⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 draft-ietf-dnsop-ipv6-dns-configuration-06.txt

📁 非常好的dns解析软件
💻 TXT
📖 第 1 页 / 共 5 页
字号:
   2.  DHCPv6 is not necessarily needed for 3GPP UE IPv6 addressing       (3GPP Stateless Address Autoconfiguration is typically used), and       not automatically implemented in 3GPP IPv6 UEs.Jeong                   Expires November 6, 2005               [Page 20]Internet-Draft    IPv6 Host Configuration of DNS Server         May 2005   3.  Scalability and reliability of DHCPv6 in very large 3GPP networks       (with tens or hundreds of millions of UEs) may be an issue, at       least the redundancy needs to be taken care of.  However, if the       DHCPv6 service is integrated into the network elements, such as a       router operating system, scalability and reliability is       comparable with other DNS configuration approaches.   4.  It is sub-optimal to utilize the radio resources in 3GPP networks       for DHCPv6 messages if there is a simpler alternative available.       *  The use of Stateless DHCPv6 adds one round trip delay to the          case in which the UE can start transmitting data right after          the Router Advertisement.   5.  If the DNS information (suddenly) changes, Stateless DHCPv6 can       not automatically update the UE, see [23].5.3.4  Well-known Addresses   Using well-known addresses is also a feasible and a light mechanism   for 3GPP UEs.  Those well-known addresses can be preconfigured in the   UE software and the operator makes the corresponding configuration on   the network side.  So this is a very easy mechanism for the UE, but   requires some configuration work in the network.  When using well-   known addresses, UE forwards queries to any of the preconfigured   addresses.  In the current proposal [9], IPv6 anycast addresses are   suggested.Note   The IPv6 DNS configuration proposal based on the use of well-known   site-local addresses developed at the IPv6 Working Group was seen as   a feasible mechanism for 3GPP UEs, but opposition by some people in   the IETF and finally deprecating IPv6 site-local addresses made it   impossible to standardize it.  Note that this mechanism is   implemented in some existing operating systems today (also in some   3GPP UEs) as a last resort of IPv6 DNS configuration.5.3.5  Recommendations   It is suggested that a lightweight, stateless DNS configuration   mechanism is specified as soon as possible.  From a 3GPP UE and   network point of view, the Router Advertisement based mechanism looks   most promising.  The sooner a light, stateless mechanism is   specified, the sooner we can get rid of using well-known site-local   addresses for IPv6 DNS configuration.Jeong                   Expires November 6, 2005               [Page 21]Internet-Draft    IPv6 Host Configuration of DNS Server         May 20055.4  Unmanaged Network   There are 4 deployment scenarios of interest in unmanaged networks   [24]:   1.  A gateway which does not provide IPv6 at all;   2.  A dual-stack gateway connected to a dual-stack ISP;   3.  A dual-stack gateway connected to an IPv4-only ISP; and   4.  A gateway connected to an IPv6-only ISP.5.4.1  Case A: Gateway does not provide IPv6 at all   In this case, the gateway does not provide IPv6; the ISP may or may   not provide IPv6.  Automatic or Configured tunnels are the   recommended transition mechanisms for this scenario.   The case where dual-stack hosts behind an NAT, that need access to an   IPv6 RDNSS, cannot be entirely ruled out.  The DNS configuration   mechanism has to work over the tunnel, and the underlying tunneling   mechanism could be implementing NAT traversal.  The tunnel server   assumes the role of a relay (both for DHCP and Well-known anycast   addresses approaches).   RA-based mechanism is relatively straightforward in its operation,   assuming the tunnel server is also the IPv6 router emitting RAs.   Well-known anycast addresses approach seems also simple in operation   across the tunnel, but the deployment model using Well-known anycast   addresses in a tunneled environment is unclear or not well   understood.5.4.2  Case B: A dual-stack gateway connected to a dual-stack ISP   This is similar to a typical IPv4 home user scenario, where DNS   configuration parameters are obtained using DHCP.  Except that   Stateless DHCPv6 is used, as opposed to the IPv4 scenario where the   DHCP server is stateful (maintains the state for clients).5.4.3  Case C: A dual-stack gateway connected to an IPv4-only ISP   This is similar to Case B. If a gateway provides IPv6 connectivity by   managing tunnels, then it is also supposed to provide access to an   RDNSS.  Like this, the tunnel for IPv6 connectivity originates from   the dual-stack gateway instead of the host.Jeong                   Expires November 6, 2005               [Page 22]Internet-Draft    IPv6 Host Configuration of DNS Server         May 20055.4.4  Case D: A gateway connected to an IPv6-only ISP   This is similar to Case B.Jeong                   Expires November 6, 2005               [Page 23]Internet-Draft    IPv6 Host Configuration of DNS Server         May 20056.  Security Considerations   As security requirements depend solely on applications and are   different application by application, there can be no generic   requirement defined at IP or application layer for DNS.   However, it should be noted that cryptographic security requires   configured secret information that full autoconfiguration and   cryptographic security are mutually exclusive.  People insisting on   secure full autoconfiguration will get false security, false   autoconfiguration or both.   In some deployment scenarios [19], where cryptographic security is   required for applications, the secret information for the   cryptographic security is preconfigured through which application   specific configuration data, including those for DNS, can be securely   configured.  It should be noted that if applications requiring   cryptographic security depend on DNS, the applications also require   cryptographic security to DNS.  Therefore, the full autoconfiguration   of DNS is not acceptable.   However, with full autoconfiguration, weaker but still reasonable   security is being widely accepted and will continue to be acceptable.   That is, with full autoconfiguration, which means there is no   cryptographic security for the autoconfiguration, it is already   assumed that the local environment is secure enough that the   information from the local autoconfiguration server has acceptable   security even without cryptographic security.  Thus, the   communication between the local DNS client and local DNS server has   acceptable security.   In autoconfiguring recursive servers, DNSSEC may be overkill, because   DNSSEC [29] needs the configuration and reconfiguration of clients at   root key roll-over [30][31].  Even if additional keys for secure key   roll-over are added at the initial configuration, they are as   vulnerable as the original keys to some forms of attacks, such as   social hacking.  Another problem of using DNSSEC and   autoconfiguration together is that DNSSEC requires secure time, which   means secure communication with autoconfigured time servers, which   requires configured secret information.  Therefore, in order that the   autoconfiguration may be secure, it requires configured secret   information.   If DNSSEC [29] is used and the signatures are verified on the client   host, the misconfiguration of a DNS server may be simply denial of   service.  Also, if local routing environment is not reliable, clients   may be directed to a false resolver with the same IP address as the   true one.Jeong                   Expires November 6, 2005               [Page 24]Internet-Draft    IPv6 Host Configuration of DNS Server         May 20056.1  RA Option   The security of RA option for RDNSS is the same as the ND protocol   security [3][8].  The RA option does not add any new vulnerability.   It should be noted that the vulnerability of ND is not worse and is a   subset of the attacks that any node attached to a LAN can do   independently of ND.  A malicious node on a LAN can promiscuously   receive packets for any router's MAC address and send packets with   the router's MAC address as the source MAC address in the L2 header.   As a result, the L2 switches send packets addressed to the router to   the malicious node.  Also, this attack can send redirects that tell   the hosts to send their traffic somewhere else.  The malicious node   can send unsolicited RA or NA replies, answer RS or NS requests, etc.   All of this can be done independently of implementing ND.  Therefore,   the RA option for RDNSS does not add to the vulnerability.   Security issues regarding the ND protocol were discussed at IETF SEND   (Securing Neighbor Discovery) Working Group and RFC 3971 for the ND   security has been published [14].6.2  DHCPv6 Option   The DNS Recursive Name Server option may be used by an intruder DHCP   server to cause DHCP clients to send DNS queries to an intruder DNS   recursive name server [7].  The results of these misdirected DNS   queries may be used to spoof DNS names.   To avoid attacks through the DNS Recursive Name Server option, the   DHCP client SHOULD require DHCP authentication (see section   "Authentication of DHCP messages" in RFC 3315 [5]) before installing   a list of DNS recursive name servers obtained through authenticated   DHCP.6.3  Well-known Anycast Addresses   Well-known anycast addresses does not require configuration security   since there is no protocol [9].   The DNS server with the preconfigured addresses are still reasonably   reliable, if local environment is reasonably secure, that is, there   is no active attackers receiving queries to the anycast addresses of   the servers and reply to them.Jeong                   Expires November 6, 2005               [Page 25]Internet-Draft    IPv6 Host Configuration of DNS Server         May 20057.  Contributors   Ralph Droms   Cisco Systems, Inc.   1414 Massachusetts Ave.   Boxboro, MA  01719   US   Phone: +1 978 936 1674   Email: rdroms@cisco.com   Robert M. Hinden   Nokia   313 Fairchild Drive   Mountain View, CA  94043   US   Phone: +1 650 625 2004   Email: bob.hinden@nokia.com   Ted Lemon   Nominum, Inc.   950 Charter Street   Redwood City, CA  94043   US   Email: Ted.Lemon@nominum.com   Masataka Ohta   Tokyo Institute of Technology   2-12-1, O-okayama, Meguro-ku   Tokyo  152-8552   Japan   Phone: +81 3 5734 3299   Fax:   +81 3 5734 3299   Email: mohta@necom830.hpcl.titech.ac.jp   Soohong Daniel Park   Mobile Platform Laboratory, SAMSUNG Electronics   416 Maetan-3dong, Yeongtong-Gu   Suwon, Gyeonggi-Do  443-742   KoreaJeong                   Expires November 6, 2005               [Page 26]Internet-Draft    IPv6 Host Configuration of DNS Server         May 2005   Phone: +82 31 200 4508   Email: soohong.park@samsung.com   Suresh Satapati   Cisco Systems, Inc.   San Jose, CA  95134   US   Email: satapati@cisco.com   Juha Wiljakka   Nokia   Visiokatu 3   FIN-33720, TAMPERE   Finland   Phone: +358 7180 48372   Email: juha.wiljakka@nokia.com

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -