[aodvv2-discuss] Re: Fwd: [manet] Stuff from review of aodv-11 page 1-22 that are still not folded into -12

  • From: John Dowdell <john.dowdell486@xxxxxxxxx>
  • To: AODVv2 Discuss <aodvv2-discuss@xxxxxxxxxxxxx>
  • Date: Wed, 2 Dec 2015 19:33:50 +0000

In a galaxy far, far away, some people once wrote:


I suggested in my last review:

“It is important to do more than this: 7182 does only provide
“containers”
for ICVs and timestamps, and does not specify how to use
them to obtain
specific security properties. RFC7182 may be a tool that can
be used, but
*how* that tool is used is what determines the security
properties.

Therefore, saying that “security is dealt with by using
RFC7182” is either an
incomplete statement, or is indicative of insufficient
security considerations.”

The actual sentence in the I-D has been changed, now it explicitly
names the
two TLVs from 7182 that it uses. That is, alas, still not sufficient.

Making the aside that was discussed recently on the list, that (i)
control messages
are not forwarded, and that (ii) they are modified in transit, the
security/trust model
is somewhat different from that of 7181 and consequently for what
7182 was initially
written for. I think that calling out the trust model, and how 7182
actually is used here,
might be what is called for.

Continuing with the aside, this *especially* as the applicability
statement says:

"Providing security for a reactive routing protocol can be
difficult”

Vicky: Anyone like to volunteer some text?


I'm going to have to think about this for a while…

Yes I agree. 7182 does only specify the place where you can put your ICV, and
leaves it as an exercise for the reader to come up with an actual ICV. Hunting
around the inter web, an ICV seems to be something like an encrypted checksum
(so perhaps a CRC-32 encrypted with your favourite crypto suite), but using
stream ciphers are not recommended, and some sort of challenge-handshake test
based on a shared secret seems ok with some people. Frankly this is way out of
our specification, and it should be for system integrators to come up with
their own scheme. If there was an IETF best practice specification on ICV’s we
should refer to that. Perhaps something to raise with the Sec AD, who should
know about this stuff? Some of the material on IKEv2 (e.g. RFC5282) points to
RFC5116 for integrity check but I’m not qualified to make an assessment on that.

John


Other related posts: