Hello,

I have a small comment on section 4 of your draft:
" DHCPv6 message (from either a server, relay
   agent or client) with a CGA as source address, can carry the CGA
   Parameters data structure and a digital signature. The receiver can
   verify both the CGA and signature, then process the payload of the
   DHCPv6 message only if the validation is successful. In this way
   DHCPv6 messages can be protected."
Maybe I missed something, but what is the gain from a security point of view ? An attacker can still generate its own CGA and craft misleading DHCP messages. Maybe you implicitly implied there was a mechanism similar to ADD of SEND or that the Public Key is learned in a previous RS/RA message exchange and ADD has been performed on the CGA. Either way, the text seems unclear on this point, can you clarify this text in the next version ?

Best regards,
        Tony Cheneau
_______________________________________________
CGA-EXT mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/cga-ext

Reply via email to