[CGA-EXT] Re: CGA Extensions BOF situation

marcelo bagnulo braun <marcelo@it.uc3m.es> Mon, 18 June 2007 11:37 UTC

Return-path: <cga-ext-bounces@ietf.org>
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1I0FXb-0001L1-P5; Mon, 18 Jun 2007 07:37:03 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1I0FXa-0001Kk-Ut; Mon, 18 Jun 2007 07:37:02 -0400
Received: from smtp01.uc3m.es ([163.117.176.131] helo=smtp.uc3m.es) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1I0FXX-0000GY-JM; Mon, 18 Jun 2007 07:37:02 -0400
Received: from [163.117.139.243] (chelo-it-uc3m-es.it.uc3m.es [163.117.139.243])by smtp.uc3m.es (Postfix) with ESMTP id 4C78B28F8C; Mon, 18 Jun 2007 13:36:57 +0200 (CEST)
In-Reply-To: <467275B7.6060007@piuha.net>
References: <467275B7.6060007@piuha.net>
Mime-Version: 1.0 (Apple Message framework v624)
Content-Type: text/plain; charset="ISO-8859-1"; delsp="yes"; format="flowed"
Message-Id: <0fa83ce4bc13fca5d1bc8f2768d50048@it.uc3m.es>
Content-Transfer-Encoding: quoted-printable
From: marcelo bagnulo braun <marcelo@it.uc3m.es>
Date: Mon, 18 Jun 2007 13:37:08 +0200
To: Jari Arkko <jari.arkko@piuha.net>
X-Mailer: Apple Mail (2.624)
X-imss-version: 2.047
X-imss-result: Passed
X-imss-scanInfo: M:B L:E SM:2
X-imss-tmaseResult: TT:1 TS:-17.6805 TC:1F TRN:92 TV:3.6.1039(15240.003)
X-imss-scores: Clean:100.00000 C:0 M:0 S:0 R:0
X-imss-settings: Baseline:1 C:1 M:1 S:1 R:1 (0.0000 0.0000)
X-Spam-Score: 0.1 (/)
X-Scan-Signature: a0534e6179a1e260079328e8b03c7901
Cc: cga-ext@ietf.org, Internet Area <int-area@ietf.org>
Subject: [CGA-EXT] Re: CGA Extensions BOF situation
X-BeenThere: cga-ext@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: CGA and SeND Extensions <cga-ext.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/cga-ext>, <mailto:cga-ext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/cga-ext>
List-Post: <mailto:cga-ext@ietf.org>
List-Help: <mailto:cga-ext-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/cga-ext>, <mailto:cga-ext-request@ietf.org?subject=subscribe>
Errors-To: cga-ext-bounces@ietf.org

Hi,

First of all, i would like to thank Jari for his support during all  
this process and his ideas about how to move forward with this.

I think that in order to be in good shape for having a bof for  
Vancouver, we need discussion on the different proposed work items.

I include a list of work items that were included in the proposed  
charter or that were mentioned during the discussion.

I would encourage people that are interested in the different items and  
would like to see them included in the charter for the next bof  
proposal for vancouver to express themselves on the mailing list and if  
possible to write a short draft (or update an old draft describing the  
motivations for the work. If people are interested in working in some  
of the items, please let me know and i can put you in contact with  
other people that would be also interested in the same topic.

Here is a list of work items open for discussion

------------------------------------------------
Work Originally included in the proposed charter
------------------------------------------------

- Extensions to the SeND protocol to support Neighbour Discovery
Proxies:  SeND protocol as currently defined in RFC 3971 lacks of
support for ND Proxies defined in RFC 4389. Extensions to the SeND
protocol will be defined in order to provide equivalent SeND
security capabilities to ND Proxies.

- Extensions to the IKEv2 protocol to create IPSec SAs associated to
the CGA key. Because of their cryptographic nature, CGAs are
inherently bound to the key pair that was used for their generation.
This is used in existent protocols for proving address ownership.
However, it would be possible also to use this cryptographic material
to create a security association between peers. The key benefit of
such approach is that it allows the creation of a security association
that is cryptographically bound to the IP address of the end points
without dependence on a common trust anchor point, eg. PKI. Such
approach would provide additional protection compared to the
opportunistic approaches. The proposed work will produce an analysis
of this type of solution and the required extensions to CGAs and to
the IKEv2 protocol in order to be able to create IPSec SA using the
CGAs keys.

- DHCP support for CGAs. An analysis of possible approaches to allow
the usage of the DHCP protocol to assign CGAs will be produced. The
output of the analysis will be an informational document describing
the recommended approaches that will be provided as an input to the
DHC working group where the actual DHCP extensions needed for the
recommended approaches will be defined.

- Define a CGA extension to support other public key algorithms: As
currently defined, CGAs can only use RSA keys in the CGA Parameter
Data Structure. An extension to update the CGA specification in
order to multiple public key cryptographic algorithm support will be
defined.

---------------------------------
Additional work to be considered
---------------------------------

- Moving RFC3971 and RFC3972 to draft standard (J.Kempf)

- SeND extensions to perform source address validation at the local  
link level (F. Baker)
   see message  
http://www1.ietf.org/mail-archive/web/int-area/current/msg00792.html

- Extensions to secure Multicast Listener Discovery Version 2 (MLDv2)  
for IPv6 (J. Laganier)
   see message  
http://www1.ietf.org/mail-archive/web/int-area/current/msg00807.html
   1. protection against spoofing of multicast listener
   report messages in which a rogue node unsubscribe its
   target from receiving multicast traffic.
   2. protection against spoofing of multicast Listener
   query messages in which a rogue node with a lower IPv6
   address than the current querier will cause querier
   duties to be assigned to the rogue node.

- Definition of EKU for the X.509 certs used for securing Router  
Discovery, that authorizes use as a router (D. Thaler)
   see message  
http://www1.ietf.org/mail-archive/web/int-area/current/msg00803.html

- Prefix delegation and certificate delegation (J.M. Combes)
   see message  
http://www1.ietf.org/mail-archive/web/int-area/current/msg00802.html

- SeND optimizations for wireless environments (W. Haddad) based on  
draft-haddad-mipshop-optisend-02
   http://tools.ietf.org/html/draft-haddad-mipshop-optisend-02
   Abstract:
    This memo describes a new set of mechanisms, which aims to increase
    the Secure Neighbor Discovery (SEND) protocol usability by reducing
    the required processing power on small devices and adapting it to
    mobile environment requirements while maintaining its efficiency.

- Cryptographic layering enforcement (CLE) (G. Montenegro) based on  
draft-montenegro-send-cga-rr-01.txt
    
http://www.join.uni-muenster.de/Dokumente/drafts/draft-montenegro-send- 
cga-rr-01.txt
   Abstract:
    The known security vulnerabilities in Neighbor Discovery have not
    been properly dealt with.  This note suggests some techniques based
    on cryptographically generated addresses and probes that may be
    applied even in the absence of a pre-established security
    relationship between the parties involved.

- Link Layer HBA Based on  
http://www.join.uni-muenster.de/Dokumente/drafts/draft-laganier-send- 
ll-hba-00.txt
   Abstract:
    The current mechanisms used by Secure Neighbor Discovery (SEND) to
    secure the Neighbor Discovery Protocol (NDP) relies almost solely on
    public key cryptography (i.e.  Certificates and/or Cryptographically
    Generated Addresses).  While these approaches provide very strong
    guarantees on the authenticity of an IP address to link layer address
    mapping, they are computationally expensive, which might be a problem
    on resource-constrained devices.

    It is also recognized in the SEND specification that it does not
    compensate for an insecure link layer; more specifically, no
    protections are offered against spoofing, link disruption, or bombing
    DoS attacks launched at the link layer.  Accordingly, this note
    suggests an alternative to the current specification of SEND which
    leverage on the deemed required link layer security to secure NDP.
    This technique is based on the use of a specific kind of IPv6
    addresses, the so-called Link Layer Hashed Based Addresses (LL-HBA),
    and of link layer address reachability tests.

    When the link layer security prevents attacker to redirect frames at
    the link layer layer, this technique allows to provide some level of
    security to NDP while relying solely on symmetric (i.e.,
    computationally inexpensive) cryptography.

Comments on this or other potential work is welcome

Regards, marcelo


El 15/06/2007, a las 13:19, Jari Arkko escribió:

>
> This is a heads up of what is going on with the
> CGA Extensions BOF proposal.
>
> The proposal for a WG is clear and well justified,
> particularly in the areas that relate to maintenance
> of existing RFCs. Chartering work for maintaining
> an existing spec is an obviously useful thing.
> There has been a fair number of people interested
> in this, and the discussion has identified possible
> new work items. Some of the work items related to
> new uses (source address validation, IKEv2) have
> been more controversial and need further
> documentation & discussion.
>
> The main question mark relating to this BOF has
> been the state of implementation and deployment of
> SEND. The IETF should spend effort only when technology
> has promise of making a significant impact in real-world
> networking. We have privately been told that efforts
> are underway, however.
>
> After discussions with Marcelo, IAB, IESG, and the
> IP Directorate, Marcelo and I have decided to
> postpone the BOF to Vancouver. By Vancouver,
> we expect the following to have happened:
>
> - Additional documents become available and
>   are discussed on the list. This is particularly
>   needed for the maintenance items that come
>   up during recent int-area list discussion and
>   in the new uses of CGAs in other contexts than
>   SEND.
>
> - More information about implementation status and
>   real-world usage plans has become available.
>
> - An interoperability event has been held. Marcelo
>   is planning one for the fall.
>
> - A charter discussion is held on the list to
>   determine which of many possible items are
>   actually the most interesting ones.
>
> With these items completed, we expect the meeting
> in Vancouver to conclude that a WG should be
> created, and move on to progress work. We
> expect people to work on the above items
> starting from now.
>
> Jari
>


_______________________________________________
CGA-EXT mailing list
CGA-EXT@ietf.org
https://www1.ietf.org/mailman/listinfo/cga-ext