Jim and all,

Jim Bound wrote:

> This is a good technical question.
>
> >  Yes excuse me, I did mean autoconfiguration.  As I read
> >Thomas' draft the fix for the MAC privacy problem is not
> >addressed as a function of autoconfiguration.  What part
> >did you see that does?
>
> From: draft-ietf-ipngwg-addrconf-privacy-00.txt
> The following text defines the adjuncts to stateless addrconf RFC 2462
> what would need to be done, and the modifications to RFC 2462 to resolve
> the issue at hand.  On this list today and yesterday I was also hearing
> folks would want manual configuration too.  Me too.  As a third option.
> Having implemented addr conf I will say this is very doable and its a
> matter of the IETF working on the spec (which is in process) and
> wrapping this up.

  I agree here and this is in part one method of addressing the
the privacy concerns.  But I would strongly suggest for reasons
that I have already stated the the autoconfiguration include that the
privacy concerns be addressed as a default of the spec.  If this
is done much of the problem with IPv6 in this area would be
adequately addressed.  I also agree that a manual configuration too
be included as has been suggested by others, but be a second
priority to the autoconfiguration fix.

>
>
> So as I read the attached below the issue is addressed for address
> autoconfiguration.
>
> I would suggest we just move on to the technical work at hand and work
> this spec out in the working group.
>
> ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
> 3.  Protocol Description
>
>    The goal of this section is to define procedures that:
>
>    1) Result in a different interface identifier being generated at each
>      system restart or attachment to a network.
>
>    2) Produce a sequence of interface identifiers that appear to be
>       random in the sense that it is difficult for an outside observer
>       to predict a future identifier based on a current one and it is
>       difficult to determine previous identifiers knowing only the
>       present one.
>
> 3.1.  When Stable Storage is Present
>
>    The following algorithm assumes the presence of a 64-bit "history
>    value" that is used as input in generating an interface identifier.
>    The very first time the system boots (i.e., out-of-the-box), any
>    value can be used including all zeros. Whenever a new interface
>    identifier is generated, its value is saved in the seed for the next
>   iteration of the process.
>
>    Section 5.3 of [ADDRCONF] describes the steps for generating a link-
>   local address when an interface becomes enabled. This document
>    modifies that step in the following way. Rather than use interface
>    identifiers generated as described in [ADDRARCH], the identifier is
>    generated as follows:
>
>    1) Take the history value from the previous iteration (or 0 if there
>      is no previous value) and append to it the interface identifier
>       generated as described in [ADDRARCH].
>    2) Compute the MD5 message digest [MD5] over the quantity created in
>      step 1).
>    3) Take the left-most 64-bits of the MD5 digest and set bit 6 (the
>       left-most bit is numbered 0) to zero. This creates an interface
>       identifier with the universal/local bit indicating local
>       significance only. Use the resultant identifier for generating
>       addresses as outlined in [ADDRCONF]. That is, use the interface
>       identifier to generate a link-local and other appropriate
>       addresses.
>    4) Save the interface identifier created in step 3) in stable storage
>      as the history value to be used in the next iteration of the
>       algorithm.
>
>    MD5 was chosen for convenience, not because of strict requirements.
>    IPv6 nodes are already required to implement MD5 as part of IPsec
>    [IPSEC], thus the code will already be present on IPv6 machines.
>
> 3.2.  In The Absence of Stable Storage
>
>    In the absence of stable storage, no history information will be
>    available to generate a pseudo-random sequence of interface
>    identifiers. Consequently, identifiers will need to be generated at
>    random. A number of techniques might be appropriate. Consult [RANDOM]
>   for suggestions on good sources for obtaining random numbers. Note
>    that even though a machine may not have stable storage for storing
>    the previously using interface identifier, they will in many cases
>    have configuration information that differs from one machine to
>    another (e.g., user identity, security keys, etc.). One approach to
>    generating random interface identifiers in such cases is to use the
>    configuration information to generate some data bits (which may be
>    remain constant for the life of the machine, but will vary from one
>    machine to another), append some random data and compute the MD5
>    digest as before. The remaining details for generating addresses
>    would be analogous to those of the previous section.
> +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
>
> /jim

Regards,

--
Jeffrey A. Williams
Spokesman INEGroup (Over 95k members strong!)
CEO/DIR. Internet Network Eng/SR. Java/CORBA Development Eng.
Information Network Eng. Group. INEG. INC.
E-Mail [EMAIL PROTECTED]
Contact Number:  972-447-1894
Address: 5 East Kirkwood Blvd. Grapevine Texas 75208


Reply via email to