On 3.2.2015, at 14.47, Ted Lemon <ted.le...@nominum.com> wrote:
> On Feb 3, 2015, at 3:44 AM, Markus Stenberg <markus.stenb...@iki.fi> wrote:
>> If we have a home router, which does NAT (and I dare you to find one that 
>> does not), the e.g. potential authentication mentioned in Section 2.3 
>> becomes invalid in case of IPv4 as the source address prefix information has 
>> to change (or be omitted) for it to be useful. Section 2.5 further advocates 
>> combining both IPv4 and IPv6 PVDs, and as a result, whole authentication 
>> scheme becomes more or less invalid if not directly connected to the network 
>> PVD lives in. (And IPv4 source address prefix information has to change.)
> I think this is future work.   The MIF working group did consider whether to 
> separate IPv4 and IPv6 PVDs; my belief was that we should, but the consensus 
> was that they should be able to be kept together.   I think it's true that 
> the capability to authenticate an explicit provisioning domain's container 
> across a home gateway that is doing NAT for IPv4 is unlikely to work without 
> some care.   However, it's not clear to me that this is even a use case that 
> we care about.   If it is, then it can be addressed by treating the NATted 
> provisioning domain as a different provisioning domain than the external IPv4 
> provisioning domain.   It's actually not usual however for HGs to even pass 
> the external PVD information into the home network on IPv4 NATs.   Instead, 
> it sets up a DNS proxy and advertises that, and passes nothing else through 
> at all.
> 
>> - make use of source address specific optional with IPv4? (or note somewhere 
>> that prefix should be 0.0.0.0/0 if any use of NAT is ever thought reasonable 
>> using the PVD)
> 
> This is another alternative, but it would only be necessary in the case where 
> you wanted to advertise a translated prefix internally and have that be 
> treated as the same PVD as the externally advertised prefix.   Since the 
> current architecture document doesn't make specific recommendations about 
> this, I don't think that we need to add anything, but if you think it's 
> worthwhile we could add text that just explains the issue you've raised and 
> talks about your proposed solution and possibly the one I've suggested.
> 
> I don't really want to add text about this, because I don't think it's been 
> thought through carefully, and there are some holes in it that I can see.   
> For example, there's no way to prove that an advertised NAT prefix actually 
> reaches the PVD that it is claimed to reach.   So you are pretty much at the 
> mercy of the HG anyway.

Fair enough; I guess just splitting the dual stack PVDs if encountered 
(IPv4+IPv6 -> NATted IPv4 + IPv6 as-is) is sufficient answer to that. As I 
personally consider authentication mostly bogus, this is not really a problem 
for me :)

>> On not so serious note, as PvD has (more or less) binding to the protocol it 
>> was used to acquire the configuration information (e.g. DHCPv4, DHCPv6, or 
>> RA), I would much rather advocate single-AF PvDs so their lifetime would map 
>> to the lifetime of the other network information received/updated via that 
>> particular protocol.
> Me too, but I think that ship has already sailed.   And if you think about 
> it, your point about RA and DHCPv6 is clearly an implementation issue: the 
> implementation for explicit PVDs has to make it possible to connect them, 
> because in practice they are related.   So there’s no technical reason why 
> this can't also work for DHCPv4 and explicit PVDs.
>> Nit: In section 7.2.1, where does TLS come from? Does DHCPv6 or RA have TLS 
>> transport? (X.509 certificate would fit better.)
> How about "PKI" instead of "TLS"?  I know PKI generally means X.509, but it 
> isn’t restricted to X.509.

PKI is more generic, yes. I also wondered about doing ‘authentication using .. 
DANE’, as _that_ also just uses X.509 certificates (and would be covered under 
PKI certificate using authentication).

So final suggestion - get rid of DANE, get rid of TLS, and probably rework the 
text in that paragraph a bit to make it simpler. As-is, both DANE and TLS 
mention seem superfluous.

Cheers,

-Markus
_______________________________________________
mif mailing list
mif@ietf.org
https://www.ietf.org/mailman/listinfo/mif

Reply via email to