One document matched: draft-arkko-mip6-ro-enhancements-00.txt
Network Working Group J. Arkko
Internet-Draft Ericsson Research NomadicLab
Expires: April 1, 2005 C. Vogt
University of Karlsruhe
October 2004
A Taxonomy and Analysis of Enhancements to Mobile IPv6 Route
Optimization
draft-arkko-mip6-ro-enhancements-00
Status of this Memo
By submitting this Internet-Draft, I certify that any applicable
patent or other IPR claims of which I am aware have been disclosed,
and any of which I become aware will be disclosed, in accordance with
RFC 3668.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that other
groups may also distribute working documents as Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at http://
www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on April 1, 2005.
Copyright Notice
Copyright (C) The Internet Society (2004). All Rights Reserved.
Arkko & Vogt Expires April 1, 2005 [Page 1]
Internet-Draft MIP6 Route Optimization Enhancements October 2004
Abstract
The Mobile IPv6 mobility-management protocol enables minimum routing
paths between a mobile node and a correspondent node, which may
itself be mobile. This feature is called route optimization. Route
optimization requires authorization of initially unacquainted and
untrusted parties. A so-called return-routability procedure was
integrated into the Mobile IPv6 in order to do this securely. The
return-routability procedure equips the mobile node with
cryptographic tokens that authenticate the mobile node and prove the
mobile node's presence at a claimed new location after movement.
Recently, a number of improvements or optional alternatives have been
suggested to the standard procedure. The primary driver between these
improvements is oftentimes further reduction of signaling messages
and latency, but other improvements such as better security have also
been suggested. This document discusses the potential goals for
future enhancements of route optimization, the security threats that
such enhancements must consider, and the various enhancement
proposals and their key ideas. An evaluation of some recent proposals
is included, as well as a discussion of how significant the Mobile
IPv6 related optimizations are related to other ongoing optimization
efforts. Finally, needs for future research are outlined.
Arkko & Vogt Expires April 1, 2005 [Page 2]
Internet-Draft MIP6 Route Optimization Enhancements October 2004
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 4
2. Mobility-Related Security Threats . . . . . . . . . . . . . 6
2.1 Impersonation Attacks . . . . . . . . . . . . . . . . . . 6
2.2 Resource-Exhaustion Attacks . . . . . . . . . . . . . . . 7
2.3 Flooding Attacks . . . . . . . . . . . . . . . . . . . . . 8
3. Mobile IPv6 Route Optimization . . . . . . . . . . . . . . . 9
3.1 Goals and Assumptions . . . . . . . . . . . . . . . . . . 10
3.2 Return Routability Procedure . . . . . . . . . . . . . . . 11
3.3 Security Analysis . . . . . . . . . . . . . . . . . . . . 16
4. Objectives for Enhancement . . . . . . . . . . . . . . . . . 17
4.1 Latency Optimizations . . . . . . . . . . . . . . . . . . 17
4.2 Signaling Optimizations . . . . . . . . . . . . . . . . . 18
4.3 Security Enhancements . . . . . . . . . . . . . . . . . . 19
4.4 Applicability Enhancements . . . . . . . . . . . . . . . . 20
5. The Toolbox . . . . . . . . . . . . . . . . . . . . . . . . 20
5.1 Address Tests . . . . . . . . . . . . . . . . . . . . . . 21
5.2 Protected Tunnels . . . . . . . . . . . . . . . . . . . . 21
5.3 Optimistic Behaviour . . . . . . . . . . . . . . . . . . . 22
5.4 Proactive Tests . . . . . . . . . . . . . . . . . . . . . 22
5.5 Concurrent Tests . . . . . . . . . . . . . . . . . . . . . 23
5.6 Diverted Routing . . . . . . . . . . . . . . . . . . . . . 24
5.7 Credit-Based Authorization . . . . . . . . . . . . . . . . 25
5.8 Heuristic Monitoring . . . . . . . . . . . . . . . . . . . 26
5.9 Cryptographically Generated Addresses . . . . . . . . . . 27
5.10 Semi-Permanent Security Associations . . . . . . . . . . 28
5.11 Pre-Configuration . . . . . . . . . . . . . . . . . . . 29
5.12 Infrastructure . . . . . . . . . . . . . . . . . . . . . 29
5.13 Cryptographically Bound Identifiers . . . . . . . . . . 30
5.14 Local Mobility . . . . . . . . . . . . . . . . . . . . . 30
5.15 Local Repair . . . . . . . . . . . . . . . . . . . . . . 31
5.16 Processing Improvements . . . . . . . . . . . . . . . . 32
5.17 Delegation . . . . . . . . . . . . . . . . . . . . . . . 33
6. Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . 33
6.1 Categorization of Techniques . . . . . . . . . . . . . . . 33
6.2 Evaluation of Some Proposals . . . . . . . . . . . . . . . 34
6.3 Further Research . . . . . . . . . . . . . . . . . . . . . 42
7. Security Considerations . . . . . . . . . . . . . . . . . . 44
8. Conclusions . . . . . . . . . . . . . . . . . . . . . . . . 44
9. References . . . . . . . . . . . . . . . . . . . . . . . . . 47
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . 50
A. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 50
Intellectual Property and Copyright Statements . . . . . . . 51
Arkko & Vogt Expires April 1, 2005 [Page 3]
Internet-Draft MIP6 Route Optimization Enhancements October 2004
1. Introduction
Traditionally, an IP address combines identification and location
semantics. The address prefix locates a node's point of network
attachment. It is used by routers to forward IP packets towards the
correct destination. At the same time, existing transport protocols
and applications, commonly termed "upper layers", use the IP address
as part of a session identification. This naturally rules out
mobility: Whenever a mobile node moves from one access network to
another, its IP address must change to reflect the new location. The
new "identity", however, causes sessions at upper layers to abort.
Protocol designers thus had to decide whether to change transport
protocols and applications, or to come up with a new IP-layer
protocol that could separate location from identification
functionality. Due to the prevalence of TCP and the significant base
of existing applications, most people opted for the latter approach.
Mobile IPv6 [15], its IPv4 counterpart [25], and the Host Identity
Protocol [22] are three dominant mobility-management protocols that
the IETF has developed to facilitate the continued use of existing
transport protocols and applications in an Internet with mobility
support. This document focuses on Mobile IPv6.
Mobile IPv6 uses two IP addresses per mobile node in an attempt to
separate location semantics from identification semantics: a
transient "care-of address" is used for the purpose of routing. It is
reconfigured whenever the mobile node moves to a new access network.
A static "home address" is configured with the network prefix from a
non-mobile "home agent's" network. The home address doesn't change
when the mobile node moves, and it can be used for session
identification at upper layers. The home address also serves as a
node identifier for Mobile IPv6 itself. In the Mobile IPv6 base mode,
"bidirectional tunneling", the home agent intercepts packets
addressed to the mobile node's home address, and it tunnels those
packets to the mobile node's current care-of address. After
decapsulation at the mobile node, these packets bear the mobile
node's home address and are as such accepted at upper layers. In the
opposite direction, transport protocols and applications at the
mobile node generate packets with the home address in the IPv6 Source
Address field. The mobile node tunnels these packets to the home
agent who, in turn, decapsulates them and forwards them on to the
final recipient.
Bidirectional tunneling through the home agent provides for location
privacy, as a communication peer never sees the mobile node's care-of
address. It is also a very safe approach to mobility, because all
signaling between the mobile node and the home agent can easily be
protected by means of a pre-established security association and
Arkko & Vogt Expires April 1, 2005 [Page 4]
Internet-Draft MIP6 Route Optimization Enhancements October 2004
trust relationship. Last, but not least, the beauty of bidirectional
tunneling is that it does not require support from a mobile node's
correspondent peer. On the other hand, middle-box-style approaches
like bidirectional tunneling loose attractiveness due to the
additional overhead that a growing population of mobile nodes can
pose on the Internet. A home agent can also be a single point of
failure or a performance bottleneck. This leads to the concept of
"route optimization".
With Mobile IPv6 route optimization, packets can be directly relayed
between a mobile node and its correspondent node. The mobile node
keeps the correspondent node up to date about its current care-of
address. When a route-optimized packets is received from the network,
either at the mobile node or at the correspondent node, the Mobile
IPv6 implementation replaces the care-of address in the packet's IPv6
header by the mobile node's home address before the packet is handed
to the upper layer. Vice versa, when a packet is received from the
upper layer, the Mobile IPv6 implementation replaces the home address
in the packet's IPv6 header by the mobile node's current care-of
address before the packet is injected into the network.
The need for routing efficiency was deemed important enough to
outweigh a number of disadvantages that come along with route
optimization. First of all, different than bidirectional tunneling,
route optimization requires mobility support from the correspondent
node. Also, route optimization reveals the mobile node's current
care-of address to the correspondent node, and thus makes the mobile
node tracable. Route optimization should therefore not be used when
location privacy is an issue. Last, but not least, route optimization
would impose significant security threats if it was not accompanied
by a new security protocol: Although one can generally neither
presuppose a security association nor a trust relationship between a
mobile node and its communication peer, a correspondent node should
be able to verify the origin, the integrity, and the validity of all
received registration messages. Indeed, a mobile node must authorize
its requests to the correspondent node, protect a registration
message against tampering, and prove to the correspondent node that
it is indeed reachable through the to-be-registered care-of address.
Such protection is necessary to prevent impersonation and
denial-of-service attacks [23].
As part of the registration procedure, a correspondent node probes a
mobile node's home address to verify the mobile node's identity. It
also probes the mobile node's care-of address to gain assurance that
the mobile node is reachable at this address. The two address tests
are combined in the so-called "return-routability procedure".
The return-routability procedure is to be executed for each
Arkko & Vogt Expires April 1, 2005 [Page 5]
Internet-Draft MIP6 Route Optimization Enhancements October 2004
care-of-address update, or periodically in case the mobile node does
not move for a while. This can lead to a handover delay unacceptable
for many real-time or interactive applications like Voice over IP
(VoIP) and audio or video streaming. Moreover, the periodic
repetitions imply a hidden signaling overhead that may interfere with
mobile nodes who intend to sleep during times of inactivity. Finally,
the return-routability procedure uses "weak authentication" to bind a
home address to the legitimate owner. It limits vulnerabilities to
attackers that are on the path from the correspondent node to the
mobile node or to the home agent. The residual vulnerabilities are
similar to those that exist anyway in today's non-mobile Internet.
But still, mechanisms that use strong authentication of IP addresses
can provide a higher level of security than the return-routability
procedure does.
This document describes and classifies possible enhancements to the
return-routability procedure. Following this introduction, section
Section 2 shows which new security threats arise in an Internet with
mobility support. Section 3 explains the care-of-address registration
protocol as defined in RFC 3775 [15], including the
return-routability procedure. A number of potential goals for
enhancements (such as reducing latency) are discussed in Section 4.
Known optimization techniques are discussed in Section 5. Section 6
discusses how these techniques are used by existing optimization
proposals, evaluates some of these proposals, and proposes some
further work.
2. Mobility-Related Security Threats
Mobile IPv6 allows a node to redirect those packets, that a
correspondent node would otherwise send to one IP address (the home
address), to a second IP address (the care-of address). But the
ability for redirection could also be misused by a malicious node for
an arbitrary pair of IP addresses if no appropriate precautions were
taken.
Overall, there are three major families of mobility-related threats:
impersonation attacks, resource-exhaustion attacks, and flooding
attacks. The following subsections take a closer look at each of the
categories. Threats are described in the light of Mobile IPv6, but
some of them apply to other mobility-management protocols as well.
2.1 Impersonation Attacks
The probably most obvious issue with mobility is how one can ensure
that only a mobile node itself has the ability to change its care-of
address. If care-of-address registrations were unauthenticated, an
attacker could easily impersonate an arbitrary victim. For instance,
Arkko & Vogt Expires April 1, 2005 [Page 6]
Internet-Draft MIP6 Route Optimization Enhancements October 2004
the attacker could contact the victim's correspondent node and
register its own IP address on behalf of its victim. The
correspondent node would assume that the victim's care-of address has
changed, and it would redirect all packets intended for the victim to
the attacker instead. The attacker could forward the packets to the
victim after analyzing, or even tampering with, their payloads. In a
related offense, the perpetrator could simply cause havoc at its
victim by directing the victim's packets to a random or non-existent
IP address. These attacks are jointly referred to as "impersonation
attacks". Impersonation attacks can be prevented through proper
authentication techniques that keep an outsider from assuming another
node's identity.
It is important to recognize that impersonation attacks not only
impact those nodes that have an interest in mobility. Although the
attacker makes the correspondent node believe that the victim is
mobile, neither the attacker nor the victim do have to be mobile.
Indeed, mobile nodes, non-moving nodes with mobility support, as well
as traditional stationary nodes are potentially endangered because
they all share the same IPv6 identifier namespace. (Actually, even
IPv4 nodes are jeopardized when IPv4-to-IPv6 translation occurs on
the path between these nodes and their correspondent peers.) This
unfolds the need for mandatory protection of mobility-related
signaling in order to safeguard the Internet community as a whole.
Beyond their large group of potential victims, mobility-related
impersonation attacks allow an attacker to choose the location from
where to wage its attack. For example, the impersonator could
position itself at a place where it is easier to inject spoofed
care-of-address registration packets into the network than anywhere
on the direct path between the victims. The attacker may also move to
a place where it can remain unrecognized. In contrast to this, in the
non-mobile Internet that we have today, an attacker can only listen
to or tamper with packets while it is on the path between its
victims. Similarly, a mobility-management protocol may give the
attacker the possibility to shift the time for its attack. The
attacker might be able to register false care-of addresses even
before its victims' conversation begins, or attack a network long
after it has visited it. In the non-mobile Internet, an attacker must
strike at the same time as its victims communicate. The ability to
choose the location and time for an attack constitutes a dangerous
new degree of freedom for the attacker.
2.2 Resource-Exhaustion Attacks
Mobility support at correspondent nodes can become an issue if it
takes a lot of processing capacity to handle an incoming
care-of-address registration. During times of increased signaling
Arkko & Vogt Expires April 1, 2005 [Page 7]
Internet-Draft MIP6 Route Optimization Enhancements October 2004
load, a correspondent node may thus end up having to commit a
significant fraction of its resources to mobility-related
transactions. What is worse, an attacker may take advantage of this
vulnerability. It could swamp the correspondent node with large
quantities of bogus registrations messages, keeping it from doing
useful work. Such denial-of-service attempts are called
"resource-exhaustion attacks". Clearly, if mobility support is to be
implemented on a large basis, handling care-of-address registrations
must be lightweight in order to lessen the susceptibility to resource
exhaustion. Another effective technique is to defer resource
commitment until late in the registration process: Once the
registrant has proven its identity or shown that it is willing to
invest resources itself, it is less likely malicious. As a last
resort, busy Internet servers should limit the resources they devote
to registration processing, and they may give preference to those
mobile nodes they know or have recently had meaningful communications
with.
It is worthwhile to stress the trade-off between effectiveness of
signaling authentication and resilience against increased signaling
load. On one hand, a strong authentication mechanism can effectively
prevent certain impersonation attacks. On the other hand, the
resources a correspondent node must spend on the verification of a
registering node's authenticity increases with the complexity of the
authentication algorithm. The susceptibility to resource exhaustion
thus grows with the level of protection against impersonation
attacks.
2.3 Flooding Attacks
A third mobility-related security threat emanates from
redirection-based flooding attacks. Redirection-based flooding
attacks are characterized by a victim being bombarded with unwanted
packets at a rate that the victim, and possibly the victim's access
network, cannot handle. As with impersonation attacks, it is
important to compare existing flooding attacks in today's non-mobile
Internet with redirection-based flooding attacks that could be made
possible through an insecure mobility-management protocol.
Three types of flooding attacks can be identified in today's
Internet. The simplest one is a "direct flooding attack". Here, the
attacker itself sends bogus packets to the victim. In an indirect
"reflection attack", the attacker tricks a third node, the
"reflection point", to send the packets. It typically uses a known
protocol vulnerability to make the reflection point generate these
packets [24]. For example, the attacker may send spoofed ICMP Echo
Request packets to the reflection point, using its victim's IP
address in the packets' IPv6 Source Address field. For each such
Arkko & Vogt Expires April 1, 2005 [Page 8]
Internet-Draft MIP6 Route Optimization Enhancements October 2004
request, the reflection point generates an ICMP Echo Reply message,
which it sends "back" to the victim. The advantage of a reflection
attack over a direct flooding attack is that the attacker is usually
harder to track when flooding traffic comes from a third node.
Another example for a reflection attack is TCP-SYN flooding. Here,
the attacker sends TCP SYN packets, again with false source
addresses, to the reflection point, which in turn sends TCP SYN-ACK
packets to someone who does not expect these packets. Since most TCP
servers are configured so that they re-send a TCP SYN packet multiple
times when failing to receive an acknowledgement, this reflection
attack can even produce a small amplification. Gaining higher
amplification in today's Internet necessitates more complex
strategies like "distributed flooding attacks". In a distributed
flooding attack, the attacker typically gains control over other
nodes by spreading viral software. Then, at a certain point of time,
infected nodes simultaneously commence a joint flooding attack
against a common victim.
The introduction of mobility support renders amplified flooding
attacks much less complex. Suppose a mobile node is allowed to change
its care-of address without having to evidence that it is present at
the new care-of address. Then, an attacker can subscribe, through its
own IP address, to a large data flow (e.g., a video stream) offered
by some server on the Internet. The attacker can easily accomplish
the initial handshake procedure with the server while it uses its own
IP address. Once data is flowing, the attacker can redirect the flow
to the IP address of an arbitrary victim. The attacker can use the
sequence numbers learned during the initial handshake procedure in
order to spoof acknowledgements for packets that it assumes the
server has sent to the victim. In this attack, not the attacker, but
a faithful server on the Internet can be made generate packets used
for an attack. The server does not have to be infected with
compromised code, and neither the victim nor the server has to be
mobile. The attacker produces as little as spoofed feedback
information to keep the data flow alive. To make matters worse, the
attacker can redirect data flows from multiple servers to the victim.
Support for Mobile IPv6 route optimization is recommended to all IPv6
nodes [19]. The base of correspondent nodes that an attacker could
exploit for a redirection-based flooding attack would therefore be
immense. Also note that no distribution of viral software would be
necessary. The severity of this new type of flooding is that it would
provide potentially unbounded amplification at comparably low cost.
3. Mobile IPv6 Route Optimization
The potential for new security threats necessitates the protection of
mobility-related signaling in Mobile IPv6. The development of an
Arkko & Vogt Expires April 1, 2005 [Page 9]
Internet-Draft MIP6 Route Optimization Enhancements October 2004
appropriate security design, however, is a challenge: Nodes that
never met before must find a way to authenticate themselves,
preferably without the need for a global PKI. Also, a trade-off
between cryptographic complexity and resilience to resource
exhaustion must be found.
This section explains the security design for Mobile IPv6 route
optimization in the light of the goals and assumptions based on which
it was built.
3.1 Goals and Assumptions
An important objective for the development of Mobile IPv6 was to
provide for a wide, preferably universal, support for route
optimization. In fact, support for Mobile IPv6 and, thus, route
optimization is recommended in the requirements suite for IPv6 nodes
[19]. It was, and still is, believed that the additional routing
overhead associated with bidirectional tunneling is too much of a
burden on the core Internet given that the number of connected mobile
nodes is expected to grow substantially within the next years.
The aspiration for wide-scale deployment of route optimization has an
impact on how correspondent nodes can authenticate mobile nodes.
Authentication can be performed based on a preconfigured shared
secret or through a trusted public-key infrastructure (PKI).
Unfortunately, both approaches turn out to be impractical for route
optimization.
Preconfiguration is not an option because there is usually no
pre-existing relationship between communicating nodes. A PKI could
assist unacquainted nodes in the authentication process. But a PKI
for Mobile IPv6 would have to be able to authenticate all mobile
nodes on the Internet. It is generally believed that no such PKIs can
be constructed. More seriously, a PKI that simply authenticates users
would not suffice to prevent mobility related attacks. It would be
necessary to have authorization of specific IP addresses. This seems
hard even for home addresses, as IP address assignment is usually
handled by other network entities than the PKI nodes. Moreover,
authorization of care-of addresses would be infeasible, as these
addresses change all the time. The global PKI would also constitute
an attractive target for attacks, endangering the Internet as a
whole.
Due to these difficulties, the concept of "weak authentication" was
elaborated for the use between nodes that have no a-priori
relationship. The intent was to make an Internet with mobility
support as secure as the non-mobile Internet is today.
Arkko & Vogt Expires April 1, 2005 [Page 10]
Internet-Draft MIP6 Route Optimization Enhancements October 2004
It is important to recognize that some mobility-related attacks can
be prevented through authentication/authorization of the used IP
addresses, while others cannot. Impersonation attacks belong the the
former class. Protection against resource-exhaustion attacks requires
that the protocol is of low complexity, or delays state creation and
computation in an appropriate manner until peer has shown its
credentials. On the other hand, redirection-based flooding attacks
are based on care-of-address spoofing. Mandatory authentication may
lessen the attractiveness of such flooding, but certainly cannot
prevent it. Care-of-address validity must therefore be ensured
through different means.
One option is to enforce proper use of care-of addresses already at
the mobile node's point of network attachment. The correspondent node
may then simply believe in the validity of a care-of address without
doing any verification itself. Many access networks today provide
this service through ingress filtering [11]. However, the crux with
verifying a care-of address at the fringe of the Internet is that an
attacker can choose the location from where to wage a flooding
attack. As long as there are access networks where ingress filtering,
or an equivalent technique, is not deployed, an attacker can always
avoid care-of-address verification. Mobile IPv6 hence does not rely
on ingress filtering.
Another way to protect against care-of-address spoofing is to have a
correspondent node probe a mobile node's new care-of address before
it sends packet there. This verification strategy operates end to
end, and it is independent of support from the access network. Mobile
IPv6 uses care-of address probing during the return-routability
procedure.
It should be mentioned that care-of-address verification can be
omitted in scenarios where the correspondent node has confidence in
the mobile node's honesty. In fact, Mobile IPv6 assumes a trust
relationship between mobile nodes and their respective home agents.
It is believed that the mandatory security association between mobile
nodes and home agents implicates the trust. This is certainly a
feasible hypothesis in many cases, but one ought to bear that, in
some scenarios, it may be not. If the home registration process had a
care-of address verification, the extension of Mobile IPv6 for
bootstrapping solutions would be easier [29].
3.2 Return Routability Procedure
The security design for Mobile IPv6 route optimization is shaped from
the assumptions outlined in the preceding section. At the heart of a
correspondent registration is the return-routability procedure, a
protocol for weak authentication and end-to-end care-of-address
Arkko & Vogt Expires April 1, 2005 [Page 11]
Internet-Draft MIP6 Route Optimization Enhancements October 2004
verification [15]. This section gives a nutshell view on the standard
Mobile IPv6 correspondent registration. A correspondent registration
has two phases: First, the return-routability procedure is executed,
then the registration proper is accomplished.
Mobile Node Home Agent Correspondent Node
| | |
| 1. Binding Update (BU) | |
|------------------------->| |
| | |
| 2. Binding Ack (BA) | |
|<-------------------------| |
| | |
| 3a. Home Test Init (HoTI)| |
|------------------------->|------------------------->|
| |
| 3b. Care-of Test Init (CoTI) |
|---------------------------------------------------->|
| |
| | 4a.Home Test (HoT) |
|<-------------------------|<-------------------------|
| | |
| 4b.Care-of Test (CoT) |
|<----------------------------------------------------|
| |
| 5. Binding Update (BU) |
|-----------------------------------------------------|
| |
| 6. Binding Ack (BA) |
|<----------------------------------------------------|
| |
Note 1: Waiting for the Binding Acknowledgement from
the home agent may proceed in parallel with the rest
of the process.
Note 2: The home and care-of tests can be done in
parallel. That is, the Home Test Init and Care-of Test
Init messages can be sent one after another, and the
process completes when a response has been received
to both.
Note 3: Acknowledgements are optional (but often
desirable).
Figure 1. Correspondent registration process.
Arkko & Vogt Expires April 1, 2005 [Page 12]
Internet-Draft MIP6 Route Optimization Enhancements October 2004
Figure 1: Mobile IPv6 Correspondent Registration
When the mobile node detects that it has moved to a different access
network, it configures an IP address with the prefix of the new
network. The mobile node registers this IP address as its new care-of
address with the home agent (home registration) and with each
correspondent node capable of supporting route optimization
(correspondent registration). The correspondent registration includes
a return-routability procedure for authentication and care-of-address
verification purposes. Figure Figure 1 depicts the overall process.
The home and correspondent registrations may be interleaved as the
mobile node can already initiate the correspondent registration while
the home registration is still in progress. Messages (1) and (2)
comprise the home registration; messages (3a) to (6) make up the
correspondent registration. In the latter, messages (3a), (3b), (4a),
and (4b) constitute the return-routability procedure. The following
is a more detailed description of the registration process.
When the mobile node has configured a care-of address after movement,
it sends to its home agent a Binding Update message (1). The Binding
Update message informs the home agent about the mobile node's new
care-of address. The new care-of address is in the packet's IPv6
source address, the home address is placed into the IPv6
destination-options extension header. The Binding Update message is
authenticated, and optionally encrypted, by means of an IPsec
security association between the mobile node and the home agent.
When the home agent receives the Binding Update message, it can
determine the appropriate IPsec security association based on the
mobile node's home address. Provided that the message is properly
authenticated, the home agent registers the mobile node's new care-of
address. In case the home agent maintains an IPsec tunnel for packets
routed through the home network, it also updates the corresponding
security association to the new care-of address [6]. The home agent
sends back to the mobile node a Binding Acknowledgement message (2)
to indicate successful care-of-address registration. Like the Binding
Update message, the Binding Acknowledgement message is authenticated,
and possibly encrypted, through IPsec.
Once the home registration is complete, the mobile node initiates the
correspondent registration. (In case the mobile nodes communicates
with multiple correspondent nodes, it can register with all of them
in parallel.) The mobile node sends to the correspondent node two
messages in parallel: a Home Test Init message and a Care-of Test
Init message. The Home Test Init message (3a) is tunneled to the
mobile node's home agent, and forwarded on to the correspondent node.
The Home Test Init message includes a random Home Init Cookie, which
Arkko & Vogt Expires April 1, 2005 [Page 13]
Internet-Draft MIP6 Route Optimization Enhancements October 2004
the correspondent node will return in its Home Test message. This
gives the mobile node reasonable assurance that the Home Test message
was sent by the correspondent node itself rather than a hidden
attacker impersonating the correspondent node. In fact, the returned
cookie can only guarantee that the Home Test message was generated by
some node on the path from the mobile node via the home agent to the
correspondent node. The Home Test Init message and the Home Test
message may (and should) be protected through IPsec on the path
between the mobile node and the home agent, but they are unprotected
on the path between the home agent and the correspondent node. On the
latter path, a malicious node may thus eavesdrop on the Home Init
Cookie and return it in a spoofed Home Test message.
The Care-of Test Init message (3b) does not go through the mobile
node's home agent. It takes the direct path to the correspondent
node. Again, the Care-of Test Init message includes a random cookie,
the Care-of Init Cookie, to be returned by the correspondent node in
the Care-of Test message. Both the Care-of Test Init and the Care-of
Test messages cannot be protected by IPsec in the general case, since
there is usually no security association between the mobile node and
the correspondent node. For this reason, the cookie mechanism can
only restrict the sender of the Care-of Test message to the direct
path between the mobile node and the correspondent node. Still, the
mobile node considers this a sufficient proof that the Care-of Test
message was generated by the correspondent node itself.
In the above, the return-routability procedure was generated after
the home registration was complete. This is not necessarily so. The
mobile node may reduce the registration latency by sending messages
(1), (3a), and (4b) simultaneously.
When the correspondent node receives the Home Test Init message, it
sends back to the mobile node a Home Test message (4a). The Home Test
message is directed to the mobile node's home address, hence passes
the mobile node's home agent. The Home Test message contains a Home
Keygen Token, a Home Nonce Index, and the Home Init Cookie copied
from the Home Test Init message. The mobile node needs the Home
Keygen Token to authenticate the Binding Update message, as described
below. The Home Nonce Index identifies a random value based on which
the correspondent node has computed the Home Keygen Token. The mobile
node will include the Home Nonce Index in the subsequent Binding
Update message to allow the correspondent node to reproduce the Home
Keygen Token without having to explicitly store it.
Likewise, upon receiving the Care-of Test Init message, the
correspondent node sends back to the mobile node a Care-of Test
message (4b). The Care-of Test message is directed to the mobile
node's new care-of address, hence does not pass the mobile node's
Arkko & Vogt Expires April 1, 2005 [Page 14]
Internet-Draft MIP6 Route Optimization Enhancements October 2004
home agent. Similar to the Home Test message, the Care-of Test
message contains a Care-of Keygen Token, a Care-of Nonce Index, and
the Care-of Init Cookie copied from the Care-of Test Init message.
The mobile node needs the Care-of Keygen Token for the Binding Update
message in order to prove its reachability at the new care-of
address. This is described below. When returned in the Binding Update
message, the Care-of Nonce Index allows the correspondent node to
reproduce the Care-of Keygen Token without having to store it.
The mobile node then sends a Binding Update message (5) to the
correspondent node. The Binding Update message contains a
message-authentication code produced on the basis of the Home and the
Care-of Keygen Tokens. It also contains the Home Nonce Index and the
Care-of Nonce Index. The mobile node may request the correspondent
node to return a Binding Acknowledgement message by raising the
A-flag in the Binding Update message.
When the correspondent node receives the Binding Update message, it
can reproduce the Home Keygen Token and the Care-of Keygen Token with
the help of the two nonce indices. The tokens, in turn, allow the
correspondent node to verify the message-authentication code. If the
message-authentication code is ok, the correspondent node can assume
two things. First, the mobile node must have received the Home Keygen
Token. Hence, the mobile node is the legitimate owner of the home
address with high probability, since the Home Keygen Token was sent,
as part of the Home Test message, to the mobile node's home address.
Second, the mobile node must have received the Care-of Keygen Token.
Therefore, the mobile node is apparently reachable through the new
care-of address, since the Care-of Keygen Token was sent, as part of
the Care-of Test message, to the mobile node's care-of address.
Beyond this, the message-authentication code validates the Binding
Update message's integrity.
Provided that the verification of the message-authentication code
succeeds, the correspondent node creates a binding-cache entry with
the mobile node's new care-of address. The correspondent node uses
the mobile node's new care-of address as soon as the binding-cache
entry is in place. In case the A-flag in the Binding Update message
is set, the correspondent node sends back to the mobile node a
Binding Acknowledgement message (6) to indicate a successful
care-of-address update.
Both home and the correspondent registrations are valid for limited
time only. For security reasons, these lifetimes are limited for
correspondent nodes. If, after seven minutes, the mobile node did not
move, it must refresh the existing registration with its
correspondent nodes.
Arkko & Vogt Expires April 1, 2005 [Page 15]
Internet-Draft MIP6 Route Optimization Enhancements October 2004
3.3 Security Analysis
To analyse the security of the return-routability procedure, one
should evaluate its protection against the tree types of attacks
described in section Section 2: impersonation attacks against a
mobile node, resource-exhaustion attacks against mobile nodes or
correspondent nodes, and flooding attacks against third parties.
Mobile IPv6 uses the home address as an identifier for a mobile node.
Impersonation attacks are thus based on claiming ownership of another
node's IP address. The return-routability procedure can prevent such
attacks unless the attacker is on the path from the correspondent
node to the victim (in the case of a stationary victim) or from the
correspondent node to the victim's home agent (if the victim is
mobile). However, if an attacker happens to be on the critical path,
it can spoof a Home Test Init message on behalf of the victim,
eavesdrop on the returning Home Test message, and thus illegitimately
acquire a Home Keygen Token. The impersonator can produce its own
Care-of Keygen Token by sending the victim's correspondent peer a
Care-of Test Init message with a care-of address the impersonator
itself is reachable through. Both tokens allow the attacker to send
an authenticated Binding Update message on behalf of the victim.
The described susceptibility to attacks from the routing path between
two communicating nodes conforms with the design objective to make
the security of a mobile Internet as secure as the current,
non-mobile Internet. After all, an on-path attacker can compromise
the communications of two nodes already today. It can block
communications, or it can interfere by ingesting its own packets.
The similarity between the home-address test and the care-of-address
test belies the different purpose of these exchanges. While the
former is to prevent impersonation attacks, the latter tackles the
problem of flooding attacks by probing a mobile node's presence at a
new care-of address. As with the home-address test, there are
scenarios where the care-of-address test takes no effect. Namely, it
cannot protect against attackers that are on the path between the
victim and the correspondent node at which traffic is to be
redirected. In this scenario, the attacker can perform a
care-of-address test on behalf of the victim further down the path.
Again, the exposure to on-path attacks corresponds to the objectives
of the Mobile IPv6 security design. Flooding attacks initiated by an
on-path attacker are already a threat in the non-mobile Internet: An
on-path attacker could initiate, say, a large file download from an
FTP server on behalf of a victim if the attacker is on the path from
the FTP server to the victim. In this case, the attacker would
probably do a TCP handshake using the victim's IP address. As it is
Arkko & Vogt Expires April 1, 2005 [Page 16]
Internet-Draft MIP6 Route Optimization Enhancements October 2004
on path, the attacker could hear the messages from the FTP server,
and it could respond to them. The attacker would so learn the TCP
Initial Sequence Number, which it needs to later spoof
acknowledgements on behalf of its victim. These things considered,
the care-of-address test inherent in the return-routability procedure
limits flooding attacks to exactly those situations in which
comparable flooding attacks are already possible today.
Yet, the limitation to on-path attacks alone is insufficient to
prevent a related style of attack that is called "space- and
time-shift attacks". In these attacks, the perpetrator taps the
critical wire in order to obtain the secret information it needs, and
it then moves to a saver place and starts an attack from there. The
attacker could also wait for a better point of time. It may even
install a binding on behalf of a victim before the victim starts
communicating. Mobile IPv6 requires mobile nodes to refresh active
care-of-address registrations in intervals of at most seven minutes
in an attempt to mitigate the threat of space- and time-shift
attacks.
The return-routability procedure is such that the correspondent node
does not need to explicitly store the Home or Care-of Keygen Tokens
sent to a mobile node. Given the index of a random nonce that was
used to create a token, the correspondent node can recalculate the
token. This saves the correspondent node from attacks against its
memory. On the other hand, it may open the door for attacks against
the correspondent node's processing capacity. A token is a SHA-1 hash
on the mobile node's care-of or home address, the correspondent
node's address, a random nonce, and a secret known only to the
correspondent node. The related processing overhead is hence rather
moderate, although a correspondent node should implement its own
policies to manage resources in a situation of increased processing
workload.
4. Objectives for Enhancement
This section discusses the objectives for enhanced or alternative
designs for route optimization. We discuss the objectives from a
requirements perspective, such as the need for decreasing latency.
The technical means to reach those objectives is not considered here,
nor is the feasibility of achieving them.
4.1 Latency Optimizations
A disadvantage of the return-routability procedure is that a mobile
node must wait for both address tests to complete before it can
register a new care-of address. Therefore, a correspondent
registration consumes, at a minimum, one and a half round-trip times
Arkko & Vogt Expires April 1, 2005 [Page 17]
Internet-Draft MIP6 Route Optimization Enhancements October 2004
between a mobile node and its correspondent node, counting the
parallel address tests and the transfer of the Binding Update
message. An additional one-way time elapses until the first packet
from the correspondent node arrives at the new care-of address. Note
that two different paths are employed: the direct path between the
mobile node and the correspondent node, and the path via the home
agent. The actual latency is governed by the path with a longer
round-trip time.
Direct communications to the correspondent node can optimistically
start right after the Binding Update message has been sent (i.e.,
after one round-trip time), but more generally are delayed until the
Binding Acknowledgement message is received (i.e., after two
round-trip times).
Similarly, optimistic mobile nodes are allowed by RFC 3775 to start
their return-routability procedure right after sending a Binding
Update message to their home agent. They can so reduce the latency
for the correspondent registration. But more generally, mobile nodes
wait for the home registration to be completed and acknowledged
before continuing with the correspondent registration.
Depending on the type of application, the above delays can be an
issue. For instance, this can be a problem in real-time voice-over-IP
applications. Even fast bulk-data transfer can be affected if the
lack of packets during the movement period is interpreted as
congestion, leading to a new TCP slow start. There appears to be
general consensus that faster mechanisms for route optimization are
needed.
Note that delays introduced by the rest of the stack can be
significant as well (see Section 6.3.1). The sum of the delays from
the link layer, IP layer, and IP mobility mechanisms must not exceed
the requirements of the application.
4.2 Signaling Optimizations
As stated in Section 3, one objective of the return-routability
procedure is to prevent time-shift attacks. Time-shift attacks are
prepared on the path between the victim and its correspondent node,
but launched at a later time and from a different, probably more
amenable location. Since authentication material is exchanged in
unencrypted form during the return-routability procedure, an on-path
eavesdropper can get hold of it. Mobile IPv6 requires that
authentication material have limited lifetime in an attempt to
prevent the eavesdropper from taking the stolen information to a
different position. Registrations must be refreshed at least every
seven minutes, even in the absent of handovers. Such periodic
Arkko & Vogt Expires April 1, 2005 [Page 18]
Internet-Draft MIP6 Route Optimization Enhancements October 2004
re-registrations limit the likelihood and feasibility of off-path
attacks. After all, if a malicious node overheard authentication
material on path and moved off path to launch the attack, it would
have to get back on path when the authentication material is due to
be refreshed.
[5] shows that the seven-minute refreshment interval implies a
signaling overhead of 7.16 bps [5] when one mobile node communicates
with a stationary node. If both peers are mobile, the signaling
overhead doubles. For two communicating nodes, this signaling
overhead is certainly negligible. On the other hand, the accumulated
overhead generated by a network provider's customer base can grow an
issue. As an example, consider a mobile-phone provider that offers
some sort of event-driven messenger service for its customers. For
instant message delivery and reduced load on the core network, the
provider may prescribe the use of route optimization. (Note that,
with bi-directional tunneling, messages for all subscribers would
have to be relayed through a home agent. This could drastically the
increase network load.) On the other hand, even route optimization
requires a home agent. For example, of the 716 Mbps signaling
overhead generated by 100 million route-optimized mobile nodes, 220
Mbps goes through the home agent.
The signaling may also be an issue for mobile nodes that are inactive
and stay at the same location for a while. Usually, these nodes have
limited energy supply and prefer to go to standby mode when no
transmissions are needed. Route optimization, however, would require
them to continually wake up and re-register. This shows that an
optimization for reduced signaling could be beneficial.
4.3 Security Enhancements
In the current Internet, nodes can, and typically will, communicate
even though they do not have a pre-existing relationship. This is
usually not an issue, because most data exchanged on the Internet is
non-confidential. On the other hand, recall from Section 2 that
mobility does require authentication also for non-confidential
communications, because mobility-related attacks may otherwise
compromise the Internet community as a whole.
The standard return-routability procedure takes a zero-configuration
approach. This is lightway and prevents mobility-related attacks
reasonably well. On the other hand, better security would be useful,
particularly to limit what on-path attackers (including the nodes in
the same network as the endpoints) can do. There are existing
proposals that offer higher security in Mobile IPv6 [32] and in other
protocols such as HIP [27].
Arkko & Vogt Expires April 1, 2005 [Page 19]
Internet-Draft MIP6 Route Optimization Enhancements October 2004
However, even with better security for mobility management, the
Internet as a whole cannot get any safer than the non-mobile
Internet. For instance, even with plain IPv6 can on-path attackers
cause denial of service, or inspect and modify cleartext packets.
Communications that are encrypted end-to-end are vulnerable only to
denial of service. So, applications that require strong security are
generally advised to end-to-end mechanisms such as IPsec or TLS.
However, better route-optimization security may become necessary in
the future, if improvements in other areas of Internet technology
remove some of these plain IPv6 vulnerabilities. For instance, the
use of Secure Neighbor Discovery [4] on the network where one of the
endpoints resides removes some of the existing threats.
Yet, a security association alone does not suffice as an enhanced
security mechanism. General security associations typically do not
show that a node owns a specific IP address, a property that is
desired in the case of route optimization to authenticate home
addresses. Certificate technology, for instance, usually does not
track the correct IP-address assignments of a large group of users.
Also, the validity of care-of addresses cannot be ensured by a
security association alone. The security association must either be
accompanied by a trust relationship, or care-of addresses must be
checked otherwise. This shows that enhancements to the security of
route optimization are likely to employ Mobile-IPv6-specific
technology rather than general-purpose security tools.
4.4 Applicability Enhancements
In Mobile IPv6, a mobile node's home address and current care-of
address are carried in all route-optimized packets. The course of the
mobile node may therefore easily be tracked by an observer. This can
be an issue in situations where the mobile node prefers not to reveal
its location. Location privacy, however, is inherently not supported
by Mobile IPv6 route optimization. One solution is to fall back to
bidirectional tunneling when location privacy is an issue. The path
between the mobile node and its home agent can then be encrypted
through IPsec ESP [16][17]. For full privacy protection the mobile
node may have to re-establish its IPsec security associations,
however, so that it cannot be tracked through its SPIs. On the path
between the home agent and the correspondent node, all packets bear
the mobile node's home address only. Hence, it is impossible for an
outsider to realize when the mobile node is at home and when it is
not.
5. The Toolbox
This section introduces a number of techniques (the "toolbox") that
Arkko & Vogt Expires April 1, 2005 [Page 20]
Internet-Draft MIP6 Route Optimization Enhancements October 2004
can be used in the construction of a route optimization protocol. The
section starts with the basic techniques used in RFC 3775 and
continues with additional techniques that have been proposed as
enhancements or alternatives.
It is important to note that many of the specific techniques are
insufficient or insecure on their own, as they address just one
aspect of the problem. It is the combination of a set of techniques
that makes a secure and efficient route optimization mechanism
possible. Different techniques also have different trade-offs with
respect to, say, universal applicability versus efficiency.
5.1 Address Tests
An address test can be employed to ensure that the peer is live and
at least on the path to a specific destination address. RFC 3775 uses
address tests for two purposes, for ensuring (weak) ownership of the
home address, and for preventing flooding attacks related to spoofed
care-of addresses.
As specified in RFC 3775, such address tests can also be stateless
for the correspondent node, making their use in denial-of-service
attacks harder.
The limitations of address tests relate to their security properties
and the required number of messages. The security provided by an
address test can only guarantee that the peer is on the path, not
that the peer truly owns its address or other identifier. On the
other hand, on-path attackers are in any case capable of performing
the same type of attacks as would be possible by misuse of route
optimization, so this does not present a significant new threat in
the Internet.
The use of two address tests requires four messages although it can
usually be completed in one roundtrip by employing parallelism.
5.2 Protected Tunnels
An additional technique used in RFC 3775 is the protection of a part
of the signaling communications through an encrypted tunneled to the
home agent. This prevents other nodes, close to the mobile node, from
seeing the home address tests.
Given the starting point that we can not assume a security
association with the correspondent node, this protection exists only
for the mobile node side; an attacker close to the correspondent node
would be able to perform various attacks (similar to those that an
attacker in that position would be able to do even in the non-mobile
Arkko & Vogt Expires April 1, 2005 [Page 21]
Internet-Draft MIP6 Route Optimization Enhancements October 2004
case). The use of security associations with correspondent nodes is
discussed further in Section 5.11.
5.3 Optimistic Behaviour
RFC 3775 leaves quite a bit of freedom for mobile nodes regarding
when they initiate the different procedures, and when they start
sending data packets. An optimistic mobile node can initiate the
return routability procedure right after sending the Binding Update
to the home agent, even before it has gotten an Acknowledgement back.
Mobile nodes may also start sending data packets right after having
sent the Binding Update to the correspondent node.
The drawback of this behaviour is that a dropped, re-ordered, or
rejected Binding Update can cause data packets to be dropped.
5.4 Proactive Tests
One technique for reducing delay is to move some of the tasks from
the critical path to an earlier stage. In particular,
movement-related signaling that needs to complete before
communications can resume is on the critical path.
As discussed in [15] and [36], the home address test in standard
Mobile IPv6 can be done "proactively". This eliminates the need to do
a home address test after the movement.
As described in Section 3, a mobile node must refresh an existing
binding at least every seven minutes. Since a Home Keygen Token is
generally valid for no longer than 3.5 minutes, the mobile node must
acquire a fresh Home Keygen Token prior to a binding refreshment. If
a mobile node seeks to have available a fresh Home Keygen Token at
all times it needs to initiate a proactive home-address test every
3.5 minutes even though it may not need to refresh its binding. Thus,
upon a handover, the mobile node has already a fresh Home Keygen
Token at hand when it arrives at the new link after handover.
(Alternatively, the mobile node may be able to receive a trigger from
its local link layer indicating that a handover is imminent. In this
case, the mobile node may initiate the home-address test right in
time instead of doing it periodically every 3.5 minutes.)
Another optimization possibility is performing a care-of address test
before the movement. This is possible only if the mobile node is
capable of attaching to two networks simultaneously.
Arkko & Vogt Expires April 1, 2005 [Page 22]
Internet-Draft MIP6 Route Optimization Enhancements October 2004
5.5 Concurrent Tests
Assuming a proactive home test has been performed but a care-of test
has not, the mobile node cannot send a Binding Update immediately
after the handover because it is still missing a valid Care-of Keygen
Token for the new care-of address. On the other hand, the mobile node
already has the Home Keygen Token. Recall from Section 3 that the
Home Keygen Token authenticates the mobile node, through certifying
the mobile node's ownership of the home address. In the concurrent
test technique, the mobile node sends to the correspondent node an
Early Binding Update. This message is is similar to the Binding
Update used in standard Mobile IPv6 except that it is authenticated
with the Home Keygen Token only.
When the correspondent node receives the Early Binding Update, it can
be confident that the mobile node uses the correct home address,
because a valid Home Keygen Token was used to sign the message. On
the other hand, the message-authentication code does not bear a
Care-of Keygen Token, so the correspondent node cannot be sure
whether the mobile node is actually present at the claimed new
care-of address. The correspondent node thus registers the mobile
node's new care-of address, labeling it "unconfirmed" for the time
being.
The mobile node can use the new care-of address as soon as it has
dispatched the Early Binding Update. The mobile node then initiates a
care-of-address test. When it receives the Care-of Keygen Token, it
can send to the correspondent node a standard Binding Update. The
message-authentication code is produced with the new Care-of Keygen
Token and the Home Keygen Token from the proactive home-address test.
When the correspondent node receives the standard Binding Update
message, it can be confident that the mobile node uses the correct
home address, and that the mobile node is actually present at the new
care-of address. The correspondent node then changes the status of
the new care-of address from "unconfirmed" to "confirmed".
Due to the lack of care-of-address authentication in the Early
Binding Update message, there needs to be additional protection while
a mobile node's care-of address is unconfirmed. If no such protection
is provided, a malicious node may misuse Early Binding Updates to
register, as an unconfirmed care-of address, the IP address of a
third party. This implies a vulnerability to flooding attacks (c.f.
Section 2). Albeit the vulnerability is limited to a short period
after handover, there needs to be additional protection while a
mobile node's care-of address is unconfirmed. Heuristics could be
used, but are per definition reactive. Heuristics may also result in
false positives or, even worse, false negatives. (An enhancement to
concurrent tests that avoids these problems is discussed in Section
Arkko & Vogt Expires April 1, 2005 [Page 23]
Internet-Draft MIP6 Route Optimization Enhancements October 2004
5.7.)
The concurrent tests avoid the delay that emanates from the home- and
care-of-address test by moving both tests to more suitable phases.
This saves one round-trip time between the mobile node and the
correspondent node, potentially through the home agent due to
bidirectional tunneling for the home-address test. A disadvantage,
however, is the increase in signaling that comes with the proactive
home-address test: Unless the mobile node cannot anticipate a
handover through link-layer triggers, the home-address test must be
performed roughly every 3.5 minutes instead of the minimum rate of
once every seven minutes prescribed by the Mobile IPv6 base
specification. ([5] describes an signaling-reduction technique that
can mitigate this impact when combined with Early Binding Updates.)
5.6 Diverted Routing
Given that the per-movement signaling takes some time, mobile nodes
can optionally request their traffic to be routed through their home
address while this signaling is being completed.
The performance impact of this approach depends on the length of the
signaling period and the capacity and latency of the path through the
home agent. We can generally analyze the fate of the different parts
of the inbound payload traffic stream as follows:
Packets sent before movement is known
The correspondent node does not know the mobile node has moved
until it has been told about this. In addition, being able to tell
the correspondent node may itself involve some security-related
signalling. The packets sent before the movement is are going to
be lost, unless the mobile node is still connected also to its
previous attachment point or local repair techniques (see Section
5.15) are used.
Packets sent during the early part of signaling
Assuming that the route optimization signaling involves messages
through the home agent, it can be expected that at least the first
packets sent from the correspondent will make it to the mobile
node before the registration process is complete. This is because
they have to travel the same path.
Packets sent during the later part of signaling
The fate of the packets sent via the home agent close to the end
of the signaling period depends on the relative capacity and
Arkko & Vogt Expires April 1, 2005 [Page 24]
Internet-Draft MIP6 Route Optimization Enhancements October 2004
latency of the home agent and direct paths. If former path has a
high latency, it might be better to queue the packets and wait for
the signalling to be completed.
One potential research direction is to look at whether the
properties of the paths could be learned during the signaling and
then used to decide the optimal time when the correspondent node
should start queueing packets.
The situation for the outbound traffic stream is similar, except that
the mobile node knows immediately that it has moved, and thus first
packets do not get lost.
This technique appeared originally in [36] and has since then be used
also in [13].
5.7 Credit-Based Authorization
Credit-Based Authorization (CBA) [35] is a technique that allows a
correspondent node to already send packets to a new care-of address
while the care-of-address test is in progress. The mobile node
registers the new care-of address first, and it initiates the
care-of-address test thereafter. CBA ensures that the mobile node
still cannot wage an amplified flooding attack.
The attraction of a redirection-based flooding attack emanates from
its inherent potential for amplification. This is to say, the flooded
victim sees itself confronted with a much higher data load than the
attacker generates itself. The idea of CBA is that a correspondent
node, when requested by a mobile node to switch to an unconfirmed
care-of address, weighs the volume and rate of packets recently
received from the mobile node against the volume and rate of packet
that it sends to the mobile node's unconfirmed care-of address. Thus,
if an attacker decided to misuse an unconfirmed care-of address for
malicious redirection, it would not gain any amplification. Indeed,
it would take less coordinative effort, and be at least equally
effective, to send bogus packets to the victim directly.
With CBA, a correspondent node maintains a credit account for each
entry in its binding cache. When the correspondent receives a packet
from a mobile node, it increases the credit in that mobile node's
binding-cache entry by the size of the inbound packet. While the
binding-cache entry holds a confirmed care-of address, the credit
does not change when the correspondent node sends a packet that
care-of address. However, when the care-of address is unconfirmed,
the credit decreases by the size of each packet sent to that address.
If the credit would be decreased to a negative value for a particular
packet, that packet cannot be sent to the care-of address. With
Arkko & Vogt Expires April 1, 2005 [Page 25]
Internet-Draft MIP6 Route Optimization Enhancements October 2004
Mobile IPv6 and concurrent tests, the correspondent node can send
such packets to the mobile node's home address. This is legitimate
because the home address has been proactively verified before. For
other protocols that do not provide an equivalent static IP address
through which a mobile node is reachable, such packets may either be
buffered for later transmission, or they may simply be discarded. HIP
[27] and Mobike belong to the latter protocol category, although, in
HIP, rendez-vous servers may theoretically be extended to provide
mobile nodes with static IP addresses for constant reachability.
The correspondent node exponentially ages existing credit, thereby
giving precedence to credit obtained recently. This guarantees that a
mobile node cannot collect credit over an extended time period at a
very slow speed and use this credit, all at once, for a short but
potent data burst towards a fraudulent unconfirmed care-of address.
It is believed that a fair-minded mobile node sends packets to the
correspondent node as part of its normal operation. Under many
circumstances, the mobile node should thus automatically earn credit
due to its normal behavior. Still, the proposal for CBA specifies an
alternative mode that better accommodates applications with
asymmetric traffic patterns such as file transfers and media
streaming. Those applications are characterized by high throughput
towards the client, typically the mobile node, and comparably little
throughput towards the serving correspondent node. In the second
mode, the correspondent node allocates credit for packets that it
sends to a confirmed care-of address of the mobile node, rather than
for packets that it receives. It is perspicuous that a mobile node,
as well as an attacker, invests comparable effort for data reception
as for transmission, in terms of bandwidth, memory, and processing
capacity. In-band care-of-address spot checks allow the correspondent
node to determine the approximate packet loss on the path towards the
mobile node, and to derive the mobile node's average reception rate.
An interesting property of the first version of CBA is that it does
not require support from a mobile node. A mobile node neither needs
to understand that CBA is effective at the correspondent node, nor
does it have to have an idea of how much credit it currently has. If
packet loss is not an issue, care-of-address spot checks may be
omitted so that the second version of CBA is transparent as well.
5.8 Heuristic Monitoring
Heuristic approaches are conceivable as well. For instance, one may
consider a lifetime limit for unconfirmed care-of addresses which,
supplemented by a heuristic for misuse detection, can prevent, or at
least effectually discourage, misuse of such addresses. The challenge
here seems to be a feasible heuristic: On one hand, the heuristic
must be sufficiently rigid to catch any malicious intents at the
Arkko & Vogt Expires April 1, 2005 [Page 26]
Internet-Draft MIP6 Route Optimization Enhancements October 2004
other side. On the other hand, however, it must not have a negative
impact on a fair-minded mobile node's communications.
Correspondent nodes could also track the behaviour of mobile nodes
over a longer period of time, and refuse communicating with them if
they misbehave. The problem with this approach is that attackers can
invent new addresses and other correspondent nodes to use in their
attacks.
5.9 Cryptographically Generated Addresses
Public-key cryptography is a powerful mechanism for mutual
authentication between two nodes that do not know each other. Yet,
the key question with public-key cryptography is how the nodes can
trust in the respective other node's public key. How can an attacker
be stopped to spoof its identity and use a false public key? The crux
is that, generally, one cannot see from an identifier to which public
key it belongs. There may not even be a one-to-one relationship
between the identifier and the public key.
In today's Internet, the identity-key matching problem is solved
through certification authorities that have a reputation to be
trustworthy. Nodes that want to mutually authenticate send each other
their identities and public keys. Each node can then contact a
trusted certification authority and have it verify whether the two
parameters match. Once a node knows that its peer's public key is
correct, it can verify whether the peer actually knows the right
private key by decrypting the encrypted version of a certain piece of
data.
This mechanism has two disadvantages: First, it relies on the trusted
certification authorities. If the certification authorities fail or
are target of an attack, public-key cryptography is seriously
compromised. Second, authorities usually delegate certain requests to
other authorities. So, going through the authentication process can
be time and resource consuming for the querier.
These two drawbacks made public-key cryptography little attractive
for Mobile IPv6. On the other hand, the described mechanism was
designed to authenticate arbitrary transactions. This level of
generality is actually not needed for mobility support. For example,
a proof of home-address ownership would be sufficient in Mobile IPv6.
This is where Cryptographically Generated Addresses (CGA) is helpful
[8].
A CGA is an IPv6 address, which contains a set of bits generated by
hashing the IPv6 address owner's public key. Such feature allows the
user to proof that it is the legitimate owner of the its IPv6
Arkko & Vogt Expires April 1, 2005 [Page 27]
Internet-Draft MIP6 Route Optimization Enhancements October 2004
address.
The CGA offers three main advantages: First, it makes the spoofing
attack against the IPv6 address much harder. Second, it allows to
sign messages with the owner's private key. Third, CGA does not
require any upgrade or modification in the infrastructure.
The CGA offers a method for binding a public key to an IPv6 address.
The binding between the public key and the CGA can be verified by
re-computing and comparing the hash value of the public key and other
parameters with the interface identifier from the owner's IPv6
address. Both the public and the additional parameters are sent with
the message that requires authentication. Note that an attacker can
always create its own CGA address but he will not be able to spoof
someone else's address since he needs to sign the message with the
corresponding private key, which is supposed to be known only by the
real owner.
The CGA technique was originally described in [28] and in [31], and
it has later been used in [32], [8], and [13], among others.
5.10 Semi-Permanent Security Associations
In the above techniques each movement involves a new, complete round
of signaling. In the semi-permanent security association technique a
key is established upon first contact, and then this key is later
used in movements later, making the signaling efficient and secure.
The primary security benefit of this approach is that the subsequent
communications can be securely bound to the initial contact.
Another way to look at this technique is that a key is created for a
specific purpose or resource, and that all requests relating to that
resource have to be authenticated by the same key.
This technique works well in applications where the secured resource
can be identified by the key. For instance, in HIP [27],
opportunistic security can be achieved through binding all
communications to the public keys generated by the participants.
This technique is less secure when the resource is identified by some
other means. For instance, if solely this technique is used for route
optimization security in Mobile IPv6, there is nothing that prevents
a malicious node from grabbing someone else's address and claiming
that all subsequent signaling related to that address has to be
authenticated through the attacker's public key. As a result, this
technique is typically applied together with some other means to
ensure the ownership of the resource, such as CGA as was done in
[13].
Arkko & Vogt Expires April 1, 2005 [Page 28]
Internet-Draft MIP6 Route Optimization Enhancements October 2004
Semi-permanent security associations were first developed in [10]
where they were called Purpose Built Keys (PBKs). They have since
then been applied in [12] and [13].
5.11 Pre-Configuration
The currently standardized route optimization method is based on the
assumption that no security association or configuration can be
expected between mobile and correspondent nodes either directly or
via an infrastructure. However, in situations where such
configuration is possible, efficiency and security improvements
become possible.
Perhaps the simplest route optimization security mechanism is the use
of a shared secret between the mobile and correspondent nodes, as
defined in [26].
5.12 Infrastructure
Infrastructure can provide assistance by vouching for the correctness
of the home address, correctness of the care-of address, or the
trustworthiness of the mobile node.
This infrastructure can take many forms, such as a PKI tailored for
for the route optimization problem or AAA enhanced with the required
features.
In its basic form, the infrastructure hands out home addresses and
associates some keys with these addresses. It could produce
certificates that could be used by others to verify the binding of
the used key to the right home address, or it could provide a query
interface where this verification is performed within the
infrastructure.
Setting up such infrastructure has generally been considered
impossible for general Internet use. One of the problems is the
current separation of address assignment and security
infrastructures. However, [9] suggests a useful simplification: only
home agents need to be assigned such prefix-based certificates, as
they can vouch for their own mobile nodes. This makes the
infrastructure problem more tractable.
The infrastructure could also just identify the trustworthy mobile
nodes. Together with an identifier for each mobile node, this could
be used to retroactively track down misbehaving nodes.
The use of infrastructure for care-of address verification could be
based on the querying local network access system about the existence
Arkko & Vogt Expires April 1, 2005 [Page 29]
Internet-Draft MIP6 Route Optimization Enhancements October 2004
of a node at a claimed address. The mobile node would be identified
by some means (such as a public key) known both to the correspondent
node and the AAA network. The problem with this is that a global AAA
system would have to be provided in order for a correspondent node to
find out whether a mobile node connecting to it from the other side
of the world is legitimate.
5.13 Cryptographically Bound Identifiers
The primary problem in route optimization is to ensure that the home
address is owned by the node that claims it. While the Mobile IPv6
architecture can not easily be changed with respect to the use of the
home address as an identifier, other protocols have avoided some of
these problems through the use of a cryptographic identifier. For
instance, in HIP [27] a cryptographic identity is the primary
identifier that binds all communications and upper layer protocols to
the lower-level signaling exchanges. In HIP this identifier is a
public key compressed to a 128-bit value through a hash function. The
use of this type of identifiers avoids the home address ownership
problem, but it is still necessary to verify the correctness of
care-of addresses to avoid flooding attacks.
5.14 Local Mobility
Local mobility can be provided via protocols such as Hierarchical
Mobile IPv6 [33]. Local mobility supplements the end-to-end mobility
support of standard Mobile IPv6. It brings performance improvements
in terms of signaling overhead and handover latency. Hierarchical
Mobile IPv6 introduces the concept of a regional Mobile Anchor Point
(MAP). A MAP acts as a local home agent towards a visiting mobile
node, and it proxies the mobile node towards the mobile node's home
agent and correspondent nodes. Typically, a MAP serves multiple
access networks, which are together referred to as the MAP's domain.
Access routers in the MAP domain distribute the MAP's IP address in
Router Advertisement extensions. The MAP is a router at a preferably
central position within its domain.
When a mobile node enters a visited network, it configures an
"on-link care-of address" with the local network prefix through
standard IPv6 Address Autoconfiguration. The mobile node may also
configure a wider-scope "regional care-of address" with the MAP's
network prefix and register the on-link and regional care-of
addresses with the MAP. The MAP treats a mobile node's regional
care-of address as a home agent treats the mobile node's home
address. In particular, it performs Duplicate Address Detection for
the regional care-of address. A bidirectional tunnel is established
between the MAP and the mobile node.
Arkko & Vogt Expires April 1, 2005 [Page 30]
Internet-Draft MIP6 Route Optimization Enhancements October 2004
The mobile node registers the regional care-of address with its home
agent and correspondent nodes. The MAP is prepared to intercept
packets addressed the regional care-of address. It tunnels these
packets to the mobile node's on-link care-of address. Vice versa, the
mobile node may--or may have to if administratively prescribed in the
access network--tunnel outbound packets to the MAP, which in turn
decapsulates these packets and forwards them on to the recipient.
When the mobile node moves to a different network within the same MAP
domain, it updates the binding at the MAP, but it can leave the
existing bindings at its home agent and correspondent nodes in place.
5.15 Local Repair
A local repair technique involves reducing the ill effects of a
movement, such as the ability to redirect packets received at a
previous location to the new location.
Fast Handovers for Mobile IPv6 [18] is one such optimization. It
provides support from the access network that assists a mobile node
during handover. Fast Handovers packages three functions: proxy
router discovery, proactive IPv6 address configuration and proxy
neighbor discovery, and provision against packet loss during
handover.
When a mobile node recognizes that a handover to a new access point
is imminent--for instance, through a trigger from its local link
layer--the mobile node can inquire of its current, old access router
about a router attached to the detected new access point. For this,
the mobile node sends a Router Solicitation for Proxy Advertisement
to the old access router along with the MAC address of the new access
point. Access routers are configured with tables matching near-by
access points' MAC addresses to information about attached access
routers. When the old access router hears a Router Solicitation for
Proxy Advertisement, it looks up its table for an access router on
the prospective new link, and it sends a Proxy Router Advertisement
on behalf of that router.
With the Proxy Router Advertisement at hand, the mobile node can
configure a care-of address for the new link, even though it is still
connected to the old link. Preferably right before handover, the
mobile node signals the new care-of address to its old access router.
The old access router verifies the new care-of address with the new
access router and sends to the mobile node an acknowledgement
indicating the result. If the suggested care-of address is
acceptable, the new access router starts proxying the address.
Otherwise, it signals an alternate care-of address to the old access
router which, in turn, includes that address in its acknowledgement.
Arkko & Vogt Expires April 1, 2005 [Page 31]
Internet-Draft MIP6 Route Optimization Enhancements October 2004
Packets for the mobile node may still arrive at the old care-of
address after the mobile node has switched to the new link. The old
access router tunnels those packets to the mobile node's new care-of
address.
There are two exceptions that are worthwhile mentioning. During proxy
router discovery, the old access router may not be configured with
information about an appropriate new access router. No proxy router
discovery can then be provided. Nonetheless may the mobile node
request the old access router, from the new link, to forward any
packets that subsequently arrive at the old care-of address.
Furthermore, during proactive IPv6 address configuration, it may turn
out that the mobile node's suggested care-of address is unacceptable,
and the mobile node may no longer be at the old link when the old
access router sends the acknowledgement with the alternate care-of
address. In this case, the mobile node fails when attempting to
connect to the new network with the unacceptable care-of address. The
new access router may then install a host route for the old care-of
address and set up a bidirectional tunnel with the old access router
between the old and new care-of addresses. (Note that outbound
tunneling is necessary to ensure topological correctness of the
packets' IPv6 source addresses.) Thus, the mobile node may continue
to use its old care-of address at the new link until it has
successfully configured a new care-of address through standard IPv6
Address Autoconfiguration.
In a non-optimized environment, standard router discovery and IPv6
Address Autoconfiguration can cause substantial disruption to ongoing
communications during a handover. With Fast Handovers, a mobile node
can accomplish these tasks proactively before the handover. Moreover,
the mobile node's communication peers typically continue to use an
outdated care-of address for some time after a handover due to the
natural latency of global Mobile IPv6 signaling. In a standard
setting, packets sent to a stale care-of address are typically
dropped. Fast Handovers salvage these packets by means of the
tunneling service from the old to the new access router. This enables
lossless handovers.
Fast Handovers can nicely be integrated with Hierarchical Mobile IPv6
[33]. The mobile node then registers a prospective new care-of
address directly through the MAP, rather than through the old access
router, for efficiency reasons. The forwarding service for packets
sent to an outdated care-of address is also provided by the MAP.
5.16 Processing Improvements
Processing power is in general not as significant issue in route
optimization as the amount of signaling and latency. However, this
Arkko & Vogt Expires April 1, 2005 [Page 32]
Internet-Draft MIP6 Route Optimization Enhancements October 2004
can still be an issue for busy servers or proposals that are based on
public key operations. For these cases, new types of cryptographic
algorithms (such as ECC instead of RSA) might provide some
assistance.
5.17 Delegation
Given that the home agent does not need to move or conserve battery
energy, it can be used for performing computationally expensive
tasks. It can also be used for parts of the signaling, to reduce
communications over slow wireless links.
Some work relating to delegation has been done in [32] and [9].
6. Analysis
This section analyzes the previously presented techniques in relation
to each other and the enhancement objectives. We start by looking at
how the techniques can be categorized, continue by studying a number
of proposals that apply a number of techniques to reach a goal, and
conclude with some subjects for further research in this area.
6.1 Categorization of Techniques
Local techniques require support from the access network that the
mobile node is attached to. HMIP and FMIP are examples of local
techniques. They can significantly mitigate the disruptive impact
that movements have on ongoing communications. Yet, they require
investments at the access network and thus imply additional costs for
the network operator. Also, local optimizations are ineffective for
handovers across administrative domains unless providers have mutual
agreements to interconnect their networks.
End-to-end techniques do without the need infrastructure in the
access network. They also work across administrative domains. On the
other hand, end-to-end approaches cannot leverage the short distances
to local network entities, but have to cope with global, thus
potentially long, round-trip times. Hence, end-to-end techniques
cannot usually catch up with the high performance gains that are
characteristical for local optimizations.
Zero-configuration techniques require no preconfiguration or
assistance from a managed infrastructure. Address tests, proactive
tests, concurrent tests, diverted routing, credit-based schemes,
monitoring, CGA, semi-permanent, cryptographically bound identifiers,
processing improvements, and delegation are zero-configuration
techniques.
Arkko & Vogt Expires April 1, 2005 [Page 33]
Internet-Draft MIP6 Route Optimization Enhancements October 2004
Pre-configuration and infrastructure-based methods are not
zero-configuration techniques.
Local techniques have traditionally been implemented in a manner that
requires configuration, but there appears to be no fundamental reason
why this would have to be so.
6.2 Evaluation of Some Proposals
6.2.1 Local Assistance
IETF's two current protocols for localized assistance to mobile nodes
have been described in Section 5.14 and Section 5.15.
Hierarchical Mobile IPv6 (HMIPv6) screens a mobile node's movements
within a MAP domain from nodes not inside that domain. In case
standard Mobile IPv6 is used end-to-end, this eliminates most of the
global signaling: While its regional care-of address does not change,
a mobile node does not need to update its home agent or correspondent
nodes beyond the mandatory periodic refreshments. Not having to
signal on a global basis also reduces handover latency.
Updates to the home agent and to correspondent nodes are necessary
only when the mobile node leaves the current MAP domain. The mobile
node may then register a new regional care-of address with a
different MAP if one is available. Note that switching MAPs usually
requires the mobile node to signal more than if standard Mobile IPv6
was used alone. Local and end-to-end signaling then comes together
because, as it stands, a mobile node must contact the new MAP
seperately from its home agent and correspondent nodes. Due to
dependencies between a MAP registration and a contemporary home or
correspondent registration, a mobile node may want to wait for the
MAP registration to complete before it initiates the standard Mobile
IPv6 registration procedure. Handover latency is then increased in
addition to the signaling overhead. Future work should thus go into
the integration of MAP registrations with standard Mobile IPv6
signaling.
Another interesting research opportunity seems to be a mechanism that
tells neighboring MAPs from different administrative sites that their
domains overlap. The MAPs could then mutually advertise each other
throughout certain parts of their domains.
The cost for an inter-MAP handover in terms of signaling load and
delay strongly depends on the network topology. In an optimal layout,
a MAP is located somewhere on the path from the mobile node to its
home agent and correspondent nodes. This may be the case if the MAP
is co-located with an Internet gateway. Then, switching MAPs is
Arkko & Vogt Expires April 1, 2005 [Page 34]
Internet-Draft MIP6 Route Optimization Enhancements October 2004
cheap. On the other hand, if the MAP is way off the direct path
between a mobile node and its peers, the additional overhead might
become noticeable. Indeed, a good topological layout is crucial for
the performance of HMIPv6.
Fast Handovers for Mobile IPv6 (FMIPv6) streamlines the
router-discovery and IPv6-address-configuration processes, and it
facilitates lossless handovers. FMIPv6 assumes that access routers
are capable of matching a neighboring access point to the access
router to which it attaches. The capability is a prerequisite for
proxy router discovery. Yet, it is still an open issue how access
routers learn about this information. Manual configuration is one
option, though it can be extremely expensive. More attractive would
be an automated mechanism that allows access routers to dynamically
recognize access points to which mobile nodes may want to switch. A
related issue is how such knowledge can be securely obtained across
the borders of administrative sites. These are opportunities for
future research.
Note that Hierarchical Mobile IPv6 may be used even when the no
Mobile IPv6 is used beyond the local domain. I.e., a mobile node may
use its regional care-of address as a temporary home address. The
mobile node would thus appear to a correspondent node as a stationary
node in the MAP's network. The same is true for a combination between
HMIPv6 and FMIPv6, but FMIPv6 alone cannot be used without standard
Mobile IPv6. It should also be mentioned that HMIPv6 provides
location privacy for mobile nodes as long as the mobile nodes do not
move across MAP domains. In fact, a mobile node appears to parties
outside its current MAP domain as a stationary host located in the
MAP's network because it does not advertise its link-local addresses
to those nodes.
Of course, there are disadvantages with HMIPv6 and FMIPv6. Local
optimizations in general require investments in the access network
and thus imply additional costs for the network operator. Also, as
mentioned, localized mobility support may even cause increased
overhead in certain situations. And local mechanisms are to date
ineffective for handovers across administrative domains unless
providers have mutual agreements to interconnect their networks.
6.2.2 Preconfigured Secret Method
It has been explained in section Section 3 that the
return-routability procedure serves two purposes: The home-address
test allows the nodes to authenticate mobility-related signaling, and
the care-of-address test is needed to verify a mobile node's
reachability. Preconfigured shared secrets allow nodes to
authenticate without the home-address test. But without further
Arkko & Vogt Expires April 1, 2005 [Page 35]
Internet-Draft MIP6 Route Optimization Enhancements October 2004
assumptions, preconfiguration cannot streamline the care-of-address
verification process.
The Home Keygen Token exchange from the return-routability procedure
is the default authentication technique used in Mobile IPv6. It
facilitates reasonable security even for nodes that have no
pre-existing relationship. On the other hand, nodes that do share a
common secret should be allowed to omit the home-address test. This
can be beneficial in certain scenarios where the home-address test
causes a long handover latency due to packet redirection through the
home agent.
On the other hand, the latency improvement can be much higher if not
only the Home Keygen Token exchange, but also the Care-of Keygen
Token exchange is ignored. Eliminating the latter, however, requires
some sort of trust into mobile nodes not to spoof a care-of address.
In fact, [26], a method being standardized by the IETF MIP6 Working
Group, is based on this trust model.
The assumption that mobile nodes be fair-minded turns out to be quite
far stretching. On on side, it affords the elimination of the entire
return-routability procedure, not just the Home Keygen Token
exchange. As explained in [26], and can also be inferred from figure
Figure 1, this can cut handover latency in half. On the other hand,
the assumption significantly limits the applicability of the
optimization. There are certainly scenarios where preconfiguration
per se would be possible, but no trust model can be assumed. For
instance, an ISP may configure its media servers with the keys of its
customers. The customers could then use their keys and Mobile IPv6
for communications with the media servers, but some customers might
misuse the lack of a care-of-address test to wage a
re-direction-based flooding attack against an arbitrary IP host. This
example reveals the difference between a security association for
authentication and a trust relationship for misuse prevention.
In an effort to extend preconfiguration to scenarios where no trust
relationship can be presupposed, one may combine it with
care-of-address tests. Of course, the care-of-address test would
partly vitiate the handover-latency improvement that preconfigured
keys brings without the care-of-address test. But handover latency
may still improve over the standard return-routability procedure
because a care-of-address test is usually faster than a complete
return-routability procedure. (This is because the complete
return-routability procedure includes a home-address test, which is
usually more expensive than the care-of-address test because it is
directed through a home agent.) Also pre-authentication facilitates
stronger authentication mechanisms and thus the use of route
optimization for applications that would otherwise opt for
Arkko & Vogt Expires April 1, 2005 [Page 36]
Internet-Draft MIP6 Route Optimization Enhancements October 2004
bidirectional tunneling due to security concerns.
Moreover, preconfiguration can be used along with a combination of a
concurrent care-of-address test and credit-based authorization or
heuristic monitoring. This approach eliminates the home-address test
and makes the care-of-address test transparent to applications. It
also keeps the possibility to use an alternative authentication
mechanism.
These things said, it seems like a good idea to make the
preconfiguration protocol bendable to different environments. Is
there a small group of people who trust each other? Then, of course,
group members are unlikely to spoof care-of addresses, and we can go
without the care-of-address test. Or are we talking about the
customer base of a big ISP? Then, proper authentication does usually
not imply trust, and it may not be feasible to use preconfigured keys
without checking a mobile node's reachability. Tracability techniques
are not a compensation for the missing care-of-address test, because
they are a reactive measure, whereas a care-of-address test is a
proactive one.
Specifically, the integration of key preconfiguration with
care-of-address test could be done as follows. In case the
care-of-address test is deemed necessary, a preconfigured 64-bit key
can substitute the Home Keygen Token. The Home Keygen Token may also
be derived in some defined way from the preconfigured key. Either
way, signaling messages can then be authenticated in the same way as
defined in the Mobile IPv6 specification. This amendment to [26]
helps to broaden the scope of key preconfiguration to environments
where end-hosts have administrative relationships with each other,
but do not necessarily trust each other.
6.2.3 CGA-Based Optimizations
CGA assures that a mobile node is the legitimate owner of its home
address. As far as the correctness of home addresses go, CGA provides
more assurance than the pure use of routing paths. This makes it
possible to have a significant decrease in the signaling frequency.
In addition, the public keys used in the CGA technique allow certain
data to be communicated privately between the nodes, which makes some
of our other techniques possible.
GA could also be used to reduce the risk of flooding attacks via
care-of addresses, as attackers would be unable to manufacture victim
addresses for a specific host. However, only the interface-identifier
part of an IPv6 address is cryptographically generated, so flooding a
network or a link is still an issue. As a result, CGA needs to be
employed together with a reachability test in scenarios where
Arkko & Vogt Expires April 1, 2005 [Page 37]
Internet-Draft MIP6 Route Optimization Enhancements October 2004
redirection-based flooding attacks are a concern. An interesting
future path for research would be to consider the combination of
concurrent care-of-address tests together with CGA-based care-of
addresses.
CGA is typically used to assure the correctness of the home address
that the mobile node claims to own, and combined together with other
techniques to prevent flooding attacks. Note that this implies that
an initial home address test is typically required too in order to
avoid the deletion of a binding to flood an unconfirmed home address.
The crux with using cryptographically generated care-of addresses is
address collisions: A given public key hashes to exactly one value.
CGA uses modifiers in the case of collisions. But as such modifiers
weaken the cryptographic strength of CGAs, only a few (usually four)
modifiers are allowed.
6.2.4 CBA-Based Latency Reduction
As shown in Section 2, the ability to change a packet flows
destination IP address can potentially be misused for a malicious
redirection-based flooding attack. Mobile IPv6 and similar
mobility-management protocols like Host Identity Protocol (HIP) [27]
and current Mobike proposals solve this issue by probing a new IP
address before that IP address is used as a destination for payload
packets. Unfortunately, by definition, IP-address probing cannot be
done in a proactive style. After all, a handover involving an
IP-address change invalidates any previous probes.
Instead, a new care-of address may be probed while packets are
already flowing to that care-of address. This concept of concurrent
care-of-address tests was first mentioned in [36]. CBA was added to
secure the time phase during which a mobile node's reachability at
the new care-of address is not yet verified, but the new care-of
address is already in use. After all, this time phase could otherwise
introduce a susceptibility to malicious redirection, if but for an
albeit short time.
As shown in Section 2, the attraction to redirection-based flooding
attacks is its potential for easy-to-get amplification. Note that CBA
does not prevent an attacker from spoofing its care-of address. But
the attacker will not be able to wage an amplified flooding attack.
More specifically, the amount of data that can be redirected to an
unconfirmed care-of address is sufficient for a fair-minded mobile
node to continue communications during the care-of-address test, but
it is far from satisfactory for an attacker planning denial of
service.
Arkko & Vogt Expires April 1, 2005 [Page 38]
Internet-Draft MIP6 Route Optimization Enhancements October 2004
The challenge with CBA is how much data the correspondent node may
exactly send to a care-of address while it is unconfirmed. If it
sends too much, an attacker could take advantage of this. If it sends
to little, a fair-minded mobile node might suffer performance
degradations during the handover phase. As shown in Section 5.7,
there are two modes for Credit-Based Authorization. In the first
mode, the correspondent node weighs the data volume that it has
recently received from a mobile node with the data volume that it may
maximally send to an unconfirmed care-of address of that mobile node.
This is the most straightforward way to make redirection-based
flooding attacks comparable to direct flooding attacks, which are,
after all, already possible and easy to perform in today's non-mobile
Internet. The second mode takes the data volume a mobile node has
recently received at a confirmed care-of address as a limit on how
much data the mobile node can receive after handover to a new,
unconfirmed care-of address. This second mode gives away some of the
first mode's straightforwardness in exchange for a better support for
applications with asymmetric data throughput. This was deemed
necessary in consideration of applications like media streaming,
television broadcasts, and file transfers, where the mobile node
typically receives multiple orders of magnitude more data than it
sends.
One should evaluate whether the second mode of Credit-Based
Authorization could be misused by an attacker that has an asymmetric
connection to the Internet. Wide-spread digital subscriber lines
(DSL) usually have a much higher download rate than upload rate. The
limited upload rate would render most denial-of-service attempts
through direct flooding meaningless. But the strong download rate
could be misused to illegitimately build up credit at one or many
correspondent nodes. The credit could then be used for a more potent,
redirection-based flooding attack.
It turns out that this issue is less serious than it may seem at
first glance. The reason is that, in order to build up enough credit
at the remote end, the attacker would initially have to expose itself
to exactly the same packet flood that it could then redirect towards
the victim. Note that this is true for both data volume and data
rate: While data volume directly affects how much credit the
correspondent node allocates, the data rate is indirectly taken into
account through credit aging.
The second CBA mode requires some sort of feedback for the
correspondent node about how many packets that the correspondent node
sends to a mobile node actually make it all the way to that mobile
node. As mentioned in Section 5.7, care-of-address spot checks
provide this feedback. But they require more significant
modifications to the Mobile IPv6 base specification than the first
Arkko & Vogt Expires April 1, 2005 [Page 39]
Internet-Draft MIP6 Route Optimization Enhancements October 2004
mode of CBA does. Moreover, while the first mode operates completely
transparent to the mobile node, the second obviously does not.
CBA uses exponential aging to gradually reduce credit that has been
earned in the past. This way, an attacker is prevented to collect
credit over a long time interval and use this credit, all at once,
for a short but potent data burst towards a victim. Care must be
taken to set the aging factor to an appropriate value.
Finally, one should mention that CBA-based concurrent care-of-address
tests can be used to improve other mobility-management protocols that
verify a new IP address through probing. This includes HIP and
certain Mobike proposals. Also, CBA-based concurrent care-of-address
tests can be integrated into other Mobile IPv6 optimization
techniques described in this document. Approaches that may benefit
are, for example, CGA-based ones (cf. Section 6.2.3) as well as those
that use shared-secret preconfiguration (cf. Section 6.2.2). Last,
but not least, in scenarios where a home agent cannot trust in the
correctness of the registered mobile nodes' care-of addresses,
CBA-based concurrent care-of-address tests could be proscribed even
for home registrations. The same is true for Hierarchical Mobile
IPv6, which, as it stands, assumes a MAP can be confident that mobile
nodes use correct on-link care-of addresses, and so gets around the
care-of-address test.
6.2.5 Prefix-Based Certificates
The Mobile IPv6 base specification avoids strong authentication
cryptography for signaling between mobile nodes and correspondent
nodes. One reason for this is the impracticality of a global trusted
PKI that could approve bindings between the mobile nodes' identities
and public keys. Another reason is that limited power resources and
processing capacity at the mobile nodes generally rule out any
complex cryptographic operations. Robustness to resource-exhaustion
attacks requires a similar restrictiveness on the correspondent-node
side.
[9] suggest promoting the home agent to a security proxy operating on
behalf of its mobile nodes. Correspondent nodes can trust a home
agent based on a certificate that binds the home-network prefix to
the public key of the home agent. The home agent, in turn, vouches
for the correctness of its mobile nodes' home addresses. This
approach is called Certificate-based Binding Update (CBU).
CBU circumvents the lack of a global PKI in an elegant way. Rather
than having to issue a certificate per mobile node, only a
certificate per home-network prefix is required. This reduction in
complexity makes certificate-based approaches to mobile-node
Arkko & Vogt Expires April 1, 2005 [Page 40]
Internet-Draft MIP6 Route Optimization Enhancements October 2004
authentication more feasible than it is today. The approach also
avoids heavy computations at mobile nodes since all such computations
are performed by the home agent. This mitigates the issue with
resource limitations at mobile nodes.
As a side effect, once the end-to-end security association between a
mobile node and a correspondent node has been created, CBU allows for
improved signaling delay during all subsequent handovers.
On the other hand, it should be mentioned that the processing
overhead at correspondent nodes actually increases compared to
standard correspondent registrations. This may not be an issue since
resources at stationary correspondent nodes are usually higher than
those of many mobile devices, and home agents would do the
cryptographic operations for mobile correspondent nodes.
Correspondent nodes should hence be provided with sufficient
resources, at least where the correspondent node is not a popular web
server or other central resource. One should, however, bear in mind
that the increased overhand implies a higher risk to
resource-exhaustion attacks.
The identity of a mobile node may in certain scenarios also be
verifiable through an AAA infrastructure. A home AAA server, which
may or may not be co-located with the home agent, can then contact a
remote AAA server in the correspondent node's network. Note that this
moves some of the authentication overhead from the correspondent node
to the remote AAA server. An AAA-based approach can also dynamically
assign mobile-node requests to different correspondent nodes while
keeping secret authenticating material local at a single AAA server.
There is ongoing work on the integration of AAA with Mobile IPv6
[30]. The current focus is on authentication between mobile nodes and
home agents. The proposal is thus a replacement for the IPsec-based
authentication protocol for home registrations. But the concept of
security proxies presented in [9] may as well be re-used for
enhancements to the AAA infrastructure.
CBU does not solve the issue with care-of-address spoofing: A
vouching home agent does not prevent a malicious mobile node from
faking its care-of address. The culprit could cheat its home agent,
or it could cooperate with it. This said, CBU should be combined with
a care-of-address test that rules out redirection-based flooding
attacks. A combination of concurrent care-of-address tests and CBA
(cf. Section 5.7) can be used to keep the signaling delay during
handover as low as it currently is in [9].
Arkko & Vogt Expires April 1, 2005 [Page 41]
Internet-Draft MIP6 Route Optimization Enhancements October 2004
6.3 Further Research
Mobility-related optimizations are currently actively studied by many
researchers, looking at a number of different protocol layers. The
preceding section also identifies some worthwhile amendments to the
existing proposals that require further work. While some of the basic
methods for route optimization are fairly well understood and are
being deployed, there are a number of interesting, newer approaches
that deserve to be studied in more detail. This section discusses
some research directions that appear fruitful, or necessary in the
future, and that go beyond the existing proposals described so far.
6.3.1 Related Research in Other Protocol Layers
The efficiency, security, and other functionality related to
movements is not dependent only on Mobile IPv6 route optimization
(even if researchers often pose their analysis in that light). A
movement that is visible at the IP layer involves all lower layers as
well; this includes layer 2 attachment procedures, layer 2 security
mechanism negotiation, authentication and key agreement, IP router
and neighbor discovery, address autoconfiguration, duplicate address
detection and so forth. A complete network attachment typically
requires over twenty link and IP layer messages, assuming features
necessary for a commercial deployment (such as security) are turned
on.
A significant research question is the overall performance of the
network access stack as a whole. Current protocol stacks have a
number of limitations in addition to the long attachment delays [1],
such as denial-of-service vulnerabilities, difficulties in trusting a
set of access nodes distributed to physically insecure locations,
inability to get enough information for a handoff decision, and so
on.
A number attempts are ongoing to improve various parts of the stack,
in particular focusing on performance of movements. These attempts
include link-layer enhancements, parameter tuning [34], network
access authentication mechanisms [14], fast handover mechanisms [20],
[2], and IP layer attachment improvements (such as Optimistic DAD
[21]).
It is uncertain how far this optimization can be taken by only
looking at the different parts individually. It is possible that a
more integrated approach would be necessary to gain a more
significant improvement [3].
It is also unclear at this time which components are the most
critical ones. Reference [1] suggests that IP mobility related
Arkko & Vogt Expires April 1, 2005 [Page 42]
Internet-Draft MIP6 Route Optimization Enhancements October 2004
signaling contributes only under 10% of the overall delay in an IEEE
802.11 environment. The most significant delays are caused by link
layer and IPv6 attachment. However, the results are not conclusive,
as there is a factor five difference between the best and worst
cases. The results can also be affected by a number of conditions,
such as the availability of specific link layer optimizations, or the
type of security mechanism used in the Mobile IPv6 home
registrations.
6.3.2 New Route Optimization Work
The primary driver to improve route optimization appears to be better
efficiency for a few usage scenarios, such as fast movements or the
ability to reduce signaling frequencies for hosts in standby mode.
Ongoing work addresses these aspects already quite well; most of the
suggested methods are quite stable in this regard. It is expected
that further (perhaps smaller) improvements continue to be achieved
through research and parameter tuning far into the future. This is
particularly true because the optimizations are often targeted to a
specific usage situation, and may not give the same improvement in
another situation. As a result, the publication of a few enhanced
methods for different situations seems more reasonable than expecting
to define a final, single method.
The development of an infrastructure-based route optimization method
is clearly a longer-term project. At this stage, it is not even clear
that such a mechanism is needed. We believe the prefix-based
certificate approach shows some promise in this area, particularly if
it can be combined with the deployment of these certificates for some
other purposes, such as Secure Neighbor Discovery [4]. The pre-shared
method being standardized at the IETF is simple and efficient, but we
do not expect it to be applicable in wide enough number of cases to
make a significant difference in practice.
In the following we list some potentially interesting research ideas
for new route optimization methods:
o Local mobility or local repair optimizations that require no
configuration.
o Care-of address verification mechanisms that employ lower layer
assistance or Secure Neighbor Discovery.
o The introduction of optimizations developed in the context of
Mobile IPv6 to HIP or other mobility protocols, or to layer 2
mobility solutions.
o Extension of the developed techniques to full multiaddressing,
i.e., including also multi-homing.
o Further development of techniques based on "asymmetric cost wars"
[7], such as CBA.
Arkko & Vogt Expires April 1, 2005 [Page 43]
Internet-Draft MIP6 Route Optimization Enhancements October 2004
6.3.3 Experimentation and Simulation
As discussed earlier, even the contribution of different stack parts
to overall movement delays is unclear. More measurements are needed,
particularly ones that
o Measure a realistic network scenario, enabling all features that
would likely be needed in commercial deployment. These features
include link-layer access control, for instance. Similarly, it is
necessary to include support for already specified optimizations.
o Measure or simulate the performance impacts of various suggested
improvements to the different parts of the stack.
o Measure implementation differences between systems based on the
same specifications. It would be valuable to know how much
implementations differ with regards to, for instance, the use of
the parallelism that RFC 3775 allows in the home and correspondent
registrations, the return routability procedure, and transmission
of packets before Binding Acknowledgements have arrived.
o Measure the effect of network conditions, such as packet loss, and
their effect to existing and new route optimization mechanisms.
o Collect data about the behaviour of mobile nodes in different
networks. Different route optimization mechanisms behave
differently depending on what the frequency of movements is, or
what payload traffic streams exist at the different stages of the
mobile node's existence.
o Measure or simulate the performance of different route
optimization schemes under different application scenarios, such
as symmetric/asymmetric applications, only seldomly active mobile
nodes, and so on.
7. Security Considerations
Security issues related to route optimization are an integral part of
the problem and have been discussed in the body of the document.
8. Conclusions
Mobility related optimizations are currently actively studied by many
researchers. Some of the basic Mobile IPv6 related methods, such as
the return routability method, pre-shared secrets, CGAs are either
already being applied in practical systems or will be soon. A growing
number of new proposals are being studied that attempt to optimize
these methods further, or make them better applicable to a particular
situation.
Many of the current proposals are mature enough to withstand close
scrutiny. Their relative advantages are somewhat subjective, however.
For instance, some may have a high cost in terms of configuration
while others do not need configuration but are slower. It is expected
Arkko & Vogt Expires April 1, 2005 [Page 44]
Internet-Draft MIP6 Route Optimization Enhancements October 2004
that more than one new method is needed for this reason. Deployment
experience will also be needed, so publication of a few alternative
methods as RFCs would be desirable.
It is interesting to note, however, that historically most if not all
current proposals had predecessors that were shown to be insecure.
For instance, the initial return routabality and CGA methods were
proposed before the need for flooding attack protection was
understood, concurrent tests were first proposed with a limited form
of flooding protection, and several proposals employing
semi-permanent security associations have suffered from address
stealing attacks. This shows the need to reserve sufficient amount of
time for community analysis and review of new methods.
Another interesting observation is that mature proposals combine a
number of techniques and do not rely on a single approach. This is
due to the nature of the problem, where several different types of
vulnerabilities have to be avoided.
But it is also necessary to avoid overly expensive or complex
solutions. For instance, in evaluating the security needs for the
route optimization problem, it is important to compare these needs to
other vulnerabilities, such as denial-of-service, that already exist
for on path attackers. These vulnerabilities should not be made
worse, but it is not necessarily a requirement to use managed,
expensive security either.
A significant research question is the overall performance of the
whole stack in a mobile setting. This includes but is not limited to
IP mobility. Current network access protocol stacks have a number of
limitations, such as long attachment and movement latencies [1] -- an
attachment typically requires over twenty link and IP layer messages
-- denial-of-service vulnerabilities, and so on.
A number attempts are currently being made to improve various parts
of the stack, in particular focusing on high-performance movements.
These attempts include link-layer enhancements, parameter tuning
[34], network access authentication mechanisms [14], fast handover
mechanisms [20][2], and IP layer attachment improvements such as
Optimistic DAD [21]. It is uncertain how far this optimization can be
taken by only looking at the different parts individually. It is also
unclear at this time which components are the most critical ones.
Other significant research questions include the effect of various
network conditions such as packet loss to the current methods and
whether different application situations require different
optimization methods. Our current understanding about the different
traffic patterns and their effects in mobility is limited, and
Arkko & Vogt Expires April 1, 2005 [Page 45]
Internet-Draft MIP6 Route Optimization Enhancements October 2004
experiments, modelling, and simulations will be needed.
Arkko & Vogt Expires April 1, 2005 [Page 46]
Internet-Draft MIP6 Route Optimization Enhancements October 2004
9 References
[1] Alimian, A. and B. Aboba, "Analysis of Roaming Techniques",
IEEE Contribution 11-04-0377r1 2004.
[2] Arbaugh, W. and B. Aboba, "Experimental Handoff Extension to
RADIUS", draft-irtf-aaaarch-handoff-04 (work in progress),
November 2003.
[3] Arkko, J., Eronen, P., Nikander, P. and V. Torvinen, "Secure
and Efficient Network Access", Extended abstract to be
presented in the DIMACS workshop, November 2004.
[4] Arkko, J., Kempf, J., Sommerfeld, B., Zill, B. and P. Nikander,
"SEcure Neighbor Discovery (SEND)", draft-ietf-send-ndopt-06
(work in progress), July 2004.
[5] Arkko, J. and C. Vogt, "Credit-Based Authorization for Binding
Lifetime Extension",
draft-arkko-mipv6-binding-lifetime-extension-00 (work in
progress), May 2004.
[6] Arkko, J., Devarapalli, V. and F. Dupont, "Using IPsec to
Protect Mobile IPv6 Signaling Between Mobile Nodes and Home
Agents", RFC 3776, June 2004.
[7] Arkko, J. and P. Nikander, "Weak Authentication: How to
Authenticate Unknown Principals without Trusted Parties",
Proceedings of Security Protocols Workshop 2002, Cambridge, UK,
April 16-19, 2002.
[8] Aura, T., "Cryptographically Generated Addresses (CGA)",
draft-ietf-send-cga-06 (work in progress), April 2004.
[9] Bao, F., "Certificate-based Binding Update Protocol (CBU)",
draft-qiu-mip6-certificated-binding-update-02 (work in
progress), August 2004.
[10] Bradner, S., Mankin, A. and J. Schiller, "A Framework for
Purpose-Built Keys (PBK)", draft-bradner-pbk-frame-06 (work in
progress), June 2003.
[11] Ferguson, P. and D. Senie, "Network Ingress Filtering:
Defeating Denial of Service Attacks which employ IP Source
Address Spoofing", BCP 38, RFC 2827, May 2000.
[12] Haddad, W. and S. Krishnan, "Optimizing Mobile IPv6 (OMIPv6)",
draft-haddad-mipv6-omipv6-01 (work in progress), February 2004.
Arkko & Vogt Expires April 1, 2005 [Page 47]
Internet-Draft MIP6 Route Optimization Enhancements October 2004
[13] Haddad, W., Madour, L., Arkko, J. and F. Dupont, "Applying
Cryptographically Generated Addresses to Optimize MIPv6
(CGA-OMIPv6)", draft-haddad-mip6-cga-omipv6-02 (work in
progress), June 2004.
[14] Institute of Electrical and Electronics Engineers, "Local and
Metropolitan Area Networks: Port-Based Network Access Control",
IEEE Standard 802.1X, September 2001.
[15] Johnson, D., Perkins, C. and J. Arkko, "Mobility Support in
IPv6", RFC 3775, June 2004.
[16] Kent, S. and R. Atkinson, "IP Encapsulating Security Payload
(ESP)", RFC 2406, November 1998.
[17] Kent, S., "IP Encapsulating Security Payload (ESP)",
draft-ietf-ipsec-esp-v3-08 (work in progress), March 2004.
[18] Koodli, R., "Fast Handovers for Mobile IPv6",
draft-ietf-mipshop-fast-mipv6-02 (work in progress), July 2004.
[19] Loughney, J., "IPv6 Node Requirements",
draft-ietf-ipv6-node-requirements-11 (work in progress), August
2004.
[20] Mishra, A., Shin, M., Arbaugh, W., Lee, I. and K. Jang,
"Proactive Key Distribution to support fast and secure
roaming", IEEE Contribution 11-03-084r1-I, January 2003.
[21] Moore, N., "Optimistic Duplicate Address Detection for IPv6",
draft-ietf-ipv6-optimistic-dad-01 (work in progress), June
2004.
[22] Moskowitz, R., "Host Identity Protocol", draft-ietf-hip-base-00
(work in progress), June 2004.
[23] Nikander, P., Arkko, J., Aura, T., Montenegro, G. and E.
Nordmark, "Mobile IP version 6 Route Optimization Security
Design Background", draft-ietf-mip6-ro-sec-01 (work in
progress), July 2004.
[24] Paxson, V., "An Analysis of Using Reflectors for Distributed
Denial-of-Service Attacks", Computer Communication Review
31(3)., July 2001.
[25] Perkins, C., "IP Mobility Support for IPv4", RFC 3344, August
2002.
Arkko & Vogt Expires April 1, 2005 [Page 48]
Internet-Draft MIP6 Route Optimization Enhancements October 2004
[26] Perkins, C., "Preconfigured Binding Management Keys for Mobile
IPv6", draft-ietf-mip6-precfgKbm-00 (work in progress), April
2004.
[27] Moskowitz, R., Nikander, P. and P. Jokela, "Host Identity
Protocol", draft-moskowitz-hip-09 (work in progress), February
2004.
[28] Nikander, P., "Denial-of-Service, Address Ownership, and Early
Authentication in the IPv6 World", Proceedings of the Cambridge
Security Protocols Workshop, April 2001.
[29] Patel, A., "Problem Statement for bootstrapping Mobile IPv6",
draft-ietf-mip6-bootstrap-ps-00 (work in progress), July 2004.
[30] Patel, A., Leung, K., Khalil, M., Akhtar, H. and K. Chowdhury,
"Authentication Protocol for Mobile IPv6",
draft-ietf-mip6-auth-protocol-00 (work in progress), July 2004.
[31] O'Shea, G. and M. Roe, "Child-proof Authentication for MIPv6",
Computer Communications Review, April 2001.
[32] Roe, M., Aura, T., O'Shea, G. and J. Arkko, "Authentication of
Mobile IPv6 Binding Updates and Acknowledgments",
draft-roe-mobileip-updateauth-02 (work in progress), March
2002.
[33] Soliman, H., Castelluccia, C., Malki, K. and L. Bellier,
"Hierarchical Mobile IPv6 mobility management (HMIPv6)",
draft-ietf-mipshop-hmipv6-02 (work in progress), June 2004.
[34] Velayos, H. and G. Karlsson, "Techniques to Reduce IEEE 802.11b
MAC Layer Handover Time", Laboratory for Communication
Networks, KTH, Royal Institute of Technology, Stockholm,
Sweden, TRITA-IMIT-LCN R 03:02, April 2003.
[35] Vogt, C., Arkko, J., Bless, R., Doll, M. and T. Kuefner,
"Credit-Based Authorization for Mobile IPv6 Early Binding
Updates", draft-vogt-mipv6-credit-based-authorization-00 (work
in progress), May 2004.
[36] Vogt, C., Bless, R., Doll, M. and T. Kuefner, "Early Binding
Updates for Mobile IPv6",
draft-vogt-mip6-early-binding-updates-00 (work in progress),
February 2004.
Arkko & Vogt Expires April 1, 2005 [Page 49]
Internet-Draft MIP6 Route Optimization Enhancements October 2004
Authors' Addresses
Jari Arkko
Ericsson Research NomadicLab
FI-02420 Jorvas
Finland
EMail: jari.arkko@ericsson.com
Christian Vogt
Institute of Telematics
University of Karlsruhe
P.O. Box 6980
76128 Karlsruhe
Germany
EMail: chvogt@tm.uka.de
URI: http://www.tm.uka.de/~chvogt/
Appendix A. Acknowledgements
The authors wish to thank Gabriel Montenegro and Rajeev Koodli for
their support, review, and suggestions related to this paper.
Arkko & Vogt Expires April 1, 2005 [Page 50]
Internet-Draft MIP6 Route Optimization Enhancements October 2004
Intellectual Property Statement
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the IETF's procedures with respect to rights in IETF Documents can
be found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Disclaimer of Validity
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Copyright Statement
Copyright (C) The Internet Society (2004). This document is subject
to the rights, licenses and restrictions contained in BCP 78, and
except as set forth therein, the authors retain all their rights.
Acknowledgment
Funding for the RFC Editor function is currently provided by the
Internet Society.
Arkko & Vogt Expires April 1, 2005 [Page 51]| PAFTECH AB 2003-2026 | 2026-04-22 17:21:59 |