One document matched: draft-cui-mext-firewall-traversing-00.txt
MEXT Working Group X.Cui
Internet Draft Huawei
Intended status: Standards Track February 10, 2010
Expires: August 2010
Stateful Firewall Traversing for Route Optimization
draft-cui-mext-firewall-traversing-00.txt
Status of this Memo
This Internet-Draft is submitted to IETF in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on August 10, 2010.
Copyright Notice
Copyright (c) 2010 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the BSD License.
Cui Expires August 10, 2010 [Page 1]
Internet-Draft Firewall Traversing for RO February 2010
Abstract
This document presents a new approach for the scenario where the
correspondent node is in a network protected by stateful firewall.
The approach extends the mobility management procedure and enables
the Return Routability related messages to traverse the stateful
firewall and Route Optimization may also be achieved well in such
scenario.
Conventions used in this document
In examples, "C:" and "S:" indicate lines sent by the client and
server respectively.
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119].
Table of Contents
1. Introduction...................................................3
2. Terminology....................................................3
3. Scenario and Solution Consideration............................4
3.1. Scenario..................................................4
3.2. Solution Consideration....................................5
4. Messages Formats...............................................8
4.1. Extension of HoTI Message.................................8
4.2. Care-of Test Allowance Message............................9
5. Security Considerations........................................9
6. IANA Considerations...........................................10
7. Acknowledgments...............................................10
8. References....................................................11
8.1. Normative References.....................................11
8.2. Informative References...................................11
Author's Addresses...............................................11
Cui Expires August 10, 2010 [Page 2]
Internet-Draft Firewall Traversing for RO February 2010
1. Introduction
Mobile IP [RFC3775] is standardized to support mobility of IPv6 and
the Mobile Node with support of Mobile IP can keep the established
session when it is moving.
Firewall is security device that can protect IP nodes inside the
security domain and resist hostile attacks.
Mobility and security are the most important features of IPv6 but in
current specifications they can not cooperate well.
As specified in [RFC4487], many issues will happen in some scenarios.
Section 5.2 of [RFC4487] shows the scenario where the correspondent
node is in a network protected by firewall. Some analyses for this
scenario are also provided in [RFC4487].
In principle, the issues may be resolved in two different ways,
extension of firewall or extension of mobility management.
One approach, which is based on extensions and configuration of
static firewall, is introduced in [draft-ietf-mext-firewall-admin]
and [draft-ietf-mext-firewall-vendor]. But at present many network
administrators use stateful firewall as the security device and the
configuration of static firewall is not welcomed in many scenarios.
This document presents another approach, which is based on the
combination of extension of Mobility management and stateful
firewall. In this approach the requirements of firewall may be
simplified and the complex configuration on firewall may be avoided.
2. Terminology
All the mobility related terms used in this document are to be
interpreted as defined in the Mobile IPv6 specification [RFC3775] and
Problem Statement of Mobile IPv6 and Firewalls [RFC4487].
Cui Expires August 10, 2010 [Page 3]
Internet-Draft Firewall Traversing for RO February 2010
3. Scenario and Solution Consideration
3.1. Scenario
This document focuses on the scenario described in section 5.2 of
[RFC4487]. In this scenario the Corresponding Node is protected by
the firewall.
+----------------+ +----+
| | | HA |
| | +----+
| | Home Agent
| +---+ +----+ of B
| |CN | | FW |
| | C | +----+
| +---+ | +---+
| | | B |
| | +---+
+----------------+ External Mobile
Network protected Node
by a firewall
Figure 1 CN Is in a Network Protected by Firewall.
Since the stateful firewall is the most common firewall device in
current network, this draft takes the fact as a precondition.
The stateful firewalls implement the Stateful packet filtering
function which is defined in [RFC2647] as "forwarding or rejecting
traffic based on the contents of a state table maintained by a
firewall." [RFC2647] also specifies that "devices using stateful
packet filtering will only forward packets if they correspond with
state information maintained by the device about each connection".
Additionally, the connection is established by data exchanged between
hosts.
In such scenario, the connection between corresponding node C and
external node B is established in the firewall based on the address
of corresponding node C and home address of mobile node B. At this
stage the corresponding node C may send packets to home address (by
existing connection state) and care of address (by dynamically
established connection state) of external mobile node B. The external
node B can send packets to corresponding node only with its home
address but can not send packets to C with its care of address,
Cui Expires August 10, 2010 [Page 4]
Internet-Draft Firewall Traversing for RO February 2010
because there is no corresponding connection state for the care of
address of node B.
3.2. Solution Consideration
This document presents a new approach for the above scenario. The
solution extends the route optimization establishment procedure and
use 'Hole Punching' techniques to set up a connection state for care
of address of external node B.
The message flow of this solution is as follows:
Cui Expires August 10, 2010 [Page 5]
Internet-Draft Firewall Traversing for RO February 2010
CN C Firewall HA MN B
| | | |
| Connection state | |
| for C & HoA of B | |
| | | |
| packets | | |
|------------>| packets | |
| |-------------->| packets |
| | |---------->|
| | | packets |
| | packets |<----------|
| packets |<--------------| |
|<------------| | |
| | | |
| | | HoTI |
a1 | | HoTI |<----------|
a2 | |<--------------| |
| | | CoTI |
a3 | HoTI X<--------------------------|
b1 |<------------| |
| HoT | | |
c1 |------------>| HoT | |
c2 | |-------------->| HoT |
c3 | CoTA | |---------->|
d1 |------------>| CoTA | |
d2 | |-------------------------->|
| | CoTI |
e1 | CoTI |<--------------------------|
e2 |<------------| |
| CoT | |
f1 |------------>| CoT |
f2 | |-------------------------->|
| | Binding Update |
g1 | BU |<--------------------------|
g2 |<------------| |
| Binding Ack | |
g3 |------------>| Binding Ack |
g4 | |-------------------------->|
| | |
| packets | packets |
|<----------->|<------------------------->|
| | |
| | |
Figure 2 Route Optimization Extension for Firewall.
Cui Expires August 10, 2010 [Page 6]
Internet-Draft Firewall Traversing for RO February 2010
The detailed descriptions are as follows:
At the initiatory stage, the stateful firewall establishes a
connection state for the internal node (i.e., CN C) and external node
(i.e., MN B). CN C can send packets to MN B by home address of MN B,
which is included in the destination IP address field of the packet.
Since the firewall maintains the connection state, the packets are
allowed to go through the firewall. MN B can also send packets to CN
C by home address of MN B, which is included in the source IP address
field of the packet. Since the firewall maintains the connection
state, the packets are also allowed to go through the firewall.
(a1~a3) MN B initiates the Return Routability procedure and sends
HoTI and CoTI messages to CN C as specified in [RFC3775], with the
exception that the Punching Flag and Alternate Care-of Address Option
are included in the HoTI message. HoA of MN B is included in the
source IP address field of HoTI and CoA of MN B is included in the
source IP address field of CoTI message.
(b1) Since the firewall maintains the state of HoA connection (i.e.,
between the address pair of CN and HoA of MN), the HoTI message is
allowed to go through the firewall. But the firewall doesn't
maintain the state of CoA connection (i.e., between the address pair
of CN and CoA of MN), the CoTI message is not allowed to go through
the firewall. The firewall drops the CoTI packet.
(c1~c3) CN C receives the HoTI message and replies a HoT message as
specified in [RFC3775]. The HoT message can traverse the firewall and
arrive at MN B.
(d1~d2) The Punching Flag included in HoTI message trigger the CN B
to respond a Care-of Test Allowance (CoTA) message to the address
which is included in the Alternate Care-of Address Option. CN C
copies the care of address from the HoTI message and sends the Care-
of Test Allowance message to the care of address of MN B. Since the
stateful firewall permits the protected node to send packets to the
outside network, the CoTA message can traverse the firewall and
arrive at MN B. The firewall simultaneously establishes a new
connection state for the care of address of MN B in its connection
state table.
(e1~e2) MN B receives the CoTA message and immediately resends the
CoTI message to CN C. Since there is corresponding connection state
in the firewall at this time, the CoTI can go through the firewall.
Cui Expires August 10, 2010 [Page 7]
Internet-Draft Firewall Traversing for RO February 2010
(f1~f2) The CN C receives the CoTI message and responds CoT as
specified in [RFC3775]. The CoT packet goes through the firewall and
arrives at MN B.
(g1~g4) Normal corresponding binding update is implemented as
specified in [RFC3775].
After the Route Optimization is established, packets can be delivered
without the involvement of Home Agent.
4. Messages Formats
4.1. Extension of HoTI Message
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Reserved |P|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
+ Home Init Cookie +
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
. .
. Mobility Options .
. .
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
A new flag (P)unching is added in Home Test Init message to request
firewall punching and Alternate Care-of Address option SHOULD be
included in extended HoTI message.
When the P flag is set to a value of 1 the receiver of HoTI message
SHOULD respond CoTA message to the care of address included in the
same HoTI message.
Cui Expires August 10, 2010 [Page 8]
Internet-Draft Firewall Traversing for RO February 2010
4.2. Care-of Test Allowance Message
A node in the protected network uses the Care-of Test Allowance
(CoTA) message to punch a hole in the stateful firewall for the
Return Routability procedure. The Care-of Test Allowance message
uses the MH Type value TBD1. When this value is indicated in the MH
Type field, the format of the Message Data field in the Mobility
Header is as follows:
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Reserved |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
. .
. Mobility Options .
. .
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Reserved
16-bit field reserved for future use. The value MUST be initialized
to zero by the sender, and MUST be ignored by the receiver.
Mobility Options
Variable-length field of such length that the complete Mobility
Header is an integer multiple of 8 octets long. This field contains
zero or more TLV-encoded mobility options. The receiver MUST ignore
and skip any options which it does not understand.
5. Security Considerations
The security must be carefully considered for this solution. Since
the attacker can forge the Home Test Init message and cheat the
firewall for a dangerous hole, the protected node must carefully
check the HoTI message and some security extensions may be integrated
in this solution.
Cui Expires August 10, 2010 [Page 9]
Internet-Draft Firewall Traversing for RO February 2010
6. IANA Considerations
TBD1 is a new Mobility Header type value introduced in this document.
IANA is requested to assign the new type value for the Care-of Test
Allowance message.
7. Acknowledgments
TBD.
Cui Expires August 10, 2010 [Page 10]
Internet-Draft Firewall Traversing for RO February 2010
8. References
8.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC3775] Johnson, D., Perkins, C., and J. Arkko, "Mobility Support
in IPv6", RFC 3775, June 2004.
8.2. Informative References
[RFC2647] Newman, D., "Benchmarking Terminology for Firewall
Performance", RFC 2647, August 1999.
[RFC4487] Le, F., Faccin, S., Patil, B., and H. Tschofenig, "Mobile
IPv6 and Firewalls: Problem Statement", RFC 4487, May
2006.
Author's Addresses
Xiangsong Cui
Huawei Technologies
KuiKe Bld., No.9 Xinxi Rd.,
Shang-Di Information Industry Base,
Hai-Dian District, Beijing, P.R. China, 100085
Email: Xiangsong.Cui@huawei.com
Cui Expires August 10, 2010 [Page 11]
| PAFTECH AB 2003-2026 | 2026-04-24 08:12:05 |