On Mon, 3 Jan 2011 12:21:41 +0200 (EET)
Pekka Savola <pek...@netcore.fi> wrote:

> On Mon, 3 Jan 2011, Mark Smith wrote:
> >> "do not use privacy addresses when communicating inside the site [a set of
> >> designated destination prefixes], use it by default otherwise"
> >>
> >
> > I'd be curious what the benefits are.
> >
> > The only reason I could think of as to why to do this is to be able to
> > associate internal application access logs with internal hosts. At face
> > value that sounds useful, however if you really care about auditing
> > application access and use, it isn't the hosts you need to worry about,
> > but the people behind them - and they can usually easily change hosts.
> > So I think those applications should be using proper AAA to identify the
> > user, rather than using IPv6 host identifiers as very poor substitutes
> > for user identities.
> 
> One use case is administrators running ssh, vnc or some such remote 
> management to the client OS.  The conclusion from looking at various 
> similar cases was that systems need to have a well-known (non-privacy) 
> IP where they can be reached and run TCP services at, or the privacy 
> IP needs to be stored in DNS (not much point in that..).
> 

I think that could be achieved by using another address/prefix for that
purpose, which has a preferred lifetime of 0 and an ordinary valid
lifetime, although RFC3484 needs to be updated to use the largest
preferred lifetime as a tie-breaker when multiple valid addresses
remain as candidate sources. As the addresses have a zero preferred
lifetime, they wouldn't be used for outbound connections, but they're
still valid for inbound ones.

> Also, many site-internal access control mechanisms (for example, 
> hosts.allow for ssh, some others for e.g. web browsing) use 
> host-specific IPs in addition to other checks.  In some cases these 
> could be substituted with stronger upper-layer identities e.g with 
> certificates.
> 

I think it is inevitable that some of IPv6's more advanced and
dynamic addressing mechanisms and properties are going to make
traditional IPv4 addressing related security methods obsolete. When
ever a function is to be achieved in IPv6 that is being achieved in
IPv4, I think it is better not to assume that the IPv4 method is
directly translatable, and to see if there are methods which don't
constrain some of IPv6's new addressing mechanisms or possibly takes
advantage of them.


> On the other hand, user identification due to static EU64 is a little 
> bit of concern e.g. with web surfing, but this also applies to other 
> applications so the issue does not go away with application-specific 
> tuning.
> 


Regards,
Mark.
--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to