Guys,

I am going to go back and review "IPv6 Neighbor Discovery (ND) Trust Models and 
Threats: RFC 3756"

http://datatracker.ietf.org/doc/rfc3756/

For all who think that ND and RA in particular does not have problems, here is 
a UTube video of a hacker at work using RA.

http://www.youtube.com/watch?v=TfsfNWHCKK0

Next, there is an interesting web site: http://www.thc.org/thc-ipv6/

You can see the "interesting" tools available:

dnssecwalk - performs NSEC walking including Iv6+IPv4 resolving
firewall6 - various TCP/UDP ACL bypass test cases
fake_pim6 - send fake hello and join/prune pim messages
ndpexhaust26 - very performant ndp exhauster based on ICMP error toobig 
messages but can send many types of packets
alive6: ranges are now supported in the input file too
parasite6: enhancements to make it way more effective
fake_router26: added overlap RA guard evasion type (-E o, -E O)
dos-new-ip6: fix that only DAD replies are sent, not full NDP spoofing 
flood_router26: Added local LAN privacy extension prevention attack
randicmp6: - added function which dumps icmp answers received - added 
funtionality to send a specific type (and also code)
dnsdict6: added SRV result address resolving

and others.

I will review all drafts with the above in mind.

Thanks,

Nalini Elkins
Inside Products, Inc.
(831) 659-8360
www.insidethestack.com



________________________________
From: Alexandru Petrescu <alexandru.petre...@gmail.com>
To: Hosnieh Rafiee <i...@rozanak.com> 
Cc: ipv6@ietf.org 
Sent: Tuesday, March 5, 2013 6:41 AM
Subject: Re: 6MAN Agenda for IETF86

Hosnieh,

I would have to read the draft and feed back about SSAS.

Some of the drafts I mentioned (ND-PD) were presented to 6MAN meeting in
Atlanta, and discussed on the email list.  One of the drafts
(draft-jhlee-mext-mnpp-00) is considered at ISO, but I dont know its status.

Another draft which generates IID from VIN (Vehicular Identification
Number) we discussed recently in the 6MAN email list is:
draft-imadali-its-vinipv6-viid-00.txt

We don't have a WG about vehicular communications but we have an email
list ITS for Intelligent Transportation Systems
(ietf.org/mailman/listinfo/its).  We discuss a Charter proposal there.

Alex

Le 05/03/2013 14:55, Hosnieh Rafiee a écrit :
> In the latest version of my draft RFC,SSAS, l have provided
> information about using SSAS for mobile nodes and I have specified
> the sections of the RFCs that can use this mechanism. So maybe this
> can prove useful for vehicular communication too. Are the drafts
> that you mentioned discussed in 6man? I have not seen any
> discussions about them. Maybe I missed it. If it is in another WG,
> would you please tell me which one?
>
> Thanks, Hosnieh
>
>
>
> -----Original Message----- From: ipv6-boun...@ietf.org
> [mailto:ipv6-boun...@ietf.org] On Behalf Of Alexandru Petrescu Sent:
> Dienstag, 5. März 2013 14:40 To: ipv6@ietf.org Subject: Re: 6MAN
> Agenda for IETF86
>
> ND security is an important topic.
>
> Let me explain why.
>
> We consider the use of ND over 802.11p links for vehicular
> communications. These links dont have ESSID nor link-layer security.
>  (it is not clear whether it is legal to run IP straight over
> 80211p, being "safety apps") but once it becomes clear the security
> question comes up.
>
> (ND drafts for vehicular communications:
> draft-petrescu-autoconf-ra-based-routing draft-kaiser-nd-pd-01
> draft-jhlee-mext-mnpp-00)
>
> The security of ND on these links needs to be fast and easy to set
> up.
>
> Alex
>
> Le 05/03/2013 14:33, Nalini Elkins a écrit :
>> Karl,
>>
>> I definitely agree that ND needs to be secured.  Also agree that
>> neither IPSec nor SEND are viable solutions.
>>
>> I do not know if I am missing something but I have not seen a
>> comprehensive document with these problems detailed.  I certainly
>> don't have a solution but I have been trying to at least catalog
>> such problems.   If there is such a document, would appreciate
>> anyone letting me know.
>>
>> If there isn't, if you would like, we can collaborate on such a
>> document and create a draft for the IETF meeting in Berlin. Maybe
>> v6Ops is a place to discuss this topic.  Once many at IETF agree
>> that indeed there is a problem, then we can discuss a potential
>> solution. Thanks,
>>
>> Nalini Elkins Inside Products, Inc. (831) 659-8360
>> www.insidethestack.com
>>
>> ----------------------------------------------------------------------
>>
>>
>>
--
>>
>>
> *From:* Karl Auer <ka...@biplane.com.au>
>> *To:* ipv6@ietf.org *Sent:* Tuesday, March 5, 2013 1:37 AM
>> *Subject:* Re: 6MAN Agenda for IETF86
>>
>> On Mon, 2013-03-04 at 16:02 -0800, Bob Hinden wrote:
>>> A Simple Secure Addressing Generation Scheme for IPv6
>>> AutoConfiguration draft-rafiee-6man-ssas-01.txt [...]
>>> DHCPv6/SLAAC Address Configuration Interaction Problem Statement
>>>  draft-liu-bonica-dhcpv6-slaac-problem-01.txt
>>>
>>> We did not think there had been enough discussion or interest on
>>> the w.g. list to guarantee a speaking slot.  We allocated short
>>> slots at the end of the session if there is time before the
>>> meeting ends.  If anyone (other than the authors) think one of
>>> these should be given more time, please speak up.
>>
>> For what it's worth it seems to me that there is a gaping hole
>> around securing ND. IPSec is obviously ridiculous, SEND is only
>> marginally less ridiculous. Maybe SSAS is a way forward? Or maybe
>> noone else thinks ND needs to be secured? Maybe the meeting could
>> attempt to gauge whether this is actually a real problem. I think
>> it is, and I urge others to speak up if they too think this should
>> be pursued.
>>
>> If there is a priority to these things, then sorting out the
>> perceived and actual discrepancies\ and ambiguities in the meaning
>> of the RA M and O flags would seem pretty important. Otherwise
>> they will end up cemented into even more implementations than they
>> are now. The way Windows handles them is just plain broken, and if
>> the RFCs support that way of handling them, then the RFCs are
>> broken. At very least this topic needs some impetus.
>>
>> Regards, K.
>>
>> --
>> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>>
>>
>>
~
>>
>>
> Karl Auer (ka...@biplane.com.au <mailto:ka...@biplane.com.au>)
>> http://www.biplane.com.au/kauerhttp://www.biplane.com.au/blog
>>
>> GPG fingerprint: B862 FB15 FE96 4961 BC62 1A40 6239 1208 9865 5F9A
>> Old fingerprint: AE1D 4868 6420 AD9A A698 5251 1699 7B78 4EEE 6017
>>
>>
>> --------------------------------------------------------------------
>>
>>
>>
IETF IPv6 working group mailing list ipv6@ietf.org
>> <mailto:ipv6@ietf.org> Administrative Requests:
>> https://www.ietf.org/mailman/listinfo/ipv6
>> --------------------------------------------------------------------
>>
>>
>>
>>
>>
>>
>>
--------------------------------------------------------------------
>> IETF IPv6 working group mailing list ipv6@ietf.org Administrative
>> Requests: https://www.ietf.org/mailman/listinfo/ipv6
>> --------------------------------------------------------------------
>>
>
>>
>>
>
> --------------------------------------------------------------------
>  IETF IPv6 working group mailing list ipv6@ietf.org Administrative
> Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------
>
>
>


--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------  
--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to