Ole and Bob: I don't think that the extension to the Privacy Extension RFC is 
applicable here.

Fernando:

I think some of these comments were also made by Ole and Bob but, as I was so 
busy, I could not finish them and send them.

Now the question is whether or not you are using the "lifetime" for this IID or 
IP. If you are, then it is the same procedure as that for the RFC privacy 
extension.

>Nobody has even suggested this. For instance, if these addresses had a 
>lifetime (in the RFC4941 sense), they wouldn't be called "stable" in the first 
>place.
I understand that you did not use a lifetime for the address where the privacy, 
within the network, is questionable! I said that, if you are really concerned 
about privacy, then you would need to set the lifetime for your address, even 
within the same subnet.

When you use the same, so called stable addresses, in the same subnet,  it 
means that you generate the same address and use the same address forever 
within that subnet. Now the question is, if your address ,according to your 
draft, does not change, what privacy protection is afforded within the network 
here? Especially for those fixed nodes, within that network, that never move to 
another network.

The second question: usually when, for privacy reasons, ISPs change their 
addresses they also change the prefixes. So as you say you generate new address 
for the new prefix, what is the stability of the address?

For the Second concern, let's go back to the privacy extension RFC. As I 
mentioned in a prior email, the second approach is to use  CGA or DHCPv6. But 
they did not explain how to do this. They mentioned CGA as a way for generating 
a  random IID but did not mention it as a security option. So one might 
consider extending that section to include an explanation  as to how to use the 
second approach in that RFC. For example, suggest using the CGA generation 
algorithm (as you are using it with another name!) and since the address does 
not need to be verified, then there is no need to set a sec value or add CGA 
options to the options in SEND. Another suggestion might  that there is no need 
for the other node to process verification because security is not an issue.
> * In 3972, there's no secret. Hence, the attacker might be able to compute 
> the IID himself (assuming the algorithm and the input parameters are known).
Not true as I pointed out before.
> * If the CGA Modifier changes (as they are supposed to), then the addresses 
> are not constant within the same network (each time you generate a CGA, the 
> IID would be different).
See my first paragraph as a response to this.

As I pointed out before, one can make improvements to the privacy extension RFC 
and explain the second approach, in more detail for the use of the same 
algorithm in CGA as was used (the same as sec value 0, i.e., you just run the 
hash algorithm once on the concatenation of a random number, subnet prefix and 
etc) and skip the verification mechanism since no verification is needed.
> As noted above, many deployments turn off privacy addresses.
I do not think this is a good reason in this case because they can also do the 
same thing using your draft proposal and never implement it, or disable it!

>A.1.3.  Revealing the identity of devices performing server-like

        Functions
Some devices need to have a fix IP address and these are usually set by an 
administrator manually or a fixed range of IP address for the devices being 
used. This is what happens in large networks. In small networks, like home 
networks, usually the name of the devices are used. For some servers or server 
functioning devices, privacy is not important because they should be available 
and well known in that network. So for those well-known devices, privacy does 
not make sense.

Finally, in your draft you do not completely address the privacy issue. When 
the same network is used to connect different places, then your node becomes 
vulnerable to tracking. What I think is, as long as you think about stability, 
that you need to also forget about  privacy. And if you decide to be concerned 
with privacy, then you need to use a lifetime for your address. This is again 
like the privacy extension RFC, and so, your draft can be written to improve 
the second approach described in that RFC as I do not think stability can solve 
the privacy issues. At the beginning privacy related attacks might decreased, 
but when you plan to use that IP from the same subnet forever, then you are 
vulnerable to those types of attack. The attacker only needs to spend more time 
gathering information about that node. Then, after a while, it will be easy for 
him to track that node again. This means, with your way, the attacks are still 
possible; you have just postponed the attacks between networks but done nothing 
for those inside the same network.

Thank you,
Hosnieh


From: [email protected] [mailto:[email protected]] On Behalf Of Ole 
Troan
Sent: Thursday, December 20, 2012 3:41 PM
To: 6man 6man-wg
Subject: Chairs review: draft-ietf-6man-stable-privacy-addresses-01

all,

the ADs have asked us to ensure that there are good review of documents in the
working group, prior to them being advanced to the IESG.
as a part of document last calls in the 6man working group, Bob and I want to 
try
using volunteers and/or w.g. chair reviewers, that take specific responsibility 
to
review documents in WG last call.
Bob and I have reviewed this document.



General comments:
--------------------------
We do see the usefulness of a interface-id generation algorithm, that results
in stable identifiers per IPv6 prefix, while not being derived from link-layer
MAC addresses.

The mechanism proposed could be viewed as an modification of temporary 
addresses (RFC4941)
with lifetime handling as for SLAAC, or as an extension to CGA (RFC3972) address
generation where the public key is removed from the hash.

The method for generating "Stable privacy addresses" needs to be as well 
specified
as temporary addresses (RFC4941).
We do wonder if the method of generating these addresses could be a 
modification of the
algorithm in RFC4941, or if at least, larger parts of the text in RFC4941 could 
be
references avoiding having to duplicate lots of text into this document.

We do not believe the current revision of the document is ready to advance to 
the IESG.

Major points:
-----------------
- Stable Privacy Enhanced Addresses (SPE Addresses) should not be a replacement 
for the
  algorithm specified in RFC2464. It is an alternative. Section 3 needs 
modification.

- The algorithm in the document  is underspecified.
  o It should specify the hash function. E.g. MD5 as RFC4941.
  o It should handle reserved interface-ids (see 4941).
  o We suggest renaming the "secret key" to "modifier". And add text describing
    how to 'maintain' the modifier (section 3 of RFC3972).
  o It would be useful to include an example algorithm as has been done in some 
other documents.
  o Not all implementations use interface indexes

- Clarify what lifetimes these addresses have.

- Specify the default for DAD retries (IDGEN_RETRIES)

- Clarify the requirements for stable storage (compared to RFC2464)

Minor points:
-----------------
Don't use the term "static addresses" as that implies static aka manual 
configuration.
These addresses are not static in that sense.

Section 3, Last Paragraph:
The reference to Node Information Queries only applies if the attacker is 
onlink.
Current text overstates the problem. Move to security considerations. Addresses 
will
leak regardless, in other communication, email header etc.

6. Security Considerations.
s/in replacement of/as an alternative to/

Third bullet:
The bullet on host-scanning needs some justification.

Fourth bullet:  This is not a security issue.
Paragraph after bullets:
s/algorithm is meant to replace/meant to supplement/

Best regards and Merry Christmas,
Bob and Ole
--------------------------------------------------------------------
IETF IPv6 working group mailing list
[email protected]
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to