Re: [Last-Call] [v6ops] Iotdir last call review of draft-ietf-v6ops-nd-cache-init-05

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello Phil

> Le 16 sept. 2020 à 14:51, Philip Homburg <pch-v6ops-9@xxxxxxxxxxxxxx> a écrit :
> 
> 
>> 
>>> This has huge privacy and security implications.
>> 
>> This is way, way too vague to be useful in the cons section.  Can
>> you please elaborate, like an example attack? Also, is the current
>> stack behavior exposing the user to that threat as well?
> 
> Suppose every device basics pings $vendor.com when it gets a new address as
> part of a very low level function of the stack.
> 
> So basically we spend a lot of time worrying about tracking devices. We have
> randomized MACs. We avoid embedding MAC addresses in IPv6 addresses and then
> we have all devices advertise what their vendor is and their current addresses.
> 

Certainly this is not what my pc or my phone do. They reach a dell known address from the OS vendor. Still there is no IETF spec / blessing / study about that behavior.

> Anybody who wants to do monitoring will have a field day.
> 
> I know that mobile devices do some weird stuff, but not all devices are
> mobile devices. And the whole captive portal discovery seems to be mostly a
> flight between device vendors and captive portals. There is no technical
> reason it has to be this ugly for mobile devices.
> 

One reason is that we did not specify a better way. 


> The situation would be better if there were a well-known anycast address.
> However that has operational implications (pinging $vendor as well, because
> it has happened often enough that vendors stopped renewing the DNS registrary
> after they stopped supporting a particular brand of devices).
> 
> Even the well-known address may cause operational problems for disconnected
> operation.
> 

This is listed as a cons already.


>> See
>> https://datatracker.ietf.org/doc/html/draft-ietf-6man-grand-03#section-8.3
> 
> Of the disadvantages:
> - The first point can be solved by pinging the first hop router 
> - The second point also applies to pinging an off-link destination
> - There can always be broken middle boxes. I.e., if a wireless device does
>  ND proxying then it is up to the network admin to make sure that the
>  router has enough capacity to perfom ND. In any case, the existance of 
>  weird middle boxes should not be a reason to start pinging off-link 
>  destinations.


Actually I was pondering pinging the newly formed global address from an already formed link local one, passing ping the packet to the router at L2...

-- 
last-call mailing list
last-call@xxxxxxxx
https://www.ietf.org/mailman/listinfo/last-call




[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux