Hi all,

We have requested a slot for Vancouver for a bof on Cga and Send extensIons.

The proposed charter is the following:

Comments are welcome, and are preferred in the cga-ext ml

Regards, marcelo


Proposed charter for Cga & Send extensIons (CSI) BOF

The Secure Neighbor Discovery (SEND) protocol defined by RFC 3971
provides security mechanisms protecting different functions of the
Neighbor Discovery (ND) protocol defined by RFC 2461.  This includes
address resolution (discovering link layer address of another node
attached to the link), router discovery (discovering routers attached
to the link), and neighbor unreachability detection (detecting that a
node attached to the link is no longer reachable).  SEND protection of
address resolution and neighbor unreachability detection functions
relies on IPv6 address proof-of-ownership and message integrity
protection provided respectively via Cryptographically Generated
Addresses (CGAs) and RSA Digital Signatures.  However, the current
SEND specification lacks support for ND Proxies defined by RFC 3775
and RFC 4389.

CGAs are defined in RFC 3972, and are extended with a CGA extension
format defined in RFC 4581, and a support for multiple hash functions
defined in the to-be-RFC draft-bagnulo-multiple-hash-cga-03.txt.
While CGAs were originally defined for the SEND protocol, they have
proved to be a useful security tool in other environments too, and its
usage has been proposed to secure other protocols such as the Shim6
multihoming protocol and the Mobile IPv6 protocol.  As CGAs become
more widely used for various purposes, it is desirable to define
extensions that would support such new usages.

The objective of this working group is to define extensions related to
both to the SEND protocol and to CGAs.  The following are charter items
for the working group:

- Specify standards-track SEND Extensions to support Neighbor
  Discovery Proxies:  SEND protocol as currently defined in RFC 3971
  lacks of support for ND Proxies defined in RFC 3775 and RFC 4389.
  Extensions to the SEND protocol will be defined in order to provide
  equivalent SEND security capabilities to ND Proxies.

- Specify as required standards-track extensions to IKE and IPsec
  SPD and PAD to support creation of IPSec SAs authenticated via CGA
  public-private key pairs of their endpoints.  Because of their
  cryptographic nature, CGAs are inherently bound to the
  public-private key pair that was used for their generation.  This is
  used in existent protocols for proving address ownership.  However,
  it is also possible to use the CGA cryptographic material held by
  two peers to create between them a security association which is
  bound to that material.  The key benefit of such an approach is that
  the resulting security association can be cryptographically bound
  to the IP address of the endpoints without exclusive recourse to
  certificates and public key infrastructure.

- Develop an informational document analysing different approaches to
  the use of the DHCP protocol to assign CGAs, and making
  recommandations on which are the best suited.  The analysis will be
  provided as an input to the DHC working group where the actual DHCP
  extensions required to implemented the recommended approaches will
  be defined.

- Specify a standards-track CGA extension to support multiple public
  key algorithms. As currently defined CGAs can only use RSA keys in
  the CGA Parameter Data Structure, and thus cannot be generated using
  other public key algorithms (e.g. Elliptic Curve Cryptography --
  ECC). The main motivation for this work is that RSA keys are not
well suited for environments with resource restrictions (CPU, storage,
  power) such as the ones considered by the 6lowpan working group. ECC
is much well suited for such environments and the lack of support of ECC
  in CGAs and SeND is a deployment blocker in these environments.

- Specify standard-track extensions to RFC 4620 (IPv6 Node Information
  Queries) to support CGA-based authentication of the information
provided. RFC4620 describes a protocol for asking an IPV6 node to supply
  some network information. On this extension, by the use of CGAs,
protection against spoofing attacks and packet authentication mechanisms
  are provided.

- Definition of X.509 Extended Key Usage for SeND. SeND utilizes X.509v3
  certificates for performing router authorization.  It uses the X.509
  extension for IP addresses to verify whether the router is authorized
  to advertise the mentioned IP addresses.  Since the IP addresses
  extension does not explicitly mention what functions the node can
  perform for the IP addresses it becomes impossible to know the reason
for which the certificate was allowed. In order to facilitate issuance of certificates for specific functions, we need to encode the functions
  permitted for the certificate into the certificate itself.

- Update Cryptographically Generated Addresses (CGA) specification
  (i.e. RFC3972) based on the existent experience and publish as
  draft standard.

- Update SEcure Neighbor Discovery (SEND) specification
  (i.e. RFC3971) based on the existent experience and publish as
  draft standard.

- Define the MIB modules for SeND and CGAs and publish them
  as a Proposed Standard.

Related drafts:

draft-kempf-cgaext-ringsig-ndproxy-00.txt
draft-laganier-ike-ipv6-cga-02.txt
draft-jiang-sendcgaext-cga-config-00.txt

_______________________________________________
Int-area mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/int-area

Reply via email to