base.txt | issue55.txt | |
---|---|---|
Skipping to change at page 1, line 48: | ||
This Internet-Draft will expire on July 1, 2004. | This Internet-Draft will expire on July 1, 2004. | |
Copyright Notice | Copyright Notice | |
Copyright (C) The Internet Society (2004). All Rights Reserved. | Copyright (C) The Internet Society (2004). All Rights Reserved. | |
Abstract | Abstract | |
IPv6 nodes use the Neighbor Discovery Protocol (NDP) to discover | IPv6 nodes use the Neighbor Discovery Protocol (NDP) to discover | |
other nodes on the link, to determine each the link-layer addresses | other nodes on the link, to determine the link-layer addresses of the | |
of the nodes on the link, to find routers, and to maintain | nodes on the link, to find routers, and to maintain reachability | |
reachability information about the paths to active neighbors. If not | information about the paths to active neighbors. If not secured, NDP | |
secured, NDP is vulnerable to various attacks. This document | is vulnerable to various attacks. This document specifies security | |
specifies security mechanisms for NDP. Unlike to the original NDP | mechanisms for NDP. Unlike to the original NDP specifications, these | |
specifications, these mechanisms do not make use of IPsec. | mechanisms do not make use of IPsec. | |
Table of Contents | Table of Contents | |
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 4 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 4 | |
1.1 Specification of Requirements . . . . . . . . . . . . 4 | 1.1 Specification of Requirements . . . . . . . . . . . . 4 | |
2. Terms . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 | 2. Terms . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 | |
3. Neighbor and Router Discovery Overview . . . . . . . . . . . 7 | 3. Neighbor and Router Discovery Overview . . . . . . . . . . . 7 | |
4. Secure Neighbor Discovery Overview . . . . . . . . . . . . . 9 | 4. Secure Neighbor Discovery Overview . . . . . . . . . . . . . 9 | |
5. Neighbor Discovery Protocol Options . . . . . . . . . . . . 11 | 5. Neighbor Discovery Protocol Options . . . . . . . . . . . . 11 | |
5.1 CGA Option . . . . . . . . . . . . . . . . . . . . . .11 | 5.1 CGA Option . . . . . . . . . . . . . . . . . . . . . .11 | |
Skipping to change at page 4, line 22: | ||
Its functions include Neighbor Discovery (ND), Router Discovery (RD), | Its functions include Neighbor Discovery (ND), Router Discovery (RD), | |
Address Autoconfiguration, Address Resolution, Neighbor | Address Autoconfiguration, Address Resolution, Neighbor | |
Unreachability Detection (NUD), Duplicate Address Detection (DAD), | Unreachability Detection (NUD), Duplicate Address Detection (DAD), | |
and Redirection. | and Redirection. | |
Original NDP specifications called for the use of IPsec for | Original NDP specifications called for the use of IPsec for | |
protecting the NDP messages. However, the RFCs do not give detailed | protecting the NDP messages. However, the RFCs do not give detailed | |
instructions for using IPsec to secure NDP. It turns out that in | instructions for using IPsec to secure NDP. It turns out that in | |
this particular application, IPsec can only be used with a manual | this particular application, IPsec can only be used with a manual | |
configuration of security associations, due to chicken-and-egg | configuration of security associations, due to chicken-and-egg | |
problems in using IKE [20, 15]. Furthermore, the number of such | problems in using IKE [21, 15]. Furthermore, the number of such | |
manually configured security associations needed for protecting NDP | manually configured security associations needed for protecting NDP | |
can be very large [21], making that approach impractical for most | can be very large [22], making that approach impractical for most | |
purposes. | purposes. | |
This document is organized as follows. Section 4 describes the | This document is organized as follows. Section 4 describes the | |
overall approach to securing NDP. This approach involves the use of | overall approach to securing NDP. This approach involves the use of | |
new NDP options to carry public-key based signatures. A | new NDP options to carry public-key based signatures. A | |
zero-configuration mechanism is used for showing address ownership on | zero-configuration mechanism is used for showing address ownership on | |
individual nodes; routers are certified by a trust anchor [10]. The | individual nodes; routers are certified by a trust anchor [10]. The | |
formats, procedures, and cryptographic mechanisms for the | formats, procedures, and cryptographic mechanisms for the | |
zero-configuration mechanism are described in a related specification | zero-configuration mechanism are described in a related specification | |
[12]. | [12]. | |
Skipping to change at page 5, line 21: | ||
Cryptographically Generated Address (CGA) | Cryptographically Generated Address (CGA) | |
A technique [12] where the IPv6 address of a node is | A technique [12] where the IPv6 address of a node is | |
cryptographically generated using a one-way hash function from the | cryptographically generated using a one-way hash function from the | |
node's public key and some other parameters. | node's public key and some other parameters. | |
Duplicate Address Detection (DAD) | Duplicate Address Detection (DAD) | |
A mechanism that assures that two IPv6 nodes on the same link are | A mechanism that assures that two IPv6 nodes on the same link are | |
not using the same addresses. | not using the same address. | |
Internet Control Message Protocol version 6 (ICMPv6) | ||
The IPv6 control signaling protocol. Neighbor Discovery Protocol | ||
is a part of ICMPv6. | ||
Neighbor Discovery Protocol (NDP) | Neighbor Discovery Protocol (NDP) | |
The IPv6 Neighbor Discovery Protocol [7, 8]. | The IPv6 Neighbor Discovery Protocol [7, 8]. | |
Neighbor Discovery Protocol is a part of ICMPv6 [9]. | ||
Neighbor Discovery (ND) | Neighbor Discovery (ND) | |
The Neighbor Discovery function of the Neighbor Discovery Protocol | The Neighbor Discovery function of the Neighbor Discovery Protocol | |
(NDP). NDP contains also other functions but ND. | (NDP). NDP contains also other functions but ND. | |
Neighbor Unreachability Detection (NUD) | Neighbor Unreachability Detection (NUD) | |
This mechanism is used for tracking the reachability of neighbors. | This mechanism is used for tracking the reachability of neighbors. | |
Nonce | Nonce | |
A random number generated by a node and used exactly once. In | A random number generated by a node and used exactly once. In | |
SEND, nonces are used to ensure that a particular advertisement is | SEND, nonces are used to ensure that a particular advertisement is | |
linked to the solicitation that triggered it. | linked to the solicitation that triggered it. | |
Router Authorization Certificate | Router Authorization Certificate | |
An X.509v3 [10] PKC certificate using the profile specified in | An X.509v3 [10] certificate using the profile specified in Section | |
Section 6.1.1. | 6.1.1. | |
SEND node | SEND node | |
An IPv6 node that implements this specification. | An IPv6 node that implements this specification. | |
non-SEND node | non-SEND node | |
An IPv6 node that does not implement this specification but uses | An IPv6 node that does not implement this specification but uses | |
the legacy RFC 2461 and RFC 2462 mechanisms. | only RFC 2461 and RFC 2462 mechanisms. | |
Router Discovery (RD) | Router Discovery (RD) | |
The Router Discovery function of the Neighbor Discovery Protocol. | Router Discovery allows the hosts to discover what routers exist | |
on the link, and what prefixes are available. Router Discovery is | ||
a part of the Neighbor Discovery Protocol. | ||
3. Neighbor and Router Discovery Overview | 3. Neighbor and Router Discovery Overview | |
The Neighbor Discovery Protocol has several functions. Many of these | The Neighbor Discovery Protocol has several functions. Many of these | |
functions are overloaded on a few central message types, such as the | functions are overloaded on a few central message types, such as the | |
ICMPv6 Neighbor Advertisement message. In this section we review | ICMPv6 Neighbor Advertisement message. In this section we review | |
some of these tasks and their effects in order to understand better | some of these tasks and their effects in order to understand better | |
how the messages should be treated. This section is not normative, | how the messages should be treated. This section is not normative, | |
and if this section and the original Neighbor Discovery RFCs are in | and if this section and the original Neighbor Discovery RFCs are in | |
conflict, the original RFCs take precedence. | conflict, the original RFCs take precedence. | |
The main functions of NDP are the following. | The main functions of NDP are the following. | |
o The Router Discovery function allows IPv6 hosts to discover the | o The Router Discovery function allows IPv6 hosts to discover the | |
local routers on an attached link. Router Discovery is described | local routers on an attached link. Router Discovery is described | |
in Section 6 of RFC 2461 [7]. The main purpose of Router | in Section 6 of RFC 2461 [7]. The main purpose of Router | |
Discovery is to find neighboring routers that are willing to | Discovery is to find neighboring routers that are willing to | |
forward packets on behalf of hosts. Prefix discovery involves | forward packets on behalf of hosts. Prefix discovery involves | |
determining which destinations are directly on a link; this | determining which destinations are directly on a link; this | |
information is necessary in order to know whether a packet should | information is necessary in order to know whether a packet should | |
be sent to a router or to the destination node directly. | be sent to a router or directly to the destination node. | |
o The Redirect function is used for automatically redirecting a host | o The Redirect function is used for automatically redirecting a host | |
to a better first-hop router, or to inform hosts that a | to a better first-hop router, or to inform hosts that a | |
destination is in fact a neighbor (i.e., on-link). Redirect is | destination is in fact a neighbor (i.e., on-link). Redirect is | |
specified in Section 8 of RFC 2461 [7]. | specified in Section 8 of RFC 2461 [7]. | |
o Address Autoconfiguration is used for automatically assigning | o Address Autoconfiguration is used for automatically assigning | |
addresses to a host [8]. This allows hosts to operate without | addresses to a host [8]. This allows hosts to operate without | |
explicit configuration related to IP connectivity. The default | explicit configuration related to IP connectivity. The default | |
autoconfiguration mechanism is stateless. To create IP addresses, | autoconfiguration mechanism is stateless. To create IP addresses, | |
the hosts use any prefix information delivered to them during | the hosts use any prefix information delivered to them during | |
Router Discovery, and then test the newly formed addresses for | Router Discovery, and then test the newly formed addresses for | |
uniqueness. A stateful mechanism, DHCPv6 [23], provides | uniqueness. A stateful mechanism, DHCPv6 [19], provides | |
additional autoconfiguration features. | additional autoconfiguration features. | |
o Duplicate Address Detection (DAD) is used for preventing address | o Duplicate Address Detection (DAD) is used for preventing address | |
collisions [8], for instance during Address Autoconfiguration. A | collisions [8], for instance during Address Autoconfiguration. A | |
node that intends to assign a new address to one of its interfaces | node that intends to assign a new address to one of its interfaces | |
first runs the DAD procedure to verify that there is no other node | first runs the DAD procedure to verify that there is no other node | |
using the same address. Since the rules forbid the use of an | using the same address. Since the rules forbid the use of an | |
address until it has been found unique, no higher layer traffic is | address until it has been found unique, no higher layer traffic is | |
possible until this procedure has been completed. Thus, | possible until this procedure has been completed. Thus, | |
preventing attacks against DAD can help ensure the availability of | preventing attacks against DAD can help ensure the availability of | |
Skipping to change at page 11, line 42: | ||
. . | . . | |
. Padding . | . Padding . | |
. . | . . | |
| | | | | | |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |
The meaning of the fields is described as follows. | The meaning of the fields is described as follows. | |
Type | Type | |
TBD <To be assigned by IANA> for CGA. | TBD <To be assigned by IANA for CGA>. | |
Length | Length | |
The length of the option (including the Type and Length fields) in | The length of the option (including the Type, Length, Collision | |
Cnt, Reserved, Modifier, Key Information, and Padding fields) in | ||
units of 8 octets. | units of 8 octets. | |
Collision Cnt | Collision Cnt | |
An 8-bit collision count, which can get values 0, 1 and 2. Its | An 8-bit collision count, which can get values 0, 1 and 2. Its | |
semantics are defined in [12]. | semantics are defined in [12]. | |
Reserved | Reserved | |
An 8-bit field reserved for future use. The value MUST be | An 8-bit field reserved for future use. The value MUST be | |
Skipping to change at page 15, line 32: | ||
. . | . . | |
. Padding . | . Padding . | |
. . | . . | |
| | | | | | |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |
The meaning of the fields is described below: | The meaning of the fields is described below: | |
Type | Type | |
TBD <To be assigned by IANA> for Signature. | TBD <To be assigned by IANA for Signature>. | |
Length | Length | |
The length of the option (including the Type and Length fields) in | The length of the option (including the Type, Length, Pad Length, | |
Reserved, Key Hash, Digital Signature, and Padding fields) in | ||
units of 8 octets. | units of 8 octets. | |
Pad Length | Pad Length | |
An 8-bit integer field, giving the length of the Pad field in | An 8-bit integer field, giving the length of the Pad field in | |
units of an octet. | units of an octet. | |
Reserved | Reserved | |
An an 8-bit field reserved for future use. The value MUST be | An 8-bit field reserved for future use. The value MUST be | |
initialized to zero by the sender, and MUST be ignored by the | initialized to zero by the sender, and MUST be ignored by the | |
receiver. | receiver. | |
Key Hash | Key Hash | |
A 128-bit field contains the most significant (leftmost) 128-bits | A 128-bit field contains the most significant (leftmost) 128-bits | |
of a SHA1 hash of the public key used for the constructing the | of a SHA1 hash of the public key used for the constructing the | |
signature. The SHA1 is taken over the presentation used in the | signature. The SHA1 is taken over the presentation used in the | |
Key Information field in the CGA option. Its purpose is to | Key Information field in the CGA option. Its purpose is to | |
associate the signature to a particular key known by the receiver. | associate the signature to a particular key known by the receiver. | |
Skipping to change at page 19, line 28: | ||
The construction and verification of this option is computationally | The construction and verification of this option is computationally | |
expensive. In the NDP context, however, the hosts typically have the | expensive. In the NDP context, however, the hosts typically have the | |
need to perform only a few signature operations as they enter a link, | need to perform only a few signature operations as they enter a link, | |
and a few operations as they find a new on-link peer with which to | and a few operations as they find a new on-link peer with which to | |
communicate. | communicate. | |
Routers are required to perform a larger number of operations, | Routers are required to perform a larger number of operations, | |
particularly when the frequency of router advertisements is high due | particularly when the frequency of router advertisements is high due | |
to mobility requirements. Still, the number of required signature | to mobility requirements. Still, the number of required signature | |
operations is on the order of a few dozen ones per second, some of | operations is on the order of a few dozen per second, some of which | |
which can be precomputed as discussed below. A large number of | can be precomputed as discussed below. A large number of router | |
router solicitations may cause higher demand for performing | solicitations may cause higher demand for performing asymmetric | |
asymmetric operations, although RFC 2461 limits the rate at which | operations, although RFC 2461 limits the rate at which responses to | |
responses to solicitations can be sent. | solicitations can be sent. | |
Signatures can be precomputed for unsolicited (multicast) Neighbor | Signatures can be precomputed for unsolicited (multicast) Neighbor | |
and Router Advertisements, if the timing of such future | and Router Advertisements, if the timing of such future | |
advertisements is known. Typically, solicited advertisements are | advertisements is known. Typically, solicited advertisements are | |
sent to the unicast address from which the solicitation was sent. | sent to the unicast address from which the solicitation was sent. | |
Given that the IPv6 header is covered by the signature, it is not | Given that the IPv6 header is covered by the signature, it is not | |
possible to precompute solicited-for advertisements. | possible to precompute solicited-for advertisements. | |
5.3 Timestamp and Nonce options | 5.3 Timestamp and Nonce options | |
Skipping to change at page 20, line 21: | ||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |
| | | | | | |
+ Timestamp + | + Timestamp + | |
| | | | | | |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |
Where the fields are as follows: | Where the fields are as follows: | |
Type | Type | |
TBD <To be assigned by IANA> for Timestamp. | TBD <To be assigned by IANA for Timestamp>. | |
Length | Length | |
The length of the option (including the Type and Length fields) in | The length of the option (including the Type, Length, Reserved, | |
units of 8 octets, i.e., 2. | and Timestamp fields) in units of 8 octets, i.e., 2. | |
Reserved | Reserved | |
A 48-bit field reserved for future use. The value MUST be | A 48-bit field reserved for future use. The value MUST be | |
initialized to zero by the sender, and MUST be ignored by the | initialized to zero by the sender, and MUST be ignored by the | |
receiver. | receiver. | |
Timestamp | Timestamp | |
A 64-bit unsigned integer field containing a timestamp. The value | A 64-bit unsigned integer field containing a timestamp. The value | |
indicates the number of seconds since January 1,, 1970 00:00 UTC, | indicates the number of seconds since January 1, 1970 00:00 UTC, | |
using a fixed point format. In this format the integer number of | using a fixed point format. In this format the integer number of | |
seconds is contained in the first 48 bits of the field, and the | seconds is contained in the first 48 bits of the field, and the | |
remaining 16 bits indicate the number of 1/64K fractions of a | remaining 16 bits indicate the number of 1/64K fractions of a | |
second. | second. | |
5.3.2 Nonce Option | 5.3.2 Nonce Option | |
The purpose of the Nonce option is to ensure that an advertisement is | The purpose of the Nonce option is to ensure that an advertisement is | |
a fresh response to a solicitation sent earlier by the receiving same | a fresh response to a solicitation sent earlier by the receiving same | |
node. The format of this option is described in the following: | node. The format of this option is described in the following: | |
Skipping to change at page 21, line 20: | ||
| | | | | | |
. . | . . | |
. . | . . | |
| | | | | | |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |
Where the fields are as follows: | Where the fields are as follows: | |
Type | Type | |
TBD <To be assigned by IANA> for Nonce. | TBD <To be assigned by IANA for Nonce>. | |
Length | Length | |
The length of the option (including the Type and Length fields) in | The length of the option (including the Type, Length, and Nonce | |
units of 8 octets. | fields) in units of 8 octets. | |
Nonce | Nonce | |
A field containing a random number selected by the sender of the | A field containing a random number selected by the sender of the | |
solicitation message. The length of the random number MUST be at | solicitation message. The length of the random number MUST be at | |
least 6 bytes. | least 6 bytes. | |
5.3.3 Processing rules for senders | 5.3.3 Processing rules for senders | |
All solicitation messages MUST include a Nonce. All solicited-for | All solicitation messages MUST include a Nonce. All solicited-for | |
Skipping to change at page 22, line 50: | ||
If the message contains a Nonce option, but the Nonce value is not | If the message contains a Nonce option, but the Nonce value is not | |
recognized, the message MUST be silently discarded. | recognized, the message MUST be silently discarded. | |
Otherwise, if the message does not contain a Nonce option, it MAY be | Otherwise, if the message does not contain a Nonce option, it MAY be | |
considered as a non-solicited-for advertisement, and processed | considered as a non-solicited-for advertisement, and processed | |
according to Section 5.3.4.2. | according to Section 5.3.4.2. | |
If the message is accepted, the receiver SHOULD store the receive | If the message is accepted, the receiver SHOULD store the receive | |
time of the message and the time stamp time in the message, as | time of the message and the time stamp time in the message, as | |
specified in Section 5.3.4.2 | specified in Section 5.3.4.2. | |
5.3.4.2 Processing all other messages | 5.3.4.2 Processing all other messages | |
Receivers SHOULD be configured with an allowed timestamp Delta value, | Receivers SHOULD be configured with an allowed timestamp Delta value, | |
a "fuzz factor" for comparisons, and an allowed clock drift | a "fuzz factor" for comparisons, and an allowed clock drift | |
parameter. The recommended default value for the allowed Delta is | parameter. The recommended default value for the allowed Delta is | |
3,600 seconds (1 hour), for fuzz factor 1 second, and for clock drift | 3,600 seconds (1 hour), for fuzz factor 1 second, and for clock drift | |
1% (0.01). | 1% (0.01). | |
To facilitate timestamp checking, each node SHOULD store the | To facilitate timestamp checking, each node SHOULD store the | |
Skipping to change at page 23, line 51: | ||
o When a message is received from a known peer, i.e., one that | o When a message is received from a known peer, i.e., one that | |
already has an entry in the cache, the time stamp is checked | already has an entry in the cache, the time stamp is checked | |
against the previously received SEND message: | against the previously received SEND message: | |
TSnew + fuzz > TSlast + (RDnew - RDlast) x (1 - drift) - fuzz | TSnew + fuzz > TSlast + (RDnew - RDlast) x (1 - drift) - fuzz | |
o If TSnew < TSlast, which is possible if packets arrive rapidly and | o If TSnew < TSlast, which is possible if packets arrive rapidly and | |
out of order, TSlast MUST NOT be updated, i.e., the stored TSlast | out of order, TSlast MUST NOT be updated, i.e., the stored TSlast | |
for a given node MUST NOT ever decrease. Otherwise TSlast SHOULD | for a given node MUST NOT ever decrease. Otherwise TSlast SHOULD | |
be updated. Independent on whether TSlast is updated or not, | be updated. Independent of whether TSlast is updated or not, | |
RDlast is updated in any case. | RDlast is updated in any case. | |
6. Authorization Delegation Discovery | 6. Authorization Delegation Discovery | |
Several protocols (NDP included) allow a node to automatically | Several protocols (NDP included) allow a node to automatically | |
configure itself based on information it learns shortly after | configure itself based on information it learns shortly after | |
connecting to a new link. It is particularly easy to configure | connecting to a new link. It is particularly easy to configure | |
"rogue" routers on an unsecured link, and it is particularly | "rogue" routers on an unsecured link, and it is particularly | |
difficult for a node to distinguish between valid and invalid sources | difficult for a node to distinguish between valid and invalid sources | |
of information, when the node needs this information before being | of information, when the node needs this information before being | |
Skipping to change at page 24, line 34: | ||
The Secure Neighbor Discovery Protocol mandates a certificate format | The Secure Neighbor Discovery Protocol mandates a certificate format | |
and introduces two new ICMPv6 messages that are used between hosts | and introduces two new ICMPv6 messages that are used between hosts | |
and routers to allow the host to learn a certificate chain with the | and routers to allow the host to learn a certificate chain with the | |
assistance of the router. | assistance of the router. | |
6.1 Certificate Format | 6.1 Certificate Format | |
The certificate chain of a router terminates in a Router | The certificate chain of a router terminates in a Router | |
Authorization Certificate that authorizes a specific IPv6 node to act | Authorization Certificate that authorizes a specific IPv6 node to act | |
as a router. Because authorization chains are not a common practice | as a router. Because authorization chains are not a common practice | |
in the Internet at the time this specification is being written, the | in the Internet at the time this specification was written, the chain | |
chain MUST consist of standard Public Key Certificates (PKC, in the | MUST consist of standard Public Key Certificates (PKC, in the sense | |
sense of [18]). The certificate chain MUST start from the identity | of [18]). The certificate chain MUST start from the identity of a | |
of a trust anchor that is shared by the host and the router. This | trust anchor that is shared by the host and the router. This allows | |
allows the host to anchor trust for the router's public key in the | the host to anchor trust for the router's public key in the trust | |
trust anchor. Note that there MAY be multiple certificates issued by | anchor. Note that there MAY be multiple certificates issued by a | |
a single trust anchor. | single trust anchor. | |
6.1.1 Router Authorization Certificate Profile | 6.1.1 Router Authorization Certificate Profile | |
Router Authorization Certificates be X.509v3 certificates, as defined | Router Authorization Certificates are X.509v3 certificates, as | |
in RFC 3280 [10], and MUST contain at least one instance of the X.509 | defined in RFC 3280 [10], and MUST contain at least one instance of | |
extension for IP addresses, as defined in [11]. The parent | the X.509 extension for IP addresses, as defined in [11]. The parent | |
certificates in the certificate chain MUST contain one or more X.509 | certificates in the certificate chain MUST contain one or more X.509 | |
IP address extensions, back up to a trusted party (such as the user's | IP address extensions, back up to a trusted party (such as the user's | |
ISP) that configured the original IP address space block for the | ISP) that configured the original IP address space block for the | |
router in question, or delegated the right to do so for someone. The | router in question, or delegated the right to do so for someone. The | |
certificates for intermediate delegating authorities MUST contain | certificates for intermediate delegating authorities MUST contain | |
X.509 IP address extension(s) for subdelegations. The router's | X.509 IP address extension(s) for subdelegations. The router's | |
certificate is signed by the delegating authority for the prefixes | certificate is signed by the delegating authority for the prefixes | |
the router is authorized to to advertise. | the router is authorized to to advertise. | |
The X.509 IP address extension MUST contain at least one | The X.509 IP address extension MUST contain at least one | |
addressesOrRanges element. This element MUST contain an | addressesOrRanges element. This element MUST contain an | |
addressPrefix element with an IPv6 address prefix for a prefix the | addressPrefix element with an IPv6 address prefix for a prefix the | |
router or the intermediate entity is authorized to route. If the | router or the intermediate entity is authorized to route. If the | |
entity is allowed to route any prefix, the used IPv6 address prefix | entity is allowed to route any prefix, the used IPv6 address prefix | |
is the null prefix, 0/0. The addressFamily element of the containing | is the null prefix, ::/0. The addressFamily element of the | |
IPAddrBlocks sequence element MUST contain the IPv6 Address Family | containing IPAddrBlocks sequence element MUST contain the IPv6 | |
Identifier (0002), as specified in [11] for IPv6 prefixes. Instead | Address Family Identifier (0002), as specified in [11] for IPv6 | |
of an addressPrefix element, the addressesOrRange element MAY contain | prefixes. Instead of an addressPrefix element, the addressesOrRange | |
an addressRange element for a range of prefixes, if more than one | element MAY contain an addressRange element for a range of prefixes, | |
prefix is authorized. The X.509 IP address extension MAY contain | if more than one prefix is authorized. The X.509 IP address | |
additional IPv6 prefixes, expressed either as an addressPrefix or an | extension MAY contain additional IPv6 prefixes, expressed either as | |
addressRange. | an addressPrefix or an addressRange. | |
A SEND node receiving a Router Authorization Certificate MUST first | A SEND node receiving a Router Authorization Certificate MUST first | |
check whether the certificate's signature was generated by the | check whether the certificate's signature was generated by the | |
delegating authority. Then the client MUST check whether all the | delegating authority. Then the client MUST check whether all the | |
addressPrefix or addressRange entries in the router's certificate are | addressPrefix or addressRange entries in the router's certificate are | |
contained within the address ranges in the delegating authority's | contained within the address ranges in the delegating authority's | |
certificate, and whether the addressPrefix entries match any | certificate, and whether the addressPrefix entries match any | |
addressPrefix entries in the delegating authority's certificate. If | addressPrefix entries in the delegating authority's certificate. If | |
an addressPrefix or addressRange is not contained within the | an addressPrefix or addressRange is not contained within the | |
delegating authority's prefixes or ranges, the client MAY attempt to | delegating authority's prefixes or ranges, the client MAY attempt to | |
take an intersection of the ranges/prefixes, and use that | take an intersection of the ranges/prefixes, and use that | |
intersection. If the addressPrefix in the certificate is the null | intersection. If the addressPrefix in the certificate is the null | |
prefix, 0/0, such an intersection SHOULD be used. (In that case the | prefix, ::/0, such an intersection SHOULD be used. (In that case the | |
intersection is the parent prefix or range.) If the resulting | intersection is the parent prefix or range.) If the resulting | |
intersection is empty, the client MUST NOT accept the certificate. | intersection is empty, the client MUST NOT accept the certificate. | |
The above check SHOULD be done for all certificates in the chain. If | The above check SHOULD be done for all certificates in the chain. If | |
any of the checks fail, the client MUST NOT accept the certificate. | any of the checks fail, the client MUST NOT accept the certificate. | |
The client also needs to perform validation of advertised prefixes as | The client also needs to perform validation of advertised prefixes as | |
discussed in Section 7.3. | discussed in Section 7.3. | |
Care should be taken if the certificates used in SEND are re-used to | Care should be taken if the certificates used in SEND are re-used to | |
provide authorization in other circumstances, for example with | provide authorization in other circumstances, for example with | |
routing gateway protocols. It is necessary to ensure that the | routing protocols. It is necessary to ensure that the authorization | |
authorization information is appropriate for all applications. SEND | information is appropriate for all applications. SEND certificates | |
certificates may authorize a larger set of prefixes than the router | may authorize a larger set of prefixes than the router is really | |
is really authorized to advertise on a given interface. For | authorized to advertise on a given interface. For instance, SEND | |
instance, SEND allows the use of the null prefix. This prefix might | allows the use of the null prefix. This prefix might cause | |
cause verification or routing problems in other applications. It is | verification or routing problems in other applications. It is | |
RECOMMENDED that SEND certificates containing the null prefix are | RECOMMENDED that SEND certificates containing the null prefix are | |
only used for SEND. | only used for SEND. | |
Since it is possible that some PKC certificates used with SEND do not | Since it is possible that some PKC certificates used with SEND do not | |
immediately contain the X.509 IP address extension element, an | immediately contain the X.509 IP address extension element, an | |
implementation MAY contain facilities that allow the prefix and range | implementation MAY contain facilities that allow the prefix and range | |
checks to be relaxed. However, any such configuration options SHOULD | checks to be relaxed. However, any such configuration options SHOULD | |
be off by default. That is, the system SHOULD have a default | be off by default. That is, the system SHOULD have a default | |
configuration that requires rigorous prefix and range checks. | configuration that requires rigorous prefix and range checks. | |
The following is an example of a certificate chain. Suppose that | The following is an example of a certificate chain. Suppose that | |
ispgroup.com is the trust anchor. The host has this certificate for | isp_group_example.net is the trust anchor. The host has this | |
it: | certificate for it: | |
Certificate 1: | Certificate 1: | |
Issuer: isp_group.com | Issuer: isp_group_example.net | |
Validity: Jan 1, 2004 through Dec 31, 2004 | Validity: Jan 1, 2004 through Dec 31, 2004 | |
Subject: isp_group.com | Subject: isp_group_example.net | |
Extensions: | Extensions: | |
IP address delegation extension: | IP address delegation extension: | |
Prefixes: P1, ..., Pk | Prefixes: P1, ..., Pk | |
... possibly other extensions ... | ... possibly other extensions ... | |
... other certificate parameters ... | ... other certificate parameters ... | |
When the host attaches then to a linked served by | When the host attaches then to a linked served by | |
router_x.isp_foo.com, it receives the following certificate chain: | router_x.isp_foo_example.net, it receives the following certificate | |
chain: | ||
Certificate 2: | Certificate 2: | |
Issuer: isp_group.com | Issuer: isp_group_example.net | |
Validity: Jan 1, 2004 through Dec 31, 2004 | Validity: Jan 1, 2004 through Dec 31, 2004 | |
Subject: isp_foo.com | Subject: isp_foo_example.net | |
Extensions: | Extensions: | |
IP address delegation extension: | IP address delegation extension: | |
Prefixes: Q1, ..., Qk | Prefixes: Q1, ..., Qk | |
... possibly other extensions ... | ... possibly other extensions ... | |
... other certificate parameters ... | ... other certificate parameters ... | |
Certificate 3: | Certificate 3: | |
Issuer: isp_foo.com | Issuer: isp_foo_example.net | |
Validity: Jan 1, 2004 through Dec 31, 2004 | Validity: Jan 1, 2004 through Dec 31, 2004 | |
Subject: router_x.isp_foo.com | Subject: router_x.isp_foo_example.net | |
Extensions: | Extensions: | |
IP address delegation extension: | IP address delegation extension: | |
Prefixes R1, ..., Rk | Prefixes R1, ..., Rk | |
... possibly other extensions ... | ... possibly other extensions ... | |
... other certificate parameters ... | ... other certificate parameters ... | |
When procesing the three certificates, the usual RFC 3280 [10] | When procesing the three certificates, the usual RFC 3280 [10] | |
certificate path validation is performed. Note, however, that at the | certificate path validation is performed. Note, however, that at the | |
time a node is checking certificates received in a DCA from a router, | time a node is checking certificates received in a DCA from a router, | |
it typically does not have a connection to the Internet yet, and so | it typically does not have a connection to the Internet yet, and so | |
Skipping to change at page 28, line 36: | ||
multicast address, or the address of the host's default router. | multicast address, or the address of the host's default router. | |
Hop Limit | Hop Limit | |
255 | 255 | |
ICMP Fields: | ICMP Fields: | |
Type | Type | |
TBD <To be assigned by IANA> for Delegation Chain Solicitation. | TBD <To be assigned by IANA for Delegation Chain Solicitation>. | |
Code | Code | |
0 | 0 | |
Checksum | Checksum | |
The ICMP checksum [9]. | The ICMP checksum [9]. | |
Identifier | Identifier | |
Skipping to change at page 30, line 4: | ||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |
| Options ... | | Options ... | |
+-+-+-+-+-+-+-+-+-+-+-+- | +-+-+-+-+-+-+-+-+-+-+-+- | |
IP Fields: | IP Fields: | |
Source Address | Source Address | |
A link-local unicast address assigned to the interface from | A link-local unicast address assigned to the interface from | |
which this message is sent. Note that routers may use multiple | which this message is sent. Note that routers may use multiple | |
addresses, and therefore this address not sufficient for the | addresses, and therefore this address is not sufficient for the | |
unique identification of routers. | unique identification of routers. | |
Destination Address | Destination Address | |
Either the Solicited-Node multicast address of the receiver or | Either the Solicited-Node multicast address of the receiver or | |
the link-scoped All-Nodes multicast address. | the link-scoped All-Nodes multicast address. | |
Hop Limit | Hop Limit | |
255 | 255 | |
ICMP Fields: | ICMP Fields: | |
Type | Type | |
TBD <To be assigned by IANA> for Delegation Chain | TBD <To be assigned by IANA for Delegation Chain | |
Advertisement. | Advertisement>. | |
Code | Code | |
0 | 0 | |
Checksum | Checksum | |
The ICMP checksum [9]. | The ICMP checksum [9]. | |
Identifier | Identifier | |
Skipping to change at page 32, line 17: | ||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |
| Type | Length | Name Type | Pad Length | | | Type | Length | Name Type | Pad Length | | |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |
| Name ... | | Name ... | |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |
Where the fields are as follows: | Where the fields are as follows: | |
Type | Type | |
TBD <To be assigned by IANA> for Trust Anchor. | TBD <To be assigned by IANA for Trust Anchor>. | |
Length | Length | |
The length of the option, (including the Type, Length, Name Type, | The length of the option, (including the Type, Length, Name Type, | |
Name Length, and Name fields,) in units of 8 octets. | Pad Length, and Name fields) in units of 8 octets. | |
Name Type | Name Type | |
The type of the name included in the Name field. This | The type of the name included in the Name field. This | |
specification defines only one legal value for this field: | specification defines two legal values for this field: | |
1 DER Encoded X.501 Name | 1 DER Encoded X.501 Name | |
2 FQDN | 2 FQDN | |
Pad Length | Pad Length | |
The number of padding octets beyond the end of the Name field but | The number of padding octets beyond the end of the Name field but | |
within the length specified by the Length field. Padding octets | within the length specified by the Length field. Padding octets | |
MUST be set to zero by senders and ignored by receivers. | MUST be set to zero by senders and ignored by receivers. | |
Skipping to change at page 33, line 21: | ||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |
| Type | Length | Cert Type | Pad Length | | | Type | Length | Cert Type | Pad Length | | |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |
| Certificate ... | | Certificate ... | |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |
Where the fields are as follows: | Where the fields are as follows: | |
Type | Type | |
TBD <To be assigned by IANA> for Certificate. | TBD <To be assigned by IANA for Certificate>. | |
Length | Length | |
The length of the option, (including the Type, Length, Cert Type, | The length of the option, (including the Type, Length, Cert Type, | |
Pad Length, and Certificate fields,) in units of 8 octets. | Pad Length, and Certificate fields) in units of 8 octets. | |
Cert Type | Cert Type | |
The type of the certificate included in the Certificate field. | The type of the certificate included in the Certificate field. | |
This specification defines only one legal value for this field: | This specification defines only one legal value for this field: | |
1 X.509v3 Certificate, as specified below | 1 X.509v3 Certificate, as specified below | |
Pad Length | Pad Length | |
Skipping to change at page 34, line 25: | ||
processed in the normal manner. The only defined option that may | processed in the normal manner. The only defined option that may | |
appear is the Trust Anchor option. A solicitation that passes the | appear is the Trust Anchor option. A solicitation that passes the | |
validity checks is called a "valid solicitation". | validity checks is called a "valid solicitation". | |
Routers SHOULD send advertisements in response to valid solicitations | Routers SHOULD send advertisements in response to valid solicitations | |
received on an advertising interface. If the source address in the | received on an advertising interface. If the source address in the | |
solicitation was the unspecified address, the router MUST send the | solicitation was the unspecified address, the router MUST send the | |
response to the link-scoped All-Nodes multicast address. If the | response to the link-scoped All-Nodes multicast address. If the | |
source address was a unicast address, the router MUST send the | source address was a unicast address, the router MUST send the | |
response to the Solicited-Node multicast address corresponding to the | response to the Solicited-Node multicast address corresponding to the | |
source address. Routers SHOULD NOT send Delegation Chain | source address, except when under load, as specified below. Routers | |
Advertisements more than MAX_DCA_RATE times within a second. When | SHOULD NOT send Delegation Chain Advertisements more than | |
there are more solicitations than this, the router SHOULD send the | MAX_DCA_RATE times within a second. When there are more | |
response to the All-Nodes multicast address regardless of the source | solicitations than this, the router SHOULD send the response to the | |
address that appeared in the solicitation. | All-Nodes multicast address regardless of the source address that | |
appeared in the solicitation. | ||
In an advertisement, the router SHOULD include suitable Certificate | In an advertisement, the router SHOULD include suitable Certificate | |
options so that a delegation chain to the solicited trust anchor can | options so that a delegation chain to the solicited trust anchor can | |
be established. The anchor is identified by the Trust Anchor option. | be established. The anchor is identified by the Trust Anchor option. | |
If the Trust Anchor option is represented as a DER Encoded X.501 | If the Trust Anchor option is represented as a DER Encoded X.501 | |
Name, then the Name must be equal to the Subject field in the | Name, then the Name must be equal to the Subject field in the | |
anchor's certificate. If the Trust Anchor option is represented as | anchor's certificate. If the Trust Anchor option is represented as | |
an FQDN, the FQDN must be equal to an FQDN in the subjectAltName | an FQDN, the FQDN must be equal to an FQDN in the subjectAltName | |
field of the anchor's certificate. The router SHOULD include the | field of the anchor's certificate. The router SHOULD include the | |
Trust Anchor option(s) in the advertisement for which the delegation | Trust Anchor option(s) in the advertisement for which the delegation | |
Skipping to change at page 34, line 51: | ||
If the router is unable to find a chain to the requested anchor, it | If the router is unable to find a chain to the requested anchor, it | |
SHOULD send an advertisement without any certificates. In this case | SHOULD send an advertisement without any certificates. In this case | |
the router SHOULD include the Trust Anchor options which were | the router SHOULD include the Trust Anchor options which were | |
solicited. | solicited. | |
6.2.6 Processing Rules for Hosts | 6.2.6 Processing Rules for Hosts | |
Hosts SHOULD possess the public key and trust anchor name of at least | Hosts SHOULD possess the public key and trust anchor name of at least | |
one certificate authority, they SHOULD possess their own key pair, | one certificate authority, they SHOULD possess their own key pair, | |
and they MAY posses a certificate from the above mentioned | and they MAY possess a certificate from the above mentioned | |
certificate authority. | certificate authority. | |
A host MUST silently discard any received Delegation Chain | A host MUST silently discard any received Delegation Chain | |
Advertisement messages that do not satisfy all of the requirements | Advertisement messages that do not satisfy all of the requirements | |
listed in Section 6.2.2. | listed in Section 6.2.2. | |
The contents of the Reserved field, and of any unrecognized options, | The contents of the Reserved field, and of any unrecognized options, | |
MUST be ignored. Future, backward-compatible changes to the protocol | MUST be ignored. Future, backward-compatible changes to the protocol | |
may specify the contents of the Reserved field or add new options; | may specify the contents of the Reserved field or add new options; | |
backward-incompatible changes may use different Code values. The | backward-incompatible changes may use different Code values. The | |
Skipping to change at page 37, line 9: | ||
When processing possible advertisements sent as responses to a | When processing possible advertisements sent as responses to a | |
solicitation, the host MAY prefer to process first those | solicitation, the host MAY prefer to process first those | |
advertisements with the same Identifier field value as in the | advertisements with the same Identifier field value as in the | |
solicitation. This makes Denial-of-Service attacks against the | solicitation. This makes Denial-of-Service attacks against the | |
mechanism harder (see Section 9.3). | mechanism harder (see Section 9.3). | |
7. Addressing | 7. Addressing | |
7.1 CGA Addresses | 7.1 CGA Addresses | |
Nodes that use stateless address autoconfiguration, SHOULD generate a | Nodes that use stateless address autoconfiguration SHOULD generate a | |
new CGA as specified in Section 4 of [12] for each new | new CGA as specified in Section 4 of [12] for each new | |
autoconfiguration run. The nodes MAY continue to use the same public | autoconfiguration run. The nodes MAY continue to use the same public | |
key and modifier, and start the process from Step 4. | key and modifier, and start the process from Step 4. | |
By default, a SEND-enabled node SHOULD use only CGAs as its own | By default, a SEND-enabled node SHOULD use only CGAs as its own | |
addresses. Other types of addresses MAY be used in testing, | addresses. Other types of addresses MAY be used in testing, | |
diagnostics or other purposes. However, this document does not | diagnostics or other purposes. However, this document does not | |
describe how to choose between different types of addresses for | describe how to choose between different types of addresses for | |
different communications. A dynamic selection can be provided by an | different communications. A dynamic selection can be provided by an | |
API, such as the one defined in [22]. | API, such as the one defined in [23]. | |
7.2 Redirect Addresses | 7.2 Redirect Addresses | |
If the Target Address and Destination Address fields in the ICMP | If the Target Address and Destination Address fields in the ICMP | |
Redirect message are equal, then this message is used to inform hosts | Redirect message are equal, then this message is used to inform hosts | |
that a destination is in fact a neighbor. In this case the receiver | that a destination is in fact a neighbor. In this case the receiver | |
MUST verify that the given address falls within the range defined by | MUST verify that the given address falls within the range defined by | |
the router's certificate. Redirect messages failing this check MUST | the router's certificate. Redirect messages failing this check MUST | |
be silently discarded. | be silently discarded. | |
Skipping to change at page 39, line 10: | ||
to the source address of the packet, except in the case of proxy | to the source address of the packet, except in the case of proxy | |
Neighbor Discovery. Proxy Neighbor Discovery is not supported by | Neighbor Discovery. Proxy Neighbor Discovery is not supported by | |
this specification; it is planned to be specified in a future | this specification; it is planned to be specified in a future | |
document. | document. | |
8. Transition Issues | 8. Transition Issues | |
During the transition to secure links or as a policy consideration, | During the transition to secure links or as a policy consideration, | |
network operators may want to run a particular link with a mixture of | network operators may want to run a particular link with a mixture of | |
secure and insecure nodes. Nodes that support SEND SHOULD support | secure and insecure nodes. Nodes that support SEND SHOULD support | |
the use of SEND and the legacy NDP at the same time. | the use of SEND and plain NDP at the same time. | |
In a mixed environment, SEND nodes receive both secure and insecure | In a mixed environment, SEND nodes receive both secure and insecure | |
messages but give priority to "secured" ones. Here, the "secured" | messages but give priority to "secured" ones. Here, the "secured" | |
messages are ones that contain a valid signature option, as specified | messages are ones that contain a valid signature option, as specified | |
above, and "insecure" messages are ones that contain no signature | above, and "insecure" messages are ones that contain no signature | |
option. | option. | |
SEND nodes send only secured messages. Legacy Neighbor Discovery | SEND nodes send only secured messages. Plain (non-SEND) Neighbor | |
nodes will obviously send only insecure messages. Per RFC 2461 [7], | Discovery nodes will obviously send only insecure messages. Per RFC | |
such nodes will ignore the unknown options and will treat secured | 2461 [7], such nodes will ignore the unknown options and will treat | |
messages in the same way as they treat insecure ones. Secured and | secured messages in the same way as they treat insecure ones. | |
insecure nodes share the same network resources, such as prefixes and | Secured and insecure nodes share the same network resources, such as | |
address spaces. | prefixes and address spaces. | |
In a mixed environment SEND nodes follow the protocols defined in RFC | In a mixed environment SEND nodes follow the protocols defined in RFC | |
2461 and RFC 2462 with the following exceptions: | 2461 and RFC 2462 with the following exceptions: | |
o All solicitations sent by SEND nodes MUST be secured. | o All solicitations sent by a SEND node MUST be secured. | |
o Unsolicited advertisements sent by a SEND node MUST be secured. | o Unsolicited advertisements sent by a SEND node MUST be secured. | |
o A SEND node MUST send a secured advertisement in response to a | o A SEND node MUST send a secured advertisement in response to a | |
secured solicitation. Advertisements sent in response to an | secured solicitation. Advertisements sent in response to an | |
insecure solicitation MUST be secured as well, but MUST NOT | insecure solicitation MUST be secured as well, but MUST NOT | |
contain the Nonce option. | contain the Nonce option. | |
o A SEND node that uses the CGA authorization method for protecting | o A SEND node that uses the CGA authorization method for protecting | |
Neighbor Solicitations SHOULD perform Duplicate Address Detection | Neighbor Solicitations SHOULD perform Duplicate Address Detection | |
Skipping to change at page 47, line 38: | ||
o The Trust Anchor option, described in Section 6.2.3. | o The Trust Anchor option, described in Section 6.2.3. | |
o The Certificate option, described in Section 6.2.4. | o The Certificate option, described in Section 6.2.4. | |
This document defines a new 128-bit value under the CGA Message Type | This document defines a new 128-bit value under the CGA Message Type | |
[12] namespace, 0x086F CA5E 10B2 00C9 9C8C E001 6427 7C08. | [12] namespace, 0x086F CA5E 10B2 00C9 9C8C E001 6427 7C08. | |
This document defines a new name space for the Name Type field in the | This document defines a new name space for the Name Type field in the | |
Trust Anchor option. Future values of this field can be allocated | Trust Anchor option. Future values of this field can be allocated | |
using standards action [6]. The current values for this field are: | using Standards Action [6]. The current values for this field are: | |
1 DER Encoded X.501 Name | 1 DER Encoded X.501 Name | |
2 FQDN | 2 FQDN | |
Another new name space is allocated for the Cert Type field in the | Another new name space is allocated for the Cert Type field in the | |
Certificate option. Future values of this field can be allocated | Certificate option. Future values of this field can be allocated | |
using standards action [6]. The current values for this field are: | using Standards Action [6]. The current values for this field are: | |
1 X.509v3 Certificate | 1 X.509v3 Certificate | |
Normative References | Normative References | |
[1] Mockapetris, P., "Domain names - concepts and facilities", STD | [1] Mockapetris, P., "Domain names - concepts and facilities", STD | |
13, RFC 1034, November 1987. | 13, RFC 1034, November 1987. | |
[2] Bradner, S., "Key words for use in RFCs to Indicate Requirement | [2] Bradner, S., "Key words for use in RFCs to Indicate Requirement | |
Levels", BCP 14, RFC 2119, March 1997. | Levels", BCP 14, RFC 2119, March 1997. | |
Skipping to change at page 50, line 19: | ||
[16] Deering, S., Fenner, W. and B. Haberman, "Multicast Listener | [16] Deering, S., Fenner, W. and B. Haberman, "Multicast Listener | |
Discovery (MLD) for IPv6", RFC 2710, October 1999. | Discovery (MLD) for IPv6", RFC 2710, October 1999. | |
[17] Narten, T. and R. Draves, "Privacy Extensions for Stateless | [17] Narten, T. and R. Draves, "Privacy Extensions for Stateless | |
Address Autoconfiguration in IPv6", RFC 3041, January 2001. | Address Autoconfiguration in IPv6", RFC 3041, January 2001. | |
[18] Farrell, S. and R. Housley, "An Internet Attribute Certificate | [18] Farrell, S. and R. Housley, "An Internet Attribute Certificate | |
Profile for Authorization", RFC 3281, April 2002. | Profile for Authorization", RFC 3281, April 2002. | |
[19] Hinden, R. and S. Deering, "Internet Protocol Version 6 (IPv6) | [19] Droms, R., Bound, J., Volz, B., Lemon, T., Perkins, C. and M. | |
Carney, "Dynamic Host Configuration Protocol for IPv6 | ||
(DHCPv6)", RFC 3315, July 2003. | ||
[20] Hinden, R. and S. Deering, "Internet Protocol Version 6 (IPv6) | ||
Addressing Architecture", RFC 3513, April 2003. | Addressing Architecture", RFC 3513, April 2003. | |
[20] Arkko, J., "Effects of ICMPv6 on IKE and IPsec Policies", | [21] Arkko, J., "Effects of ICMPv6 on IKE and IPsec Policies", | |
draft-arkko-icmpv6-ike-effects-02 (work in progress), March | draft-arkko-icmpv6-ike-effects-02 (work in progress), March | |
2003. | 2003. | |
[21] Arkko, J., "Manual SA Configuration for IPv6 Link Local | [22] Arkko, J., "Manual SA Configuration for IPv6 Link Local | |
Messages", draft-arkko-manual-icmpv6-sas-01 (work in progress), | Messages", draft-arkko-manual-icmpv6-sas-01 (work in progress), | |
June 2002. | June 2002. | |
[22] Nordmark, E., Chakrabarti, S. and J. Laganier, "IPv6 Socket API | [23] Nordmark, E., Chakrabarti, S. and J. Laganier, "IPv6 Socket API | |
for Address Selection", draft-chakrabarti-ipv6-addrselect-02 | for Address Selection", draft-chakrabarti-ipv6-addrselect-02 | |
(work in progress), October 2003. | (work in progress), October 2003. | |
[23] Droms, R., "Dynamic Host Configuration Protocol for IPv6 | ||
(DHCPv6)", draft-ietf-dhc-dhcpv6-28 (work in progress), | ||
November 2002. | ||
[24] Kent, S., "IP Encapsulating Security Payload (ESP)", | [24] Kent, S., "IP Encapsulating Security Payload (ESP)", | |
draft-ietf-ipsec-esp-v3-06 (work in progress), July 2003. | draft-ietf-ipsec-esp-v3-06 (work in progress), July 2003. | |
[25] Nikander, P., "IPv6 Neighbor Discovery trust models and | [25] Nikander, P., Kempf, J. and E. Nordmark, "IPv6 Neighbor | |
threats", draft-ietf-send-psreq-00 (work in progress), October | Discovery trust models and threats", draft-ietf-send-psreq-04 | |
2002. | (work in progress), October 2003. | |
[26] International Organization for Standardization, "The Directory | [26] International Organization for Standardization, "The Directory | |
- Authentication Framework", ISO Standard X.509, 2000. | - Authentication Framework", ISO Standard X.509, 2000. | |
[27] Institute of Electrical and Electronics Engineers, "Local and | [27] Institute of Electrical and Electronics Engineers, "Local and | |
Metropolitan Area Networks: Port-Based Network Access Control", | Metropolitan Area Networks: Port-Based Network Access Control", | |
IEEE Standard 802.1X, September 2001. | IEEE Standard 802.1X, September 2001. | |
Authors' Addresses | Authors' Addresses | |
End of changes. | ||
This html diff was produced by rfcdiff v0.42, available from http://www.levkowetz.com/ietf/tools/rfcdiff/ |