{"draft":"draft-ietf-csi-sndp-prob-04","doc_id":"RFC5909","title":"Securing Neighbor Discovery Proxy: Problem Statement","authors":["J-M. Combes","S. Krishnan","G. Daley"],"format":["ASCII","HTML"],"page_count":"22","pub_status":"INFORMATIONAL","status":"INFORMATIONAL","source":"Cga & Send maIntenance","abstract":"Neighbor Discovery Proxies are used to provide an address presence on\r\na link for nodes that are no longer present on the link. They allow\r\na node to receive packets directed at its address by allowing another\r\ndevice to perform Neighbor Discovery operations on its behalf.\r\n\r\nNeighbor Discovery Proxy is used in Mobile IPv6 and related protocols\r\nto provide reachability from nodes on the home network when a Mobile\r\nNode is not at home, by allowing the Home Agent to act as proxy. It\r\nis also used as a mechanism to allow a global prefix to span multiple\r\nlinks, where proxies act as relays for Neighbor Discovery messages.\r\n\r\nNeighbor Discovery Proxy currently cannot be secured using Secure\r\nNeighbor Discovery (SEND). Today, SEND assumes that a node\r\nadvertising an address is the address owner and in possession of\r\nappropriate public and private keys for that node. This document\r\ndescribes how existing practice for proxy Neighbor Discovery relates\r\nto SEND. This document is not an Internet Standards Track \r\nspecification; it is published for informational purposes.","pub_date":"July 2010","keywords":["send","secure neighbor discovery"],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC5909","errata_url":null}