Hi Ana,
see comments inline
On Sunday 07 September 2008 23:22:49 Ana Kukec wrote:
> Hi all,
>
> Here are some questions about the RFC3971, there are some illogical
> paragraphs.. Answers are welcomed :-)
>
> 1. RFC3971 says about Router Solicitations:
> Section 5.1.1:  If the node has been configured to use SEND, the CGA
> option MUST be present in all NS and Advertisement messages and MUST be
> present in RS messages unless they are sent with the unspecified source
> address.
> Section 5.1.2: Note that the CGA option is not used when the source
> address is the unspecified address.
> Section 5.2.2: Router Solicitation messages wihout the RSA Signature
> option MUST also be treated as unsecured, unless the source address of
> the message is the unspecified address.
>
> -> Which means that message with unspecified address, without CGA and
> signature must be treated as secured? I am aware that the router will
> not update its Neighbor Cache in this situation. But anyway, why can
> such message be treated as secured?
What else could the receiver do? The semantic may be bogus, but RS with unspec 
is quite commonly the first message that a node will send, before acquiring 
an address.  What "secure" means in that context is that the receiver must 
respond. Even when instructed to be in "full-secure" mode.
And as you suggested, these messages don't create any state at the receiver.
>From a "handling" standpoint, they are to be treated the same way as secured 
message, even if they are not.
>
> 2. RFC3971 says:
>   Because authorization paths are not a common practice
>   in the Internet at the time of this writing, the path MUST consist of
>   standard Public Key Certificates (PKC, in the sense of [8]).
>
> -> But [8] points to Authorization certificate which does not have
> public key?
I don't get it. Certificate used in SEND have a public key. As well as X.509 
certifcate referred to in 3280. What beast are you talking about?
 
>
> 3. Isn't there Pad Length missing in the RSA Signature option?
> Section 5.2 says:
> Digital Signature
>        This field starts after the Key Hash field.  The length of the
>        Digital Signature field is determined by the length of the RSA
>        Signature option minus the length of the other fields (including
>        the variable length Pad field).
> Padding
>        This variable-length field contains padding, as many bytes long as
>        remain after the end of the signature.
>
> -> Isn't this circular? We need Pad Length, right?
The length of Digital Signature can be  inferred from the length 
of the key modulus (that you can get from the public key in the CGA option). 

>
> 4. Again, RFC3971 says:
> Section 6.3.1 says:
>     The X.509 IP address extension MUST contain at least one
>     addressesOrRanges element. This element MUST contain an
>     addressPrefix element containing an IPv6 address prefix for a prefix
>     that the router or the intermediate entity is authorized to route.
>     ...
>     Instead of an addressPrefix element, the addressesOrRange element MAY
>     contain an addressRange element for a range of subnet prefixes, if
>     more than one prefix is authorized.
>
> -> addressPrefix is first said to be MUST. And then, "instead of
> addressPrefix we may have.."
I don't see any ambiguity there. The way I read it is "It MUST be either A or 
B". How else would you interpret it? And don't know how to better put it ...
Eric

>
> Tnx for the answers,
> Cheers
> Ana
> _______________________________________________
> CGA-EXT mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/cga-ext


_______________________________________________
CGA-EXT mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/cga-ext

Reply via email to