Open puradox opened 4 years ago
https://tools.ietf.org/html/rfc8504#section-5.5 (published Jan 2019)
There have been relatively few implementations of SEND in common
operating systems and platforms since its publication in 2005; thus,
deployment experience remains very limited to date.
At this time, support for SEND is considered optional. Due to the
complexity in deploying SEND and its heavyweight provisioning, its
deployment is only likely to be considered where nodes are operating
in a particularly strict security environment.
To protect against ARP poisoning and other attacks against NDP functions, Secure Neighbor Discovery (SEND) Protocol should be deployed where preventing access to the broadcast segment might not be possible. SEND uses RSA key pairs to produce Cryptographically Generated Addresses (CGA), as defined in RFC 3972. This ensures that the claimed soruce of an NDP message is the owner of the claimed address.
From RFC 4861 Section 11.1. Threat Analysis:
This issue homes the discussion of whether or not we need this feature.