>> On Nov 19, 2019, at 2:30 AM, Ted Lemon <[email protected]> wrote:
>>
>> On Nov 18, 2019, at 1:50 AM, Gyan Mishra <[email protected]> wrote:
>> ULA mentioned in section 2.1 mentions use case described in RFC 4864 but
>> should mention section 3.2 of that document. I think we could add some
>> verbiage that ULA is used for local scope communications only. Also maybe a
>> case of SHIM6 multi homing or where 6to6 nat - nat64 is used where ULA is
>> inside local Nat to outside global address use case. Maybe also mention
>> default address selection RFC 6724 where a host is configured with both ULA
>> and Global and how ULA is used for internal local communications and how the
>> global address is used for external internet communications.
>
> I don’t think you should mention anything that’s not ready to deploy. SHIM6
> is a neat idea that nobody has deployed, as far as I know, and it’s not clear
> that it can be deployed. I may be wrong about that—that’s just my
> impression—but the point is that if you’re going to suggest something, it
> should be readily actionable..
Agreed.
>
>> 2.1.4 static does mention obfuscation of static address but 2.1.6 does not
>> since DHCPv6 ISC or other DHCPV6 server implementations the pool address
>> picked let’s say within the scope is randomly picked each time the server
>> doles ourt an IPv6 lease by default and not picked sequentially by the
>> server which is why obfuscation is not mentioned. We could mention that is
>> how the DHCPv6 sever picks the address so that is not confused. We don’t
>> mention split scope is required for redundancy which should be mentioned and
>> how that works in comparison to IPv4 where state sharing is done between
>> active and backup server where with DHCPV6 no active leases state sharing..
>> We will get that added as well. Also a caveat with DHCPv6 that when the
>> primary server goes down and the lease has to be renewed rebind time that
>> the IPv6 address has to change at which time any active session will have to
>> reset. I have actually deployed this with BT Diamond which used ISC and to
>> get around this issue we ended up setting a long 7 day lease time with
>> larger block size for the scope being a /112 versus our initial /116 scope.
>> Also good to mention that since the 128 bits is managed to use smaller scope
>> size for split scope then 2 /65 since their is not any privacy extension
>> which stateful that for security it’s better to have a smaller DHCPv6 scope
>> for managed address. In section 2.1.6 the DUID has the mac embedded in the
>> address embedded in the DUID as the 48 LSB bits. Can you provide the use
>> case where the DUID does not have embedded mac. I agree that 2.1.7 needs
>> to some extra verbiage as to the use case of when and why addressing would
>> be done as /64 per host and refer back to 2.1.4 static addressing use case.
>
> Why do you need a split scope? If the prefix is managed, just give out
> random addresses. Use a good random number generator. Use failover to keep
> the servers in sync.
See RFC 6853.
https://tools.ietf.org/html/rfc6853#section-6.1
With DHCPV6 all servers are active and that is why there is not any state
sharing since the pool has to be different and there a a preference option as
to which server is preferred. This does go deeper into host configuration
which is out of scope for this document so will leave out.
>
> DUID is opaque. We recommended generating it using the MAC address because
> we hadn’t thought about privacy. RFC7824 makes it clear that this is a
> problem. Any DHCP implementation on a device where privacy is a likely issue
> should already be randomizing the DUID. DUID-LLT with a random MAC address
> should be safe to use and unique. It can be regenerated as frequently as the
> client decides.
>
DUID-LLT which is most commonly used still uses an embedded Mac but now along
with time source to generate the DUID versus DUID-LL.
> But this isn’t really your problem. You’re talking about network operational
> security, not about host operational security. From the network
> perspective, you should just assume that this problem either is solved, or
> will be solved, because the network operator’s behavior is the same in either
> case. In fact, given that we are talking about firewalls and filtering here,
> the fact that any client already can just fabricate a DUID means that you
> have to account for that when talking about the policy implications of this.
>
Agreed. I think staying on point with network operational security which is the
goal of this draft and not drift into the weeds on host security. That in
itself could be a separate host operational security draft.
_______________________________________________
OPSEC mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/opsec