首页> 外文会议>Security Protocols >Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World
【24h】

Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World

机译:IPv6世界中的拒绝服务,地址所有权和早期身份验证

获取原文
获取外文期刊封面目录资料

摘要

In the IPv6 world, the IP protocol itself, i.e., IPv6, is used for a number of functions that currently fall beyond the scope of the IPv4 protocol. These functions include address configuration, neighbour detection, router discovery, and others. It is either suggested to or required that IPsec is used to secure these functions. Furthermore, IPsec is used to protect a number of functions that are considered dangerous in the IPv4 world, including mobility management and source routing. Now, the currently prominent method for creating IPsec Security Associations, the Internet Key Exchange (IKE) protocol, is both relatively heavy and requires that the underlying IP stacks are already fully functional, at least to the point that UDP may be used. As a result, the combination of the widened responsibility of IPsec and the relative heavy weight of IKE creates a vicious cycle that is a potential source of various denial-of-service attacks. Additionally, if we want to use IPsec to secure IPv6 autoconfiguration, a chicken-and-egg problem is created: fully configured IPsec is needed to configure IP, and fully configured IP is needed to configure IPsec. In this paper, we describe these problems in detail.
机译:在IPv6世界中,IP协议本身即IPv6被用于当前超出IPv4协议范围的许多功能。这些功能包括地址配置,邻居检测,路由器发现等。建议或要求使用IPsec保护这些功能。此外,IPsec用于保护许多在IPv4世界中被认为是危险的功能,包括移动性管理和源路由。现在,创建IPsec安全关联的当前主要方法,即Internet密钥交换(IKE)既较重,又要求底层IP堆栈已经完全起作用,至少可以使用UDP。结果,IPsec责任范围的扩大和IKE相对繁重的结合,形成了一个恶性循环,这是各种拒绝服务攻击的潜在来源。此外,如果我们要使用IPsec来保护IPv6自动配置,则会出现“鸡与蛋”的问题:需要完全配置的IPsec来配置IP,而需要完全配置的IP来配置IPsec。在本文中,我们将详细描述这些问题。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号