Coming late, hope not too late ...
Having implemented SEND on the router side, there are a few issues/questions
that came up during a thorough analysis of 3971 and 3972. Is the intention of
the BOF to go through that type of experience, and eventually
generate/trigger an update of 3971?

jak>> Yes, I think that is the main point of restarting the WG.

For examples (these are just a few substantial):
- 3971 mandates the CGA address to be the source address for NA. As far as I
know, the source address does not have to equal the target address. So anyone
could claim someone else (target) address as long as it does that with a
valid CGA source address. Protection against address spoofing sounds a bit
bogus, doesn't it? Or I am missing something? Shouldn't we change that to
protect the target address instead?

jak>> RFC 3971 does not apply to proxy ND so the source and target address must be the same. This could probably have been made clearer. If the WG is formed and proxy ND is supported, then this would need to be changed. In any case, the target address must be a CGA.

- CPS/CPA are not protected with the SEND options (nonce, timestamp, cga,
rsa). Why not? It sounds strange to have created a bunch of new options to
protect old messages, and ignore these for these two. I could not find in the
archive any discussion  that would explain the omission.

jak>> CPS is requesting a certificate chain, what is the attack? CPA is sending one. I guess the attacker might be able to obtain a legitimate certificate, advertise itself as a router, then provide a verifable cert chain when the victim requested it. This is a problem in hotspot networks that use UAM too. But putting the SEND options on the CPA isn't going to help here. The receiving node would need to verify the identity of the router certificate ("is 'Joe's FlybyNight IP Service' an ISP that I want to trust?"). All the cert chain verification tells you is that the public key is certified by the parent cert authority.

- It's a bit unclear what you have to do with regard to nonces, when
multicasting advertisements (RA) after receiving a bunch of solicitations
(RS). In fact 3971 suggest it's broken. My interpretation is that we can
accumulate all nonces received in RS, and insert all of them in the one RA.
Should we clarify this?

jak>> If it was unclear to you while implementing it, it sounds like it needs to be updated.

On the front of new topics, beside the one listed by others (that we would
definitely  interested to work on), one extra came up during internal and
external discussions.  Could we come up with some "transitionning" mechanism
that would enable some third party node (could be the router, switch, or
external server) to validate router credentials on behalf of hosts which
don't want to/can't be part of the PKI? The hard part of course is to signal
the result to the host (not sure there is a good solution to that problem).

jak>> Any host running a general operating system these days has a browser on it with access to a cache of root cert authority certificates. Most operating systems even manage those certs independently of the browser. So unless you are talking about an application like sensor networks or something like that, I have some difficulty seeing why requiring that the host perform certificate validation would be a burden. The host doesn't have to be part of the PKI, it just needs to have a certificate cache. The protocol was specifically designed like TLS so that the host didn't need to be provisioned with a certificate.

jak



_______________________________________________
Int-area mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/int-area

Reply via email to