| < draft-sarikaya-6lo-ap-nd-03.txt | draft-sarikaya-6lo-ap-nd-04.txt > | |||
|---|---|---|---|---|
| 6lo M. Sethi, Ed. | 6lo M. Sethi, Ed. | |||
| Internet-Draft Ericsson | Internet-Draft Ericsson | |||
| Updates: 6775 (if approved) P. Thubert | Updates: 6775 (if approved) P. Thubert | |||
| Intended status: Standards Track Cisco | Intended status: Standards Track Cisco | |||
| Expires: February 17, 2017 B. Sarikaya | Expires: February 23, 2017 B. Sarikaya, Ed. | |||
| Huawei USA | Huawei USA | |||
| August 16, 2016 | August 22, 2016 | |||
| Address Protected Neighbor Discovery for Low-power and Lossy Networks | Address Protected Neighbor Discovery for Low-power and Lossy Networks | |||
| draft-sarikaya-6lo-ap-nd-03 | draft-sarikaya-6lo-ap-nd-04 | |||
| Abstract | Abstract | |||
| This document defines an extension to 6LoWPAN Neighbor Discovery. | This document defines an extension to 6LoWPAN Neighbor Discovery. | |||
| This extension is designed for low-power and lossy network | This extension is designed for low-power and lossy network | |||
| environments and it supports multi-hop operation. Nodes supporting | environments and it supports multi-hop operation. Nodes supporting | |||
| this extension compute a Cryptographically Unique Interface ID and | this extension compute a Cryptographically Unique Interface ID and | |||
| associate it with one or more of their Registered Addresses. The | associate it with one or more of their Registered Addresses. The | |||
| Cryptographic ID (Crypto-ID) uniquely identifies the owner of the | Cryptographic ID (Crypto-ID) uniquely identifies the owner of the | |||
| Registered Address. It is used in place of the EUI-64 address that | Registered Address. It is used in place of the EUI-64 address that | |||
| skipping to change at page 1, line 42 ¶ | skipping to change at page 1, line 42 ¶ | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at http://datatracker.ietf.org/drafts/current/. | Drafts is at http://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on February 17, 2017. | This Internet-Draft will expire on February 23, 2017. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2016 IETF Trust and the persons identified as the | Copyright (c) 2016 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| skipping to change at page 8, line 26 ¶ | skipping to change at page 8, line 26 ¶ | |||
| the node moves at a different place and receives a different prefix. | the node moves at a different place and receives a different prefix. | |||
| In this scenario, the node uses the same Crypto-ID to protect its new | In this scenario, the node uses the same Crypto-ID to protect its new | |||
| IPv6 address. This prevents other nodes from stealing the address | IPv6 address. This prevents other nodes from stealing the address | |||
| and trying to use it as their source address. | and trying to use it as their source address. | |||
| Note that if the device that moves always forms new MAC and IP | Note that if the device that moves always forms new MAC and IP | |||
| address [RFC6775], then this new address can be used for | address [RFC6775], then this new address can be used for | |||
| registration. In case of a collision of the new MAC and therefore IP | registration. In case of a collision of the new MAC and therefore IP | |||
| address, the node can easily form a new IPv6 address. This is one | address, the node can easily form a new IPv6 address. This is one | |||
| case where the use of Crypto-ID would not be needed. Crypto-ID or | case where the use of Crypto-ID would not be needed. Crypto-ID or | |||
| ND-PAR should be activated when when the IP address is claimed at | ND-PAR should be activated when the IP address is claimed at another | |||
| another place, or for a different MAC address at the same place, e.g. | place, or for a different MAC address at the same place, e.g. for MAC | |||
| for MAC address privacy | address privacy [I-D.ietf-6man-ipv6-address-generation-privacy]. | |||
| [I-D.ietf-6man-ipv6-address-generation-privacy]. | ||||
| 6LN 6LR | 6LN 6LR | |||
| | | | | | | |||
| |<------------------- RA --------------------------| | |<------------------- RA --------------------------| | |||
| | | | | | | |||
| |----------- NS with ARO and Crypto-ID ----------->| | |----------- NS with ARO and Crypto-ID ----------->| | |||
| | | | | | | |||
| |<---------- NA with ARO (status=req-proof) -------| | |<---------- NA with ARO (status=req-proof) -------| | |||
| | | | | | | |||
| |----------- NS with ARO and Crypto-ID ----------->| | |----------- NS with ARO and Crypto-ID ----------->| | |||
| skipping to change at page 14, line 23 ¶ | skipping to change at page 14, line 23 ¶ | |||
| The same considerations regarding the threats to the Local Link | The same considerations regarding the threats to the Local Link | |||
| Network covered in [RFC3971] apply. | Network covered in [RFC3971] apply. | |||
| The threats discussed in Section 9.2 of [RFC3971] are countered by | The threats discussed in Section 9.2 of [RFC3971] are countered by | |||
| the protocol described in this document as well. | the protocol described in this document as well. | |||
| Collisions of Crypto-ID is a possibility that needs to be considered. | Collisions of Crypto-ID is a possibility that needs to be considered. | |||
| The formula for calculating probability of a collision is 1 - | The formula for calculating probability of a collision is 1 - | |||
| e^{-k^2/(2n)}. If the Crypto-ID is 64-bit long, then the chance of | e^{-k^2/(2n)}. If the Crypto-ID is 64-bit long, then the chance of | |||
| finding a collision is 0.01% when we the network contains 66 million | finding a collision is 0.01% when the network contains 66 million | |||
| nodes. It is important to note the collision is only relevant when | nodes. It is important to note that the collision is only relevant | |||
| this happens withing one stub network (6LBR). A collision of ID in | when this happens within one stub network (6LBR). A collision of ID | |||
| ND-PAR is a rare event. However, when such a collision does happen, | in ND-PAR is a rare event. However, when such a collision does | |||
| the protocol operation is not affected, although it opens a window | happen, the protocol operation is not affected, although it opens a | |||
| for a node to hijack an address from another. The link-layer | window for a node to hijack an address from another. The link-layer | |||
| security ensures that the nodes would normally not be aware of a | security ensures that the nodes would normally not be aware of a | |||
| collision on the subnet. If a malicious node is able to gain | collision on the subnet. If a malicious node is able to gain | |||
| knowledge of a collision through other means, the only thing that it | knowledge of a collision through other means, the only thing that it | |||
| could do is to steal addresses from the other honest. This would be | could do is to steal addresses from the other honest node. This | |||
| no different from what is already possible in a 6lo network today. | would be no different from what is already possible in a 6lo network | |||
| today. | ||||
| 6. IANA considerations | 6. IANA considerations | |||
| IANA is requested to assign two new option type values, TBA1 and TBA2 | IANA is requested to assign two new option type values, TBA1 and TBA2 | |||
| under the subregistry "IPv6 Neighbor Discovery Option Formats". | under the subregistry "IPv6 Neighbor Discovery Option Formats". | |||
| 7. Acknowledgements | 7. Acknowledgements | |||
| We are grateful to Rene Struik and Robert Moskowitz for their | We are grateful to Rene Struik and Robert Moskowitz for their | |||
| comments that lead to many improvements to this document. | comments that lead to many improvements to this document. | |||
| skipping to change at page 17, line 24 ¶ | skipping to change at page 17, line 30 ¶ | |||
| Pascal Thubert | Pascal Thubert | |||
| Cisco Systems, Inc | Cisco Systems, Inc | |||
| Building D | Building D | |||
| 45 Allee des Ormes - BP1200 | 45 Allee des Ormes - BP1200 | |||
| MOUGINS - Sophia Antipolis 06254 | MOUGINS - Sophia Antipolis 06254 | |||
| FRANCE | FRANCE | |||
| Phone: +33 497 23 26 34 | Phone: +33 497 23 26 34 | |||
| Email: pthubert@cisco.com | Email: pthubert@cisco.com | |||
| Behcet Sarikaya | Behcet Sarikaya (editor) | |||
| Huawei USA | Huawei USA | |||
| 5340 Legacy Dr. Building 3 | 5340 Legacy Dr. Building 3 | |||
| Plano, TX 75024 | Plano, TX 75024 | |||
| Email: sarikaya@ieee.org | Email: sarikaya@ieee.org | |||
| End of changes. 8 change blocks. | ||||
| 17 lines changed or deleted | 17 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||