x5BD0tBhSGNYDSSl3YiTujmsYhiD3amRv5U+XyPcWZKyro=
X-Google-Smtp-Source: AGHT+IHQI8BdYFanVkPuWpBVd/s6j2eBcGdcES6dQy36/S75Cb5ZN1MoA6BnrSmGo9zFEHOwvoFpeaspocWf21EPeGM=
X-Received: by 2002:a0c:a719:0:b0:636:1722:8300 with SMTP id u25-20020a0ca719000000b0063617228300mr7857836qva.1.1691345942502; Sun, 06 Aug 2023 11:19:02 -0700 (PDT)
MIME-Version: 1.0
References: <fc112f43d5334e2fb307e57dd4824dd0@huawei.com> <4650D33E-D607-4426-9735-AB3717007AB6@employees.org>
In-Reply-To: <4650D33E-D607-4426-9735-AB3717007AB6@employees.org>
From: Ted Lemon <mellon@fugue.com>
Date: Sun, 06 Aug 2023 14:18:51 -0400
Message-ID: <CAPt1N1ntcgt15=MhaiNA3jiupHN15ZDBX9Ee1JjMP1a4-+=eAA@mail.gmail.com>
To: Ole Trøan <otroan=40employees.org@dmarc.ietf.org>
Cc: IPv6 Operations <v6ops@ietf.org>, Xipengxiao <xipengxiao=40huawei.com@dmarc.ietf.org>, jordi.palet@theipv6company.com
Content-Type: multipart/alternative; boundary="0000000000001879140602452a6e"
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/xu7VAaH2OANbgEXit_puWebKOL8>
Subject: Re: [v6ops] Update of RFC 7084 -- Re: Slides from AWS, SAP, ESnet, Dell in side meeting and call for volunteers on 3 research topics
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 06 Aug 2023 18:19:08 -0000

As a counterpoint to this (my opinion on this is a bit orthogonal), Roman
Danyliw’s discuss on draft-ietf-dnssd-srp asked why we didn’t mention an
ipv4 equivalent to 7084, to which my answer was “it actually covers ipv4
adequately.”

Personally I think that we should decide what to recommend if we specify
IPv4aas. 8585 mentions numerous options. This doesn’t feel like something
that should be in a router requirements document. I suspect we have enough
operational experience at this point to make a specific recommendation;
probably NAT64/464xlat. If we aren’t ready to do that, I don’t think we’re
ready to include this in 7084bis.

Op zo 6 aug 2023 om 12:45 schreef Ole Trøan <otroan=
40employees.org@dmarc.ietf.org>

>
>
> > On 6 Aug 2023, at 18:02, Xipengxiao <xipengxiao=
> 40huawei.com@dmarc.ietf.org> wrote:
> >
> > 
> >>
> >>> I think it will be very useful to update both documents into a single
> one and include other points that we discussed in the list several times
> >
> > I agree with Jordi that it's a good idea to merge 7084 and 8585 to have
> a single requirement RFC for IPv6 CPEs, rather than having two separate
> requirement RFCs, one for all IPv6 CPEs and another for IPv4-as-a-Service
> CPEs.  The latter can be a section in the overall document.  But doing so
> does require coordination with the 7084 authors.  Can Tim/Gabor/Jordi
> please do so?  Thanks.
>
> I don’t think that’s a good idea. For the same reasons stated when we had
> this discussion last.
> IPv4aaS would belong in a IPv4 CE document. Not in an IPv6 one.
>
> O.
>
>
> >
> > XiPeng
> >
> > -----Original Message-----
> > From: v6ops <v6ops-bounces@ietf.org> On Behalf Of
> jordi.palet@consulintel.es
> > Sent: Wednesday, August 2, 2023 10:17 PM
> > To: IPv6 Operations <v6ops@ietf.org>
> > Subject: Re: [v6ops] Update of RFC 7084 -- Re: Slides from AWS, SAP,
> ESnet, Dell in side meeting and call for volunteers on 3 research topics
> >
> > When I was working in RFC8585, for long time, the intent was to update
> RFC7084, and it went well at the 1st stage, but then, there was a
> push-back, mainly from RFC7084 authors … so we needed to find an
> alternative way.
> >
> > So if we now want to do that, I’m happy to go back and work on that
> together with Tim, Gabor or any others. I think it will be very useful to
> update both documents into a single one and include other points that we
> discussed in the list several times.
> >
> > Regadrs,
> > Jordi
> >
> > @jordipalet
> >
> >
> >> El 2 ago 2023, a las 22:01, Brian E Carpenter <
> brian.e.carpenter@gmail.com> escribió:
> >>
> >> Gábor,
> >>
> >> RFC 8585 is Informational, like RFC 7084, so although updates/updated
> by is theoretically possible, this isn't really a bug.
> >>
> >> I agree that it's time to update RFC 7084, and maybe make it a BCP this
> time.
> >>
> >> Regards
> >>  Brian Carpenter
> >>
> >>> On 03-Aug-23 04:26, Gábor LENCSE wrote:
> >>> Hi Tim and Xipeng,
> >>> If you plan to update (or re-issue) RFC7084 “Basic Requirements for
> >>> IPv6 Customer Edge Routers”, then I recommend you to consider that,
> >>> IMHO, some of its content is outdated. It mentions only 6rd (which I
> >>> consider to be rather obsolete today) and DS-Lite. Since then RFC
> >>> 8585 “Requirements for IPv6 Customer Edge Routers to Support
> >>> IPv4-as-a-Service” has been published, but in the header of RFC 7084
> >>> a reference to RFC 8585 is missing. (It should have: "updated by RFC
> >>> 8585.) Perhaps Section 4.4 "Transition Technologies Support" (
> >>> https://datatracker.ietf.org/doc/html/rfc7084#section-4.4 ) should be
> >>> replaced by a pointer to RFC 8585. :-) Best regards, Gábor
> >>> 8/2/2023 6:08 PM keltezéssel, Xipengxiao írta:
> >>>>
> >>>> Hi Tim,
> >>>>
> >>>> I agree that we should update RFC7084 “Basic Requirements for IPv6
> Customer Edge Routers” to advise against EUI-64.  At a first thought, I
> wondered whether such an update is a bit too “ad hoc” (we update it every
> time we discover an issue). But at a second thought, I think the CPE
> requirement RFC is an important RFC that should be kept “up to date”.
> Although it’s not ideal to frequently update/publish new (requirement)
> RFCs, it’s easier to update RFCs than to deal with operations issues in the
> field.  So if you are willing, please work with the existing authors of
> 7084 to update it. thanks.
> >>>>
> >>>> XiPeng
> >>>>
> >>>> *From:* Timothy Winters <tim@qacafe.com>
> >>>> *Sent:* Wednesday, August 2, 2023 2:42 PM
> >>>> *To:* Xipengxiao <xipengxiao@huawei.com>
> >>>> *Cc:* Ryo Yanagida <ryo@htonl.net>; v6ops@ietf.org
> >>>> *Subject:* Re: [v6ops] Slides from AWS, SAP, ESnet, Dell in side
> >>>> meeting and call for volunteers on 3 research topics
> >>>>
> >>>> Hi XiPeng,
> >>>>
> >>>> I've responded inline to your questions.
> >>>>
> >>>> On Wed, Aug 2, 2023 at 4:12 AM Xipengxiao <xipengxiao=
> 40huawei.com@dmarc.ietf.org> wrote:
> >>>>
> >>>>   Hi Ryo,
> >>>>
> >>>>   Thanks for providing your thought. Your question “Is BCP about IID
> assignment the only thing that could be done as v6ops?” triggers me to
> think that:
> >>>>
> >>>>   1.Can some people in v6ops work with the authors to identify (the
> >>>> involved operators and) the guilty CPE models? Then something may be
> >>>> done (see below)
> >>>>
> >>>> [twinters] - If we truly believe that EUI-64 shouldn't be used, we
> should update 7084.  Either via a bis, or update RFC for this issue.  I'd
> be happy to be an author on this draft.
> >>>>
> >>>>   1.
> >>>>
> >>>>   2.Many people in v6ops are involved in various IPv6 Councils
> >>>> (e.g. of Belgium, UK).  They can talk about this issue in their
> >>>> countries to prevent repeat of this same mistake.  They can even
> >>>> talk to their regulators to issue directives
> >>>>
> >>>> [twinters] - IPv6 Ready Logo has a CE Router program that is used for
> regulators in some areas (Brazil).   One option would be to put a
> requirement in about using EUI-64 on the WAN.
> >>>>
> >>>>   1.
> >>>>
> >>>>   2.Should the operators stuck with EUI-64 CPEs do NAT66 to hide
> their customers’ IPv6 addresses?  I know NAT is not a popular idea in IPv6,
> but compared to allowing (bad) people to locate your customers’ IPv6
> addresses to the street level, maybe NAT66 is less evil?
> >>>>
> >>>> [twinters] - I've spoken to operators in some areas that are
> investigating requiring privacy addressing on the WAN for this reason.
> When it's inside the house, not connected to the ISP network it's much
> harder to control, I haven't heard of any operator looking into NAT66.
> >>>>
> >>>>   1.
> >>>>
> >>>>   To all - these are preliminary thoughts.  I am not really
> advocating them so please don’t be upset if you dislike them. I just hope
> v6ops people don’t conclude too quickly that nothing can be done.  To me
> this is an operations issue, and it’s up to us to deal with it.
> >>>>
> >>>>   XiPeng
> >>>>
> >>>>   *From:* Ryo Yanagida <ryo@htonl.net>
> >>>>   *Sent:* Tuesday, August 1, 2023 5:01 PM
> >>>>   *To:* Xipengxiao <xipengxiao@huawei.com>
> >>>>   *Cc:* v6ops@ietf.org
> >>>>   *Subject:* Re: [v6ops] Slides from AWS, SAP, ESnet, Dell in side
> >>>> meeting and call for volunteers on 3 research topics
> >>>>
> >>>>   Hi Xipeng,
> >>>>
> >>>>   Thanks for sending this through.
> >>>>
> >>>>       On 29 Jul 2023, at 01:15, Xipengxiao <xipengxiao=
> 40huawei.com@dmarc.ietf.org> wrote:
> >>>>
> >>>>       New report from MAPrg on Friday.  Does v6ops need to do
> anything?
> >>>>
> >>>>       oWe present IPvSeeYou, a privacy attack that permits a remote
> and unprivileged adversary to physically geolocate many residential IPv6
> hosts and networks with street-level precision. The crux of our method
> involves: 1) remotely discovering wide area (WAN) hardware MAC addresses
> from home routers; 2) correlating these MAC addresses with their WiFi BSSID
> counterparts of known location; and 3) extending coverage by associating
> devices connected to a common penultimate provider router.
> >>>>
> >>>>       oWe first obtain a large corpus of MACs embedded in IPv6
> addresses via high-speed network probing. These MAC addresses are
> effectively leaked up the protocol stack and largely represent WAN
> interfaces of residential routers, many of which are all-in-one devices
> that also provide WiFi. We develop a technique to statistically infer the
> mapping between a router's WAN and WiFi MAC addresses across manufacturers
> and devices, and mount a large-scale data fusion attack that correlates WAN
> MACs with WiFi BSSIDs available in wardriving (geolocation) databases.
> Using these correlations, we geolocate the IPv6 prefixes of >12M routers in
> the wild across 146 countries and territories. Selected validation confirms
> a median geolocation error of 39 meters. We then exploit technology and
> deployment constraints to extend the attack to a larger set of IPv6
> residential routers by clustering and associating devices with a common
> penultimate provider router. While we responsibly
> >>>>       disclosed our results to several manufacturers and providers,
> the ossified ecosystem of deployed residential cable and DSL routers
> suggests that our attack will remain a privacy threat into the foreseeable
> future.
> >>>>
> >>>>   On this particular point. If I understand this correctly, it this
> is an issue with ISP/Vendor’s IID assignment in the CPEs. Is BCP about IID
> assignment the only thing that could be done as v6ops? (I think there are
> probably several RFCs like RFC8064 that deters the use of link-layer
> address in EUI-64 generation for IIDs described in RFC4291 already) Maybe
> to encourage a firmware update to change the IID assignment mechanism?
> >>>>
> >>>>   I think the scope (and the trick) here is the existence of
> all-in-one devices that have an EUI64 IID in the northbound (and also
> potentially 802.11 wifi side) v6 addr. which is used here to provide a
> mapping from v6 prefix to the known BSSIDs locations.
> >>>>
> >>>>   Best,
> >>>>
> >>>>   Ryo
> >>>>
> >>>>   _______________________________________________
> >>>>   v6ops mailing list
> >>>>   v6ops@ietf.org
> >>>>   https://www.ietf.org/mailman/listinfo/v6ops
> >>>>
> >>>>
> >>>> _______________________________________________
> >>>> v6ops mailing list
> >>>> v6ops@ietf.org
> >>>> https://www.ietf.org/mailman/listinfo/v6ops
> >>> _______________________________________________
> >>> v6ops mailing list
> >>> v6ops@ietf.org
> >>> https://www.ietf.org/mailman/listinfo/v6ops
> >> _______________________________________________
> >> v6ops mailing list
> >> v6ops@ietf.org
> >> https://www.ietf.org/mailman/listinfo/v6ops
> >
> >
> > **********************************************
> > IPv4 is over
> > Are you ready for the new Internet ?
> > http://www.theipv6company.com
> > The IPv6 Company
> >
> > This electronic message contains information which may be privileged or
> confidential. The information is intended to be for the exclusive use of
> the individual(s) named above and further non-explicilty authorized
> disclosure, copying, distribution or use of the contents of this
> information, even if partially, including attached files, is strictly
> prohibited and will be considered a criminal offense. If you are not the
> intended recipient be aware that any disclosure, copying, distribution or
> use of the contents of this information, even if partially, including
> attached files, is strictly prohibited, will be considered a criminal
> offense, so you must reply to the original sender to inform about this
> communication and delete it.
> >
> >
> >
> > _______________________________________________
> > v6ops mailing list
> > v6ops@ietf.org
> > https://www.ietf.org/mailman/listinfo/v6ops
> > _______________________________________________
> > v6ops mailing list
> > v6ops@ietf.org
> > https://www.ietf.org/mailman/listinfo/v6ops
>
> _______________________________________________
> v6ops mailing list
> v6ops@ietf.org
> https://www.ietf.org/mailman/listinfo/v6ops
>