Fernando,

This is my personal views from reading the draft.

Generally I support the idea in this draft that another type of privacy 
addresses would be useful to add to IPv6.  For example, to not expose the 
vendor IDs in IEEE MAC addresses.  I have some comments on the internet draft.

Bob

------

Introduction

In the Introduction the draft mentions that the IEEE MAC based interface 
identifiers don't eliminate the threat from host scanning.  To justify this the 
document references two documents [Gont-DEEPSEC2011] [CPNI-IPv6].  The first is 
a presentation you prepared and the second is also written by you but not 
publicly available (the reference says "available on request").  I was able to 
find the presentation online.  It makes an argument that host scanning is 
possible because (in my words) that there is structure in how Internet IDs are 
formed.  It lists different type of IIDs found and reported in a paper by 
Malone.  This paper is primarily about the observed types of address in an 
operational test.  It includes stats on the percentage of IPv6 address types 
observed in live traffic (e.g., 50% SLACC based, 20% IPv4 based, etc.).   

The problem I see is that this doesn't justify the claim that there is a 
problem with host scanning with MAC based interface identifiers.  It would be 
helpful if you could provide some data or analysis that justifies this to 
quantify the risk.  In my reading the references don't do that.  

-------

2. Design Goals

Could these types of Interface Identifiers also be generated by DHCPv6 servers. 
 I would think that it would be useful to generate these hard to predict IIDs 
when a DHCPv6 server is providing addresses.  This would be much better than 
assigning them linearly that are easy to predict and scan for.  

That is, the same approach could be used to create IIDs for SLAAC and DHCPv6.  

---------

5. Security Considerations

In the second paragraph the document says 

  "We note that this algorithm is meant to replace Modified EUI-64 format 
identifiers".  

This is the first time the document says this.  If it intends to do this, it 
should be in the main part of the document and not first appear in the security 
considerations.  The document makes a clear argument why it is preferable to 
MAC based IIDs, but it doesn't justify replacing Modified EUI-64 identifiers.  
It's a would be a major change to the IPv6 Address Architecture that I don't 
think is warranted.

The algorithm in Section 3. even clears the U/L bit to be compatible with the 
Modified EUI-64 IIDs.   I think document may be confusing IEEE MAC based 
Modified EUI-64 Interface IDs with the format defined in the IPv6 Address 
Architecture that can accommodate different types of tokens (MAC based, random 
number based, manual assignment, etc.) to create IIDs.

Please clarify?

-------

Sections 7.

I don't understand the purpose of this section.  It comes after the 
Acknowledgement section and before References.  It reads like open issues and 
says it might be removed.  Is it meant as an appendix?  Perhaps rewriting it to 
show how addresses based on these IIDs prevent these problems.


----

References:

   [CPNI-IPv6]
              Gont, F., "Security Assessment of the Internet Protocol
              version 6 (IPv6)",  UK Centre for the Protection of
              National Infrastructure, (available on request).

I am not sure this will be acceptable by the RFC-Editor.   There isn't enough 
information to know who to ask to to get a copy.  It would be better if it was 
available online.




--------------------------------------------------------------------
IETF IPv6 working group mailing list
[email protected]
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to