Document Action: 'SEND Hash Threat Analysis' to Informational RFC (draft-ietf-csi-hash-threat-12.txt)
The IESG <iesg-secretary@ietf.org> Fri, 22 April 2011 17:11 UTC
Return-Path: <iesg-secretary@ietf.org>
X-Original-To: ietf-announce@ietfc.amsl.com
Delivered-To: ietf-announce@ietfc.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfc.amsl.com (Postfix) with ESMTP id 65278E07C4; Fri, 22 Apr 2011 10:11:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level:
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([208.66.40.236]) by localhost (ietfc.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8aMylmAX-Mo5; Fri, 22 Apr 2011 10:11:09 -0700 (PDT)
Received: from ietfc.amsl.com (localhost [127.0.0.1]) by ietfc.amsl.com (Postfix) with ESMTP id 66578E07CB; Fri, 22 Apr 2011 10:11:09 -0700 (PDT)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce <ietf-announce@ietf.org>
Subject: Document Action: 'SEND Hash Threat Analysis' to Informational RFC (draft-ietf-csi-hash-threat-12.txt)
X-Test-IDTracker: no
X-IETF-IDTracker: 3.52
Message-ID: <20110422171109.18616.7508.idtracker@ietfc.amsl.com>
Date: Fri, 22 Apr 2011 10:11:09 -0700
Cc: csi chair <csi-chairs@tools.ietf.org>, csi mailing list <cga-ext@ietf.org>, RFC Editor <rfc-editor@rfc-editor.org>
X-BeenThere: ietf-announce@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "IETF announcement list. No discussions." <ietf-announce.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf-announce>, <mailto:ietf-announce-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf-announce>
List-Post: <mailto:ietf-announce@ietf.org>
List-Help: <mailto:ietf-announce-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf-announce>, <mailto:ietf-announce-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 22 Apr 2011 17:11:10 -0000
The IESG has approved the following document: - 'SEND Hash Threat Analysis' (draft-ietf-csi-hash-threat-12.txt) as an Informational RFC This document is the product of the Cga & Send maIntenance Working Group. The IESG contact persons are Ralph Droms and Jari Arkko. A URL of this Internet Draft is: http://datatracker.ietf.org/doc/draft-ietf-csi-hash-threat/ Technical Summary Neighbor Discovery Proxies are used to provide an address presence on a link for nodes that are no longer present on the link. They allow a node to receive packets directed at its address by allowing another device to perform neighbor discovery operations on its behalf. Neighbor Discovery Proxy is used in Mobile IPv6 and related protocols to provide reachability from nodes on the home network when a Mobile Node is not at home, by allowing the Home Agent to act as proxy. It is also used as a mechanism to allow a global prefix to span multiple links, where proxies act as relays for Neighbor discovery messages. Neighbor Discovery Proxy currently cannot be secured using SEND. Today, SEND assumes that a node advertising an address is the address owner and in possession of appropriate public and private keys for that node. This document describes how existing practice for proxy Neighbor Discovery relates to Secured Neighbor Discovery. Working Group Summary Nothing extraordinary that is worth noting. Not a controversial document. The document has been extensively revised based on comments received during IESG review. The document was put through a second WG last call and there is consensus from the WG to resubmit the document for IETF last call and IESG review. Document Quality The document is an informational problem statement. The problem described in one of the main issues the CSI is chartered to work on. There is already a WG document describing a proposed solution to the problem. The document had 5 through reviews, including reviews from Julien Laganier, Sheng Jiang, Tony Cheneau, Jean Michel Combes and no substantive issues were identified. The document has been extensively revised based on comments received during IESG review. Personnel Marcelo Bagnulo is the document shepherd. Ralph Droms is the responsible AD. RFC Editor Note Add citations in section 3,2 to new references: OLD: Researchers demonstrated attacks against PKIX certificates with MD5 signatures in 2005 [NEW-HASHES] and in 2007 [X509-COLL]. NEW: Researchers demonstrated attacks against PKIX certificates with MD5 signatures in 2005 [NEW-HASHES], in 2007 [X509-COLL][STEV2007][SLdeW2007], and in 2009 [SSALMOdeW2009][SLdeW2009].