Dear Ahmad,

Thank you so much for your comments. 

>SEND already offers what you are looking for. It has the Timestamp and the
Signature options which are attached to the DNP messages.

As I explained in my last email to Jeremy, It just updates SEND and does not
replace it. It updates SEND because of the signature contents. I also
explained in the draft that we used the same timestamp as is used in SEND.

>I agree with the claim that CGA is compute intensive, but one can use Sec=0
or 1. In this case the computation of the CGA (SEND) would be equivalent to
the complexity of your approach.  
I compared it with both sec value 0 and sec value 1. I did not consider sec
value higher because it is not really feasible in practice that someone wait
for 2 or 3 hours to days to generate an address. CGA for 1 it is 600 times
more. For zero it is about 10 to 20 times more. 

The computation of this algorithm is faster than that for CGA and also the
verification process is much faster. In the verification process you do not
need to do all the CGA generation processing in reverse in order to verify
it. With CGA you also have to include the verification time for the
signature even though we say we use a sec value of 0 this is not considered
in the verification process. For CGA you also need to include an extra 17
bytes of options (modifier and collision count) in the packet, but with SSAS
the packet size would be less. 

Thank you,
Hosnieh

-----Original Message-----
From: Al-Sadeh, Ahmad [mailto:ahmad.alsa...@hpi.uni-potsdam.de] 
Sent: Sunday, January 06, 2013 9:10 PM
To: Hosnieh Rafiee; cga-...@ietf.org
Cc: ipv6@ietf.org
Subject: RE: [CGA-EXT] Call for comments on draft-rafiee-6man-ssas-00.txt

Hosnieh,
I have read your draft. And I have the following comments.
SEND already offers what you are looking for. It has the Timestamp and the
Signature options which are attached to the DNP messages. So, the new
benefits of your approach are not clear to me.
I agree with the claim that CGA is compute intensive, but one can use Sec=0
or 1. In this case the computation of the CGA (SEND) would be equivalent to
the complexity of your approach.  Therefore the enhancements that are
proposed to protect the user privacy by setting a lifetime for the generated
address (e.g. 2 days) or generating the key pairs by CGA code can be
directly applied to the CGA and SEND implementation without significant
change to proposed standard.
In Section 5, ". it provides proof of address ownership at a speed that is
about 600 times faster than that of the CGA algorithm."
For which Sec value this comparison was done?
Regards,
Ahmad AlSadeh

________________________________
From: cga-ext-boun...@ietf.org [cga-ext-boun...@ietf.org] On Behalf Of
Hosnieh Rafiee [i...@rozanak.com]
Sent: 04 January 2013 21:13
To: cga-...@ietf.org
Subject: [CGA-EXT] Call for comments on draft-rafiee-6man-ssas-00.txt


Dear All,

This draft addresses the following problem:
Unfortunately the existing drafts do not consider the integration of
security and privacy  for the generation of the Interface ID (IID). This
draft tries to offer a solution to this problem while at the same time
considering the generation and verification times and complexity of the
existing algorithms. Please take a look. Comments are greatly appreciated.
Thank you,
Hosnieh



Filename:        draft-rafiee-6man-ssas
Revision:        00
Title:           A Simple Secure Addressing Generation Scheme for IPv6
AutoConfiguration (SSAS)
Creation date:   2013-01-02
WG ID:           Individual Submission
Number of pages: 13
URL:
http://www.ietf.org/internet-drafts/draft-rafiee-6man-ssas-00.txt
Status:          http://datatracker.ietf.org/doc/draft-rafiee-6man-ssas
Htmlized:        http://tools.ietf.org/html/draft-rafiee-6man-ssas-00


Abstract:
   The default method for IPv6 address generation uses two unique
   manufacturer IDs that are assigned by the IEEE Standards Association
   [1] (section 2.5.1 RFC-4291) [RFC4291]. This means that a node will
   always have the same Interface ID (IID) whenever it connects to a new
   network. Because the node's IP address does not change, the node is
   vulnerable to privacy related attacks. To address this issue, there
   are currently two mechanisms in use to randomize the IID,
   Cryptographically Generated Addresses (CGA) [RFC3972] and Privacy
   Extension [RFC4941]. The problem with the former approach is the
   computational cost involved for the IID generation. The problem with
   the latter approach is that it lacks security. This document offers a
   new algorithm for use in the generation of the IID while, at the same
   time, securing the node against some types of attack, such as IP
   spoofing. These attacks are prevented with the addition of a
   signature to the Neighbor Discovery messages (NDP).


--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

_______________________________________________
CGA-EXT mailing list
cga-...@ietf.org
https://www.ietf.org/mailman/listinfo/cga-ext

--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to