RE: On SEND deployment (Re: Conclusion: 6MAN Adoption call on draft-rafiee-6man-ssas-07)
"Hosnieh Rafiee" <ietf@rozanak.com> Fri, 17 January 2014 05:52 UTC
Return-Path: <ietf@rozanak.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CA7BC1ADF78 for <ipv6@ietfa.amsl.com>; Thu, 16 Jan 2014 21:52:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.438
X-Spam-Level:
X-Spam-Status: No, score=-2.438 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.538] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vIvaZvPW9HXq for <ipv6@ietfa.amsl.com>; Thu, 16 Jan 2014 21:52:49 -0800 (PST)
Received: from mail.rozanak.com (mail.rozanak.com [IPv6:2a01:238:42ad:1500:aa19:4238:e48f:61cf]) by ietfa.amsl.com (Postfix) with ESMTP id E91FE1ADF72 for <ipv6@ietf.org>; Thu, 16 Jan 2014 21:52:48 -0800 (PST)
Received: from localhost (unknown [127.0.0.1]) by mail.rozanak.com (Postfix) with ESMTP id 374E123E24BF; Fri, 17 Jan 2014 05:52:35 +0000 (UTC)
X-Virus-Scanned: amavisd-new at rozanak.com
Received: from mail.rozanak.com ([127.0.0.1]) by localhost (mail.iknowlaws.de [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id G116k1GSLJOa; Fri, 17 Jan 2014 06:52:34 +0100 (CET)
Received: from kopoli (g225113217.adsl.alicedsl.de [92.225.113.217]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by mail.rozanak.com (Postfix) with ESMTPSA id 1F1BC23E24BC; Fri, 17 Jan 2014 06:52:34 +0100 (CET)
From: Hosnieh Rafiee <ietf@rozanak.com>
To: 'Fernando Gont' <fernando@gont.com.ar>, 'Ole Troan' <otroan@employees.org>, '6man WG' <ipv6@ietf.org>
References: <34A47FEE-22AF-4980-8A9A-4D0202CE1591@employees.org> <52D88115.5050506@gont.com.ar>
In-Reply-To: <52D88115.5050506@gont.com.ar>
Subject: RE: On SEND deployment (Re: Conclusion: 6MAN Adoption call on draft-rafiee-6man-ssas-07)
Date: Fri, 17 Jan 2014 06:52:31 +0100
Message-ID: <001201cf1348$50032470$f0096d50$@rozanak.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQJmpLcF3y5zH+S21udjEgCPzUyOIQIAB5nYmUlFLxA=
Content-Language: en-us
Cc: '6man Chairs' <6man-chairs@tools.ietf.org>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 17 Jan 2014 05:52:51 -0000
Fernando, > On 01/15/2014 05:03 AM, Ole Troan wrote: > > We do not believe the working group understands why SEND is not > > deployed. > > My two cents: > > * Use of trust anchors makes deployment painful for the general case. This is why I proposed a local centralized RPKI in the second draft. > * Most popular OSes do not have a real SEND implementation (not long ago > the only way to play on BSDs was a Java implementation?). When it comes to > open source ones, the fact that SEND is IPR'ed doesn't help the situation. The reason is because of CGA > * While other parts of the "system" are largely unsecured, SeND probably > does not much. (e.g, if a local attacker can spoof a DNS response, securing the > layer-2/3 mapping will not buy much in most cases -- i.e., just spoof the DNS > response, and you're done). I considered DNS spoofing to address that problem by proposing CGA-TSIG (it use both SSAS/CGA as its solution) and it is implemented. > * SEND wasn't there for v4. And there's a tendency to try to employ > IPv6 as IPv4, focusing on the benefit of the larger address space (i.e., for > some, "I lived with this in v4 for 20+ years, so..."). Not that I necessarily > endorse this view, but just meant to spell it out. Current available mechanism also have problem and cannot mitigate IP spoofing. This is the main reason I wrote that local security draft to address these problems. Hosnieh ----------
- Conclusion: 6MAN Adoption call on draft-rafiee-6m… Ole Troan
- Re: Conclusion: 6MAN Adoption call on draft-rafie… Alexandru Petrescu
- RE: Conclusion: 6MAN Adoption call on draft-rafie… Hosnieh Rafiee
- On SEND deployment (Re: Conclusion: 6MAN Adoption… Fernando Gont
- RE: On SEND deployment (Re: Conclusion: 6MAN Adop… Hosnieh Rafiee
- Re: On SEND deployment (Re: Conclusion: 6MAN Adop… Fernando Gont