Dear Joshua,
Thank you so much for your comments. Please find the answer below.

>1) RFC3972 ("CGA") specifies that the modifier should be 64 bits and the 
>collision count eight bits, yet I notice in Figure 2 it specifies a 16 bit 
>modifier and a 1 bit collision count. Can you explain why you chose to 
>implement this differently?
- No, that was a typo. It will be corrected in the updated version that I will 
submit this weekend


2) In your implementation of the protocol you call for DAD but it does not 
mention (or maybe I just can't find) what do re: collision count if a duplicate 
address is detected. Further, in 3.2.1.2 I don't see a step to verify this 
number as per CGA. I'm assuming you're to follow the specs from CGA but you may 
want to be specific regarding this.

- After I implemented this draft RFC, I noticed that the values must be cached 
and the DNS server should not be involved in generating CGA values or be 
involved in addressing. So, this section is for the SEND implementation 
installed on a DNS server or a client. In my new draft this section will also 
be updated.

3) In 3.1 step 5 you may want to be clear that bits seven and eight should be 
set to zero.

-I will correct it and included in my update version.

4) In 3.2.1.2, step 2, Check Time Signed, your window seems very short given 
typical retransmission timeouts and the like. 

- I will examine my implemenation on a larger scale to see what the delay will 
be and will update the document accordingly.

5) 3.2.1.2 step 5, Verify the signature, I don't see exact method you want used 
in this protocol to accomplish this.

- Please clarify this question. As you probably know, the signature 
verification function uses a minimum of 2 values; the plaintext and the 
signature itself.  The default algorithm here is RSA. This is what I meant when 
I said signature verification. The DNS server retreives all the plaintext 
contents (CGA parameters, time signed, DNS update) of the signature and also 
the signature itself and then verfies this signature using the RSA algorithm. 
The result is a boolean value. 
 
Joshua >Would you actually be running these algorithms again just for the 
purpose of sending a DNS update or 
- No, just data cached in the server. The current SEND implementation would 
cache this data when the server or a client wants to generate a new IP address 
using SEND. CGA-TSIG is an application layer protocol. 
Joshua >would you be layering on top of the existing IP stack and using the 
existing CGA functionality?
Yes

Best,
Hosnieh
_______________________________________________
Int-area mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/int-area

Reply via email to