RE: On SEND deployment (Re: Conclusion: 6MAN Adoption call on draft-rafiee-6man-ssas-07)

"Hosnieh Rafiee" <ietf@rozanak.com> Fri, 17 January 2014 05:52 UTC

Return-Path: <ietf@rozanak.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CA7BC1ADF78 for <ipv6@ietfa.amsl.com>; Thu, 16 Jan 2014 21:52:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.438
X-Spam-Level:
X-Spam-Status: No, score=-2.438 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.538] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vIvaZvPW9HXq for <ipv6@ietfa.amsl.com>; Thu, 16 Jan 2014 21:52:49 -0800 (PST)
Received: from mail.rozanak.com (mail.rozanak.com [IPv6:2a01:238:42ad:1500:aa19:4238:e48f:61cf]) by ietfa.amsl.com (Postfix) with ESMTP id E91FE1ADF72 for <ipv6@ietf.org>; Thu, 16 Jan 2014 21:52:48 -0800 (PST)
Received: from localhost (unknown [127.0.0.1]) by mail.rozanak.com (Postfix) with ESMTP id 374E123E24BF; Fri, 17 Jan 2014 05:52:35 +0000 (UTC)
X-Virus-Scanned: amavisd-new at rozanak.com
Received: from mail.rozanak.com ([127.0.0.1]) by localhost (mail.iknowlaws.de [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id G116k1GSLJOa; Fri, 17 Jan 2014 06:52:34 +0100 (CET)
Received: from kopoli (g225113217.adsl.alicedsl.de [92.225.113.217]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by mail.rozanak.com (Postfix) with ESMTPSA id 1F1BC23E24BC; Fri, 17 Jan 2014 06:52:34 +0100 (CET)
From: Hosnieh Rafiee <ietf@rozanak.com>
To: 'Fernando Gont' <fernando@gont.com.ar>, 'Ole Troan' <otroan@employees.org>, '6man WG' <ipv6@ietf.org>
References: <34A47FEE-22AF-4980-8A9A-4D0202CE1591@employees.org> <52D88115.5050506@gont.com.ar>
In-Reply-To: <52D88115.5050506@gont.com.ar>
Subject: RE: On SEND deployment (Re: Conclusion: 6MAN Adoption call on draft-rafiee-6man-ssas-07)
Date: Fri, 17 Jan 2014 06:52:31 +0100
Message-ID: <001201cf1348$50032470$f0096d50$@rozanak.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQJmpLcF3y5zH+S21udjEgCPzUyOIQIAB5nYmUlFLxA=
Content-Language: en-us
Cc: '6man Chairs' <6man-chairs@tools.ietf.org>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 17 Jan 2014 05:52:51 -0000

Fernando,


> On 01/15/2014 05:03 AM, Ole Troan wrote:
> > We do not believe the working group understands why SEND is not
> > deployed.
> 
> My two cents:
> 
> * Use of trust anchors makes deployment painful for the general case.

This is why I proposed a local centralized RPKI in the second draft.

> * Most popular OSes do not have a real SEND implementation (not long ago
> the only way to play on BSDs was a Java implementation?). When it comes to
> open source ones, the fact that SEND is IPR'ed doesn't help the situation.

The reason is because of CGA


> * While other parts of the "system" are largely unsecured, SeND probably
> does not much. (e.g, if a local attacker can spoof a DNS response,
securing the
> layer-2/3 mapping will not buy much in most cases -- i.e., just spoof the
DNS
> response, and you're done).

I considered DNS spoofing to address that problem by proposing CGA-TSIG (it
use both SSAS/CGA as its solution) and it is implemented.

> * SEND wasn't there for v4. And there's a tendency to try to employ
> IPv6 as IPv4, focusing on the benefit of the larger address space (i.e.,
for
> some, "I lived with this in v4 for 20+ years, so..."). Not that I
necessarily
> endorse this view, but just meant to spell it out.

Current available mechanism also have problem and cannot mitigate IP
spoofing. This is the main reason I wrote that local security draft to
address these problems.

Hosnieh

----------