1 / 15

SHIM6 Protocol Drafts Overview

This protocol draft explores the SHIM6 approach to supporting multiple external connections in IPv6 end-site configurations, focusing on session resiliency and avoiding routing system overload. It covers host-based solutions, per-host pairs, negotiated capabilities, and more.

stevenmay
Download Presentation

SHIM6 Protocol Drafts Overview

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. SHIM6 Protocol DraftsOverview Geoff Huston, Marcelo Bagnulo, Erik Nordmark

  2. The Multi6 Problem • how to support IPv6 end-site configurations that have multiple external connections to support application-level session resiliency across connectivity failure events • how to use IPv6 multi-addressing and connection-based address aggregates to avoid overloading the routing system with site-based specific address advertisements

  3. The SHIM6 Approach • host-based solution (rather than host / router interaction) • network layer approach – per host pair (rather than transport – per session) • discoverable negotiated capability (rather than a new protocol service) • no new identifier space

  4. Shim6 From http://www.shim6.org

  5. Initial Contact No SHIM state active Locator Selection using RFC3484 Locators and Identifiers are Equivalent Transport Transport IDENTIFIERS SHIM SHIM IP IP LOCATORS

  6. SHIM6 Activation SHIM active Current Locator Sets exchanged Locators and Identifiers are Equivalent Transport Transport IDENTIFIERS SHIM SHIM IP IP LOCATORS [context]

  7. SHIM6 Locator Failure and Recovery Detect locator failure Explore for functioning locator pair Use new locator pair – preserve identifier pair Transport Transport IDENTIFIERS SHIM SHIM Reachability Exchange IP IP LOCATORS [context]

  8. SHIM6 Control Elements • initial handshake (4-way) and locator set exchange • locator list updates • explicit locator switch request • keepalive • reachability probe exchange • No-Context error exchange

  9. SHIM6 Proto Issues • Interaction with IPSEC BITW • Case where IPSEC is applied at the interface • Solution: implement part of shim6 proto in the BITW • Is this an extension to SHIM6 decoders allowing variable Shim6 / IPsec header processing depending on header ordering? • It is possible to put shim6 on top of IPSec, maybe suboptimal (IKE for each locator pair) • IPSec Transport mode vs. IPSec Tunnel mode • This is not IPSec security for shim6 signalling

  10. SHIM6 Proto Issues • Provide shim6 security based on IPSec SAs • Option 1: use certificates with ULIDs in them • How do you issue this certificates • Address autoconf, DHCP, • Revocation • Option 2: use pre-existent IPSec trust relationships • Still need to change IPSec so that SAs are dynamically created when a locator pair changes • This is functionally what mobike does…

  11. SHIM6 Proto Issues • Support for multiple ULID security mechanisms • Already have HBA, CGA HBA/CGA hybrids • Is the protocol spec already sufficiently modular wrt ULID security? • Do we need to support other security mechanisms • DNS • SSL certificates • Do we need to support different security for client and server? • Do we need error messages to express no support for a sec mechanism? See key length section… • DoS attacks based on exhausting the 2^47 context tag space • Would the 4-way handshake enough to protect this?

  12. SHIM6 Proto Issues • About forking • The whole point of shim6 is to make locator transparent to ULP, then why forking? • Examples of apps using forking • Transport Area AD request for support for different transports • Allowing a shim6 host to continue using a renumbered prefix may create confusion and security issues • Proposal: remove recommendation about keeping shim6 context even if the prefix was renumbered • Shim6 protocol should define minimum CGA key length? • What would be the minimum length? • Do we need to define an error message for different security mechanisms/key lengths? Currently ICMP parameter problem in the UPDATE case and silent discard in I2/R2 case • Define the BROKEN flag

  13. SHIM6 HBA Issues • IPR Concerns • IPR statements on CGA with potential HBA relevance have been clarified to the WG • Use of protocol structures that are compatible with CGA • Is this acceptable to the WG? • IANA Considerations • Is “CGA Extension Type” a new IANA registry? • RFC 4581 creates the CGA Extension type registry • Security Considerations • Is the “Interaction with ISPEC” section finished? • Is the “SHA-1 Dependency” section finished? • draft-bagnulo-multiple-hash-cga-00 • SECDIR review: added motivation, overview and threat model section • Other Issues?

  14. SHIM6 Failure Detection Issues • Have all the identified issues been addresses in the -06 version of this draft?

  15. Shim6 WG Last Call • Is the WG ready to pass these 3 base drafts to the IESG for publication as Proposed Standard?

More Related