Document Action: 'SEND Hash Threat Analysis' to Informational RFC (draft-ietf-csi-hash-threat-12.txt)

The IESG <iesg-secretary@ietf.org> Fri, 22 April 2011 17:11 UTC

Return-Path: <iesg-secretary@ietf.org>
X-Original-To: ietf-announce@ietfc.amsl.com
Delivered-To: ietf-announce@ietfc.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfc.amsl.com (Postfix) with ESMTP id 65278E07C4; Fri, 22 Apr 2011 10:11:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level:
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([208.66.40.236]) by localhost (ietfc.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8aMylmAX-Mo5; Fri, 22 Apr 2011 10:11:09 -0700 (PDT)
Received: from ietfc.amsl.com (localhost [127.0.0.1]) by ietfc.amsl.com (Postfix) with ESMTP id 66578E07CB; Fri, 22 Apr 2011 10:11:09 -0700 (PDT)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce <ietf-announce@ietf.org>
Subject: Document Action: 'SEND Hash Threat Analysis' to Informational RFC (draft-ietf-csi-hash-threat-12.txt)
X-Test-IDTracker: no
X-IETF-IDTracker: 3.52
Message-ID: <20110422171109.18616.7508.idtracker@ietfc.amsl.com>
Date: Fri, 22 Apr 2011 10:11:09 -0700
Cc: csi chair <csi-chairs@tools.ietf.org>, csi mailing list <cga-ext@ietf.org>, RFC Editor <rfc-editor@rfc-editor.org>
X-BeenThere: ietf-announce@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "IETF announcement list. No discussions." <ietf-announce.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf-announce>, <mailto:ietf-announce-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf-announce>
List-Post: <mailto:ietf-announce@ietf.org>
List-Help: <mailto:ietf-announce-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf-announce>, <mailto:ietf-announce-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 22 Apr 2011 17:11:10 -0000

The IESG has approved the following document:
- 'SEND Hash Threat Analysis'
  (draft-ietf-csi-hash-threat-12.txt) as an Informational RFC

This document is the product of the Cga & Send maIntenance Working Group.

The IESG contact persons are Ralph Droms and Jari Arkko.

A URL of this Internet Draft is:
http://datatracker.ietf.org/doc/draft-ietf-csi-hash-threat/




Technical Summary

  Neighbor Discovery Proxies are used to provide an address presence on
  a link for nodes that are no longer present on the link.  They allow
  a node to receive packets directed at its address by allowing another
  device to perform neighbor discovery operations on its behalf.

  Neighbor Discovery Proxy is used in Mobile IPv6 and related protocols
  to provide reachability from nodes on the home network when a Mobile
  Node is not at home, by allowing the Home Agent to act as proxy.  It
  is also used as a mechanism to allow a global prefix to span multiple
  links, where proxies act as relays for Neighbor discovery messages.

  Neighbor Discovery Proxy currently cannot be secured using SEND.
  Today, SEND assumes that a node advertising an address is the address
  owner and in possession of appropriate public and private keys for
  that node.  This document describes how existing practice for proxy
  Neighbor Discovery relates to Secured Neighbor Discovery.

Working Group Summary

  Nothing extraordinary that is worth noting. Not a controversial
  document.

  The document has been extensively revised based on comments
  received during IESG review.  The document was put through a
  second WG last call and there is consensus from the WG to resubmit
  the document for IETF last call and IESG review.

Document Quality

  The document is an informational problem statement. The problem
  described in one of the main issues the CSI is chartered to work
  on. There is already a WG document describing a proposed solution to
  the problem.

  The document had 5 through reviews, including reviews from Julien
  Laganier, Sheng Jiang, Tony Cheneau, Jean Michel Combes and no
  substantive issues were identified.

  The document has been extensively revised based on comments
  received during IESG review.

Personnel

   Marcelo Bagnulo is the document shepherd.  Ralph Droms is the
responsible AD.

RFC Editor Note

Add citations in section 3,2 to new references:

OLD:

   Researchers demonstrated attacks against PKIX certificates with MD5
   signatures in 2005 [NEW-HASHES] and in 2007 [X509-COLL].

NEW:

   Researchers demonstrated attacks against PKIX certificates with MD5
   signatures in 2005 [NEW-HASHES], in 2007
   [X509-COLL][STEV2007][SLdeW2007], and in 2009 [SSALMOdeW2009][SLdeW2009].