[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Comments on draft-bagnulo-multi6dt-hba-00.txt
I had a few comments/questions on this draft. Sorry if some of them have already been
asked (i did not look closely at the archives).
1) In section 1,
In addition, it should also be noted that it
is not required that all interface identifiers of the addresses of an
HBA set are equal, preserving some degree of privacy through changes
in the addresses used during the communications.
To create all addresses (for various prefixes) with same interface identifiers, what is the
change that would be needed ? Does including the multi-prefix extension and removing the subnet-prefix
in the second hash calculation (Hash1 in CGA draft) sufficient ? It might be worth mentioning the procedure.
2) If HBA is used and the node wants RFC 3041 privacy addresses, it means that it needs to
periodically regnerate the HBA ? Though this is more expensive than RFC 3041 privacy addresses,
there is not much we can do here i guess. Perhaps, this should be mentioned somewhere.
3) In section 2,
First, the current Secure Neighbor Discovery specification [2] uses
the CGAs defined in [1] to prove address ownership. If HBAs are not
compatible with CGAs, then nodes using HBAs for multihoming wouldn't
be able to do Secure Neighbor Discovery using the same addresses (at
least the parts of SeND that require CGAs). This would imply that
nodes would have to choose between security (from SeND) and
reliability (from multi6)
What do you mean by reliability here ?
4)When the multi6 state is setup, i assume that the CGA parameter is exchanged between the
communicating parties. I was wondering whether it would make any difference between including
the prefix Vs the whole address itself in the CGA parameter data structrure ? I am not able
to see anything less secure by including the whole address itself. One possibility is that
the peer can compute and validate the address ahead of time (which is of no use if rehoming
will never occur) and hash verification becomes a simple comparison
when a packet with different locator comes in. I am not saying we should do it this way.
I was mainly trying to understand what it means to include the address instead of prefix.
5) Security considerations need to be improved. It would be good to discuss what attacks it
addresses with respect to the threats document. In the beginning of the document,
This memo describes a tool that can be used to provide protection against some
of the potential attacks, in particular against future/ premeditated
attacks (a.k.a. time shifting attacks in [6]).
I hope the future version of the document would explain more on this. Is there a document
that explains what threat needs to be addressed by multi6 solution ? (the threats document
mentions this in a few places, but does not look like requirements to me).
One of the inferences from the security consideration section is that the attacker cannot create an HBA
set given a set of victim's addresses. It was not very obvious by reading the security consideration section.
Also, how important is return routability for the locators before they are used ? It is not discussed here.
As it is hard for the attacker to redirect packets to a victim, is it needed ? Can it be optional ?
-mohan