draft-ietf-6man-nd-extension-headers-03.txt | draft-ietf-6man-nd-extension-headers-04.txt | |||
---|---|---|---|---|
IPv6 maintenance Working Group (6man) F. Gont | IPv6 maintenance Working Group (6man) F. Gont | |||
Internet-Draft SI6 Networks / UTN-FRH | Internet-Draft SI6 Networks / UTN-FRH | |||
Updates: 3971, 4861 (if approved) January 14, 2013 | Updates: 3971, 4861 (if approved) March 22, 2013 | |||
Intended status: Standards Track | Intended status: Standards Track | |||
Expires: July 18, 2013 | Expires: September 23, 2013 | |||
Security Implications of IPv6 Fragmentation with IPv6 Neighbor Discovery | Security Implications of IPv6 Fragmentation with IPv6 Neighbor Discovery | |||
draft-ietf-6man-nd-extension-headers-03 | draft-ietf-6man-nd-extension-headers-04 | |||
Abstract | Abstract | |||
This document analyzes the security implications of employing IPv6 | This document analyzes the security implications of employing IPv6 | |||
fragmentation with Neighbor Discovery (ND) messages. It updates RFC | fragmentation with Neighbor Discovery (ND) messages. It updates RFC | |||
4861 such that use of the IPv6 Fragmentation Header is forbidden in | 4861 such that use of the IPv6 Fragmentation Header is forbidden in | |||
all Neighbor Discovery messages, thus allowing for simple and | all Neighbor Discovery messages, thus allowing for simple and | |||
effective counter-measures for Neighbor Discovery attacks. Finally, | effective counter-measures for Neighbor Discovery attacks. Finally, | |||
it discusses the security implications of using IPv6 fragmentation | it discusses the security implications of using IPv6 fragmentation | |||
with SEcure Neighbor Discovery (SEND), and formally updates RFC 3971 | with SEcure Neighbor Discovery (SEND), and formally updates RFC 3971 | |||
skipping to change at page 1, line 39 | skipping to change at page 1, line 39 | |||
Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
Drafts is at http://datatracker.ietf.org/drafts/current/. | Drafts is at http://datatracker.ietf.org/drafts/current/. | |||
Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
This Internet-Draft will expire on July 18, 2013. | This Internet-Draft will expire on September 23, 2013. | |||
Copyright Notice | Copyright Notice | |||
Copyright (c) 2013 IETF Trust and the persons identified as the | Copyright (c) 2013 IETF Trust and the persons identified as the | |||
document authors. All rights reserved. | document authors. All rights reserved. | |||
This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
(http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
publication of this document. Please review these documents | publication of this document. Please review these documents | |||
skipping to change at page 2, line 15 | skipping to change at page 2, line 15 | |||
to this document. Code Components extracted from this document must | to this document. Code Components extracted from this document must | |||
include Simplified BSD License text as described in Section 4.e of | include Simplified BSD License text as described in Section 4.e of | |||
the Trust Legal Provisions and are provided without warranty as | the Trust Legal Provisions and are provided without warranty as | |||
described in the Simplified BSD License. | described in the Simplified BSD License. | |||
Table of Contents | Table of Contents | |||
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
2. Traditional Neighbor Discovery and IPv6 Fragmentation . . . . 5 | 2. Traditional Neighbor Discovery and IPv6 Fragmentation . . . . 5 | |||
3. SEcure Neighbor Discovery (SEND) and IPv6 Fragmentation . . . 6 | 3. SEcure Neighbor Discovery (SEND) and IPv6 Fragmentation . . . 6 | |||
4. Specification . . . . . . . . . . . . . . . . . . . . . . . . 7 | 4. Rationale for Forbidding IPv6 Fragmentation in Neighbor | |||
5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 8 | Discovery . . . . . . . . . . . . . . . . . . . . . . . . . . 7 | |||
6. Security Considerations . . . . . . . . . . . . . . . . . . . 9 | 5. Specification . . . . . . . . . . . . . . . . . . . . . . . . 8 | |||
7. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 10 | 6. Operational Advice . . . . . . . . . . . . . . . . . . . . . . 9 | |||
8. References . . . . . . . . . . . . . . . . . . . . . . . . . . 11 | 7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 10 | |||
8.1. Normative References . . . . . . . . . . . . . . . . . . . 11 | 8. Security Considerations . . . . . . . . . . . . . . . . . . . 11 | |||
8.2. Informative References . . . . . . . . . . . . . . . . . . 11 | 9. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 12 | |||
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 13 | 10. References . . . . . . . . . . . . . . . . . . . . . . . . . . 13 | |||
10.1. Normative References . . . . . . . . . . . . . . . . . . 13 | ||||
10.2. Informative References . . . . . . . . . . . . . . . . . 13 | ||||
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 15 | ||||
1. Introduction | 1. Introduction | |||
The Neighbor Discovery Protocol (NDP) is specified in RFC 4861 | The Neighbor Discovery Protocol (NDP) is specified in RFC 4861 | |||
[RFC4861]. It is used by both hosts and routers. Its functions | [RFC4861]. It is used by both hosts and routers. Its functions | |||
include Neighbor Discovery (ND), Router Discovery (RD), Address | include Neighbor Discovery (ND), Router Discovery (RD), Address | |||
Autoconfiguration, Address Resolution, Neighbor Unreachability | Autoconfiguration, Address Resolution, Neighbor Unreachability | |||
Detection (NUD), Duplicate Address Detection (DAD), and Redirection. | Detection (NUD), Duplicate Address Detection (DAD), and Redirection. | |||
Many of the possible attacks against the Neighbor Discovery Protocol | Many of the possible attacks against the Neighbor Discovery Protocol | |||
skipping to change at page 3, line 32 | skipping to change at page 3, line 32 | |||
the unavailability of SEND implementations for many widely-deployed | the unavailability of SEND implementations for many widely-deployed | |||
operating systems, make SEND hard to deploy [Gont-DEEPSEC2011]. | operating systems, make SEND hard to deploy [Gont-DEEPSEC2011]. | |||
Thus, in many general scenarios it may be necessary and/or convenient | Thus, in many general scenarios it may be necessary and/or convenient | |||
to use other mitigation techniques for NDP-based attacks. The | to use other mitigation techniques for NDP-based attacks. The | |||
following mitigations are currently available for NDP attacks: | following mitigations are currently available for NDP attacks: | |||
o Layer-2 filtering of Neighbor Discovery packets (such as RA-Guard | o Layer-2 filtering of Neighbor Discovery packets (such as RA-Guard | |||
[RFC6105]) | [RFC6105]) | |||
o Neighbor Discovery monitoring tools (e.g., such as NDPMon | o Neighbor Discovery monitoring tools (e.g., such as NDPMon | |||
[NDPMon], ramond [ramond], and rafixd [rafixd]) | [NDPMon], ramond [ramond]) | |||
o Intrusion Prevention Systems (IPS) | o Intrusion Prevention Systems (IPS) | |||
IPv6 Router Advertisement Guard (RA-Guard) is a mitigation technique | IPv6 Router Advertisement Guard (RA-Guard) is a mitigation technique | |||
for attack vectors based on ICMPv6 Router Advertisement messages. It | for attack vectors based on ICMPv6 Router Advertisement messages. It | |||
is meant to block attack packets at a layer-2 device before the | is meant to block attack packets at a layer-2 device before the | |||
attack packets actually reach the target nodes. [RFC6104] describes | attack packets actually reach the target nodes. [RFC6104] describes | |||
the problem statement of "Rogue IPv6 Router Advertisements", and | the problem statement of "Rogue IPv6 Router Advertisements", and | |||
[RFC6105] specifies the "IPv6 Router Advertisement Guard" | [RFC6105] specifies the "IPv6 Router Advertisement Guard" | |||
functionality. | functionality. | |||
Tools such as NDPMon [NDPMon] and ramond [ramond] aim at monitoring | Tools such as NDPMon [NDPMon] and ramond [ramond] aim at monitoring | |||
Neighbor Discovery traffic in the hopes of detecting possible attacks | Neighbor Discovery traffic in the hopes of detecting possible attacks | |||
when there are discrepancies between the information advertised in | when there are discrepancies between the information advertised in | |||
Neighbor Discovery packets and the information stored on a local | Neighbor Discovery packets and the information stored on a local | |||
database. rafixd [rafixd] goes one step further, and tries to | database. | |||
mitigate some Neighbor Discovery attacks by sending "correcting" | ||||
Router Advertisement messages in response to incorrect/malicious | ||||
Router Advertisement messages. | ||||
Some Intrusion Prevention Systems (IPS) can mitigate Neighbor | Some Intrusion Prevention Systems (IPS) can mitigate Neighbor | |||
Discovery attacks. We recommend that Intrusion Prevention Systems | Discovery attacks. We recommend that Intrusion Prevention Systems | |||
(IPS) implement mitigations for NDP attacks. | (IPS) implement mitigations for NDP attacks. | |||
A key challenge that these mitigation or monitoring techniques face | A key challenge that these mitigation or monitoring techniques face | |||
is that introduced by IPv6 fragmentation, since it is trivial for an | is that introduced by IPv6 fragmentation, since it is trivial for an | |||
attacker to conceal his attack by fragmenting his packets into | attacker to conceal his attack by fragmenting his packets into | |||
multiple fragments. This may limit or even eliminate the | multiple fragments. This may limit or even eliminate the | |||
effectiveness of the aforementioned mitigation or monitoring | effectiveness of the aforementioned mitigation or monitoring | |||
skipping to change at page 4, line 29 | skipping to change at page 4, line 25 | |||
packets into multiple fragments, such that the layer-2 device cannot | packets into multiple fragments, such that the layer-2 device cannot | |||
find all the necessary information to perform packet filtering in the | find all the necessary information to perform packet filtering in the | |||
same packet. While Neighbor Discovery monitoring tools could (in | same packet. While Neighbor Discovery monitoring tools could (in | |||
theory implement IPv6 fragment reassembly, this is usually an arms- | theory implement IPv6 fragment reassembly, this is usually an arms- | |||
race with the attacker (an attacker generate lots of forged fragments | race with the attacker (an attacker generate lots of forged fragments | |||
to "confuse" the monitoring tools), and therefore the aforementioned | to "confuse" the monitoring tools), and therefore the aforementioned | |||
tools are unreliable for the detection of such attacks. | tools are unreliable for the detection of such attacks. | |||
Section 2 analyzes the use of IPv6 fragmentation in traditional | Section 2 analyzes the use of IPv6 fragmentation in traditional | |||
Neighbor discovery. Section 3 analyzes the use of IPv6 fragmentation | Neighbor discovery. Section 3 analyzes the use of IPv6 fragmentation | |||
in SEcure Neighbor Discovery (SEND). Section 4 formally updates RFC | in SEcure Neighbor Discovery (SEND). Section 4 provides the | |||
4861 such that use of the IPv6 Fragment Header with traditional | rationale for forbidding the use of IPv6 fragmentation with Neighbor | |||
Neighbor Discovery is forbidden, and also formally updates RFC 3971 | Discovery. Section 5 formally updates RFC 4861 such that use of the | |||
providing advice on the use of IPv6 fragmentation with SEND. | IPv6 Fragment Header with traditional Neighbor Discovery is | |||
forbidden, and also formally updates RFC 3971 providing advice on the | ||||
use of IPv6 fragmentation with SEND. Section 6 provides operational | ||||
advice about interoperability problems arising from the use of IPv6 | ||||
fragmentation with Neighbor Discovery. | ||||
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | |||
document are to be interpreted as described in RFC 2119 [RFC2119]. | document are to be interpreted as described in RFC 2119 [RFC2119]. | |||
2. Traditional Neighbor Discovery and IPv6 Fragmentation | 2. Traditional Neighbor Discovery and IPv6 Fragmentation | |||
The only potential use case for IPv6 fragmentation with traditional | The only potential use case for IPv6 fragmentation with traditional | |||
(i.e., non-SEND) IPv6 Neighbor Discovery would be that in which a | (i.e., non-SEND) IPv6 Neighbor Discovery would be that in which a | |||
Router Advertisement must include a large number of options (Prefix | Router Advertisement must include a large number of options (Prefix | |||
skipping to change at page 5, line 22 | skipping to change at page 5, line 22 | |||
the aforementioned information into multiple Router Advertisement | the aforementioned information into multiple Router Advertisement | |||
messages. | messages. | |||
Some Neighbor Discovery implementations are known to silently | Some Neighbor Discovery implementations are known to silently | |||
ignore Router Advertisement messages that employ fragmentation. | ignore Router Advertisement messages that employ fragmentation. | |||
Therefore, splitting the necessary information into multiple RA | Therefore, splitting the necessary information into multiple RA | |||
messages (rather than sending a large RA message that is | messages (rather than sending a large RA message that is | |||
fragmented into multiple IPv6 fragments) is probably desirable | fragmented into multiple IPv6 fragments) is probably desirable | |||
even from an interoperability point of view. | even from an interoperability point of view. | |||
As a result of the aforementioned considerations, and since avoiding | Thus, avoiding the use of IPv6 fragmentation in traditional Neighbor | |||
the use of IPv6 fragmentation in traditional Neighbor Discovery would | Discovery would greatly simplify and improve the effectiveness of | |||
greatly simplify and improve the effectiveness of monitoring and | monitoring and filtering Neighbor Discovery traffic, and would also | |||
filtering ND, Section 4 specifies that hosts silently ignore | prevent interoperability problems with those implementations that do | |||
traditional Neighbor Discovery messages (i.e., those specified in | not support fragmentation in Neighbor Discovery messages. | |||
[RFC4861]) that employ IPv6 fragmentation. | ||||
3. SEcure Neighbor Discovery (SEND) and IPv6 Fragmentation | 3. SEcure Neighbor Discovery (SEND) and IPv6 Fragmentation | |||
SEND packets typically carry more information than traditional | SEND packets typically carry more information than traditional | |||
Neighbor Discovery packets: for example, they include additional | Neighbor Discovery packets: for example, they include additional | |||
options such as the CGA option and the RSA signature option. | options such as the CGA option and the RSA signature option. | |||
When SEND nodes employ any of the Neighbor Discovery messages | When SEND nodes employ any of the Neighbor Discovery messages | |||
specified in [RFC4861], the situation is roughly the same: if more | specified in [RFC4861], the situation is roughly the same: if more | |||
information than would fit in a non-fragmented Neighbor Discovery | information than would fit in a non-fragmented Neighbor Discovery | |||
packet needs to be sent, it should be split into multiple Neighbor | packet needs to be sent, it should be split into multiple Neighbor | |||
Discovery messages (such that IPv6 fragmentation is avoided). | Discovery messages (such that IPv6 fragmentation is avoided). | |||
However, Certification Path Advertisement messages (specified in | However, Certification Path Advertisement messages (specified in | |||
[RFC3971]) pose a different situation, since the Certificate Option | [RFC3971]) pose a different situation, since the Certificate Option | |||
they include typically contains much more information than any other | they include typically contains much more information than any other | |||
Neighbor Discovery option. For example, Appendix C of [RFC3971] | Neighbor Discovery option. For example, Appendix C of [RFC3971] | |||
reports Certification Path Advertisement messages from 1050 to 1066 | reports Certification Path Advertisement messages from 1050 to 1066 | |||
bytes on an Ethernet link layer. Since the size of CPA messages | bytes on an Ethernet link layer. Since the size of CPA messages | |||
could potentially exceed the MTU of the local link, Section 4 | could potentially exceed the MTU of the local link, Section 5 | |||
recommends that fragmented CPA messages be normally processed, but | recommends that fragmented CPA messages be normally processed, but | |||
discourages the use of keys that would result in fragmented CPA | discourages the use of keys that would result in fragmented CPA | |||
messages. | messages. | |||
It should be noted that relying on fragmentation opens the door to a | It should be noted that relying on fragmentation opens the door to a | |||
variety of IPv6 fragmentation-based attacks. In particular, if an | variety of IPv6 fragmentation-based attacks. In particular, if an | |||
attacker is located on the same broadcast domain as the victim host, | attacker is located on the same broadcast domain as the victim host, | |||
and Certification Path Advertisement messages employ IPv6 | and Certification Path Advertisement messages employ IPv6 | |||
fragmentation, it would be trivial for the attacker to forge IPv6 | fragmentation, it would be trivial for the attacker to forge IPv6 | |||
fragments such that they result in "Fragment ID collisions", causing | fragments such that they result in "Fragment ID collisions", causing | |||
both the attack fragments and the legitimate fragments to be | both the attack fragments and the legitimate fragments to be | |||
discarded by the victim node. This would eventually cause the | discarded by the victim node. This would eventually cause the | |||
Authorization Delegation Discovery to fail, thus leading the host to | Authorization Delegation Discovery to fail, thus leading the host to | |||
fall back (depending on local configuration) either to unsecured | fall back (depending on local configuration) either to unsecured | |||
mode, or to reject the corresponding Router Advertisement messages | mode, or to reject the corresponding Router Advertisement messages | |||
(possibly resulting in a Denial of Service). | (possibly resulting in a Denial of Service). | |||
4. Specification | 4. Rationale for Forbidding IPv6 Fragmentation in Neighbor Discovery | |||
A number of considerations should be made regarding the use of IPv6 | ||||
fragmentation with Neighbor Discovery: | ||||
o A significant number of existing implementations already silently | ||||
drop fragmented ND messages, so the use of IPv6 fragmentation may | ||||
hamper interoperability among IPv6 implementations. | ||||
o Although it is possible to build an ND message that needs to be | ||||
fragmented, such packets are unlikely to exist in the real world | ||||
because of the large number of options that would be required for | ||||
the resulting packet to exceed the minimum IPv6 MTU of 1280 | ||||
octets. | ||||
o If an ND message was so large as to need fragmentation, there is | ||||
an option to distribute the same information amongst more than one | ||||
message, each of which is small enough to not need fragmentation. | ||||
Thus, forbidding the use of IPv6 fragmentation with Neighbor | ||||
Discovery normalizes existing behavior and sets the expectations of | ||||
all implementations to the existing lowest common denominator. | ||||
5. Specification | ||||
Nodes MUST NOT employ IPv6 fragmentation for sending any of the | Nodes MUST NOT employ IPv6 fragmentation for sending any of the | |||
following Neighbor Discovery and SEcure Neighbor Discovery messages: | following Neighbor Discovery and SEcure Neighbor Discovery messages: | |||
o Neighbor Solicitation | o Neighbor Solicitation | |||
o Neighbor Advertisement | o Neighbor Advertisement | |||
o Router Solicitation | o Router Solicitation | |||
skipping to change at page 8, line 5 | skipping to change at page 9, line 5 | |||
o Certification Path Solicitation | o Certification Path Solicitation | |||
Nodes SHOULD normally process the following messages when the packets | Nodes SHOULD normally process the following messages when the packets | |||
carrying them include an IPv6 Fragmentation Header: | carrying them include an IPv6 Fragmentation Header: | |||
o Certification Path Advertisement | o Certification Path Advertisement | |||
SEND nodes SHOULD NOT employ keys that would result in fragmented CPA | SEND nodes SHOULD NOT employ keys that would result in fragmented CPA | |||
messages. | messages. | |||
5. IANA Considerations | 6. Operational Advice | |||
An operator detecting that Neighbor Discovery traffic is being | ||||
silently dropped should find whether the corresponding Neighbor | ||||
Discovery are employing IPv6 fragmentation. If they are, it is | ||||
likely that the devices receiving such packets are silently dropping | ||||
them merely because they employ IPv6 fragmentation. In such case, an | ||||
operator should check whether the sending device has an option to | ||||
prevent fragmentation of ND messages, and/or see whether it is | ||||
possible to reduce the options carried on such messages. We note | ||||
that solving this (unlikely) problem might need a software upgrade to | ||||
a version that does not employ IPv6 fragmentation with Neighbor | ||||
Discovery. | ||||
7. IANA Considerations | ||||
There are no IANA registries within this document. The RFC-Editor | There are no IANA registries within this document. The RFC-Editor | |||
can remove this section before publication of this document as an | can remove this section before publication of this document as an | |||
RFC. | RFC. | |||
6. Security Considerations | 8. Security Considerations | |||
The IPv6 Fragmentation Header can be leveraged to circumvent network | The IPv6 Fragmentation Header can be leveraged to circumvent network | |||
monitoring tools and current implementations of mechanisms such as | monitoring tools and current implementations of mechanisms such as | |||
RA-Guard [I-D.ietf-v6ops-ra-guard-implementation]. By updating the | RA-Guard [I-D.ietf-v6ops-ra-guard-implementation]. By updating the | |||
relevant specifications such that the IPv6 Fragment Header is not | relevant specifications such that the IPv6 Fragment Header is not | |||
allowed in any Neighbor Discovery messages except "Certification Path | allowed in any Neighbor Discovery messages except "Certification Path | |||
Advertisement", protection of local nodes against Neighbor Discovery | Advertisement", protection of local nodes against Neighbor Discovery | |||
attacks, and monitoring of Neighbor Discovery traffic is greatly | attacks, and monitoring of Neighbor Discovery traffic is greatly | |||
simplified. | simplified. | |||
[I-D.ietf-v6ops-ra-guard-implementation] discusses an improvement to | [I-D.ietf-v6ops-ra-guard-implementation] discusses an improvement to | |||
the RA-Guard mechanism that can mitigate Neighbor Discovery attacks | the RA-Guard mechanism that can mitigate Neighbor Discovery attacks | |||
that employ IPv6 Fragmentation. However, it should be noted that | that employ IPv6 Fragmentation. However, it should be noted that | |||
unless [RFC4861] is updated (as proposed in this document), Neighbor | unless [RFC4861] is updated (as proposed in this document), Neighbor | |||
Discovery monitoring tools (such as NDPMon [NDPMon], ramond [ramond], | Discovery monitoring tools (such as NDPMon [NDPMon], and ramond | |||
and rafixd [rafixd]) would remain unreliable and trivial to | [ramond]) would remain unreliable and trivial to circumvent by a | |||
circumvent by a skilled attacker. | skilled attacker. | |||
As noted in Section 3, use of SEND could potentially result in | As noted in Section 3, use of SEND could potentially result in | |||
fragmented "Certification Path Advertisement" messages, thus allowing | fragmented "Certification Path Advertisement" messages, thus allowing | |||
an attacker to employ IPv6 fragmentation-based attacks against such | an attacker to employ IPv6 fragmentation-based attacks against such | |||
messages. Therefore, to the extent that is possible, such use of | messages. Therefore, to the extent that is possible, such use of | |||
fragmentation should be avoided. | fragmentation should be avoided. | |||
7. Acknowledgements | 9. Acknowledgements | |||
The author would like to thank (in alphabetical order) Mikael | The author would like to thank (in alphabetical order) Mikael | |||
Abrahamsson, Ran Atkinson, Ron Bonica, Jean-Michel Combes, David | Abrahamsson, Ran Atkinson, Ron Bonica, Jean-Michel Combes, David | |||
Farmer, Roque Gagliano, Bran Haberman, Bob Hinden, Philip Homburg, | Farmer, Adrian Farrel, Stephen Farrell, Roque Gagliano, Brian | |||
Ray Hunter, Arturo Servin, and Mark Smith, for providing valuable | Haberman, Bob Hinden, Philip Homburg, Ray Hunter, Arturo Servin, Mark | |||
comments on earlier versions of this document. | Smith, and Martin Stiemerling, for providing valuable comments on | |||
earlier versions of this document. | ||||
This document resulted from the project "Security Assessment of the | This document resulted from the project "Security Assessment of the | |||
Internet Protocol version 6 (IPv6)" [CPNI-IPv6], carried out by | Internet Protocol version 6 (IPv6)" [CPNI-IPv6], carried out by | |||
Fernando Gont on behalf of the UK Centre for the Protection of | Fernando Gont on behalf of the UK Centre for the Protection of | |||
National Infrastructure (CPNI). The author would like to thank the | National Infrastructure (CPNI). The author would like to thank the | |||
UK CPNI, for their continued support. | UK CPNI, for their continued support. | |||
8. References | 10. References | |||
8.1. Normative References | 10.1. Normative References | |||
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | |||
Requirement Levels", BCP 14, RFC 2119, March 1997. | Requirement Levels", BCP 14, RFC 2119, March 1997. | |||
[RFC3971] Arkko, J., Kempf, J., Zill, B., and P. Nikander, "SEcure | [RFC3971] Arkko, J., Kempf, J., Zill, B., and P. Nikander, "SEcure | |||
Neighbor Discovery (SEND)", RFC 3971, March 2005. | Neighbor Discovery (SEND)", RFC 3971, March 2005. | |||
[RFC4861] Narten, T., Nordmark, E., Simpson, W., and H. Soliman, | [RFC4861] Narten, T., Nordmark, E., Simpson, W., and H. Soliman, | |||
"Neighbor Discovery for IP version 6 (IPv6)", RFC 4861, | "Neighbor Discovery for IP version 6 (IPv6)", RFC 4861, | |||
September 2007. | September 2007. | |||
8.2. Informative References | 10.2. Informative References | |||
[RFC3756] Nikander, P., Kempf, J., and E. Nordmark, "IPv6 Neighbor | [RFC3756] Nikander, P., Kempf, J., and E. Nordmark, "IPv6 Neighbor | |||
Discovery (ND) Trust Models and Threats", RFC 3756, | Discovery (ND) Trust Models and Threats", RFC 3756, | |||
May 2004. | May 2004. | |||
[RFC6104] Chown, T. and S. Venaas, "Rogue IPv6 Router Advertisement | [RFC6104] Chown, T. and S. Venaas, "Rogue IPv6 Router Advertisement | |||
Problem Statement", RFC 6104, February 2011. | Problem Statement", RFC 6104, February 2011. | |||
[RFC6105] Levy-Abegnoli, E., Van de Velde, G., Popoviciu, C., and J. | [RFC6105] Levy-Abegnoli, E., Van de Velde, G., Popoviciu, C., and J. | |||
Mohacsi, "IPv6 Router Advertisement Guard", RFC 6105, | Mohacsi, "IPv6 Router Advertisement Guard", RFC 6105, | |||
February 2011. | February 2011. | |||
[NDPMon] "NDPMon - IPv6 Neighbor Discovery Protocol Monitor", | [NDPMon] "NDPMon - IPv6 Neighbor Discovery Protocol Monitor", | |||
<http://ndpmon.sourceforge.net/>. | <http://ndpmon.sourceforge.net/>. | |||
[ramond] "ramond", <http://ramond.sourceforge.net/>. | [ramond] "ramond", <http://ramond.sourceforge.net/>. | |||
[rafixd] "rafixd", <http://www.kame.net/dev/cvsweb2.cgi/kame/kame/ | ||||
kame/rafixd/>. | ||||
[I-D.ietf-v6ops-ra-guard-implementation] | [I-D.ietf-v6ops-ra-guard-implementation] | |||
Gont, F., "Implementation Advice for IPv6 Router | Gont, F., "Implementation Advice for IPv6 Router | |||
Advertisement Guard (RA-Guard)", | Advertisement Guard (RA-Guard)", | |||
draft-ietf-v6ops-ra-guard-implementation-07 (work in | draft-ietf-v6ops-ra-guard-implementation-07 (work in | |||
progress), November 2012. | progress), November 2012. | |||
[CPNI-IPv6] | [CPNI-IPv6] | |||
Gont, F., "Security Assessment of the Internet Protocol | Gont, F., "Security Assessment of the Internet Protocol | |||
version 6 (IPv6)", UK Centre for the Protection of | version 6 (IPv6)", UK Centre for the Protection of | |||
National Infrastructure, (available on request). | National Infrastructure, (available on request). | |||
End of changes. 20 change blocks. | ||||
44 lines changed or deleted | 82 lines changed or added | |||
This html diff was produced by rfcdiff 1.41. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ |