Re: [Int-area] Evaluate impact of MAC address randomization to IP applications

2020-09-22 Thread Michael Richardson
This thread was started today on the INTAREA WG ML. While I don't object to a BOF, I don't know where it goes. What I see is that much of this problem needs to be resolved through increased use of 802.1X: making WPA-Enterprise easier to use and setup, this changing core identity from MAC Addres

Re: [Int-area] Evaluate impact of MAC address randomization to IP applications

2020-09-22 Thread Michael Richardson
On 2020-09-22 4:22 p.m., Andy Smith wrote: Yiu- I’d like to help here.   Is the problem that residential devices can’t be reliably tracked for purposes of policy enforcement?     Or is it an IP address depletion issue? I noticed iOS 14 does allow for disabling of random MAC addresses. On a

Re: [Int-area] Evaluate impact of MAC address randomization to IP applications

2020-09-22 Thread Michael Richardson
Y3uzmK6I> To: int-area@ietf.org, captive-por...@ietf.org, home...@ietf.org From: Michael Richardson Date: Tue, 22 Sep 2020 16:34:33 -0400 This thread was started today on the INTAREA WG ML. While I don't object to a BOF, I don't know where it goes. What I see is that much of thi

Re: [Int-area] [homenet] Evaluate impact of MAC address randomization to IP applications

2020-09-22 Thread Michael Richardson
device a different IP(v4), right? If you solve persistent DHCP, then you solve those, don't you? -- Michael Richardson. o O ( IPv6 IøT consulting ) Sandelman Software Works Inc, Ottawa and Worldwide signature.asc Description: PGP signature ___

Re: [Int-area] [homenet] Evaluate impact of MAC address randomization to IP applications

2020-09-22 Thread Michael Richardson
he set-up of {whatever the BOF/WG output > is}, after which the MAC gets changed to {something else}. An interesting idea. -- ] Never tell me the odds! | ipv6 mesh networks [ ] Michael Richardson, Sandelman Software Works |IoT architect [ ] m...@sandelman.ca htt

Re: [Int-area] [homenet] [Captive-portals] [EXTERNAL] Re: Evaluate impact of MAC address randomization to IP applications

2020-09-22 Thread Michael Richardson
at it deserved wider review and excitement. Our mailman strips off Reply-To: since we did that DMARC avoidant hack (AFAIK), so redirecting replies only works if we all agree. -- Michael Richardson. o O ( IPv6 IøT consulting ) Sandelman Software Works Inc, Ottawa and Worldwide

Re: [Int-area] [homenet] Evaluate impact of MAC address randomization to IP applications

2020-09-23 Thread Michael Richardson
, but were wrong? I heard about this change from Tiru Reddy. It would be great if this BOF elicited public statements and/or public policies about Google and Apple's intentions in this space. If it's their goal to go in the direction I outlined, then it would be good to know. -- Mi

Re: [Int-area] [Captive-portals] [homenet] Evaluate impact of MAC address randomization to IP applications

2020-09-23 Thread Michael Richardson
MAC address is outside of the WEP encryption, so it is always seen, even if the traffic is otherwise encrypted. An EAP-*TLS based upon TLS1.2 would reveal the identity, at least the first time. Perhaps this is a reason to support resumption tokens in EAP-TLS! -- Michael Richardson

Re: [Int-area] [homenet] [Captive-portals] [EXTERNAL] Re: Evaluate impact of MAC address randomization to IP applications

2020-09-29 Thread Michael Richardson
C addresses negates a lot > of the benefits of randomized MAC addresses, This assumes that a single observer can observe both at the same time. WEP++ leaves MAC addresses visible, but encrypts the rest of L3 content. -- ] Never tell me the odds! | ipv6 mes

Re: [Int-area] [Captive-portals] [homenet] [EXTERNAL] Re: Evaluate impact of MAC address randomization to IP applications

2020-09-29 Thread Michael Richardson
domization proponents (if there is such a group), to explain the thread profile. I don't think it includes active compromised hosts. Such hosts can also ARP/ND spoof, and can even do that for the router (".1"), capturing all the traffic on the network. -- Michael Richardson.

Re: [Int-area] [homenet] [Captive-portals] [EXTERNAL] Re: Evaluate impact of MAC address randomization to IP applications

2020-09-29 Thread Michael Richardson
Stephen Farrell wrote: > On 29/09/2020 19:41, Michael Richardson wrote: >> It will be good if we can get a document from the MAC randomization >> proponents (if there is such a group), to explain the thread profile. >> I don't think it include

Re: [Int-area] [homenet] [Captive-portals] [EXTERNAL] Re: Evaluate impact of MAC address randomization to IP applications

2020-09-30 Thread Michael Richardson
Stephen Farrell wrote: >> Stephen Farrell wrote: >> >> > On 29/09/2020 19:41, Michael Richardson wrote: >> It will be good if >> we can get a document from the MAC randomization >> proponents (if >> there is such a group

Re: [Int-area] [dhcwg] WGLC started -- draft-ietf-homenet-naming-architecture-dhc-options-12

2021-05-05 Thread Michael Richardson
sh renumber), they would be right to think that they legitimately control them. (I'm still miffed that Relay Agents have to snoof to learn PD, and nobody seems to think this a problem) -- Michael Richardson. o O ( IPv6 IøT consulting ) Sandelman Software Works Inc, Ottawa and W

Re: [Int-area] [dhcwg] WGLC started -- draft-ietf-homenet-naming-architecture-dhc-options-12

2021-05-05 Thread Michael Richardson
Ted Lemon wrote: > On May 5, 2021, at 11:44 AM, Michael Richardson > wrote: >> The end user might suffer slightly by having locally served reverse >> names that are no longer connected: they should obsolete that zone >> when they realize that thei

Re: [Int-area] [6lo] Short Hierarchial IPv6 addresses

2021-11-13 Thread Michael Richardson
me border > router or edge node? I think that it is okay if it doesn't work for mixed prefixes from multiple providers. -- Michael Richardson , Sandelman Software Works -= IPv6 IoT consulting =- signature.asc Description: PGP signature ___

Re: [Int-area] overlay networks and the democratizing of address allocations

2021-11-14 Thread Michael Richardson
ndpoints) > o Low latency (which implies shortest paths between endpoints) I agree. Important. But, to get this, we need apps to be able to learn what EID/IID/etc. to use in order to get the service they need. > We have to talk about how we, not as netowrk engineers, but network

Re: [Int-area] [IPv6] New Draft - ICMPv6 Loopback

2023-06-07 Thread Michael Richardson
Despite what the Security Considerations suggests, this still looks ripe for use as an amplication attack to me. -- Michael Richardson. o O ( IPv6 IøT consulting ) Sandelman Software Works Inc, Ottawa and Worldwide signature.asc Description: PGP signature

Re: [Int-area] [IPv6] New Draft - ICMPv6 Loopback

2023-06-08 Thread Michael Richardson
Tianran Zhou wrote: > What if we ask for symmetric request and response? I.e., carry reserved > bytes in the request packet. That would make me happier actually. -- Michael Richardson. o O ( IPv6 IøT consulting ) Sandelman Software Works Inc, Ottawa and Wor

Re: [Int-area] Fwd: New Version Notification for draft-herbert-host2netsig-00.txt

2023-11-04 Thread Michael Richardson
r IPv6 Hop-by-Hop? I think that this document is really a kind of merge Requirements and Architecture. Maybe it will also be a Roadmap to other documents? -- Michael Richardson , Sandelman Software Works -= IPv6 IoT consulting =- *I*LIKE*TRAINS* signature.asc