Hello,

Just a few observations after reviewing this:

1) RFC3972 ("CGA") specifies that the modifier should be 64 bits and the 
collision count eight bits, yet I notice in Figure 2 it specifies a 16 bit 
modifier and a 1 bit collision count. Can you explain why you chose to 
implement this differently?
2) In your implementation of the protocol you call for DAD but it does not 
mention (or maybe I just can't find) what do re: collision count if a duplicate 
address is detected. Further, in 3.2.1.2 I don't see a step to verify this 
number as per CGA. I'm assuming you're to follow the specs from CGA but you may 
want to be specific regarding this.
3) In 3.1 step 5 you may want to be clear that bits seven and eight should be 
set to zero.
4) In 3.2.1.2, step 2, Check Time Signed, your window seems very short given 
typical retransmission timeouts and the like. 
5) 3.2.1.2 step 5, Verify the signature, I don't see exact method you want used 
in this protocol to accomplish this. 

Just an overall note, and this likely has more to do with me that you, I'm a 
bit confused as to how this would functionally integrate on a host using a CGA. 
Would you actually be running these algorithms again just for the purpose of 
sending a DNS update or would you be layering on top of the existing IP stack 
and using the existing CGA functionality?

Thanks,

Joshua Shire
Information Systems Manager
Hyduke Energy Services Inc.
ph: 780-955-0401
fax: 780-955-0368
mx: [email protected]

-----Original Message-----
From: [email protected] [mailto:[email protected]] On Behalf Of 
Rafiee, Hosnieh
Sent: Tuesday, October 23, 2012 9:07 AM
To: [email protected]
Cc: [email protected]
Subject: [Int-area] Last Call before IETF meeting: 
draft-rafiee-intarea-cga-tsig-00.txt

Hello,

This is our "last call" request for comments concerning our draft, RFC 
"CGA-TSIG". If you feel so inclined, please feel free to comment on it. Any and 
all comments are greatly appreciated.
Thank you,



----------------------------------

A new version of I-D, draft-rafiee-intarea-cga-tsig-00.txt
has been successfully submitted by Hosnieh Rafiee and posted to the IETF 
repository.

Filename:        draft-rafiee-intarea-cga-tsig
Revision:        00
Title:           Transaction SIGnature (TSIG) using CGA Algorithm in IPv6
Creation date:   2012-10-15
WG ID:           Individual Submission
Number of pages: 13
URL:             
http://www.ietf.org/internet-drafts/draft-rafiee-intarea-cga-tsig-00.txt
Status:          http://datatracker.ietf.org/doc/draft-rafiee-intarea-cga-tsig
Htmlized:        http://tools.ietf.org/html/draft-rafiee-intarea-cga-tsig-00


Abstract:
   The first step of Transaction SIGnature (TSIG) (RFC 2845) is to
   generate a shared secret and exchange it manually between a DNS
   server and a host. This document, CGA-TSIG, proposes a possible way
   to automate the now manual process for the authentication of a node
   with a DNS server during the DNS Update process by using the same
   parameters as are used in generating a secure address in IPv6
   networks, i.e., Cryptographically Generated Addresses (CGA) (RFC
   3972). CGA-TSIG facilitates this authentication process and reduces
   the time needed for DNS Updates. The current signature generation
   process and verification mechanism in TSIG are thus replaced with
   CGA. This algorithm is added, as an extension, to TSIG to eliminate
   the human intervention needed for generation and exchange of keys
   between a DNS server and a host when SEcure Neighbor Discovery (SEND)
   (RFC 3971) is used.

                                                                                
  


The IETF Secretariat

_______________________________________________
Int-area mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/int-area
_______________________________________________
Int-area mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/int-area

Reply via email to