As you can see the latest version of the SSAS draft (version 3) has been 
successfully applied to the IETF repository. I want to thank all of you who 
reviewed the prior version and proffered comments. I included the information 
from those comments in version 3. A brief synopsis of the changes contained in 
version 3 are as follow:  
- correct the spelling error and typos (hopefully no new ones were inserted in 
this version)
- extended this draft to include devices using Mobile nodes for the secure 
configuration of CoA using ND. Also included nodes with limited resources, such 
as 6LoWPAN, which can make use of SSAS as a security mechanism during address 
configuration using ND and car to car networks.
- Explained the differences between mechanisms used in this draft with current 
mechanisms in use today. 
- Improved the SSAS algorithm and classified it into two different uses:  
observing both security and privacy and just observing privacy

Please review this latest version to ensure that I haven't missed anything. I 
always welcome your comments which enable me to improve it more. I would also 
like to present it, informally, to anybody who is interested in ND security. I 
will do this tomorrow (Tuesday) at 12:15 in Grand Sierra D (IETF lounge) and 
then formally on Friday, in the 6man session, if time permits as I am an "if 
time permits" person. 

Thank you,
Hosnieh

Filename:        draft-rafiee-6man-ssas
Revision:        03
Title:           A Simple Secure Addressing Generation Scheme for IPv6 
AutoConfiguration (SSAS)
Creation date:   2013-03-11
Group:           Individual Submission
Number of pages: 17
URL:             
http://www.ietf.org/internet-drafts/draft-rafiee-6man-ssas-03.txt
Status:          http://datatracker.ietf.org/doc/draft-rafiee-6man-ssas
Htmlized:        http://tools.ietf.org/html/draft-rafiee-6man-ssas-03
Diff:            http://www.ietf.org/rfcdiff?url2=draft-rafiee-6man-ssas-03

Abstract:
   The default method for IPv6 address generation uses an
   Organizationally Unique Identifier (OUI) assigned by the IEEE
   Standards Association and an Extension Identifier assigned to the
   hardware manufacturer [1] (section 2.5.1 RFC-4291) [RFC4291]. This
   fact thus means that a node will always have the same Interface ID
   (IID) whenever it connects to a new network. Because the node's IP
   address does not change, the node will be vulnerable to privacy
   related attacks. Currently this problem is addressed by the use of
   two mechanisms that do not make use of the MAC address, or other
   unique values that can be used for ID generation, for randomizing the
   IID; Cryptographically Generated Addresses (CGA) [RFC3972] and
   Privacy Extension [RFC4941]. The problem with the former approach is
   the computational cost involved for the IID generation and in the
   verification process. The problem with the latter approach is that it
   lacks necessary security mechanisms and provides the node with only
   partial protection against privacy related attacks. This document
   proposes the use of a new algorithm for use in the generation of the
   IID while, at the same time, securing the node against some types of
   attack, like IP spoofing. These attacks are prevented by the addition
   of a signature to messages sent over the network and by direct use of
   a public key in the IP address.



                                                                                
  


The IETF Secretariat

--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to