base.txt | issue81.txt | |||
---|---|---|---|---|
skipping to change at page 12, line 26 | skipping to change at page 12, line 26 | |||
which allows the owner of an address and the signer to be | which allows the owner of an address and the signer to be | |||
different parties. | different parties. | |||
Padding | Padding | |||
A variable length field making the option length a multiple of 8, | A variable length field making the option length a multiple of 8, | |||
containing as many octets as specified in the Pad Length field. | containing as many octets as specified in the Pad Length field. | |||
5.1.1 Processing Rules for Senders | 5.1.1 Processing Rules for Senders | |||
The CGA option MUST be present in all Neighbor Solicitation and | If the node has been configured to use SEND, the CGA option MUST be | |||
Advertisement messages, and MUST be present in Router Solicitation | present in all Neighbor Solicitation and Advertisement messages, and | |||
messages unless they are sent with the unspecified source address. | MUST be present in Router Solicitation messages unless they are sent | |||
The CGA option MAY be present in other messages. | with the unspecified source address. The CGA option MAY be present in | |||
other messages. | ||||
A node sending a message using the CGA option MUST construct the | A node sending a message using the CGA option MUST construct the | |||
message as follows. | message as follows. | |||
The CGA Parameter field in the CGA option is filled in according to | The CGA Parameter field in the CGA option is filled in according to | |||
the rules presented above and in [13]. The public key in the field is | the rules presented above and in [13]. The public key in the field is | |||
taken from the node's configuration used to generate the CGA; | taken from the node's configuration used to generate the CGA; | |||
typically from a data structure associated with the source address. | typically from a data structure associated with the source address. | |||
The address MUST be constructed as specified in Section 4 of [13]. | The address MUST be constructed as specified in Section 4 of [13]. | |||
Depending on the type of the message, this address appears in | Depending on the type of the message, this address appears in | |||
skipping to change at page 16, line 40 | skipping to change at page 16, line 40 | |||
Signature option minus the length of the other fields (including | Signature option minus the length of the other fields (including | |||
the variable length Pad field). | the variable length Pad field). | |||
Padding | Padding | |||
This variable length field contains padding, as many bytes as | This variable length field contains padding, as many bytes as | |||
remains after end of the signature. | remains after end of the signature. | |||
5.2.1 Processing Rules for Senders | 5.2.1 Processing Rules for Senders | |||
Neighbor Solicitation, Neighbor Advertisement, Router Advertisement, | If the node has been configured to use SEND, Neighbor Solicitation, | |||
and Redirect messages MUST contain the RSA Signature option. Router | Neighbor Advertisement, Router Advertisement, and Redirect messages | |||
Solicitation messages not sent with the unspecified source address | MUST contain the RSA Signature option. Router Solicitation messages | |||
MUST contain the RSA Signature option. | not sent with the unspecified source address MUST contain the RSA | |||
Signature option. | ||||
A node sending a message using the RSA Signature option MUST | A node sending a message using the RSA Signature option MUST | |||
construct the message as follows: | construct the message as follows: | |||
o The message is constructed in its entirety, without the RSA | o The message is constructed in its entirety, without the RSA | |||
Signature option. | Signature option. | |||
o The RSA Signature option is added as the last option in the | o The RSA Signature option is added as the last option in the | |||
message. | message. | |||
skipping to change at page 21, line 33 | skipping to change at page 21, line 33 | |||
Nonce | Nonce | |||
A field containing a random number selected by the sender of the | A field containing a random number selected by the sender of the | |||
solicitation message. The length of the random number MUST be at | solicitation message. The length of the random number MUST be at | |||
least 6 bytes. The length of the random number MUST be selected so | least 6 bytes. The length of the random number MUST be selected so | |||
that the length of the nonce option is a multiple of 8 octets. | that the length of the nonce option is a multiple of 8 octets. | |||
5.3.3 Processing rules for senders | 5.3.3 Processing rules for senders | |||
All solicitation messages MUST include a Nonce. When sending a | If the node has been configured to use SEND, all solicitation | |||
solicitation, the sender MUST store the nonce internally so that it | messages MUST include a Nonce. When sending a solicitation, the | |||
can recognize any replies containing that particular nonce. | sender MUST store the nonce internally so that it can recognize any | |||
replies containing that particular nonce. | ||||
All solicited advertisements MUST include a Nonce, copied from the | If the node has been configured to use SEND, all solicited | |||
received solicitation. Note that routers may decide to send a | advertisements MUST include a Nonce, copied from the received | |||
multicast advertisement to all nodes instead of a response to a | solicitation. Note that routers may decide to send a multicast | |||
specific host. In such case the router MAY still include the nonce | advertisement to all nodes instead of a response to a specific host. | |||
value for the host that triggered the multicast advertisement. | In such case the router MAY still include the nonce value for the | |||
Omitting the nonce value may, however, cause the host to ignore the | host that triggered the multicast advertisement. Omitting the nonce | |||
router's advertisement, unless the clocks in these nodes are | value may, however, cause the host to ignore the router's | |||
sufficiently synchronized so that timestamps can be relied on. | advertisement, unless the clocks in these nodes are sufficiently | |||
synchronized so that timestamps can be relied on. | ||||
All solicitation, advertisement, and redirect messages MUST include a | If the node has been configured to use SEND, all solicitation, | |||
Timestamp. Senders SHOULD set the Timestamp field to the current | advertisement, and redirect messages MUST include a Timestamp. | |||
time, according to their real time clock. | Senders SHOULD set the Timestamp field to the current time, according | |||
to their real time clock. | ||||
5.3.4 Processing rules for receivers | 5.3.4 Processing rules for receivers | |||
The processing of the Nonce and Timestamp options depends on whether | The processing of the Nonce and Timestamp options depends on whether | |||
a packet is a solicited advertisement. A system may implement the | a packet is a solicited advertisement. A system may implement the | |||
distinction in various ways. Section 5.3.4.1 defines the processing | distinction in various ways. Section 5.3.4.1 defines the processing | |||
rules for solicited advertisements. Section 5.3.4.2 defines the | rules for solicited advertisements. Section 5.3.4.2 defines the | |||
processing rules for all other messages. | processing rules for all other messages. | |||
In addition, the following rules apply in all cases: | In addition, the following rules apply in all cases: | |||
o Messages received without at least one of the the Timestamp and | ||||
Nonce options MUST be treated as insecure, i.e., processed in the | ||||
same way as NDP messages sent by a non-SEND node. | ||||
o Messages received with the RSA Signature option but without the | o Messages received with the RSA Signature option but without the | |||
Timestamp option MUST be silently discarded. | Timestamp option MUST be silently discarded. | |||
o Solicitation messages received with the RSA Signature option but | o Solicitation messages received with the RSA Signature option but | |||
without the Nonce option MUST be silently discarded. | without the Nonce option MUST be silently discarded. | |||
o Advertisements sent to a unicast destination address with the RSA | o Advertisements sent to a unicast destination address with the RSA | |||
Signature option but without a Nonce option MUST be silently | Signature option but without a Nonce option MUST be silently | |||
discarded. | discarded. | |||
skipping to change at page 35, line 33 | skipping to change at page 35, line 33 | |||
Padding | Padding | |||
A variable length field making the option length a multiple of 8, | A variable length field making the option length a multiple of 8, | |||
beginning after the ASN.1 encoding of the previous field ends, and | beginning after the ASN.1 encoding of the previous field ends, and | |||
continuing to the end of the option, as specified by the Length | continuing to the end of the option, as specified by the Length | |||
field. | field. | |||
6.2.5 Processing Rules for Routers | 6.2.5 Processing Rules for Routers | |||
Routers should be configured with a key pair and a certificate from | If the router has been configured to use SEND, it should be | |||
at least one certificate authority. | configured with a key pair and a certificate from at least one | |||
certificate authority. | ||||
A router MUST silently discard any received Delegation Chain | A router MUST silently discard any received Delegation Chain | |||
Solicitation messages that do not conform to the message format | Solicitation messages that do not conform to the message format | |||
defined in Section 6.2.1. The contents of the Reserved field, and of | defined in Section 6.2.1. The contents of the Reserved field, and of | |||
any unrecognized options, MUST be ignored. Future, | any unrecognized options, MUST be ignored. Future, | |||
backward-compatible changes to the protocol may specify the contents | backward-compatible changes to the protocol may specify the contents | |||
of the Reserved field or add new options; backward-incompatible | of the Reserved field or add new options; backward-incompatible | |||
changes may use different Code values. The contents of any defined | changes may use different Code values. The contents of any defined | |||
options that are not specified to be used with Router Solicitation | options that are not specified to be used with Router Solicitation | |||
messages MUST be ignored and the packet processed in the normal | messages MUST be ignored and the packet processed in the normal | |||
skipping to change at page 36, line 34 | skipping to change at page 36, line 36 | |||
include the Trust Anchor option(s) in the advertisement for which the | include the Trust Anchor option(s) in the advertisement for which the | |||
delegation chain was found. | delegation chain was found. | |||
If the router is unable to find a chain to the requested anchor, it | If the router is unable to find a chain to the requested anchor, it | |||
SHOULD send an advertisement without any certificates. In this case | SHOULD send an advertisement without any certificates. In this case | |||
the router SHOULD include the Trust Anchor options which were | the router SHOULD include the Trust Anchor options which were | |||
solicited. | solicited. | |||
6.2.6 Processing Rules for Hosts | 6.2.6 Processing Rules for Hosts | |||
Hosts SHOULD possess the public key and trust anchor name of at least | If the host has been configured to use SEND, it SHOULD possess the | |||
one certificate authority, they SHOULD possess their own key pair, | public key and trust anchor name of at least one certificate | |||
and they MAY possess certificates from certificate authorities. | authority, they SHOULD possess their own key pair, and they MAY | |||
possess certificates from certificate authorities. | ||||
A host MUST silently discard any received Delegation Chain | A host MUST silently discard any received Delegation Chain | |||
Advertisement messages that do not conform to the message format | Advertisement messages that do not conform to the message format | |||
defined in Section 6.2.2. The contents of the Reserved field, and of | defined in Section 6.2.2. The contents of the Reserved field, and of | |||
any unrecognized options, MUST be ignored. Future, | any unrecognized options, MUST be ignored. Future, | |||
backward-compatible changes to the protocol MAY specify the contents | backward-compatible changes to the protocol MAY specify the contents | |||
of the Reserved field or add new options; backward-incompatible | of the Reserved field or add new options; backward-incompatible | |||
changes MUST use different Code values. The contents of any defined | changes MUST use different Code values. The contents of any defined | |||
options that are not specified to be used with Delegation Chain | options that are not specified to be used with Delegation Chain | |||
Advertisement messages MUST be ignored and the packet processed in | Advertisement messages MUST be ignored and the packet processed in | |||
skipping to change at page 41, line 22 | skipping to change at page 41, line 22 | |||
messages but give priority to "secured" ones. Here, the "secured" | messages but give priority to "secured" ones. Here, the "secured" | |||
messages are ones that contain a valid signature option, as specified | messages are ones that contain a valid signature option, as specified | |||
above, and "insecure" messages are ones that contain no signature | above, and "insecure" messages are ones that contain no signature | |||
option. | option. | |||
A SEND node SHOULD have a configuration option that causes it to | A SEND node SHOULD have a configuration option that causes it to | |||
ignore all insecure Neighbor Solicitation and Advertisement, Router | ignore all insecure Neighbor Solicitation and Advertisement, Router | |||
Solicitation and Advertisement, and Redirect messages. This can be | Solicitation and Advertisement, and Redirect messages. This can be | |||
used to enforce SEND-only networks. The default for this | used to enforce SEND-only networks. The default for this | |||
configuration option SHOULD be that both secure and insecure messages | configuration option SHOULD be that both secure and insecure messages | |||
are allowed. | are allowed. A SEND node MAY also have a configuration option that | |||
causes it to disable the use of SEND even the messages it sends | ||||
itself. | ||||
SEND nodes MUST send only secured messages. Plain (non-SEND) | SEND nodes MUST send only secured messages. Plain (non-SEND) | |||
Neighbor Discovery nodes will obviously send only insecure messages. | Neighbor Discovery nodes will obviously send only insecure messages. | |||
Per RFC 2461 [7], such nodes will ignore the unknown options and will | Per RFC 2461 [7], such nodes will ignore the unknown options and will | |||
treat secured messages in the same way as they treat insecure ones. | treat secured messages in the same way as they treat insecure ones. | |||
Secured and insecure nodes share the same network resources, such as | Secured and insecure nodes share the same network resources, such as | |||
prefixes and address spaces. | prefixes and address spaces. | |||
In a mixed environment SEND nodes follow the protocols defined in RFC | In a mixed environment SEND nodes follow the protocols defined in RFC | |||
2461 and RFC 2462 with the following exceptions: | 2461 and RFC 2462 with the following exceptions: | |||
End of changes. | ||||
This html diff was produced by rfcdiff v1.06, available from http://www.levkowetz.com/ietf/tools/rfcdiff/ |