IPv6 CGA and key (non-)management, was Re: How to preempt rogue RAs?

Shane Kerr shane at time-travellers.org
Mon Nov 1 15:32:32 CET 2010


Gert,

On Mon, 2010-11-01 at 15:20 +0100, Gert Doering wrote:
> True for "neighbor discovery" things, where you want to make sure that
> the person replying to an ND for a well-known IPv6 address is really the
> one entitled to answer (protect against ND poisoning/spoofing).  You
> need prior knowledge: you need to know who you want to talk *to*.
> 
> For RAs, since you don't know who the router *is*, CGA-style protection
> ("I'm a router, and I have the key to prove that my IPv6 address really
> is what I claim the address to be") will not validate the "I'm a router!"
> bit.  For that, you need the CA stuff - someone you trust authorizes the
> router to send RAs.  Who has no CA certificate is not a trusted router.

Fair enough. I guess I sort of lost sight of the context of the
discussion (worrying about rogue RAs).

I'm not sure that configuring a CA gives you a lot though. You're
basically configuring your network devices so that you can use RA which
will avoid having to configure your network devices. :-P

Also, if we're talking about networks where administrators cannot be
bothered to filter RA traffic then does it seem likely that they will be
interested in configuring certificates on their devices? ;)

--
Shane




More information about the ipv6-ops mailing list