Re: Comments on draft-ietf-6man-stable-privacy-addresses-07

2013-06-07 Thread SM
Hi Fernando, At 13:02 06-06-2013, Fernando Gont wrote: I'd personally prefer this not to be in the body of the document. For the most part, because I think that we might benefit of a separate document that does an analysis of all IID generation techniques, rather than only this one (I had planned

Re: Comments on draft-ietf-6man-stable-privacy-addresses-07

2013-06-07 Thread t . petch
- Original Message - From: "Fernando Gont" To: "Alissa Cooper" Cc: <6man-cha...@tools.ietf.org>; "Brian Haberman" ; <6...@ietf.org>; "Dave Thaler" ; "Ray Hunter" ; "Fernando Gont" ; "tom.petch" ; "Christian Huitema" ; "He Xuan" Sent: Thursday, June 06, 2013 9:02 PM On 06/06/2013 03:40 PM

Re: Comments on draft-ietf-6man-stable-privacy-addresses-07

2013-06-06 Thread Fernando Gont
On 06/06/2013 03:40 PM, Alissa Cooper wrote: >> For instance, Section B.1 explicitly says so (and this type of >> attack is not meant to be solved by stable-privacy-addresses). >> >> In some scenarios, it can be mitigated with RFC 4941. Hoawever, as >> noted in Section C.4, even ith RFC4941 there

Re: Comments on draft-ietf-6man-stable-privacy-addresses-07

2013-06-06 Thread Alissa Cooper
Hi Fernando, On Jun 5, 2013, at 9:19 PM, Fernando Gont wrote: > On 06/06/2013 12:24 AM, Alissa Cooper wrote: >> I'll try to re-state one of my questions more simply, based on the >> -09: >> >> How is the attack explained in C.4 mitigated by the mechanism >> specified in draft-ietf-6man-stable-p

Re: Comments on draft-ietf-6man-stable-privacy-addresses-07

2013-06-06 Thread Alissa Cooper
I'll try to re-state one of my questions more simply, based on the -09: How is the attack explained in C.4 mitigated by the mechanism specified in draft-ietf-6man-stable-privacy-addresses-09? One more comment below: On May 31, 2013, at 8:23 PM, Fernando Gont wrote: >> Another point for clarifi

Re: Comments on draft-ietf-6man-stable-privacy-addresses-07

2013-06-05 Thread Fernando Gont
On 06/06/2013 12:24 AM, Alissa Cooper wrote: > I'll try to re-state one of my questions more simply, based on the > -09: > > How is the attack explained in C.4 mitigated by the mechanism > specified in draft-ietf-6man-stable-privacy-addresses-09? It doesn't. For instance, Section B.1 explicitly s

Re: Comments on draft-ietf-6man-stable-privacy-addresses-07

2013-05-31 Thread Fernando Gont
On 05/28/2013 11:07 PM, Alissa Cooper wrote: >>> The second group of three are for nodes that only use temporary >>> addresses (but that also configure a stable address that never >>> gets used). This is what would be expected by users that want to >>> avoid correlation attacks, assuming their adm

Re: Comments on draft-ietf-6man-stable-privacy-addresses-07

2013-05-31 Thread Fernando Gont
On 05/24/2013 03:22 PM, Tim Chown wrote: > >> I've tweaked the text a bit in the hopes that readers don't get the >> impression that I'm arguing against use of RFC4941. (Most likely, >> by the time you read this I'll have posted version -08... so please >> check that one... and if there's still ro

Re: Comments on draft-ietf-6man-stable-privacy-addresses-07

2013-05-31 Thread Fernando Gont
On 05/30/2013 06:09 PM, Dave Thaler wrote: >> Isn't it enough simply noting that the target node can be probed? >> Getting into the specific details of the probe packet >> (stimulus/response) seems like "over-specifying" things to me... > > My opinion is that this example is important, since the e

RE: Comments on draft-ietf-6man-stable-privacy-addresses-07

2013-05-30 Thread Dave Thaler
ject: Re: Comments on draft-ietf-6man-stable-privacy-addresses-07 > > On 05/29/2013 04:03 AM, Dave Thaler wrote: > >>>> [...] I could rely on the > >>>> ICMPv6 "address resolution failed" error messages sent by your > >>>> local ro

Re: Comments on draft-ietf-6man-stable-privacy-addresses-07

2013-05-30 Thread Fernando Gont
On 05/29/2013 04:03 AM, Dave Thaler wrote: [...] I could rely on the ICMPv6 "address resolution failed" error messages sent by your local router (i.e., if I receive one of such messages, you're not there. If I don't, >> you are). >>> >>> Ok, yes that one is interesting. >> >> A

Re: Comments on draft-ietf-6man-stable-privacy-addresses-07

2013-05-29 Thread Fernando Gont
On 05/29/2013 04:00 AM, Dave Thaler wrote: >> >> What does draft-ietf-6man-stable-privacy-addresses has to do with CGAs? > > 1) Both give "random-per-network" addresses, using Alissa's terminology. CGA's doesn't seem to aim at stable-per-network addresses. For instance, the modifier is expected t

Re: Comments on draft-ietf-6man-stable-privacy-addresses-07

2013-05-29 Thread Tim Chown
On 28 May 2013, at 22:07, Alissa Cooper wrote: > > On May 26, 2013, at 9:01 AM, Fernando Gont wrote: > >> How about including something along these lines (*) in an Appendix? >> >> (*) Discussion of possible attacks, and what stable privacy addresses do >> about them (analyzing this for every p

RE: Comments on draft-ietf-6man-stable-privacy-addresses-07

2013-05-28 Thread Dave Thaler
> >> [...] I could rely on the > >> ICMPv6 "address resolution failed" error messages sent by your local > >> router (i.e., if I receive one of such messages, you're not there. If I > >> don't, > you are). > > > > Ok, yes that one is interesting. > > An attacker just needs one vector to be succes

RE: Comments on draft-ietf-6man-stable-privacy-addresses-07

2013-05-28 Thread Dave Thaler
ject: Re: Comments on draft-ietf-6man-stable-privacy-addresses-07 > > Dave, > > What does draft-ietf-6man-stable-privacy-addresses has to do with CGAs? 1) Both give "random-per-network" addresses, using Alissa's terminology. 2) Both generate an IP address using a se

Re: Comments on draft-ietf-6man-stable-privacy-addresses-07

2013-05-28 Thread Alissa Cooper
Hi Fernando, Comments inline. On May 26, 2013, at 9:01 AM, Fernando Gont wrote: > HI Alissa, > > Thanks for posting this. Please find my comments inline... > > On 05/24/2013 11:33 PM, Alissa Cooper wrote: >> >> The rows of the table are the address generation methods that have >> been discus

RE: Comments on draft-ietf-6man-stable-privacy-addresses-07

2013-05-26 Thread SM
At 15:43 24-05-2013, Dave Thaler wrote: It also now occurs to me that since RFC 3972 has IPR disclosures from both Microsoft and Ericsson, those disclosures may or may not apply to draft-ietf-6man-stable-privacy-addresses as well. Per the Note Well, I'm at least sending this email, but will chec

Re: Comments on draft-ietf-6man-stable-privacy-addresses-07

2013-05-26 Thread Fernando Gont
HI Alissa, Thanks for posting this. Please find my comments inline... On 05/24/2013 11:33 PM, Alissa Cooper wrote: > > The rows of the table are the address generation methods that have > been discussed. The first three are for nodes that only use stable > addresses and never use temporary addre

Re: Comments on draft-ietf-6man-stable-privacy-addresses-07

2013-05-26 Thread Fernando Gont
On 05/25/2013 12:29 AM, Dave Thaler wrote: > [...] >> The fact that you use a firewall is mostly irrelevant. I'd bet your firewall >> still >> reponds to some packets (e.g., packets with unsupported options?). > [..] > > No, the Windows firewall doesn't allow any ICMP responses to unsolicited >

Re: Comments on draft-ietf-6man-stable-privacy-addresses-07

2013-05-26 Thread Fernando Gont
On 05/25/2013 12:19 AM, Dave Thaler wrote: > I'd also like to see CGAs (3972) added to this analysis. It seems to me > they're > the existing standards-track "random-per-network" addresses. So all of the > "random-per-network" statements would seem apply equally to the existing RFC. > > This dr

Re: Comments on draft-ietf-6man-stable-privacy-addresses-07

2013-05-25 Thread Fernando Gont
Dave, What does draft-ietf-6man-stable-privacy-addresses has to do with CGAs? Has MS or Ericsson patented the use of PRFs? Have you guys any IPR on RFC1948? -- Because draft-ietf-6man-stableprivacy-addresses is essentially Bellovin's RFC1948 applied to IPv6 addresses. Thanks, Fernando On 05

Re: Comments on draft-ietf-6man-stable-privacy-addresses-07

2013-05-25 Thread Alissa Cooper
I made updates in response to this email and Dave's emails and made the table publicly viewable and editable if folks want to make further changes themselves: https://docs.google.com/spreadsheet/ccc?key=0Au4OS7RZgZwHdHozNzNHdUNtVEJSNlo3N3NFMG5Wa1E&usp=sharing On May 24, 2013, at 6:28 PM, Brian

Re: Comments on draft-ietf-6man-stable-privacy-addresses-07

2013-05-25 Thread Alissa Cooper
This discussion got me thinking about how to be rigorous in articulating the specific threats that different kinds of addresses do and do not mitigate. I put together a little table to try to sum this up: http://www.alissacooper.com/files/IPv6-address-threats.pdf The table assumes, for simplici

RE: Comments on draft-ietf-6man-stable-privacy-addresses-07

2013-05-24 Thread Dave Thaler
Cooper; Fernando Gont > Cc: 6man-cha...@tools.ietf.org; Brian Haberman; 6...@ietf.org; Ray Hunter; > tom.petch; Christian Huitema; He Xuan > Subject: RE: Comments on draft-ietf-6man-stable-privacy-addresses-07 > > I'd also like to see CGAs (3972) added to this analysis. It seems

RE: Comments on draft-ietf-6man-stable-privacy-addresses-07

2013-05-24 Thread Dave Thaler
[...] > The fact that you use a firewall is mostly irrelevant. I'd bet your firewall > still > reponds to some packets (e.g., packets with unsupported options?). [..] No, the Windows firewall doesn't allow any ICMP responses to unsolicited traffic, they're all dropped. This is what is sometimes

Re: Comments on draft-ietf-6man-stable-privacy-addresses-07

2013-05-24 Thread Brian E Carpenter
On 25/05/2013 10:04, Dave Thaler wrote: > Thanks Alissa for the nice table, this is very helpful. Agreed. Two points though: 1. It seems to me that location tracking to the level of the 64-bit prefix is *always* possible, which may well identify a specific customer and/or physical location, but n

RE: Comments on draft-ietf-6man-stable-privacy-addresses-07

2013-05-24 Thread Dave Thaler
4 PM > > To: Fernando Gont > > Cc: Dave Thaler; 6...@ietf.org; 6man-cha...@tools.ietf.org; Brian > > Haberman; Ray Hunter; tom.petch; Christian Huitema; He Xuan > > Subject: Re: Comments on draft-ietf-6man-stable-privacy-addresses-07 > > > > This discussion got me thinki

RE: Comments on draft-ietf-6man-stable-privacy-addresses-07

2013-05-24 Thread Dmitry Anipko
ls.ietf.org; Brian Haberman; 6...@ietf.org; Ray Hunter; tom.petch; Christian Huitema; He Xuan Subject: RE: Comments on draft-ietf-6man-stable-privacy-addresses-07 Thanks Alissa for the nice table, this is very helpful. > -Original Message- > From: Alissa Cooper [mailto:acoo...@cdt.or

RE: Comments on draft-ietf-6man-stable-privacy-addresses-07

2013-05-24 Thread Dave Thaler
Hunter; tom.petch; Christian Huitema; He Xuan > Subject: Re: Comments on draft-ietf-6man-stable-privacy-addresses-07 > > This discussion got me thinking about how to be rigorous in articulating the > specific threats that different kinds of addresses do and do not mitigate. I > put > t

Re: Comments on draft-ietf-6man-stable-privacy-addresses-07

2013-05-24 Thread Tim Chown
Hi, In-line... On 24 May 2013, at 02:00, Fernando Gont wrote: > Hi, Tim, > > Thanks so much for your feedback! -- Please find my comments in-line... > > On 05/22/2013 10:19 AM, Tim Chown wrote: >> >> Overall, I think this is good work and should be progressed. > > Thanks! > >> First, some

Re: Comments on draft-ietf-6man-stable-privacy-addresses-07

2013-05-24 Thread Tim Chown
On 24 May 2013, at 10:31, Fernando Gont wrote: > On 05/22/2013 03:34 AM, Dave Thaler wrote: >>> I attend an IETF meeting, and learn the IID of your laptop. Then I can >>> actively >>> probe your node regarding "Is David at the office?" "Is David at home?", >>> etc simply because your IID is

Re: Comments on draft-ietf-6man-stable-privacy-addresses-07

2013-05-24 Thread Fernando Gont
On 05/22/2013 03:34 AM, Dave Thaler wrote: >> I attend an IETF meeting, and learn the IID of your laptop. Then I can >> actively >> probe your node regarding "Is David at the office?" "Is David at home?", >> etc simply because your IID is known and constant. > > Since you're making this perso

Re: Comments on draft-ietf-6man-stable-privacy-addresses-07

2013-05-23 Thread Fernando Gont
Hi, Tim, Thanks so much for your feedback! -- Please find my comments in-line... On 05/22/2013 10:19 AM, Tim Chown wrote: > > Overall, I think this is good work and should be progressed. Thanks! > First, some general comments: > > You may wish to be clearer earlier in the document (abstract

Re: Comments on draft-ietf-6man-stable-privacy-addresses-07

2013-05-22 Thread Tim Chown
Hi Fernando, I've read -07 and have some comments. Apologies if they are duplicates of previous comments. Overall, I think this is good work and should be progressed. First, some general comments: You may wish to be clearer earlier in the document (abstract and/or introduction) that your meth

Re: Comments on draft-ietf-6man-stable-privacy-addresses-07

2013-05-21 Thread Fernando Gont
On 05/21/2013 10:34 PM, Dave Thaler wrote: >> >> This issue was debated more than a year ago, at the IETF Paris timeframe. >> Since then, the wg adopted this document, and we went through WGLC and >> IETF LC. So I'm not sure how it helps to raise this point again and at this >> point >> in time. >

RE: Comments on draft-ietf-6man-stable-privacy-addresses-07

2013-05-21 Thread Dave Thaler
ject: Re: Comments on draft-ietf-6man-stable-privacy-addresses-07 > > Hi, Dave, > > This issue was debated more than a year ago, at the IETF Paris timeframe. > Since then, the wg adopted this document, and we went through WGLC and > IETF LC. So I'm not sure how it helps to rais

Re: Comments on draft-ietf-6man-stable-privacy-addresses-07

2013-05-20 Thread Fernando Gont
Hi, Dave, This issue was debated more than a year ago, at the IETF Paris timeframe. Since then, the wg adopted this document, and we went through WGLC and IETF LC. So I'm not sure how it helps to raise this point again and at this point in time. That said, please let me try to clarify a few thing

Comments on draft-ietf-6man-stable-privacy-addresses-07

2013-05-20 Thread Dave Thaler
Disclaimer: haven't read all the prior list discussion so don't know if this duplicates some existing discussion. I have some fundamental problems with this document as is. I will concentrate on sections 1, 2, and Appendix B, being the motivation/goals/justification, as opposed to the technical