On Aug 15, 2007, at 06:29, Wes Beebee (wbeebee) wrote:

DHCPv6 is useful when MSO's want to control which CPE's get addresses and which do not. It provides a simple way to do access control on a network.

EAP is a better way to do that. DHCPv6 is more useful for controlling which CPE gets what addresses from a centrally administered network service. I just don't see how that solves any *real* problems; that's all. Why should it matter what address each CPE interface is assigned, as long as it's reachable, authenticated, authorized and accounted? (Answer: because there are lazy people using interface addresses as CPE device identifiers in security protocols, when there are perfectly good alternatives in IPv6 that have the added virtue of actually functioning properly.)

As near as I can tell, the one architecturally goodish thing DHCPv6 has going for it is prefix delegation. There's no way to do that with straight router advertisements-- more's the pity. (Once again, IETF stopped short of redesigning the full Appletalk protocol stack, which supported ad-hoc routed internets, sort of... but, alas, I'm beginning to degenerate.)

Could a hacked-up rogue system still manage to get on? Probably - but at least it bars casual users from getting on a network that they're not supposed to.

Probably?  Try: absolutely.

I could tell you how I used a commercial off-the-shelf product at IETF 69 to bypass the hotel's stupid method of using DHCP to prevent me from interposing my Wi-Fi NAT gateway into the in-room Internet service. It's a supported feature of the product I used, expressly marketed to customers for the purpose of making it easy for casual users to do this. If they had used an appropriate technology, it wouldn't have mattered whether I was using a bridge or a router or I was directly connected, and they would have still been assured that only my one computer was permitted to access their network. Instead, they were relying on my good will not to run an open Wi-Fi AP and allow everybody in the rooms around me to share my access.

Operators who depend on DHCPv6 alone to deter users from accessing their networks with unauthorized devices are just going to end up peeving their paying customers with needless interoperability complexity. Some operators have already discovered this, and they've now stopped using DHCP as an access control mechanism.


--
james woodyatt <[EMAIL PROTECTED]>
member of technical staff, communications engineering



--------------------------------------------------------------------
IETF IPv6 working group mailing list
[email protected]
Administrative Requests: https://www1.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to