On 05/29/10 06:07 AM, Zach Shelby wrote:
Hi Robert,

Thanks for the comments, below you'll find merged comments from the authors. On 
the nit and grammar related comments I will check those though while doing 
editing on nd-10 so don't be bothered that I skip them below. We have started 
creating tickets on changes in progress for nd-10.

On May 14, 2010, at 6:26 PM, Robert Cragie wrote:

page 7:

"EUI-64s are globally unique" - What about the case of spoofed/cloned EUI-64s? 
What would be the effect using this ND? Would it be significant? My guess is probably not 
but it might be worth making this clear

We decided it might take a whole bunch of text to discuss all the issues that 
might happen with duplicate EUI-64s. For this spec we simply assume that 
EUI-64s are unique thus we don't try to detect duplicates.

Just to clarifiy, this stance isn't just because we are lazy.

I believe that detecting cloned/spoofed hosts in a 6lowpan environment is impossible. We assume that the clone is identical to the original host. Thus not only is the EUI-64 identical, but any other factory or configuration information is assumed to be identical.

Suppose a simple topology with a single 6LBR, and the original and cloned hosts attach to this 6LBR. 1. How can the 6LBR tell the difference between a packet from the original and the clone? It can't, because they look the same and they arrive on the same interface on the 6LBR. For instance, if it receives a packet from the original with a high signal strength, and a millisecond later receives a low strength packet from the clone, that wouldn't indicate they there are two different hosts since the change in signal strength could happen with a single host and changing radio conditions.

2. Can the 6LBR do some challenge-response against the host(s) to see whether there is one host or two? That doesn't seem possible since the 6LBR can choose to target a transmission to only one of them (they are both within radio range and use the same MAC address). Thus any challenge would be heard by both of the hosts, and in many cases the clone might hear the response from the original host (and vice versa).

Note that there other types of networks can detect duplicates.
For example, if a cell phone is in Chicago and San Francisco at the same time one can assume that one of them is a clone. Or if the same source MAC address appears on different wired Ethernet switch ports at the same time, then it is probably a duplicate (or could be a single host which has two NICs, or that disconnected and the reconnected to the switch). In this case, the Ethernet switch can target some form of challenge by selectively sending out each of the ports, to be able to tell whether it is a move, a dual-attached single host, or a case of two hosts. If the link-layer creates some form of session keys as part of some association protocol, then I suspect one can also tell the there is a clone. But I don't know if anybody has studied the security of such approach.
In any case, we assume none of those capabilities for 6lowpans.


   Erik
_______________________________________________
6lowpan mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/6lowpan

Reply via email to