[dhcwg] more thoughts about draft-ietf-dhc-sedhcpv6-02.txt

Francis Dupont <Francis.Dupont@fdupont.fr> Mon, 23 June 2014 14:19 UTC

Return-Path: <Francis.Dupont@fdupont.fr>
X-Original-To: dhcwg@ietfa.amsl.com
Delivered-To: dhcwg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 87EAF1B2961 for <dhcwg@ietfa.amsl.com>; Mon, 23 Jun 2014 07:19:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.304
X-Spam-Level:
X-Spam-Status: No, score=-0.304 tagged_above=-999 required=5 tests=[BAYES_20=-0.001, HELO_EQ_FR=0.35, RP_MATCHES_RCVD=-0.651, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FyBTSgvV7q5D for <dhcwg@ietfa.amsl.com>; Mon, 23 Jun 2014 07:19:22 -0700 (PDT)
Received: from givry.fdupont.fr (givry.fdupont.fr [IPv6:2001:41d0:1:6d55:211:5bff:fe98:d51e]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E7A9B1B2AF8 for <dhcwg@ietf.org>; Mon, 23 Jun 2014 07:19:21 -0700 (PDT)
Received: from givry.fdupont.fr (localhost [127.0.0.1]) by givry.fdupont.fr (8.14.3/8.14.3) with ESMTP id s5NEJKQe017346 for <dhcwg@ietf.org>; Mon, 23 Jun 2014 16:19:20 +0200 (CEST) (envelope-from dupont@givry.fdupont.fr)
Message-Id: <201406231419.s5NEJKQe017346@givry.fdupont.fr>
From: Francis Dupont <Francis.Dupont@fdupont.fr>
To: dhcwg@ietf.org
Date: Mon, 23 Jun 2014 16:19:20 +0200
Sender: Francis.Dupont@fdupont.fr
Archived-At: http://mailarchive.ietf.org/arch/msg/dhcwg/qoI26kkJ5iPKnql0C7UidVZRHyE
Subject: [dhcwg] more thoughts about draft-ietf-dhc-sedhcpv6-02.txt
X-BeenThere: dhcwg@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: <dhcwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dhcwg/>
List-Post: <mailto:dhcwg@ietf.org>
List-Help: <mailto:dhcwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 23 Jun 2014 14:19:23 -0000

Timestamps are not enough for the anti-replay protection and
are difficult to implement for clients without a good long term
real time clock, so I propose:
 - to introduce a nonce option which will be processed as an extension
  of the transaction ID (so there are already 3 octets)
 - to put the timestamp in its own option (so it can be omitted)
 - to document a way for an unsynchronized node to get a good time value,
  for instance sending an Information-Request or a Solicit without
  rapid-commit asking for a timestamp option in the ORO
I propose to require the timestamp option in all messages changing the
state (e.g., request, renew, etc) and everything from agents.
I don't propose to make nonces mandatory but there is no good reason
to not use them as soon as they are supported.
A still open problem is what to do with clock mismatch between agents
but this has in fact only an impact on optimization (multicast to
more than one agent) so IMHO we can live with it.

The second point is about (X.509 public key) certificates. They are useless
without the trust anchor, the whole chain, CRLs, etc. And if we want
to use self-signed certificates they bring nothing compared to raw
public keys. And I don't talk about profiles (even SeND had to be
completed by RFC 6494). So I really suggest to drop the certificate
option and to use the key option to identify the public key.

The last point is compatibility with SeND (RFC 3971). Today in red and
black (:-) environments it is possible to secure the Neighbor Discovery
but not DHCP. I propose to fix this using the secure DHCPv6 for
the protection of DHCP and the SeND section 6 Authorization Delegation
Discovery for the "certificate part".

Regards

Francis.Dupont@fdupont.fr