
|
Threat Model Documents RFC 3756, “IPv6 Neighbor Discovery (ND) Trust Models and Threats”, May 2004 RFC 3118, “Authentication for DHCP Messages” draft-ietf-dhc-v4-threat-analysis-02.txt, “Dynamic Host Configuration Protocol for IPv4 (DHCPv4) Threat Analysis”, April 2004 draft-prigent-dhcpv6-threats-00.txt, “DHCPv6 Threats”, March 2001 Threats Rogue configuration servers (man-in-the-middle, DoS) Redirect attacks (e.g. rogue default gateway, DNS server) DoS attack via invalid configuration Accidentally configured configuration servers Rogue clients (DoS) Impersonation of another client Resource exhaustion attack on server (more likely on IPv4) CPU exhaustion (if heavyweight computation required) Non-threats Disclosure MAC, IP addresses are public information Most server addresses considered public information Not clear what, if any configuration data is sensitive |