base.txt | issue33.txt | |
---|---|---|
Skipping to change at page 3, line 15: | ||
8.2.1 Sending Secure Router Advertisements . . . . .40 | 8.2.1 Sending Secure Router Advertisements . . . . .40 | |
8.2.2 Receiving Secure Router Advertisements . . . .40 | 8.2.2 Receiving Secure Router Advertisements . . . .40 | |
8.3 Redirect Messages . . . . . . . . . . . . . . . . . 40 | 8.3 Redirect Messages . . . . . . . . . . . . . . . . . 40 | |
8.3.1 Sending Redirects . . . . . . . . . . . . . .41 | 8.3.1 Sending Redirects . . . . . . . . . . . . . .41 | |
8.3.2 Receiving Redirects . . . . . . . . . . . . .41 | 8.3.2 Receiving Redirects . . . . . . . . . . . . .41 | |
8.4 Other Requirements . . . . . . . . . . . . . . . . . 41 | 8.4 Other Requirements . . . . . . . . . . . . . . . . . 41 | |
9. Co-Existence of SEND and non-SEND nodes . . . . . . . . . 43 | 9. Co-Existence of SEND and non-SEND nodes . . . . . . . . . 43 | |
10. Performance Considerations . . . . . . . . . . . . . . . . 45 | 10. Performance Considerations . . . . . . . . . . . . . . . . 45 | |
11. Security Considerations . . . . . . . . . . . . . . . . . 46 | 11. Security Considerations . . . . . . . . . . . . . . . . . 46 | |
11.1 Threats to the Local Link Not Covered by SEND . . . 46 | 11.1 Threats to the Local Link Not Covered by SEND . . . 46 | |
11.2 How SEND Counters Threats to Neighbor Discovery . . 47 | 11.2 How SEND Counters Threats to Neighbor Discovery . . 46 | |
11.2.1 Neighbor Solicitation/Advertisement Spoofing .47 | 11.2.1 Neighbor Solicitation/Advertisement Spoofing .47 | |
11.2.2 Neighbor Unreachability Detection Failure . .48 | 11.2.2 Neighbor Unreachability Detection Failure . .48 | |
11.2.3 Duplicate Address Detection DoS Attack . . . .48 | 11.2.3 Duplicate Address Detection DoS Attack . . . .48 | |
11.2.4 Router Solicitation and Advertisement Attacks 49 | 11.2.4 Router Solicitation and Advertisement Attacks 48 | |
11.2.5 Replay Attacks . . . . . . . . . . . . . . . .49 | 11.2.5 Replay Attacks . . . . . . . . . . . . . . . .48 | |
11.2.6 Neighbor Discovery DoS Attack . . . . . . . .49 | 11.2.6 Neighbor Discovery DoS Attack . . . . . . . .49 | |
11.3 Attacks against SEND Itself . . . . . . . . . . . . 50 | 11.3 Attacks against SEND Itself . . . . . . . . . . . . 49 | |
12. Protocol Constants . . . . . . . . . . . . . . . . . . . . 51 | 12. Protocol Constants . . . . . . . . . . . . . . . . . . . . 51 | |
13. IANA Considerations . . . . . . . . . . . . . . . . . . . 52 | 13. IANA Considerations . . . . . . . . . . . . . . . . . . . 52 | |
Normative References . . . . . . . . . . . . . . . . . . . 53 | Normative References . . . . . . . . . . . . . . . . . . . 53 | |
Informative References . . . . . . . . . . . . . . . . . . 54 | Informative References . . . . . . . . . . . . . . . . . . 54 | |
Authors' Addresses . . . . . . . . . . . . . . . . . . . . 55 | Authors' Addresses . . . . . . . . . . . . . . . . . . . . 55 | |
A. Contributors . . . . . . . . . . . . . . . . . . . . . . . 57 | A. Contributors . . . . . . . . . . . . . . . . . . . . . . . 57 | |
B. Acknowledgements . . . . . . . . . . . . . . . . . . . . . 58 | B. Acknowledgements . . . . . . . . . . . . . . . . . . . . . 58 | |
C. Cache Management . . . . . . . . . . . . . . . . . . . . . 59 | C. Cache Management . . . . . . . . . . . . . . . . . . . . . 59 | |
D. Comparison to AH-Based Approach . . . . . . . . . . . . . 60 | D. Comparison to AH-Based Approach . . . . . . . . . . . . . 60 | |
Intellectual Property and Copyright Statements . . . . . . 63 | Intellectual Property and Copyright Statements . . . . . . 63 | |
Skipping to change at page 46, line 9: | ||
Signatures can be precomputed for unsolicited (multicast) Neighbor | Signatures can be precomputed for unsolicited (multicast) Neighbor | |
and Router Advertisements. Typically, solicited advertisements are | and Router Advertisements. Typically, solicited advertisements are | |
sent to the unicast address from which the solicitation was sent. | sent to the unicast address from which the solicitation was sent. | |
Given that the IPv6 header is covered by the signature, it is not | Given that the IPv6 header is covered by the signature, it is not | |
possible to precompute solicited-for advertisements. | possible to precompute solicited-for advertisements. | |
11. Security Considerations | 11. Security Considerations | |
11.1 Threats to the Local Link Not Covered by SEND | 11.1 Threats to the Local Link Not Covered by SEND | |
SEND does not compensate for an insecure link layer. In particular, | SEND does not compensate for an insecure link layer. For instance, | |
there is no cryptographic binding in SEND between the link layer | there is no assurance that payload packets actually come from the | |
same peer that the Neighbor Discovery protocol was run against. | ||
SEND does not provide confidentiality for Neighbor Discovery | ||
communications. | ||
There may be no cryptographic binding in SEND between the link layer | ||
frame address and the IPv6 address. On an insecure link layer that | frame address and the IPv6 address. On an insecure link layer that | |
allows nodes to spoof the link layer address of other nodes, an | allows nodes to spoof the link layer address of other nodes, an | |
attacker could disrupt IP service by sending out a Neighbor | attacker could disrupt IP service by sending out a Neighbor | |
Advertisement having the source address on the link layer frame of a | Advertisement having the source address on the link layer frame of a | |
victim, a valid CGA address and a valid signature corresponding to | victim, a valid CGA address and a valid signature corresponding to | |
itself, and a Target Link-layer Address extension corresponding to | itself, and a Target Link-layer Address extension corresponding to | |
the victim. The attacker could then proceed to cause a traffic | the victim. The attacker could then proceed to cause a traffic | |
stream to bombard the victim in a DoS attack. To protect against | stream to bombard the victim in a DoS attack. To protect against | |
such attacks, link layer security MUST be used. An example of such | such attacks, link layer security SHOULD be used. | |
for 802 type networks is port-based access control defined in the | ||
802.1X standard [29]. | ||
Specifically, the 802.1X standard provides a mechanism by which a | ||
nodes can be authenticated to a particular point of attachment to a | ||
LAN (called a "port" in the standard). If the MAC on frames sent by | ||
a node does not correspond to the MAC of the node originally | ||
authenticated to this port, then the point of attachment drops the | ||
frames. Authorization to use the port is determined by the MAC | ||
address of the node that originally authenticated to the port. The | ||
way 802.1X protects against this attack is that, if a node | ||
authenticated to a particular port attempts to spoof the MAC address | ||
of another node, the port will drop the frames. Naturally, this | ||
requires that all ports by which nodes can attach to the LAN use | ||
802.1X authentication, and that all node physically attach through a | ||
port, as is the case with 802.3 switched LAN. For shared media, such | ||
as multiple nodes authenticated through the same 802.11 AP (which | ||
acts as a single port for all nodes), other measures are necessary, | ||
since an attacker on the wireless link can spoof the MAC address of a | ||
victim on the same wireless link. | ||
802.1X does not provide protection for the layer 2 frame - layer 3 | Even on a secure link layer, SEND does not require that the addresses | |
packet address binding in traffic (that is, real time filtering to | on the link layer and Neighbor Advertisements correspond to each | |
check this binding), and neither does SEND. 802.1X provides | other. However, it is RECOMMENDED that such checks be performed | |
authentication and filtering of MAC address to port; SEND provides | where this is possible on the given link layer technology. | |
protection for the layer 2 - layer 3 binding information in the | ||
Neighbor Discovery packet, via the CGA address (authorization to use | ||
the address via the public key) and the signature on the packet | ||
(authentication of contents as from authorized IP address possessor). | ||
Prior to participating in Neighbor Discovery and Duplicate Address | Prior to participating in Neighbor Discovery and Duplicate Address | |
Detection, nodes must subscribe to the link-scoped All-Nodes | Detection, nodes must subscribe to the link-scoped All-Nodes | |
Multicast Group and the Solicited-Node Multicast Group for the | Multicast Group and the Solicited-Node Multicast Group for the | |
address that they are claiming for their addresses; RFC 2461 [7]. | address that they are claiming for their addresses; RFC 2461 [7]. | |
Subscribing to a multicast group requires that the nodes use MLD | Subscribing to a multicast group requires that the nodes use MLD | |
[18]. MLD contains no provision for security. An attacker could | [18]. MLD contains no provision for security. An attacker could | |
send an MLD Done message to unsubscribe a victim from the | send an MLD Done message to unsubscribe a victim from the | |
Solicited-Node Multicast address. However, the victim should be able | Solicited-Node Multicast address. However, the victim should be able | |
to detect such an attack because the router sends a | to detect such an attack because the router sends a | |
End of changes. | ||
This html diff was produced by rfcdiff v0.42, available from http://www.levkowetz.com/ietf/tools/rfcdiff/ |