Debian Bug report logs - #859270
OpenSSH should make it possible to explicitly chose public (long-lived) IPv6 address over temporary (anti-tracking) IPv6 address

version graph

Package: openssh-client; Maintainer for openssh-client is Debian OpenSSH Maintainers <debian-ssh@lists.debian.org>; Source for openssh-client is src:openssh (PTS, buildd, popcon).

Reported by: Alain Knaff <alain@knaff.lu>

Date: Sat, 1 Apr 2017 15:33:02 UTC

Severity: normal

Found in version openssh/1:6.7p1-5+deb8u3

Reply or subscribe to this bug.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, Debian OpenSSH Maintainers <debian-ssh@lists.debian.org>:
Bug#859270; Package openssh-client. (Sat, 01 Apr 2017 15:33:05 GMT) (full text, mbox, link).


Acknowledgement sent to Alain Knaff <alain@knaff.lu>:
New Bug report received and forwarded. Copy sent to Debian OpenSSH Maintainers <debian-ssh@lists.debian.org>. (Sat, 01 Apr 2017 15:33:05 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Alain Knaff <alain@knaff.lu>
To: submit@bugs.debian.org
Subject: OpenSSH should make it possible to explicitly chose public (long-lived) IPv6 address over temporary (anti-tracking) IPv6 address
Date: Sat, 1 Apr 2017 17:19:15 +0200
Package: openssh-client
Version: 1:6.7p1-5+deb8u3

Executive summary: Browsers need short-lived addresses which can't be
tracked whereas ssh needs long-lived addresses which ensure that
connections aren't cut after a couple of hours.

Long explanation:

By default, IPv6 creates client addresses which contain the client PC's
MAC address, which exposes the user to tracking by malicious web
servers or ad networks.

That's why RFC 3041 introduced privacy extensions which allow to set up
"temporary" addresses which don't contain the MAC, but which are
recycled quickly. The temporary address is defined in _addition_ to the
public address. The temporary address is to be used for outgoing
connection by exposed programs, such as web browsers. The public
address is to be used for incoming connections (where PC is a server),
and by long-lived clients such as openssh which connect to trusted
servers

https://home.regit.org/2011/04/ipv6-privacy/
sysctl -w net.ipv6.conf.eth0.use_tempaddr=2

The issue: openssh too uses the temporary address, leading to
connection interruptions whenever the address cycles, or at least such
behavior should be configurable.

Openssh should use
setsockopt(socket, IPPROTO_IPV6, IPV6_ADDR_PREFERENCES, &value,
sizeof(value))
to explicitly opt for the public address.

See also this bug on RedHat (which suggests to make the behavior
configurable):
https://bugzilla.redhat.com/show_bug.cgi?id=512032


Thanks,

Alain



Information forwarded to debian-bugs-dist@lists.debian.org, Debian OpenSSH Maintainers <debian-ssh@lists.debian.org>:
Bug#859270; Package openssh-client. (Mon, 01 Nov 2021 16:33:03 GMT) (full text, mbox, link).


Acknowledgement sent to Anton Khirnov <anton@khirnov.net>:
Extra info received and forwarded to list. Copy sent to Debian OpenSSH Maintainers <debian-ssh@lists.debian.org>. (Mon, 01 Nov 2021 16:33:03 GMT) (full text, mbox, link).


Message #10 received at 859270@bugs.debian.org (full text, mbox, reply):

From: Anton Khirnov <anton@khirnov.net>
To: 859270@bugs.debian.org
Subject: Re: OpenSSH should make it possible to explicitly chose public (long-lived) IPv6 address over temporary (anti-tracking) IPv6 address
Date: Mon, 01 Nov 2021 17:23:18 +0100
I've implemented this feature (making it configurable with an option)
and submitted it to upstream ML [1], but the only feedback I got from
the developers was negative, apparently because this functionality is
Linux-specific (which it only is because no other OS implements the
relevant RFC).

Later I've submitted a version of the patch without the option [2],
hoping that would make it more acceptable to upstream, but received no
feedback whatsoever.

Would it be conceivable for Debian to include either of these patches in
its packages? I believe they are quite simple and non-invasive
(especially the second version - I can understand that adding new
options over what upstream has might be undesirable) and very unlikely
to cause any issues.

[1] https://lists.mindrot.org/pipermail/openssh-unix-dev/2021-April/039301.html
[2] https://lists.mindrot.org/pipermail/openssh-unix-dev/2021-July/039449.html

Cheers,
-- 
Anton Khirnov



Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Sat Mar 25 16:58:49 2023; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.