At the suggestion of one of the RRG Chairs, kindly let me reiterate
the explanations on this topic, with specific reference to the slides
presented at RRG in Stockholm today.

Looking specifically at Slide 22:

1) Off-path Attacks
Ordinary IPv6 without IPsec has broad vulnerability to on-path attacks,
   as noted in Slide 22, round bullet 2, triangle sub-bullet 2, first
   dash sub-sub-bullet.

   This means that to provide equivalent security ILNP without IPsec
   only needs to protect against off-path attacks.

   ILNP includes a Nonce to protect traffic from off-path attacks,
as described in Slide 22, 2nd round bullet (and its subsidiary items).

   This means that ILNP without IPsec has the same security properties
as IPv6 without IPsec. This is also described in draft-rja-ilnp- nonce-*
   and in the other draft-rja-ilnp-* drafts -- in more detail than fits
   on 1 slide in a ~30 minute overview talk.  This is also described
   in the 2nd circular bullet on Slide 22.

2) On-path Attacks
   For ordinary IPv6, the only solution to on-path attacks is to use
   IPsec (most obviously AH, but some forms of ESP could also suffice).

   For ILNP, the existing solution of IPsec continues to work fine, and
   actually works *better* because IPsec for ILNP works even if Locator
   Translation ("NAT") is deployed along the path -- without requiring
   any special UDP encapsulation for "IPsec NAT Traversal".  This is
   described in the first round bullet of Slide 22 (and its subsidiary
   items on that same slide).

Yours,

Ran

_______________________________________________
rrg mailing list
[email protected]
http://www.irtf.org/mailman/listinfo/rrg

Reply via email to