[sidr] FW: I-D Action: draft-rafiee-6man-ssas-05.txt
"Murphy, Sandra" <Sandra.Murphy@sparta.com> Tue, 16 July 2013 15:28 UTC
Return-Path: <Sandra.Murphy@sparta.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 125A321F88FB for <sidr@ietfa.amsl.com>; Tue, 16 Jul 2013 08:28:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level:
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fT8SkZ41+38O for <sidr@ietfa.amsl.com>; Tue, 16 Jul 2013 08:28:24 -0700 (PDT)
Received: from M4.sparta.com (M4.sparta.com [157.185.61.2]) by ietfa.amsl.com (Postfix) with ESMTP id 5240021F997B for <sidr@ietf.org>; Tue, 16 Jul 2013 08:28:24 -0700 (PDT)
Received: from Beta5.sparta.com ([10.62.8.21]) by M4.sparta.com (8.14.4/8.14.4) with ESMTP id r6GFSK5F006926 for <sidr@ietf.org>; Tue, 16 Jul 2013 10:28:20 -0500
Received: from CVA-HUB001.centreville.ads.sparta.com ([10.62.108.11]) by Beta5.sparta.com (8.13.8/8.13.8) with ESMTP id r6GFSIEB002747 for <sidr@ietf.org>; Tue, 16 Jul 2013 10:28:19 -0500
Received: from CVA-MB002.centreville.ads.sparta.com ([fe80::6046:a82a:c500:c9ad]) by CVA-HUB001.centreville.ads.sparta.com ([fe80::8ca8:7aea:3db9:1972%11]) with mapi id 14.02.0342.003; Tue, 16 Jul 2013 11:28:02 -0400
From: "Murphy, Sandra" <Sandra.Murphy@sparta.com>
To: "sidr@ietf.org" <sidr@ietf.org>
Thread-Topic: I-D Action: draft-rafiee-6man-ssas-05.txt
Thread-Index: AQHOgbW5WkbPvjD9Qk2JDh7u1XCYPZlnbNuC
Date: Tue, 16 Jul 2013 15:28:01 +0000
Message-ID: <24B20D14B2CD29478C8D5D6E9CBB29F6749B3C11@CVA-MB002.centreville.ads.sparta.com>
References: <20130715234639.18024.78338.idtracker@ietfa.amsl.com>
In-Reply-To: <20130715234639.18024.78338.idtracker@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.62.8.137]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: [sidr] FW: I-D Action: draft-rafiee-6man-ssas-05.txt
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 16 Jul 2013 15:28:41 -0000
I just noticed this and thought it might be of interest. This draft proposes a new mechanism to generate IPv6 interface identifiers (IID). Please note the reference to the use of the RPKI - described in section 4.3. --Sandy, speaking as regular ol' member ________________________________________ From: i-d-announce-bounces@ietf.org [i-d-announce-bounces@ietf.org] on behalf of internet-drafts@ietf.org [internet-drafts@ietf.org] Sent: Monday, July 15, 2013 7:46 PM To: i-d-announce@ietf.org Subject: I-D Action: draft-rafiee-6man-ssas-05.txt A New Internet-Draft is available from the on-line Internet-Drafts directories. Title : A Simple Secure Addressing Scheme for IPv6 AutoConfiguration (SSAS) Author(s) : Hosnieh Rafiee Christoph Meinel Filename : draft-rafiee-6man-ssas-05.txt Pages : 19 Date : 2013-07-15 Abstract: The default method for IPv6 address generation uses an Organizationally Unique Identifier (OUI) assigned by the IEEE Standards Association and an Extension Identifier assigned to the hardware manufacturer [1] (section 2.5.1 RFC-4291) [RFC4291]. This fact thus means that a node will always have the same Interface ID (IID) whenever it connects to a new network. Because the node's IP address does not change, the node will be vulnerable to privacy related attacks. Currently this problem is addressed by the use of two mechanisms that do not make use of the MAC address, or other unique values that can be used for ID generation, for randomizing the IID; Cryptographically Generated Addresses (CGA) [RFC3972] and Privacy Extension [RFC4941]. The problem with the former approach is the computational cost involved for the IID generation and in the verification process. The problem with the latter approach is that it lacks necessary security mechanisms and provides the node with only partial protection against privacy related attacks. This document proposes the use of a new algorithm for use in the generation of the IID while, at the same time, securing the node against some types of attack, like IP spoofing. These attacks are prevented by the addition of a signature to messages sent over the network and by finding a binding with the nodes' IP address and its public key. The use of theResource Public Key Infrastructure (RPKI), introduced in this document, is based on the centralized version explained in RFC 6494 and RFC 6495. The IETF datatracker status page for this draft is: https://datatracker.ietf.org/doc/draft-rafiee-6man-ssas There's also a htmlized version available at: http://tools.ietf.org/html/draft-rafiee-6man-ssas-05 A diff from the previous version is available at: http://www.ietf.org/rfcdiff?url2=draft-rafiee-6man-ssas-05 Internet-Drafts are also available by anonymous FTP at: ftp://ftp.ietf.org/internet-drafts/ _______________________________________________ I-D-Announce mailing list I-D-Announce@ietf.org https://www.ietf.org/mailman/listinfo/i-d-announce Internet-Draft directories: http://www.ietf.org/shadow.html or ftp://ftp.ietf.org/ietf/1shadow-sites.txt
- [sidr] FW: I-D Action: draft-rafiee-6man-ssas-05.… Murphy, Sandra
- Re: [sidr] FW: I-D Action: draft-rafiee-6man-ssas… Randy Bush