[ipv6hackers] IPv6 security presentation at Hack.lu 2011
Jean-Michel Combes
jeanmichel.combes at gmail.com
Thu Sep 22 20:31:50 CEST 2011
Hi Arturo,
2011/9/22 Arturo Servin <aservin at lacnic.net>:
> Jean,
>
> On 21 Sep 2011, at 19:36, Jean-Michel Combes wrote:
>
>> Hi Fernando,
>>
>> At first thanks for the slides! Great job summarizing the state of the
>> art about IPv6 security!
>>
>> Now, I have comments:
>> - Address resolution
>> "SEND is very difficult to deploy (it requires a PKI)"
>> AFAIK, you don't need a PKI. CGA is enough to secure NS/NA exchanges.
>> Now, the main issue, IMHO, is hard-coded crypto algorithms: SHA-1,
>> that should be replaced by the future SHA-3, and RSA, which is not
>> very well adapted to constrained devices like sensors.
>> - Auto-configuration
>> "SEND is very difficult to deploy (it requires a PKI)"
>> s/PKI/RPKI (cf. draft-ietf-csi-send-cert)
>> And again, AFAIK, RIRs are currently working to deploy RPKI (e.g.,
>> http://www.rpki.net for ARIN) and openssl already allows to generate
>> the needed certificates. Now I agree there is still work to deploy
>> this technology in product networks.
>
> I think your are mixing concepts. RPKI does have to do anything with SEND.
Please, read the draft and you should see the relationship with SIDR
WG works and so RPKI.
>
> Regarding SEND AFAIK, you need a certificate in each device requesting network information to validate the source. For that requirement only, SEND is not easy to deploy.
>
>
>> - IPsec Support
>> "The IETF has acknowledged this fact, and is currently changing IPsec
>> support in IPv6 to “optional”"
>> Sorry, but IPsec support is still a "SHOULD" (v.s. "MAY" meaning
>> optional)
>
> MAY is optional, SHOULD recommended and MUST is mandatory. (RFC2119)
Agree :)
>
> RFC4294 has IPSec (rfc4301) as MUST. But that's going to change soon:
>
> http://tools.ietf.org/html/draft-ietf-6man-node-req-bis-11
>
> "Previously, IPv6 mandated implementation of IPsec and recommended the
> key management approach of IKE. This document updates that
> recommendation by making support of the IP Security Architecture [RFC
> 4301] a SHOULD for all IPv6 nodes. "
>
> So, it is as Fernando say. It is MUST but it's going to be SHOULD.
Please, read again what I said in my previous email :)
Best regards.
JMC.
>
>> and so IPsec is not optional unless specific constraints
>> (like sensors).
>> Now, as raised many times, the main issue with IPsec is Key Management
>> (e.g., pre-shared key, certs, EAP).
>
>>
>> Best regards.
>>
>> JMC.
>
>
> Regards,
> /as
>
> _______________________________________________
> Ipv6hackers mailing list
> Ipv6hackers at lists.si6networks.com
> http://lists.si6networks.com/listinfo/ipv6hackers
>
More information about the Ipv6hackers
mailing list