The Secure Neighbor Discovery (SEND) protocol is a security extension of the Neighbor Discovery Protocol (NDP) in IPv6 defined in RFC 3971 and updated by RFC 6494.
The Neighbor Discovery Protocol (NDP) is responsible in IPv6 for discovery of other network nodes on the local link, to determine the link layer addresses of other nodes, and to find available routers, and maintain reachability information about the paths to other active neighbor nodes (RFC 4861). NDP is insecure[1] and susceptible to malicious interference. It is the intent of SEND to provide an alternate mechanism for securing NDP with a cryptographic method that is independent of IPsec, the original and inherent method of securing IPv6 communications.
SEND uses Cryptographically Generated Addresses (CGA) and other new NDP options for the ICMPv6 packet types used in NDP.
SEND was updated to use the Resource Public Key Infrastructure (RPKI) by RFC 6494 and RFC 6495 which define use of a SEND Certificate Profile utilizing a modified RFC 6487 RPKI Certificate Profile which must include a single RFC 3779 IP Address Delegation extension.
There have been concerns with algorithm agility vis-à-vis attacks on hash functions used by SEND expressed in RFC 6273, as CGA currently uses the SHA-1 hash algorithm and PKIX certificates and does not provide support for alternative hash algorithms.
YouTube Encyclopedic
-
1/3Views:1 0961 24128 616
-
How secure is IPv6? (an insight into my upcoming course)
-
MicroNugget: Setting Up SSH on a Cisco IPv6 Router
-
A look into IPv6
Transcription
Implementations
- Cisco IOS 12.4(24)T and newer
- Docomo USL SEND fork[permanent dead link]
- Easy-SEND
- ipv6-send-cga, Huawei and Beijing University of Posts and Telecommunications
- NDprotector, Telecom SudParis
- Native SeND kernel API
- TrustRouter
- USL SEND (discontinued), NTT DoCoMo
- WinSEND
See also
References
- ^ Holding IPv6 Neighbor Discovery to a Higher Standard of Security, community.infoblox.com, 2.10.2015