lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Fri, 27 Mar 2020 21:51:40 +0100
From:   "Hannes Frederic Sowa" <hannes@...essinduktion.org>
To:     Bram Bonné <brambonne@...gle.com>
Cc:     "David Miller" <davem@...emloft.net>,
        "Alexey Kuznetsov" <kuznet@....inr.ac.ru>,
        "Hideaki YOSHIFUJI" <yoshfuji@...ux-ipv6.org>, kuba@...nel.org,
        netdev@...r.kernel.org, "Lorenzo Colitti" <lorenzo@...gle.com>,
        "Jeffrey Vander Stoep" <jeffv@...gle.com>
Subject: Re: [RFC PATCH] ipv6: Use dev_addr in stable-privacy address generation

Hello,

On Fri, Mar 27, 2020, at 18:15, Bram Bonné wrote:
> Thank you for your detailed explanation and helping me understand the
> context! This is really useful.

Sure, let's try to solve this. :) Sorry for the bad formatting of the
previous email, I tried to fix it. Also I am a bit rusty on those
topics, so excuse me if I do mistakes in my argumentation here.

> On Fri, Mar 27, 2020 at 2:06 PM Hannes Frederic Sowa
> <hannes@...essinduktion.org> wrote:
> > The main idea behind stable IPv6 identifiers is to eventually
> > replace EUI-48 based generated addresses, because knowledge of the
> > MAC address should never leave the broadcast domain you are in. This
> > leads to tracking of a user moving between different networks (in
> > this case moving between different ipv6 prefixes). It does not
> > necessarily replace the temporary address mode which fully
> > randomizes addresses and is still available to you for use in cases
> > where you don't want to have this compromise. temp_addresses are
> > still a good choice to use.
> >
> > MAC address randomization was mainly introduced to blind the unique
> > identifier during wifi probing and association, where no IPv6
> > traffic is yet visible on unencrypted links. As soon as the
> > encrypted link between your wifi endpoint and the access point is
> > established, IPv6 addresses are generated and used inside the
> > "encrypted wifi tunnel". This is an orthogonal measure to reduce the
> > exposure of unique identifiers in the closer geographical proximity.
>
> While the purpose of disassociated MAC address randomization is indeed
> to prevent tracking a device during probing and association, my
> understanding is that connected MAC address randomization (as used in
> Android, for example) is designed to prevent devices being tracked
> across different networks that are managed by the same network
> operator. In this mode, a different MAC address is used for every
> network (based on SSID in the case of wireless networks) the user
> associates with. A user using connected MAC address randomization to
> associate with two different networks has the privacy expectation that
> those networks are not able to link those associations to the same
> device without some other form of identification.

Okay, I understand. This is an additional scenario that wasn't on my
radar so far. Is the MAC address randomized on the (E)SSID or the BSSID?
I assume later as the ESSID might be stable across operators, but
anyways that's just nit picking.

In this scenario you would like to blind all unique identifiers on the
network of a device in a "stable way". The MAC address is already
blinded, thus it would be possible to just inherit it as the link local
address, nothing seems to be lost then? Same for the globally scoped
generated addresses stemming from this randomized MAC address?

Using EUI-48 address generation mode here would give you the benefit of
having no unique identifier (managed by the randomized mac address), a
stable link-local address and global addresses per ESSID and not having
to maintain the stable address generation secret. Seems to me to be the
easiest way forward. I wonder what the implications regarding duplicate
MAC address detection and thus IPv6 address selection are, but that's
another topic.

Additionally for the global scoped address generation I think it makes
sense to still enable use_tempaddr=2, as it makes sure that for longer
lasting associations to an AP new addresses are phased in and old ones
are phased out regularly.

Do IPv6 addresses generated with the EUI-48 mode from a randomized MAC
address have less random bits than if it would having been generated
with the stable or temporary method?

> > You might want to combine those two features: Not being able to be
> > disclosed in your proximity while having a stable address on your
> > network. If that is not your goal, you can still enable temporary
> > addresses, which will fully randomize your IPv6 addresses and are
> > thus is completely independent of your MAC address. This would meet
> > your concerns above.
>
> I was under the impression that use_tempaddr does not apply to link-
> local addresses. Is this not the case? A quick experiment on my
> machine shows:
>
> # sysctl -w net.ipv6.conf.enp0s31f6.use_tempaddr=2 ip link set dev
> # enp0s31f6 down && ip link set dev enp0s31f6 up ip address show dev
> # enp0s31f6
> 2: enp0s31f6: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc
>    pfifo_fast state UP group default qlen 1000 inet6 {same as before}
>    scope link noprefixroute valid_lft forever preferred_lft forever

Right, temporary addresses are only globally scoped. You can enable the
random address generator for link local addresses via `ip link ...
addrgenmode random`. Those addresses are not phased in and out like
temporary addresses are. Also check if keep_addr_on_down is enabled, as
this might influence this behavior as well.

> > My additional concern with this patch is that users might already
> > expect a certain way of the generation of stable IPv6 identifiers:
> > even though wpa_supplicant randomizes the mac address, they might
> > already depend on the stable generation of those addresses. If this
> > changes, contact to those systems might get lost during upgrade.
> > Though I don't know how severe this scenario is, I do, in fact, have
> > some IPv6 stable identifiers in my shell history which are wifi
> > endpoints.
>
> If this is a scenario we care about, do you think it would make sense
> to put this behavior behind a separate configuration parameter?
> Something like use_software_mac, defaulting to disabled to keep
> current behavior?

If you like to keep the semantics of having ipv6 stable addresses as per
spec, I would not object a patch adding a new mode like e.g.
IN6_ADDR_GEN_MODE_STABLE_PRIVACY_SOFTMAC (or some better name) on an
interface and consequently using the admin-mac address. For me the sole
benefit seems to be that the generated global addresses would
additionally depend on the prefix announced by the operator in that
particular network. This would only help if use_tempaddr=2 is not
enabled or applications deliberately bind to a non temp addresses
circumventing the source address selection.

> > If the IPv6 link local address can get discovered on the unencrypted
> > wifi medium, I would be concerned but I don't think that is the
> > case. In case of fully unencrypted wifis you can make the above
> > case. It is possible to determine if a network endpoint (with the
> > same secret and permanent mac address) shows up again. In this case
> > I would recommend temporary addresses.
>
> I'm not sure I understand this paragraph. In unencrypted wireless
> networks, the link-local IPv6 address would be visible to
> eavesdroppers when it's being used, again negating the benefits of MAC
> address randomization. Please let me know if I misunderstood.

I think there was a misunderstanding: I was referring to the case that
an IPv6 address might leak prior to joining an encrypted wifi (in the
"pre-auth phase").

Off topic: does Android also deal with sockets that are still bound to
old addresses, which potentially (I am not sure) generate packets that
are black holed because of wrong source address but still recognizable
by an network operator?

Bye, Hannes

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ