Secure Neighbor Discovery
This article includes a list of references, related reading, or external links, but its sources remain unclear because it lacks inline citations. (January 2011) |
The Secure Neighbor Discovery (SEND) protocol is a security extension of the Neighbor Discovery Protocol (NDP) in IPv6 defined in RFC 3971 and updated by RFC 6494.
The Neighbor Discovery Protocol (NDP) is responsible in IPv6 for discovery of other network nodes on the local link, to determine the link layer addresses of other nodes, and to find available routers, and maintain reachability information about the paths to other active neighbor nodes (RFC 4861). NDP is insecure[1] and susceptible to malicious interference. It is the intent of SEND to provide an alternate mechanism for securing NDP with a cryptographic method that is independent of IPsec, the original and inherent method of securing IPv6 communications.
SEND uses Cryptographically Generated Addresses (CGA) and other new NDP options for the ICMPv6 packet types used in NDP.
SEND was updated to use the Resource Public Key Infrastructure (RPKI) by RFC 6494 and RFC 6495 which define use of a SEND Certificate Profile utilizing a modified RFC 6487 RPKI Certificate Profile which must include a single RFC 3779 IP Address Delegation extension.
There have been concerns with algorithm agility vis-à-vis attacks on hash functions used by SEND expressed in RFC 6273, as CGA currently uses the SHA-1 hash algorithm and PKIX certificates and does not provide support for alternative hash algorithms.
Implementations
- Cisco IOS 12.4(24)T and newer
- Docomo USL SEND fork[permanent dead link ]
- Easy-SEND
- ipv6-send-cga, Huawei and Beijing University of Posts and Telecommunications
- NDprotector, Telecom SudParis
- Native SeND kernel API
- TrustRouter
- USL SEND (discontinued), NTT DoCoMo
- WinSEND
See also
References
- ^ Holding IPv6 Neighbor Discovery to a Higher Standard of Security, community.infoblox.com, 2.10.2015