One document matched: draft-jiang-csi-dhcpv6-cga-ps-00.txt
Network Working Group Sheng Jiang
Sean Shen
Internet Draft Huawei Technologies Co., Ltd
Expires: April 2009 October 27th, 2008
DHCPv6 and CGA Interaction: Problem Statement
draft-jiang-csi-dhcpv6-cga-ps-00.txt
Status of this Memo
By submitting this Internet-Draft, each author represents that
any applicable patent or other IPR claims of which he or she is
aware have been or will be disclosed, and any of which he or she
becomes aware will be disclosed, in accordance with Section 6 of
BCP 79.
This document may only be posted in an Internet-Draft.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html
This Internet-Draft will expire on April 25, 2009.
Abstract
This document presents a problem statement for the possible
interactions between DHCPv6 and CGA. Firstly, in order to support the
co-existing scenarios of DHCPv6 and CGA, Some operations are
clarified for the interaction of DHCPv6 servers and CGA-associated
hosts. Then, some extended scenarios are also discussed in this
document, including using CGAs in DHCPv6 operations to enhance the
security features and using DHCPv6 to serve the CGA generation.
Jiang & Shen Expires April 25, 2009 [Page 1]
Internet-Draft draft-jiang-csi-dhcpv6-cga-ps-00.txt October 2008
Table of Contents
1. Introduction................................................2
2. Terminology.................................................2
3. Co-existing of DHCPv6 and CGA................................3
4. What DHCPv6 can do for CGA...................................3
5. What CGA can do for DHCPv6...................................4
6. Security Considerations......................................5
7. IANA Considerations.........................................5
8. References..................................................5
8.1. Normative References....................................5
8.2. Informative References..................................5
Author's Addresses.............................................6
Intellectual Property Statement.................................6
Disclaimer of Validity.........................................7
Copyright Statement............................................7
1. Introduction
Dynamic Host Configuration Protocol for IPv6 (DHCPv6) [RFC3315] can
assign addresses statefully. Although there are other ways to assign
IPv6 address [RFC4339], DHCPv6 is still useful when administrator
desire more control over addressing. Besides, DHCPv6 also be used to
distribute other information when dialog state is critical [RFC4242].
Cryptographically Generated Addresses (CGA) [RFC3972] are IPv6
addresses for which the interface identifiers are generated by
computing a cryptographic one-way hash function from a public key and
auxiliary parameters. By using the associate public & private keys as
described in SEcure Neighbor Discovery (SEND) [RFC3971], CGA can
protect Neighbor Discovery Protocol (NDP) [RFC4861], i.e. it provides
address validation and integrity protection for NDP messages.
This document presents a problem statement for the possible
interactions between DHCPv6 and CGA. Firstly, in order to support the
co-existing scenarios of DHCPv6 and CGA, Some operations are
clarified for the interaction of DHCPv6 servers and CGA-associated
hosts. Then, some extended scenarios are also discussed in this
document, including using CGAs in DHCPv6 operations to enhance the
security features and using DHCPv6 to serve the CGA generation.
2. Terminology
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC-2119 [RFC2119].
Jiang & Shen Expires April 25, 2009 [Page 2]
Internet-Draft draft-jiang-csi-dhcpv6-cga-ps-00.txt October 2008
3. Co-existing of DHCPv6 and CGA
As an important IPv6 technique, CGA is used efficiently on the
stateless address configuration of IPv6 address. The public key
system associated with CGA address provides message origin validation
and integrity protection without negotiation and transportation of
key materials. {more}
The current CGA specifications does not mandate which device
generates a CGA address. In many cases, a CGA address is generated by
the associated key pair owner, which normally is also the host that
will use the CGA address.
However, in a DHCPv6-managed network, hosts should obtain IPv6
addresses only from a DHCPv6 server. This difference of roles needs
to be carefully considered during the interaction of CGA and DHCPv6.
Operations, as clarified in the next paragraph, support the co-
existing of CGA's host self-generate address mechanism and DHCPv6
managed address mechanism.
This can be solved by validation procedure, which has been defined in
the current DHCPv6. A node requests DHCPv6 server to grant a CGA
generated by the node itself, listing the CGA addresses in IA options,
which has been defined in [RFC3315]. According to whether the CGA
matches the CGA-related configuration parameters of the network, the
DHCPv6 server sends an acknowledgement to the node, grant the usage
of the CGA or indicate the node that it must generate a new CGA with
the CGA-related configuration parameters of the network. In the
meantime, the DHCPv6 server has had the opportunity to log the
address/host combination.
4. What DHCPv6 can do for CGA
In the current CGA specifications, there is a lack of procedures to
enable proper management of CGA generation. Administrators should be
able to configure parameters used to generate CGA. For example,
DHCPv6 server should be able to assign subnet prefix or certificates
to CGA address owner. In some scenarios, the administrator may
further want to enforce some parameters, particularly, the demanded
security related parameters such as SEC value.
In the CGA generation procedure, the large computational consumption
is needed to generate the Modifier field. This CPU intensive
operation can represent time and/or battery consumption problems for
Jiang & Shen Expires April 25, 2009 [Page 3]
Internet-Draft draft-jiang-csi-dhcpv6-cga-ps-00.txt October 2008
end hosts (i.e. mobile devices) with limited computing ability and/or
restricted battery power. In these cases, a mechanism to delegate the
computation of the modifier should be provided.
DHCPv6 can help on these issues by providing more relevant functions.
New DHCPv6 options may be defined to carry management parameters from
DHCPv6 server to the client. A new DHCPv6 prefix assignment option
may be define to propagate a subnet prefix. More DHCPv6 options may
be defined to propagate more CGA-relevant configuration information,
such as SEC value, certification information, SEND proxy information,
etc.
New interaction behavior between DHCPv6 server and client with a set
of new DHCPv6 options may be defined to allow computation delegation.
A node may initiate a DHCPv6 request to the DHCPv6 server for the
computation of the Modifier. The server either computes the Modifier
value, or redirects the computation require to another server. Once
the server obtains the modifier, it computes the CGA and responds to
the node with the resulting address and the corresponding CGA
Parameters Data Structure.
5. What CGA can do for DHCPv6
DHCPv6 is vulnerable to various attacks particularly fake attack. In
the basic DHCPv6 specifications, regular IPv6 addresses are used. It
is possible for a malicious attacker to use a fake address to spoof
or launch an attack. A malicious fake DHCPv6 server can provide
incorrect configuration to the client in order to divert the client
to communicate with malicious services, like DNS or NTP. It may also
mount a denial of service attack through mis-configuration of the
client that causes all network communication from the client to fail.
Fake DHCPv6 server may also collect some critical information from
the client. Attackers may be able to gain unauthorized access to some
resources, such as network access.
The usage of CGA can efficiently improve the security of DHCPv6. Thus
the address of a DHCP message sender, which can be a DHCP server, a
reply agent or a client, can be verified by a receiver. It improves
communication security of DHCPv6 interaction. This mechanism is
applicable in environments where physical security on the link is not
assured (such as over wireless) or where available security
mechanisms are not sufficient, and attacks on DHCPv6 are a concern.
Of course, as an assumption, the advantage of CGA can be taken only
when CGA addresses are used in DHCPv6 communications.
Jiang & Shen Expires April 25, 2009 [Page 4]
Internet-Draft draft-jiang-csi-dhcpv6-cga-ps-00.txt October 2008
6. Security Considerations
This whole draft is discussing security relevant problems. CGA and
DHCPv6 can provide additional service or security features for each
other. The IPv6 protocols can take advantages of each other when they
coexist online.
7. IANA Considerations
There are no IANA considerations in this document.
8. References
8.1. Normative References
[RFC2462] S. Thomson, T. Narten, "IPv6 Stateless Address
Autoconfiguration", RFC2462, December 1998.
[RFC3315] R. Droms, et al., "Dynamic Host Configure Protocol for
IPv6", RFC3315, July 2003.
[RFC3971] J. Arkko, J. Kempf, B. Zill, P. Nikander, "SEcure Neighbor
Discovery (SEND) ", RFC 3971, March 2005.
[RFC3972] T. Aura, "Cryptographically Generated Address", RFC3972,
March 2005.
[RFC4242] S. Venaas, T. Chown, B. Volz, "Information Refresh Time
Option for Dynamic Host Configuration Protocol for IPv6
(DHCPv6)", RFC4242, November 2005.
[RFC4339] J. Jeong, Ed., "IPv6 Host Configuration of DNS Server
Information Approaches", RFC4339, February 2006.
[RFC4861] T. Narten, E. Nordmark, W. Simpson, H. Soliman, "Neighbor
Discovery for IP version 6 (IPv6)", RFC4861, September 2007.
8.2. Informative References
[RFC2119] S. Bradner, "Key words for use in RFCs to Indicate
Requirement Levels", RFC2119, March 1997.
Jiang & Shen Expires April 25, 2009 [Page 5]
Internet-Draft draft-jiang-csi-dhcpv6-cga-ps-00.txt October 2008
Author's Addresses
Sheng Jiang
Huawei Technologies
QuiKe Bld., No.6 Rd, Xinxi St.,
Shang-Di Information Industry Base,
Hai-Dian District, Beijing, P.R. China
100085
Phone: 86-10-82836774
Email: shengjiang@huawei.com
Sean Shen
Huawei Technologies Co., Ltd
QuiKe Building, No.9 Xinxi Rd.,
Shang-Di Information Industry Base,
Hai-Dian District, Beijing, P.R. China
100085
Phone: 86-10-82836072
Email: sshen@huawei.com
Intellectual Property Statement
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Jiang & Shen Expires April 25, 2009 [Page 6]
Internet-Draft draft-jiang-csi-dhcpv6-cga-ps-00.txt October 2008
Disclaimer of Validity
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Copyright Statement
Copyright (C) The IETF Trust (2008).
This document is subject to the rights, licenses and restrictions
contained in BCP 78, and except as set forth therein, the authors
retain all their rights.
Jiang & Shen Expires April 25, 2009 [Page 7]
| PAFTECH AB 2003-2026 | 2026-04-23 06:11:11 |