Re: [Mipshop] Review of draft-arkko-mipshop-cga-cba-04
Christian Vogt <chvogt@tm.uka.de> Tue, 08 August 2006 16:45 UTC
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1GAUiI-0001wd-LG; Tue, 08 Aug 2006 12:45:54 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1GAUiH-0001wY-Sj for mipshop@ietf.org; Tue, 08 Aug 2006 12:45:53 -0400
Received: from iramx1.ira.uni-karlsruhe.de ([141.3.10.80]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1GAUiF-0002V5-Af for mipshop@ietf.org; Tue, 08 Aug 2006 12:45:53 -0400
Received: from i72ms2.tm.uni-karlsruhe.de ([141.3.70.17] helo=smtp.ipv6.tm.uni-karlsruhe.de) by iramx1.ira.uni-karlsruhe.de with esmtps id 1GAUi8-0006kU-0i; Tue, 08 Aug 2006 18:45:50 +0200
Received: from [IPv6:2001:638:204:6:20c:6eff:fe40:8d95] (archimedes.ipv6.tm.uni-karlsruhe.de [IPv6:2001:638:204:6:20c:6eff:fe40:8d95]) by smtp.ipv6.tm.uni-karlsruhe.de (Postfix) with ESMTP id BC748BF41; Tue, 8 Aug 2006 18:45:43 +0200 (CEST)
Message-ID: <44D8BFB7.1040106@tm.uka.de>
Date: Tue, 08 Aug 2006 18:45:43 +0200
From: Christian Vogt <chvogt@tm.uka.de>
User-Agent: Mozilla/5.0 (X11; U; Linux i686; de; rv:1.8.0.5) Gecko/20060725 SUSE/1.5.0.5-0.1 Thunderbird/1.5.0.5 Mnenhy/0.7.4.0
MIME-Version: 1.0
To: Lakshminath Dondeti <ldondeti@qualcomm.com>
Subject: Re: [Mipshop] Review of draft-arkko-mipshop-cga-cba-04
References: <7.0.1.0.2.20060807150109.06a92e98@qualcomm.com>
In-Reply-To: <7.0.1.0.2.20060807150109.06a92e98@qualcomm.com>
X-Enigmail-Version: 0.94.0.0
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit
X-Spam-Score: -4.5 (----)
X-Spam-Status: No
X-Spam-Report: -1.8 ALL_TRUSTED Passed through trusted hosts only via SMTP -2.6 BAYES_00 BODY: Bayesian spam probability is 0 to 1% [score: 0.0000] -0.1 AWL AWL: From: address is in the auto white-list
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 2beba50d0fcdeee5f091c59f204d4365
Cc: Wassim Haddad <whaddad@tcs.hut.fi>, mipshop@ietf.org, Jari Arkko <jari.arkko@ericsson.com>
X-BeenThere: mipshop@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: mipshop.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/mipshop>, <mailto:mipshop-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:mipshop@ietf.org>
List-Help: <mailto:mipshop-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/mipshop>, <mailto:mipshop-request@ietf.org?subject=subscribe>
Errors-To: mipshop-bounces@ietf.org
Hi Lakshminath, thanks for reviewing draft-arkko-mipshop-cga-cba-04. My comments in-line. > I think the draft needs a revision and some major surgery. Whether > that happens before it becomes a WG item or after really doesn't > matter to me. Let's resolve whatever is necessary before the draft becomes WG item. ;-) > So, I had a tough time trying to follow what's being proposed, but > when I got to the security considerations section, things were > clearer; that section seems to capture the problem space very > clearly. I think the draft needs to be revised using that as the > guideline. Ah, that's interesting. So I guess we'll elaborate on the introductory section(s) of the draft to clarify what the protocol is up to. > Specifically, I find that the proposed solution is too > dependent on the 3775's solution for RO. I think the consideration > should be on the problem itself and a solution based on CGAs. Any > problems that are native to IPv6 itself need not be addressed in this > draft. To that end, I am proposing that the draft be split into two > parts and considered separately. I'm not sure if the description of the protocol operation can be split that easily--- not because the HoA and CoA test optimizations would not be orthogonal, but because the description is more compact and easier to read if the description follows the steps of the correspondent registration. I fully agree, however, that the security considerations should be split into two parts. And, referring to your first comment, the revised introduction should probably attend to the HoA and CoA test optimizations individually. > Let me pose that as a question actually. Are flooding attacks (from > the last paragraph of the sec considerations section) specific to > MIP6 or IPv6? If there is nothing MIP6 specific there, that problem > and the solution should be moved out of this draft. Redirection-based flooding attacks are specific to MIPv6. Actually, they are specific to multi-addressing in general, be it mobility or multi-homing. Other types of flooding, such as TCP-SYN attacks, Smurf attacks, or DDoS attacks are not MIPv6-specific. DDoS attacks could be combined with redirection-based flooding, however. See my response to Vidya's review. > To address redirection attacks, does a CN need to verify reachability > of a HoA or whether the HoA is valid or not? Perhaps the latter is > sufficient? Reachability verification is required to prevent so-called "return-to-home flooding attacks". See section 3.2.2 of RFC 4225 (MIPv6 Security Background). > Next, if the goal in generating a symmetric key is to amortize the > cost of a public-key operation, it should be specified as such. The > concept of keygen is confusing in this draft and that seems to be due > to the re-use of the terminology from 3775. I think it is best to > avoid that confusion here. Allright. Will clarify that. > I realize those are high-level comments, but feel free to start a > discussion on any of those if anything is unclear. Ok, thanks anyway. - Christian -- Christian Vogt, Institute of Telematics, Universitaet Karlsruhe (TH) www.tm.uka.de/~chvogt/pubkey/ "Everything should be made as simple as possible, but not simpler." (Albert Einstein) Lakshminath Dondeti wrote: > This is in response to the call on whether to adopt > draft-arkko-mipshop-cga-cba-04 as a MIPSHOP WG item. Given that the > charter already says "MIPv6 Return Routability via both > Cryptographically Generated Addresses and Credit-based Authorization > for advancement as Proposed Standard > > * Documents: draft-ietf-mipshop-cga-cba-XX.txt" > > I am not really sure whether there is anything to say about adopting > the I-D as a working group item. > > I think the draft needs a revision and some major surgery. Whether > that happens before it becomes a WG item or after really doesn't > matter to me. > > So, I had a tough time trying to follow what's being proposed, but > when I got to the security considerations section, things were > clearer; that section seems to capture the problem space very > clearly. I think the draft needs to be revised using that as the > guideline. Specifically, I find that the proposed solution is too > dependent on the 3775's solution for RO. I think the consideration > should be on the problem itself and a solution based on CGAs. Any > problems that are native to IPv6 itself need not be addressed in this > draft. To that end, I am proposing that the draft be split into two > parts and considered separately. > > Let me pose that as a question actually. Are flooding attacks (from > the last paragraph of the sec considerations section) specific to > MIP6 or IPv6? If there is nothing MIP6 specific there, that problem > and the solution should be moved out of this draft. > > To address redirection attacks, does a CN need to verify reachability > of a HoA or whether the HoA is valid or not? Perhaps the latter is > sufficient? > > Next, if the goal in generating a symmetric key is to amortize the > cost of a public-key operation, it should be specified as such. The > concept of keygen is confusing in this draft and that seems to be > due to the re-use of the terminology from 3775. I think it is best > to avoid that confusion here. > > I realize those are high-level comments, but feel free to start a > discussion on any of those if anything is unclear. > > regards, Lakshminath _______________________________________________ Mipshop mailing list Mipshop@ietf.org https://www1.ietf.org/mailman/listinfo/mipshop
- [Mipshop] Review of draft-arkko-mipshop-cga-cba-04 Narayanan, Vidya
- Re: [Mipshop] Review of draft-arkko-mipshop-cga-c… Wassim Haddad
- RE: [Mipshop] Review of draft-arkko-mipshop-cga-c… Narayanan, Vidya
- [Mipshop] Review of draft-arkko-mipshop-cga-cba-04 Lakshminath Dondeti
- RE: [Mipshop] Review of draft-arkko-mipshop-cga-c… Narayanan, Vidya
- Re: [Mipshop] Review of draft-arkko-mipshop-cga-c… Christian Vogt
- Re: [Mipshop] Review of draft-arkko-mipshop-cga-c… Christian Vogt
- Flooding Attacks and MIP6 (was RE: [Mipshop] Revi… Narayanan, Vidya
- CGA-based HoA generation for MIP6 (was RE: [Mipsh… Narayanan, Vidya
- Re: Flooding Attacks and MIP6 (was RE: [Mipshop] … Jari Arkko
- RE: CGA-based HoA generation for MIP6 (was RE: [M… Narayanan, Vidya
- RE: Flooding Attacks and MIP6 (was RE: [Mipshop] … Narayanan, Vidya
- Re: CGA-based HoA generation for MIP6 (was RE: [M… Jari Arkko
- Re: Flooding Attacks and MIP6 (was RE: [Mipshop] … Vijay Devarapalli
- RE: Flooding Attacks and MIP6 (was RE: [Mipshop] … Narayanan, Vidya
- Re: Flooding Attacks and MIP6 (was RE: [Mipshop] … Christian Vogt
- Re: Flooding Attacks and MIP6 (was RE: [Mipshop] … Christian Vogt
- Re: CGA-based HoA generation for MIP6 (was RE: [M… Christian Vogt
- Re: CGA-based HoA generation for MIP6 (was RE: [M… Jari Arkko
- Re: CGA-based HoA generation for MIP6 (was RE: [M… Lakshminath Dondeti
- RE: CGA-based HoA generation for MIP6 (was RE: [M… Narayanan, Vidya
- RE: CGA-based HoA generation for MIP6 (was RE: [M… Wassim Haddad
- Re: CGA-based HoA generation for MIP6 (was RE: [M… Christian Vogt
- Re: CGA-based HoA generation for MIP6 (was RE: [M… Lakshminath Dondeti
- Re: Flooding Attacks and MIP6 (was RE: [Mipshop] … Jari Arkko
- Re: CGA-based HoA generation for MIP6 (was RE: [M… Christian Vogt
- Re: CGA-based HoA generation for MIP6 (was RE: [M… Christian Vogt
- Re: CGA-based HoA generation for MIP6 (was RE: [M… Vijay Devarapalli
- RE: Flooding Attacks and MIP6 (was RE: [Mipshop] … Narayanan, Vidya
- RE: Flooding Attacks and MIP6 (was RE: [Mipshop] … Christian Vogt
- RE: Flooding Attacks and MIP6 (was RE: [Mipshop] … Narayanan, Vidya