base.txt | issue47.txt | |
---|---|---|
Secure Neighbor Discovery Working J. Arkko | Secure Neighbor Discovery Working J. Arkko | |
Group Ericsson | Group Ericsson | |
Internet-Draft J. Kempf | Internet-Draft J. Kempf | |
Expires: May 31, 2004 DoCoMo Communications Labs USA | Expires: July 15, 2004 DoCoMo Communications Labs USA | |
B. Sommerfeld | B. Sommerfeld | |
Sun Microsystems | Sun Microsystems | |
B. Zill | B. Zill | |
Microsoft | Microsoft | |
P. Nikander | P. Nikander | |
Ericsson | Ericsson | |
December 2003 | January 15, 2004 | |
SEcure Neighbor Discovery (SEND) | SEcure Neighbor Discovery (SEND) | |
draft-ietf-send-ndopt-01 | draft-ietf-send-ndopt-02 | |
Status of this Memo | Status of this Memo | |
This document is an Internet-Draft and is in full conformance with | This document is an Internet-Draft and is in full conformance with | |
all provisions of Section 10 of RFC2026. | all provisions of Section 10 of RFC2026. | |
Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |
Task Force (IETF), its areas, and its working groups. Note that | Task Force (IETF), its areas, and its working groups. Note that | |
other groups may also distribute working documents as | other groups may also distribute working documents as | |
Internet-Drafts. | Internet-Drafts. | |
Skipping to change at page 1, line 39: | ||
and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |
time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |
material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |
The list of current Internet-Drafts can be accessed at http:// | The list of current Internet-Drafts can be accessed at http:// | |
www.ietf.org/ietf/1id-abstracts.txt. | www.ietf.org/ietf/1id-abstracts.txt. | |
The list of Internet-Draft Shadow Directories can be accessed at | The list of Internet-Draft Shadow Directories can be accessed at | |
http://www.ietf.org/shadow.html. | http://www.ietf.org/shadow.html. | |
This Internet-Draft will expire on May 31, 2004. | This Internet-Draft will expire on July 15, 2004. | |
Copyright Notice | Copyright Notice | |
Copyright (C) The Internet Society (2003). All Rights Reserved. | Copyright (C) The Internet Society (2004). All Rights Reserved. | |
Abstract | Abstract | |
IPv6 nodes use the Neighbor Discovery Protocol (NDP) to discover | IPv6 nodes use the Neighbor Discovery Protocol (NDP) to discover | |
other nodes on the link, to determine each the link-layer addresses | other nodes on the link, to determine each the link-layer addresses | |
of the nodes on the link, to find routers, and to maintain | of the nodes on the link, to find routers, and to maintain | |
reachability information about the paths to active neighbors. If not | reachability information about the paths to active neighbors. If not | |
secured, NDP is vulnerable to various attacks. This document | secured, NDP is vulnerable to various attacks. This document | |
specifies security mechanisms for NDP. Unlike to the original NDP | specifies security mechanisms for NDP. Unlike to the original NDP | |
specifications, these mechanisms do not make use of IPsec. | specifications, these mechanisms do not make use of IPsec. | |
Skipping to change at page 25, line 10: | ||
ISP) that configured the original IP address space block for the | ISP) that configured the original IP address space block for the | |
router in question, or delegated the right to do so for someone. The | router in question, or delegated the right to do so for someone. The | |
certificates for intermediate delegating authorities MUST contain | certificates for intermediate delegating authorities MUST contain | |
X.509 IP address extension(s) for subdelegations. The router's | X.509 IP address extension(s) for subdelegations. The router's | |
certificate is signed by the delegating authority for the prefixes | certificate is signed by the delegating authority for the prefixes | |
the router is authorized to to advertise. | the router is authorized to to advertise. | |
The X.509 IP address extension MUST contain at least one | The X.509 IP address extension MUST contain at least one | |
addressesOrRanges element. This element MUST contain an | addressesOrRanges element. This element MUST contain an | |
addressPrefix element with an IPv6 address prefix for a prefix the | addressPrefix element with an IPv6 address prefix for a prefix the | |
router or the intermediate entity is authorized to advertise. If the | router or the intermediate entity is authorized to route. If the | |
entity is allowed to route any prefix, the used IPv6 address prefix | entity is allowed to route any prefix, the used IPv6 address prefix | |
is the null prefix, 0/0. The addressFamily element of the containing | is the null prefix, 0/0. The addressFamily element of the containing | |
IPAddrBlocks sequence element MUST contain the IPv6 Address Family | IPAddrBlocks sequence element MUST contain the IPv6 Address Family | |
Identifier (0002), as specified in [11] for IPv6 prefixes. Instead | Identifier (0002), as specified in [11] for IPv6 prefixes. Instead | |
of an addressPrefix element, the addressesOrRange element MAY contain | of an addressPrefix element, the addressesOrRange element MAY contain | |
an addressRange element for a range of prefixes, if more than one | an addressRange element for a range of prefixes, if more than one | |
prefix is authorized. The X.509 IP address extension MAY contain | prefix is authorized. The X.509 IP address extension MAY contain | |
additional IPv6 prefixes, expressed either as an addressPrefix or an | additional IPv6 prefixes, expressed either as an addressPrefix or an | |
addressRange. | addressRange. | |
Skipping to change at page 37, line 7: | ||
an attacker, and the host MUST use a different advertising router as | an attacker, and the host MUST use a different advertising router as | |
its default router (if available). If the node is performing | its default router (if available). If the node is performing | |
stateful autoconfiguration, it SHOULD check the address provided by | stateful autoconfiguration, it SHOULD check the address provided by | |
the DHCP server against the certified prefixes and MUST NOT use the | the DHCP server against the certified prefixes and MUST NOT use the | |
address if the prefix is not certified. | address if the prefix is not certified. | |
In any case, the user should inform the network operator upon | In any case, the user should inform the network operator upon | |
receiving an address or prefix outside the certified range, since | receiving an address or prefix outside the certified range, since | |
this is either a misconfiguration or an attack. | this is either a misconfiguration or an attack. | |
If the network operator wants to constrain which routers support | If the network operator wants to constrain which routers are allowed | |
particular prefixes, routers SHOULD be configured with certificates | to route particular prefixes, routers SHOULD be configured with | |
having prefixes listed in the prefix extension. Routers so | certificates having prefixes listed in the prefix extension. Routers | |
configured MUST advertise exactly the prefixes for which they are | so configured MUST advertise the prefixes which they are certified to | |
certified. | route, or a subset thereof. | |
Network operators that do not want to constrain particular routers to | Network operators that do not want to constrain routers this way | |
specific prefixes SHOULD configure routers with certificates | SHOULD configure routers with certificates containing either the null | |
containing either the null prefix or no prefix extension at all. | prefix or no prefix extension at all. | |
7.4 Limitations | 7.4 Limitations | |
This specification does not address the protection of NDP packets for | This specification does not address the protection of NDP packets for | |
nodes that are configured with a static address (e.g., PREFIX::1). | nodes that are configured with a static address (e.g., PREFIX::1). | |
Future certificate chain based authorization specifications are | Future certificate chain based authorization specifications are | |
needed for such nodes. | needed for such nodes. | |
It is outside the scope of this specification to describe the use of | It is outside the scope of this specification to describe the use of | |
trust anchor authorization between nodes with dynamically changing | trust anchor authorization between nodes with dynamically changing | |
Skipping to change at page 51, line 8: | ||
EMail: Pekka.Nikander@nomadiclab.com | EMail: Pekka.Nikander@nomadiclab.com | |
Appendix A. Contributors | Appendix A. Contributors | |
Tuomas Aura contributed the transition mechanism specification in | Tuomas Aura contributed the transition mechanism specification in | |
Section 8. | Section 8. | |
Appendix B. Acknowledgments | Appendix B. Acknowledgments | |
The authors would like to thank Tuomas Aura, Erik Nordmark, Gabriel | The authors would like to thank Tuomas Aura, Erik Nordmark, Gabriel | |
Montenegro, Pasi Eronen, and Francis Dupont for interesting | Montenegro, Pasi Eronen, Greg Daley, and Francis Dupont for | |
discussions in this problem space. | interesting discussions in this problem space. | |
Appendix C. Cache Management | Appendix C. Cache Management | |
In this section we outline a cache management algorithm that allows a | In this section we outline a cache management algorithm that allows a | |
node to remain partially functional even under a cache filling DoS | node to remain partially functional even under a cache filling DoS | |
attack. This appendix is informational, and real implementations | attack. This appendix is informational, and real implementations | |
SHOULD use different algorithms in order to avoid he dangers of | SHOULD use different algorithms in order to avoid he dangers of | |
mono-cultural code. | mono-cultural code. | |
There are at least two distinct cache related attack scenarios: | There are at least two distinct cache related attack scenarios: | |
Skipping to change at page 53, line 34: | ||
this standard. Please address the information to the IETF Executive | this standard. Please address the information to the IETF Executive | |
Director. | Director. | |
The IETF has been notified of intellectual property rights claimed in | The IETF has been notified of intellectual property rights claimed in | |
regard to some or all of the specification contained in this | regard to some or all of the specification contained in this | |
document. For more information consult the online list of claimed | document. For more information consult the online list of claimed | |
rights. | rights. | |
Full Copyright Statement | Full Copyright Statement | |
Copyright (C) The Internet Society (2003). All Rights Reserved. | Copyright (C) The Internet Society (2004). All Rights Reserved. | |
This document and translations of it may be copied and furnished to | This document and translations of it may be copied and furnished to | |
others, and derivative works that comment on or otherwise explain it | others, and derivative works that comment on or otherwise explain it | |
or assist in its implementation may be prepared, copied, published | or assist in its implementation may be prepared, copied, published | |
and distributed, in whole or in part, without restriction of any | and distributed, in whole or in part, without restriction of any | |
kind, provided that the above copyright notice and this paragraph are | kind, provided that the above copyright notice and this paragraph are | |
included on all such copies and derivative works. However, this | included on all such copies and derivative works. However, this | |
document itself may not be modified in any way, such as by removing | document itself may not be modified in any way, such as by removing | |
the copyright notice or references to the Internet Society or other | the copyright notice or references to the Internet Society or other | |
Internet organizations, except as needed for the purpose of | Internet organizations, except as needed for the purpose of | |
End of changes. | ||
This html diff was produced by rfcdiff v0.42, available from http://www.levkowetz.com/ietf/tools/rfcdiff/ |