[117873] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: ISP customer assignments

daemon@ATHENA.MIT.EDU (Valdis.Kletnieks@vt.edu)
Mon Oct 5 18:36:26 2009

To: Dan White <dwhite@olp.net>
In-Reply-To: Your message of "Mon, 05 Oct 2009 16:13:37 CDT."
	<20091005211337.GP5403@dan.olp.net>
From: Valdis.Kletnieks@vt.edu
Date: Mon, 05 Oct 2009 18:35:09 -0400
Cc: nanog@nanog.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

--==_Exmh_1254782109_3393P
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

On Mon, 05 Oct 2009 16:13:37 CDT, Dan White said:

> a publicly routeable stateless auto configured address is no less
> secure than a publicly routeable address assigned by DHCP. Security is,=
 and
> should be, handled by other means.

The problem is user tracking and privacy.

RFC4941's problem statement:

   Addresses generated using stateless address autoconfiguration
   =5BADDRCONF=5D contain an embedded interface identifier, which remains=

   constant over time.  Anytime a fixed identifier is used in multiple
   contexts, it becomes possible to correlate seemingly unrelated
   activity using this identifier.

   The correlation can be performed by

   o  An attacker who is in the path between the node in question and
      the peer(s) to which it is communicating, and who can view the
      IPv6 addresses present in the datagrams.

   o  An attacker who can access the communication logs of the peers
      with which the node has communicated.

   Since the identifier is embedded within the IPv6 address, which is a
   fundamental requirement of communication, it cannot be easily hidden.
   This document proposes a solution to this issue by generating
   interface identifiers that vary over time.

   Note that an attacker, who is on path, may be able to perform
   significant correlation based on

   o  The payload contents of the packets on the wire

   o  The characteristics of the packets such as packet size and timing

   Use of temporary addresses will not prevent such payload-based
   correlation.
(end quote)

Or phrased differently - if I DCHP my laptop in a Starbuck's, on Comcast,=
 at
work, at a hotel, and a few other places, you'll get a whole raft of answ=
ers
which will be very hard to cross-corrolate.  But if all those places did
IPv6 autoconfig, the correlation would be easy, because my address would
always end in 215:c5ff:fec8:334e - and no other users should have those
last 64 bits.

Amazingly enough, some people think making it too easy to Big-Brother you=

is a security issue...








--==_Exmh_1254782109_3393P
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Exmh version 2.5 07/13/2001

iD8DBQFKynSdcC3lWbTT17ARAtwWAJ9SdV6eOwbJZQRXbMKg990acdW6aQCgvXa8
WNxtffXESw59XsakPhAWAQk=
=2nlJ
-----END PGP SIGNATURE-----

--==_Exmh_1254782109_3393P--



home help back first fref pref prev next nref lref last post