RE: Accurate history [Re: "professional" in an IETF context]

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



If it is the best practice to disable "temporary addresses" (because it is fake privacy anyway)
Then what is the purpose of waisting (2^64-1)/2^64 of IPv6 addresses space?
The next reason could be to greatly simplify Address Resolution Protocol (some link parameters still make sense to broadcast).

Or else, we have to accept that half of the address bits are just the garbage that every node needs to store and process.
Except for a few bits that are needed on many subnets anyway to organize local connectivity.

About ARP storm:
ND has much bigger DoS capabilities because
- 2^64 subnet permits to push the router to find all 2^64 addresses, it could be done even from outside of the subnet
- temporarily addresses 10x increase the load on the protocol and the same on the log and correlation engine (for LI, forensic, and troubleshooting)
It is famous how WiFi degrades on any physical IETFevent because of the huge number of multicasts per second.
All of these multicasts would not be needed if MAC would be inside every IPv6 address as it was intended initially.
It is the best use for these 64bits.

Eduard
-----Original Message-----
From: Brian E Carpenter [mailto:brian.e.carpenter@xxxxxxxxx] 
Sent: Friday, November 5, 2021 11:13 PM
To: Stewart Bryant <stewart.bryant@xxxxxxxxx>; Vasilenko Eduard <vasilenko.eduard@xxxxxxxxxx>
Cc: IETF <ietf@xxxxxxxx>
Subject: Re: Accurate history [Re: "professional" in an IETF context]

On 06-Nov-21 01:09, Stewart Bryant wrote:
> 
> 
>> On 5 Nov 2021, at 11:10, Vasilenko Eduard <vasilenko.eduard@xxxxxxxxxx <mailto:vasilenko.eduard@xxxxxxxxxx>> wrote:
>>
>> What is important: Enterprises have no clear sign of IPv6 adoption.
>> ND protocol has a heavy influence on this.
>> Of course, ND is not the only reason. But maybe the biggest one.
> 
> Indeed, and I have had a consistent complaint from a British security conscious large private sector technology savvy company, that IPv6 is so much harder to secure than IPv4 they have no interest in moving. I think that part of this is the conflict between the privacy that IPv6 offers and their need to know that *every* packet on their network is entitled to be there doing what it is doing.


You can administratively disable "privacy" (temporary) addresses, but most sites find it safer to perform access control based on MAC addresses. Temporary addresses are intended to confuse the outside world, not the local network operator. They are *intended* to make lawful intercept harder. That's a feature, not a bug. I agree that they also make debugging harder, which may be another reason to disable them.

Complaining about ND seems odd if sites tolerate ARP. Anybody else remember ARP storms? ND was designed to avoid that risk.

All these are FUD arguments used in support of operational inertia.

     Brian




[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux