On Jun 5, 2007, at 3:53 AM, marcelo bagnulo braun wrote:

do you think there are some features that SeND should support to deal with this type of cases independently of the actual SAVA solution adopted or do you think that the the changes required to SeND heavily depend on the actual final SAVA solution? I mean, if it is the first case, it would be interesting to work on this at this stage, but if it is the second option probably we should wait till the SAVA solution is more defined?

The solution Tsinghua has prototyped is a form of CGA, AFAIK does not use SeND, and is focused not on system identity but on user identity. I have a number of thoughts that I have expressed to them and won't burden this forum with.

The proposal that I have run past them (and will one day get around to posting as an I-D - it's written now and is in review) focuses not on identifying users, but on verifying that the system that originated a datagram using a given source address can be expected to receive the datagram sent in reply. It applies to both IPv4 and IPv6 technology, and mostly uses existing technologies, including both uRPF and approaches suited to the local LAN. On the local LAN, it depends on the association of the source address with something else - an L2 address or physical port. One weakness of current technology is that it also depends on having the address assigned to the system by some outside entity, while most IPv6 systems use SAA, potentially with some form of privacy addressing. Another is that this assignment must be visible in some sense to each party that needs to verify the address pairing, which in a campus wireless LAN has obvious negative implications. I would far rather enable the use of SAA and privacy addressing and still be able to associate an L2 address with the set of L3 addresses a system uses, and do so in a manner that scales to a campus LAN with thousands of systems on it.

In theory, it seems to me that SeND should be usable for the purpose. ND has many of the same lack-of-security issues that ARP does, and also has a chicken/egg problem; in the following sketch, if H1 opens a connection to H2 using a privacy address calculated on the LAN, R1 does not necessarily learn of the association of H1's MAC and IPv6 addresses until it sees the reply from H2 and sends a Solicitation. But if it is refusing to forward datagrams for which that association is not known and therefore not verifiable, it will not send the datagram H1->H2 to open the session.

      +--+ |                 | +--+
      |H1+-+                 +-+H2|
      +--+ |                 | +--+
           | +--+       +--+ |
           +-+R1+-------+R2+-+
           | +--+       +--+ |

oops.

Hence, I would like to use SeND to exchange RFC 3401 addresses, and have H1 do so with any system that it wants to talk with/through on its local LAN for any address relevant to the association prior to other L3 exchanges. Host-to-host within the LAN, I would expect that to be limited to link-local addresses as it is now (one could also send everything through the router, but that solution doesn't help LANs that have no router, and has limitations on very busy LANs). With any system originating SeND-authenticated Router Advertisements, I would expect that it would do so for any address it wants to use off-LAN.

If I'm off in the weeds, I'm willing to be told as much. In the case, though, I'm very concerned.


_______________________________________________
Int-area mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/int-area

Reply via email to