[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: addition of TLV to locator ID or locator ID set



El 03/10/2005, a las 14:10, Paul Jakma escribió:

On Mon, 3 Oct 2005, marcelo bagnulo braun wrote:

well, hybrid CGA/HBA is required if you want that an established communications can use a new prefix introduced to the site due for instance, to renumbering. I guess that the need for this is at least debatable, since a renumbering event is expected to be not so frequent compared to the expect lifetime of most established communications. I guess that for most established communications, it is good enough to keep on using the remaining prefixes available, and then when a new communication is established to incorporate the new prefix available after renumbering. So i would say that the public key will be needed in rare cases where extremely long lived communications are required.
Ok, sure. That could be an acceptable tradeoff. That's also the detail 
I had been missing / not considered. That allowing the underlying 
prefix set to change significantly would not be allowed.
Actually we can therefore end this discussion wrt 
Shim6-by-site-intermediary, because there are no more 
incompatibilities - simply be saying that the site-intermediary case 
would have to use a globally assigned address prefix.
i am not sure what you mean here, nut just for stating things 
precisely, HBA do have globally assigned prefixes
That is what I had in mind, so:

end-host shim6 -> uses a HBA for ULID.

site shim6 ->
	 hosts are assigned ULIDs from a stable, invariant address range.
	 hosts just use regular IPv6 stacks and regular ways to
	   assign themselves IPv6 addresses
These could be HBA as well, just that someone else should create the 
HBA set for the host e.g. the dhcp server could generate the hba set 
for the legacy hosts
	 intermediary does shim6, 1:1 mapping.

Both cases would use the shim6 mechanisms. The latter case would need further thought regarding the ulid:locator(s) binding (providing proof of its validity), which HBA would have provided (as per end-host). (One possibility would be that such a globally-assigned but non-globally routable prefix would also have a key set registered at the point assignment, gets tricky - but the mechanism at could allow for such. Probably difficult to solve without significant operational considerations. :( )
I guess this depends about how do you define who... At this level, who is the identifier and where is the locator, so the HBA/CGA actually securely bind the who with the where This is exactly what need to be protected, since the shim is separating the who form the where.
Right.

I mean, currently, the relationship between the who and the where is the identity, since both are the IP address of the node. With the shim, the locator and the id are separated, so what is needed from a security p.o.v. is to restore the security of that binding, which is exactly what is achieved with the CGA/HBA
Well, that depends on 'security' really. But as your point below, I 
guess it does at least make it the same as existing IP, yes.
Problem is, we intend to introduce something new, shim6 mechanisms. :)

HBA does solve a lot of the spoofing issues though, yes - i understand that now - if renumbering is left out.
right but current (non shim) communications are vulnerable to on path attackers, so this is no worst that today... the goal from a security perspective is that shim communications are as secure as non shim communications
Ok.

HBA seems a way to detect quite fraudulent packets (invalid binding), it doesn't seem (to me) to be a way to assure a received packet came from where the binding claims it did.
just as today, right?
Sure.

With HBA/CGA is the same, since in order to receive packets to the claimed locator, you need to be the owner of the HBA set (i.e. being able to receive packets at the HBA addresses) or be an on path attacker
Right.

C can, at a minimum, play havoc with any shim mapping on E relevant to A,
not sure what do you mean here... what kind of attack do you have in 
mind?
I mean, shim communications protected by the CGA/HBA are susceptible 
to on path attackers as any non-shim communications
I had, in my mind, been considering that there would be a mechanism to 
allow the prefix set -> ULID mapping to change
there is, the CGA part of the HBA/CGA hybrid addresses.
That is why there are three flavors of addresses:
- HBA that support a static set of addresses that cannot be changed during the lifetime of an established communication (with the cost of a hash per address) - CGA/HBA that support a stable prefix set and additional addresses that can be added during the lifetime of the communications (the cost of the stable addresses is a hash operation while the cost of a new address (out of the initial set) is a public key operation) - CGA addresses, any addresses can be used with the cost of a public key operation
(to support (partial-)?renumbering events). If that is not to be allowed, then indeed the attacks are minimal.
I think that the key point here is to understand the threats introduced by the shim. The goal in not to provide extra security, but to make things not worse that what are today in non-shim communications.
because otherwise, anyone could claim that any identifier is located in any locator, which is clearly worst than what we have today
Right, and HBA prevents such claims. I had failed to understand that. 
I had thought (from the example in the draft which referred to using a 
public key) that there would be a way to allow such claims to be made 
(or at least, for an existing HBA mapping to change its verifiable 
mapping and claim a new mapping).
yes they are, see above.
However, you should note that the public key used is included in the hash that results in the interface identifier of the addresses
If that is not to be allowed, then everything is much simpler. But at 
a fairly big cost in functionality. (Eg, what exactly would shim6 
using invariant HBAs offer over application layer remapping support?
i am not sure i understand what you mean here... could you expand?

regards, marcelo