One document matched: draft-ietf-mip6-hareliability-04.txt
Differences from draft-ietf-mip6-hareliability-03.txt
MEXT (MIP6) Working Group R. Wakikawa (Editor)
Internet-Draft Toyota ITC
Intended status: Standards Track July 14, 2008
Expires: January 15, 2009
Home Agent Reliability Protocol
draft-ietf-mip6-hareliability-04.txt
Status of this Memo
By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on January 15, 2009.
Copyright Notice
Copyright (C) The IETF Trust (2008).
Wakikawa (Editor) Expires January 15, 2009 [Page 1]
Internet-Draft HA Reliability July 2008
Abstract
The home agent can be a single point of failure when Mobile IPv6 is
operated in a system. It is critical to provide home agent
reliability in the event of a home agent crashing or becoming
unavailable. This would allow another home agent to take over and
continue providing service to the mobile nodes. This document
describes the problem scope briefly and provides a mechanism of home
agent failure detection, home agent state transfer, and home agent
switching for home agent redundancy and reliability.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 4
2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 5
3. Problem Statement and Requirements . . . . . . . . . . . . . . 6
4. Protocol Overview . . . . . . . . . . . . . . . . . . . . . . 8
4.1. Home Agent Virtual Switch . . . . . . . . . . . . . . . . 8
4.2. Home Agent Hard Switch . . . . . . . . . . . . . . . . . . 9
4.3. Home Agent Management . . . . . . . . . . . . . . . . . . 10
5. Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
5.1. New Mobility Header Messages . . . . . . . . . . . . . . . 11
5.1.1. State Synchronization Message . . . . . . . . . . . . 11
5.1.2. Home Agent Control Message . . . . . . . . . . . . . . 13
5.1.3. Home Agent Hello Message . . . . . . . . . . . . . . . 15
5.1.4. Home Agent Switch Message . . . . . . . . . . . . . . 16
5.2. New Mobility Options . . . . . . . . . . . . . . . . . . . 17
5.2.1. IP address Option . . . . . . . . . . . . . . . . . . 17
5.2.2. Binding Cache Information Option . . . . . . . . . . . 17
5.2.3. AAA Information Option . . . . . . . . . . . . . . . . 18
6. Home Agent Configuration . . . . . . . . . . . . . . . . . . . 20
6.1. Network Configuration . . . . . . . . . . . . . . . . . . 20
6.2. Address Configuration for Virtual Switch . . . . . . . . . 21
6.3. Address Configuration for Hard Switch . . . . . . . . . . 21
7. Home Agent Common Operation . . . . . . . . . . . . . . . . . 22
7.1. Home Agent List Management . . . . . . . . . . . . . . . . 22
7.2. Detecting Home Agent Failure . . . . . . . . . . . . . . . 22
7.3. Processing Hello Messages . . . . . . . . . . . . . . . . 23
7.3.1. Requesting Hello Message . . . . . . . . . . . . . . . 24
7.3.2. Sending Hello Message . . . . . . . . . . . . . . . . 24
7.3.3. Receiving Hello Message . . . . . . . . . . . . . . . 25
Wakikawa (Editor) Expires January 15, 2009 [Page 2]
Internet-Draft HA Reliability July 2008
7.4. Processing State Synchronization Messages . . . . . . . . 26
7.4.1. Requesting State of a Particular Mobile Node(s) . . . 26
7.4.2. Synchronizing State . . . . . . . . . . . . . . . . . 27
7.4.3. Reliable Transmission by Explicit Acknowledgement . . 28
7.5. Processing Home Agent Control Messages . . . . . . . . . . 29
7.5.1. Standby Home Agent becomes an Active Home Agent . . . 29
7.5.2. Active Home Agent becomes in-active . . . . . . . . . 30
7.6. Interworking with VRRP . . . . . . . . . . . . . . . . . . 31
7.7. Retransmissions and Rate Limiting . . . . . . . . . . . . 32
8. Home Agent Virtual Switch . . . . . . . . . . . . . . . . . . 34
8.1. Consideration of Routing and Neighbor Discovery
Protocol . . . . . . . . . . . . . . . . . . . . . . . . . 34
8.2. Home Agent Recovery . . . . . . . . . . . . . . . . . . . 34
9. Home Agent Hard Switch . . . . . . . . . . . . . . . . . . . . 35
9.1. Home Agent Recovery . . . . . . . . . . . . . . . . . . . 35
9.2. Sending Home Agent Switch Messages . . . . . . . . . . . . 35
9.3. Notification of Home Agent Switch Completion . . . . . . . 36
9.4. Mobile Node Operation . . . . . . . . . . . . . . . . . . 36
9.4.1. Home Agent Addresses Discovery . . . . . . . . . . . . 36
9.4.2. IKE/IPsec pre-establishment to Home Agents . . . . . . 37
9.4.3. Receiving Home Agent Switch message . . . . . . . . . 37
10. Security Considerations . . . . . . . . . . . . . . . . . . . 39
11. Protocol Constants . . . . . . . . . . . . . . . . . . . . . . 41
12. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 42
13. Additional Authors . . . . . . . . . . . . . . . . . . . . . . 43
14. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 43
15. References . . . . . . . . . . . . . . . . . . . . . . . . . . 44
15.1. Normative References . . . . . . . . . . . . . . . . . . . 44
15.2. Informative References . . . . . . . . . . . . . . . . . . 44
Appendix A. Change Log From Previous Versions . . . . . . . . . . 46
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 46
Intellectual Property and Copyright Statements . . . . . . . . . . 47
Wakikawa (Editor) Expires January 15, 2009 [Page 3]
Internet-Draft HA Reliability July 2008
1. Introduction
In Mobile IPv6 [RFC-3775] and NEMO Basic Support [RFC-3963], if a
home agent loses the binding cache state, due to failure or some
other reason, it results in a loss of service for the mobile nodes.
It is beneficial to provide high availability and redundancy for a
home agent so that mobile nodes can avail of uninterrupted service
even when one home agent crashes or loses state. The Home Agent
Reliability protocol is designed to synchronize the Mobile IPv6
states between active and standby home agents as VRRP[RFC-3768] or
HSRP [RFC-2281]. A home agent maintains not only binding cache but
also IPsec and IKE related states per mobile node. Mobile IPv6
mandates IPsec encryption for signaling of home binding registration
(BU and BA) and return routability (HoTI and HoT) as described in
[RFC-3776]. However, IPsec states synchronization is out of scope in
this document. The scope of Home Agent Reliability protocol is
limited to the management of Mobile IPv6 related states. Thus, we
define two different approaches such as Home Agent Virtual Switch and
Home Agent Hard Switch depending on the capability of IPsec state
synchronization. In both cases, a mobile node maintains only one
home binding at any given time.
Home Agent Virtual Switch
The Home Agent Virtual Switch operation can be used only if IPsec
state synchronization mechanism is available (outside of Home
Agent Reliability Protocol). The IPsec state per mobile node MUST
be shared between the active home agent and standby home agents in
the background. The active and the standby home agents are
addressed by the same home agent address, although only the active
home agent is accessible with the home agent address. Each mobile
node negotiates just one Security Association with the active home
agent. In case there is a failure of the active home agent, the
standby home agent takes over without the mobile node being aware
of the change in the home agent.
Home Agent Hard Switch
In the Home Agent Hard Switch, IPsec/IKE states synchronization is
not required. The home agents are addressed by different IP
addresses. When an active home agent fails, a mobile node will
receive a notification (Home Agent Switch message [RFC-5142]) from
a standby home agent, and send a Binding Update to the standby
home agent. In order for the mobile node to receive the Home
Agent Switch message securely from the standby home agent, the
mobile node needs to establish an IPsec SA with both the active
and the standby home agents beforehand.
Wakikawa (Editor) Expires January 15, 2009 [Page 4]
Internet-Draft HA Reliability July 2008
2. Terminology
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC-2119].
In this document, the term mobile node refers to both a mobile node
[RFC-3775] and a mobile router [RFC-3963].
Mobility related terms used in this document are defined in [RFC-
3775] and [RFC-3753]. In addition or in replacement of these, the
following terms are defined or redefined:
Active Home Agent
A home agent that is currently serving the mobile nodes.
Standby Home Agent
A home agent which will serve the mobile nodes when the active
home agent fails.
Failed Home Agent
A home agent that is not available due to hardware or software
failure, system maintenance, etc.
Redundant Home Agent Set
A group of active and standby home agent(s). The Group Identifier
is used to identify a redundant home agent set.
Virtual Home Agent Address
A home agent address shared among home agents in a redundant home
agent set and used only in the Home Agent Virtual Switch case.
The address is only acitivated on an active home agent.
Home Agent Preference
This preference value is originally defined for Dynamic Home Agent
Address Discovery (DHAAD) in RFC3775. This protocol re-uses this
preference value for home agent selection when an active home
agent has failed. However, an operator can also define an
independent value used only for the home agent reliability
protocol if the operator wants to have different preference values
for DHAAD and the home agent reliability protocol. A home agent
SHOULD NOT use the same preference value of other home agents.
Wakikawa (Editor) Expires January 15, 2009 [Page 5]
Internet-Draft HA Reliability July 2008
3. Problem Statement and Requirements
In Mobile IPv6 [RFC-3775], a mobile node registers and establishes a
binding with only one home agent. Thus the home agent represents the
possibility of a single point of failure for Mobile IPv6. A home
agent is responsible for multiple mobile nodes on its home link. The
failure of the home agent may then result in the loss of connectivity
for numerous mobile nodes located throughout the Internet. To
overcome this problem, Mobile IPv6 allows deployment of multiple home
agents on the home link so that upon the failure of a home agent, a
mobile node can re-establish its connection through a new home agent.
However, the base Mobile IPv6 specification does not address home
agent failover and dynamic transfer of service from one home agent to
another. This transfer of service from the failed home agent to a
new active home agent requires coordination or pre-configuration
among the home agents regarding security associations, transfer of
mobile node bindings, and other service information for reliable
Mobile IPv6 service in a deployment scenario.
For the home agent reliability solution, we define the following
requirements:
Reliable Home agent service
Multiple home agents are available for a home prefix and one of
them actively serves the mobile nodes. A standby home agent takes
over when the active home agent becomes unavailable. The transfer
of the MN-HA association should be transparent to applications and
should not take longer than the care-of-addresses update procedure
described in Mobile IPv6 [RFC-3775].
Availability of a redundant home agent set
Availability of an active home agent address and a standby home
agent address at the bootstrapping period for the mobile node is
assumed.
State Synchronization
The information for mobile nodes must be able to be synchronized
between an active home agent and standby home agents. This
includes the Binding Cache, AAA information, other Mobile IPv6 and
NEMO related information. Note that the Home Agent Reliability
protocol exchanges only running states of mobile nodes.
Therefore, we do not have any specific operation for synchronizing
the configuration information. For instance, when Mobile IPv6 is
operated with Authentication protocol, the synchronizing the
configurations of the Authentication protocol is out of scope in
Wakikawa (Editor) Expires January 15, 2009 [Page 6]
Internet-Draft HA Reliability July 2008
this document. Operators MAY correctly configure in multiple home
agents.
Consideration of IPsec/IKE transfer
An active home agent maintains several IPsec and IKE states for
mobile nodes. These states are synchronized within the redundant
home agent set. The details are described in Section 10.
Secured Message Exchanges
The messages used between the home agents to transfer binding
cache information MAY be authenticated and encrypted.
Failure Detection
Redundant home agents must actively check for possible failure of
an active home agent. If a home agent supports an existing
failure detection mechanism such as VRRP[RFC-3768] or HSRP [RFC-
2281], it can re-use that mechanism to detect the home agent
failure. On the other hand, periodic Hello messages are
introduced to detect active home agent's service availability in
this document.
Failure Notification
If necessary, a mobile node is notified about the active home
agent failure by the standby home agent.
Wakikawa (Editor) Expires January 15, 2009 [Page 7]
Internet-Draft HA Reliability July 2008
4. Protocol Overview
4.1. Home Agent Virtual Switch
A mobile node remains unaware about the change in the active home
agent since the home agents have replicated all session state
including IPsec/IKE/ESP states. IPsec/IKE/ESP state transfer is out
of scope of this document.
MN HA1(active) HA2(Standby)
| | .
|<--------->| | 1. IKE exchange (with HoA assignment)
|---------->| . 2. Binding Update
|<----------| . 3. Binding Acknowledgment
| | .
| |<--------->. 4. State exchanges (binding cache/IPsec)
| | .
| X . HA1 FAILURE
| X .
| X<----------. 5. Failure Detection
| X | 6. HA2 takes over the HA1
| X |
| X | RECOVERY COMPLETE
Figure 1: Overview of Home Agent Virtual Switch
The operations of the Home Agent Virtual Switch mode are shown in
Figure 1. A mobile node first attempts the IKE exchange for Security
Association (SA) setup and home address assignment (1). After
binding registration is done (2, 3), the active home agent pushes all
the states of its mobile nodes with a state synchronization message
(4). The standby home agent(s) is not active unless it takes over
from a failed home Agent.
When the active home agent's failure is detected (5), the standby
home agent activates the virtual home agent address on its interface
and takes over for the failed home agent. All the home agents in the
redundant home agent set share a virtual home agent address and the
routing will ensure only the active home agent will be reachable
using that virtual home agent address. The standby home agent can
serve all the mobile nodes for which the states are synchronized,
without any further message exchange, because it has all the
necessary information which it obtained from the failed home agent.
Wakikawa (Editor) Expires January 15, 2009 [Page 8]
Internet-Draft HA Reliability July 2008
4.2. Home Agent Hard Switch
The overview of the Home Agent Hard Switch is shown in Figure 2.
This mode is not transparent to the mobile node when the active home
agent failure occurs.
MN HA1(active) HA2(Standby)
| | |
|<--------->| | 1. IKE exchange (with HoA assignment)
|---------->| | 2. Binding Update
|<----------| | 3. Binding Acknowledgment
|<--------------------->| 4. IKE exchange (without HoA assignment)
| | |
| |<--------->. 5. State exchanges (binding cache)
| | |
| X | HA1 FAILURE
| X |
| X<----------| 6. Failure Detection
|<----------------------| 7. Sending Home Agent
| X | Switch message
|<--------------------->| 8. Binding Registration
| X |
| X | RECOVERY COMPLETE
Figure 2: Overview of Home Agent Hard Switch
The mobile node establishes IPsec/IKE state with all the home agents
in the redundant home agent set beforehand (1 and 4), however it
registers its binding only with the active home agent (2 and 3).
When an active home agent fails, a standby home agent uses a pre-
existing IPsec SA to notify the mobile node about the failure by
securely sending a Home Agent Switch message. In order to discover
home agent addresses, two different mechanisms are defined, as
described in Section 9.4.1. The active home agent synchronizes the
required states of the mobile nodes, such as Binding Cache and AAA
information, with other standby home agents periodically (5). The
mobile node MUST NOT request a home address(es) assignment through
the IKE exchange to the standby home agent when it establishes an SA
with it (4).
When the standby home agent detects the failure of the active home
agent (6), it sends a Home Agent Switch message to all the mobile
nodes that were registered with the failed home agent (7). The Home
Agent Switch message must be encrypted by a pre-established IPsec SA.
After the switch message, the mobile node MUST send a binding update
to the new active home agent in order to update the Mobile IPv6
Wakikawa (Editor) Expires January 15, 2009 [Page 9]
Internet-Draft HA Reliability July 2008
tunnel end points (8).
4.3. Home Agent Management
HA1(active) HA2 HA3 .. HAn
| | | |
|------->| | | 1. HA1 sends SwitchBack Request
|<-------| | | 2. HA2 sends SwitchBack Reply
| | | |
|<-------| | | 3. HA2 sends SwitchCompl (optional)
(standby) (active) | | HA2 BECOMES ACTIVE HA
| | | |
SYSTEM MAINTENANCE, ETC.
| | | |
|------->| | | 4. HA1 sends SwitchOver Request
|<-------| | | 5. HA2 sends SwitchOver Reply
| | | |
|------->| | | 6. HA1 sends SwitchCompl (optional)
(active) (standby) | | 7. HA1 returns to active HA
| | | | HA1 BECOMES ACTIVE AGAIN
Figure 3: Manual Home Agent Change
In some scenarios the active home agent may need to stop serving
mobile nodes for system maintenance. This specification provides for
a manual home agent switch by using SwitchBack Request and Reply
messages. As shown in Figure 3, the active home agent (HA1) sends a
SwitchBack Request message to a standby home agent (HA2). As soon as
HA2 receives the message, it becomes the active home agent. HA2 will
acknowledge the message by sending a SwitchBack Reply message to HA1.
HA1 becomes a standby home agent when it receives the SwitchBack
Reply. After the downtime, HA1 sends a SwitchOver Request to HA2 in
order to become the active home agent again.
The SwitchCompl message is used only in the Home Agent Hard Switch.
As shown in Section 9, it takes certain time to complete the home
agent switch. Thus, the old active home agent continues serving the
received packets for the mobile nodes during the switch process. As
soon as the new home agent completes the recovery, it sends
SwitchCompl message to the previous active home agent. SwitchCompl
is an optional operation in this specification.
Wakikawa (Editor) Expires January 15, 2009 [Page 10]
Internet-Draft HA Reliability July 2008
5. Messages
5.1. New Mobility Header Messages
5.1.1. State Synchronization Message
This message is used to exchange state corresponding to a particular
mobile node(s). It MUST be unicasted and MUST be authenticated by
IPsec ESP. This message has the MH Type value TBD.
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type |A| Reserved |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Identifier | |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +
. .
. Mobility Options .
. .
. |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 4: State Synchronization Message
Type
8-bit unsigned integer. It can be assigned one of the following
values:
0: Request
This message is called State Synchronization Request (SS-REQ)
and used to solicit the active state corresponding to a
particular mobile node.
1: Reply
The message is called State Synchronization Reply (SS-REP) and
is used between the home agents in the redundant home agent set
to exchange binding cache information and any other information
related to providing mobility service to the mobile nodes
either periodically or in response to a SS-REQ.
Wakikawa (Editor) Expires January 15, 2009 [Page 11]
Internet-Draft HA Reliability July 2008
2: Reply-Ack
The message is called State Synchronization Reply-Ack (SS-ACK)
and is used to acknowledge to the SS-REP. This message is
optional and is specially used when the links between home
agents are not reliable.
Ack flag
This flag is valid only for SS-REP. If the sender requires
explicit acknowledgment by SS-ACK, it MUST set this flag.
Reserved
This field is unused. It MUST be initialized to zero by the
sender and MUST be ignored by the receiver.
Identifier
A 16-bit identifier to aid in matching state synchronization
message. The identifier should never be set to 0. It should
always be more than 1.
Mobility Options
Variable-length field of such length that the complete Mobility
Header is an integer multiple of 8 octets long. This field
contains zero or more TLV-encoded mobility options. The encoding
and format of defined options are described in [RFC-3775]. The
receiver MUST ignore and skip any options which it does not
understand. This message requires at least one mobility option,
therefore, there is no default length for this message.
One of the following options is mandatory in SS-REQ message.
Multiple same options can be stored in the same SS-REQ message,
(ex. two IP address options for two mobile nodes):
* IP Address Option (Sub-type: Home Address) defined in [RFC-
5268]. If a home agent wants the Binding Cache information for
a particular mobile node, it includes the mobile node's home
address in an IPv6 Address Option. If a home agent want to
solicit all the active mobile nodes' states, it can include the
unspecified address (0::0) in an IPv6 address option.
* Mobile Network Prefix Option. If a home agent wants to know
the forwarding state setup for a particular Mobile Network
Prefix, it includes a Mobile Network Prefix Option as defined
in [RFC-3963].
Wakikawa (Editor) Expires January 15, 2009 [Page 12]
Internet-Draft HA Reliability July 2008
* Vendor Specific Mobility Option. If a home agent wants vendor
specific information, it can solicit with this option as
defined in [RFC-5094].
One of the following options is mandatory in SS-REP:
* Binding Cache Information Option
* AAA Information Option
* Vendor Specific Mobility Option
5.1.2. Home Agent Control Message
This message is used to control the status of a home agent to either
active or standby. This message MUST be unicasted between home
agents and MUST be authenticated and encrypted by IPsec ESP. The
Home Agent Control message has the MH Type value TBD. If no options
are present in this message, no padding is necessary and the Header
Len field will be set to 1.
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type | Status |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
. .
. Mobility Options .
. .
. |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 5: Home Agent Control Message
Type
8-bit unsigned integer. It can be assigned one of the following
values:
0: SwitchOver Request (SO-REQ)
It is unicasted by a standby home agent that desires to become
the active home agent. The receiver of the message MUST
transition to standby state as soon as the message is received
and validated successfully.
Wakikawa (Editor) Expires January 15, 2009 [Page 13]
Internet-Draft HA Reliability July 2008
1: SwitchOver Reply (SO-REP)
It is used to acknowledge the receipt of the corresponding SO-
REQ.
2: SwitchBack Request (SB-REQ)
It is unicasted by an active home agent that desires to become
a standby home agent. The receiver of this message SHOULD
transition to active state as soon as the message is received
and validated successfully.
3: SwitchBack Reply (SB-REP)
It is used to acknowledge the receipt of the corresponding SB-
REQ.
4: Switch Complete (SW-COMP)
This message is used to indicate the completion of switch over,
(i.e. sending home agent switch messages and receiving binding
update messages from all the served mobile nodes).
Status
8-bit unsigned integer indicating the disposition of a SO-REQ or
SB-REQ. This field is only valid in SO-REP and SB-REP. The
following Status values are defined:
0: Success
128: Reason unspecified
129: Administratively prohibited
130: Not active home agent (The receiver of SO-REQ is not the
active home agent)
131: Not standby home agent (The receiver of SB-REQ is already
the active home agent)
132: Not in same redundant home agent set
Mobility Options
Wakikawa (Editor) Expires January 15, 2009 [Page 14]
Internet-Draft HA Reliability July 2008
No options are defined in this specification
5.1.3. Home Agent Hello Message
The Home Agent Hello (HA-HELLO) message MUST be either unicasted or
multicasted to carry home agent information among the redundant home
agent set. The HA-Hello message is defined for two purpose: 1) an
alive check and 2) home agent information exchange. A HA-HELLO
SHOULD be authenticated and encrypted by IPsec ESP when it is
unicasted. If a HA-Hello message is multicasted, IPsec ESP cannot be
applied. In this case the redundant home agent set should be located
in a secure network. Alternatively, all the home agents MUST have a
secure channel with each other. The HA-Hello has the MH Type value
TBD. If no options are present in this message, 0 octets of padding
are necessary and the Header Len field will be set to 2.
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Sequence # |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Home Agent Preference | Home Agent Lifetime |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Hello Interval | Group ID |A|R| Reserved |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
. .
. Mobility Options .
. .
. |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 6: Home Agent Hello Message
Sequence #
16-bit unsigned integer. The Sequence number of the HA-Hello
message can be used to verify whether this Hello message is the
latest one or not.
Home Agent Preference
16-bit unsigned integer. The preference for the home agent
sending the HA-Hello message. This preference is the same as the
Home Agent Preference value of the Home Agent Information option
as defined in [RFC-3775]. However, operators MAY use a different
Wakikawa (Editor) Expires January 15, 2009 [Page 15]
Internet-Draft HA Reliability July 2008
preference value for this operation.
Home Agent Lifetime
16-bit unsigned integer. The lifetime for the home agent sending
the HA-Hello message. This lifetime is the same as the Home Agent
Lifetime value of the Home Agent Information option as defined in
[RFC-3775].
Hello Interval
16-bit unsigned integer. The interval for the home agent sending
this Hello message.
Group Identifier
8-bit unsigned integer. This value is used to identify a
particular redundant home agent set.
A flag
Active Home Agent flag. If this flag is set, the sender of this
HA-Hello message is an active home agent.
R flag
HA-HELLO requesting flag. If this flag is set, the receiver of
this HA-Hello message must send back a HA-Hello message to the
sender.
Reserved
This field is unused. It MUST be initialized to zero by the
sender and MUST be ignored by the receiver.
Mobility Options
No valid options are defined in this specification.
5.1.4. Home Agent Switch Message
This message is defined in Section 9.4.3. The Home Agent Reliability
protocol extends this message for the Home Agent Hard Switch.
Wakikawa (Editor) Expires January 15, 2009 [Page 16]
Internet-Draft HA Reliability July 2008
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|# of Addresses |I| Reserved |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
+ +
. Home Agent Addresses .
+ +
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
. Mobility options .
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 7: Home Agent Switch Message
IPsec Re-key (I)
The IPsec re-key (I) bit is set to indicate that the mobile node
SHOULD start an IPsec re-key with the home agent specified in the
Home Agent Addresses field. This flag is used when a failed home
agent recovers and needs to re-establish IPsec SA/IKE state with a
mobile node. When this flag is set, the mobile node does not
switch the home agent, but only re-key the SA.
Reserved
The reserve field is reduced from 8 to 7 bits
5.2. New Mobility Options
5.2.1. IP address Option
This option is already defined in the Fast Handovers for Mobile IPv6
(FMIP) specification [RFC-5268]. This document introduces new Sub-
Type values for home agent address and Home Address.
Option-Code
* 4: Home Address
5.2.2. Binding Cache Information Option
The binding cache information option has an alignment requirement of
8n+2. The Binding Cache Information option is only valid in a State
Synchronization message. Its format is as follows:
Wakikawa (Editor) Expires January 15, 2009 [Page 17]
Internet-Draft HA Reliability July 2008
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type = TBD | Length = 40 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Flags | Sequence Number |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Lifetime | Reserved |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
+ +
| Home Address |
+ +
| |
+ +
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
+ +
| |
+ Care-of Address +
| |
+ +
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
. .
. .
. Mobile Network Prefix Option .
. .
. |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 8: Binding Cache Information Option
The fields of Home Address, Care-of Address, Flags, Sequence Number,
and Lifetime are copied from the registered binding of a particular
mobile node or mobile router. The 8-bit Reserved field MUST be set
to zero. If the R-flag is set to indicate this binding cache entry
is for a mobile router, then this option will be immediately followed
by one or more Mobile Network Prefix options.
5.2.3. AAA Information Option
This option is used to carry the AAA state of the mobile node's
Mobile IPv6 sessions. The AAA state information can be carried in
RADIUS or Diameter AVP formats including the user and session info.
This information option is only valid in a State Synchronization
Wakikawa (Editor) Expires January 15, 2009 [Page 18]
Internet-Draft HA Reliability July 2008
message.
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type = TBD | Length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
. .
. .
. AAA AVPs .
. .
. .
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 9: Vendor Specific Inforamtion Option
Type
8-bit Type value. The value is TBD.
Length
8-bit length value.
AAA AVPs
Series of TLV encoded AAA AVPs (including vendor specific AVPs)
carrying AAA-related information for each Mobile IPv6 and IPsec/
IKE session.
Wakikawa (Editor) Expires January 15, 2009 [Page 19]
Internet-Draft HA Reliability July 2008
6. Home Agent Configuration
6.1. Network Configuration
The Home Agent Reliability protocol supports two different
configurations for standby home agents. Standby home agents can be
placed on the same home link or on a different link.
HA1 HA2 HA3 HA4 .... HAn
| | | | |
--------+------+------+------+--------+---------
Home Link
Figure 10: Local Recovery Configuration
Figure 10 depicts the configuration where home agents serving the
same home network are located on the same link. For example, HA2,
HA3 and HA4 are standby home agents of HA1. This is the same as what
Mobile IPv6 defines for home agent configuration.
---------IGP------>|<---BGP--->|<-----IGP---------
HA1 HA2 HA3 HA4
| | | |
--------+------+-----+ R---R---R +-----+------+-------
Home Link Routers Recovery Link
(region-1) (region-2)
Figure 11: Global Recovery Configuration
Figure 11 illustrates when standby home agents are located on a
different link (illustrated as Recovery Link in Figure 11). Most
large operators have a very stringent requirement on network
availability even in the worst type of disaster or outage. For
example, HAs in region-1 are backed up by HAs in region-2. These two
regions are geographically separated. If region-1 suffers a downtime
due to any reason, all the sessions will be seamlessly taken over by
the nodes in region-2. This is called geographic redundancy. This
is a well-known configuration for Telecommunications operators. It
can achieve home agent recovery even if the entire home link fails.
In Figure 11, HA3 and HA4 are standby home agents of HA1 and HA2. In
this case, HA3 and HA4 cannot receive packets meant for the home
network until the route on the Routers is changed. The routing must
Wakikawa (Editor) Expires January 15, 2009 [Page 20]
Internet-Draft HA Reliability July 2008
be also updated to direct the packets meant for the home link to the
recovery link.
6.2. Address Configuration for Virtual Switch
Each standby home agent obtains its individual IPv6 address from its
attached link. This IPv6 address is used by the home agent
reliability protocol to exchange information with the associated home
agents. The link between home agents should be secured.
The virtual home agent's IPv6 address which is known by the mobile
node is shared with the standby home agents. When a home agent
fails, the standby home agent activates the IPv6 address of the
failed home agent and becomes the active home agent. The standby
home agent should not activate the IPv6 address until it knows the
active home agent is no longer reachable at the address, otherwise
address duplication will occur. To guarantee transparency of the
home agent virtual switch to mobile nodes located on the home link,
the neighbor cache of the home agent IP address MUST be carefully
operated. See Section 8.1 in detail.
6.3. Address Configuration for Hard Switch
Each standby home agent obtains its individual IPv6 address from its
attached link. This IPv6 address is used by the home agent
reliability protocol to exchange information with the associated home
agents. The link between home agents should be secured.
Each home agent configures itself with a different IPv6 address from
the same home prefix. This IPv6 address can be used for the Home
Agent Reliability protocol if the standby home agents are located at
the same link of the active home agent (Figure 10). In case of
Figure 11, the router must carefully route packets to the standby
home agents as described in Section 8.1. Once a mobile node
registers its binding with the active home agent, it may solicit an
IPsec/IKE exchange with standby home agents. These packets must be
routed to the recovery link. This can be achieved by installing host
routes for the standby home agents on the recovery link of the
router.
Wakikawa (Editor) Expires January 15, 2009 [Page 21]
Internet-Draft HA Reliability July 2008
7. Home Agent Common Operation
7.1. Home Agent List Management
In Mobile IPv6 [RFC-3775], each home agent periodically sends router
advertisements with the Home Address Information option [RFC-3775]
when there are multiple home agents present on a link. This
information is managed in a home agent list. For the Home Agent
Reliability Protocol, HA-HELLO messages are used to manage the home
agent list. There are several reasons to use HA-HELLO message
instead of Router Advertisement such as:
1. In the Home Agent Virtual Switch mode, if the standby home agents
send unsolicited Router Advertisements to the home link, the
mobile nodes attached to the home link are aware of the presence
of standby home agents. However, the standby home agents must be
hidden until the active home agent fails. HA-Hello messages are
exchanged only between home agents.
2. As shown in Section 6.1, standby home agents are not always
configured at the same link. In this case, Router Advertisements
cannot be sent to the recovery link unless the home link and the
recovery link are connected (ex. L2TP). HA-HELLO can be sent
beyond the link.
3. The Home Agent Reliability protocol defines to manage additional
information such as Group ID and Active/Standby Status of the
home agents in the home agent list.
In Mobile IPv6, Router Advertisement are to carry the home agent
information to both mobile nodes on the home link and the home
agents. On the other hand, in the Home Agent Reliability protocol,
HA-Hello is to exchange the information among the home agents and the
Router Advertisement is used to notify the information to the mobile
nodes. The home agents SHOULD NOT process the Home Agent Information
option carried by Router Advertisement if HA-HELLO is available.
Operators can define different values to the parameters of the home
agent information for HA-HELLO and Router Advertisement. The
management operation of the home agent list is unchanged and defined
in [RFC-3775].
7.2. Detecting Home Agent Failure
The active and standby home agents can monitor each other in several
ways. One method is to reuse other failure detection mechanisms
defined in VRRP[RFC-3768] and HSRP [RFC-2281] (see Section 7.6).
However, VRRP and HSRP cannot detect the case where the system is
running but the Mobile IPv6 stack is not operational. In the Home
Wakikawa (Editor) Expires January 15, 2009 [Page 22]
Internet-Draft HA Reliability July 2008
Agent Reliability protocol, a new message called HA-HELLO is
periodically exchanged in the redundant home agent set as a heart-
beat. If HA-HELLO is implemented as a part of Mobile IPv6 stack, it
can detect the home agent failure (Mobile IPv6 stack failure). This
HA-HELLO can also be exchanged frequently enough to detect the
failure promptly and does not introduce any processing overhead to
the mobile node attached to the home link.
Failure events used in the Home Agent Reliability protocol are listed
below.
Loss of HA-HELLO
In the event that a standby home agent does not receive any HA-
HELLO from its peer which is currently the active home agent for a
configurable duration, the standby home agent assumes the active
home agent's failure. Any home agents can also request the home
agent information of the other home agent in the same redundant
home agent set by sending HA-HELLO with R-flag set. If HA-HELLO
is not replied from the target home agent within a configurable
amount of time, that home agent peer is considered to have failed.
The detail of the Hello message is described in Section 7.3.
Monitored Server Failure by the Active Home Agent
There may be number of critical servers such as AAA server in the
network that are essential for the ongoing Mobile IPv6 sessions at
the home agent. Operators can have a policy in place that the
active home agent is treated as a failed home agent upon detecting
that the link to such servers has failed.
Routing Peer/Link Failure
Operators may require the home agent to detect its next-hop
routing peer failure. If the next-hop routing failure is fatal in
nature, or due to some other routing policies, the active home
agent is treated as a failed home gent and the recovering
operation should be started.
7.3. Processing Hello Messages
HA-HELLO MUST be either unicasted or multicasted. A new multicast
address (all_homeagent_multicast_address) will be assigned by the
IANA. When all the home agents in a redundant home agent set are
configured on a same home link, they MUST join the
all_homeagent_multicast_address. On the other hand, if a home
recovery link is separately defined as described in Figure 11, each
home agent SHOULD unicast HA-HELLO.
Wakikawa (Editor) Expires January 15, 2009 [Page 23]
Internet-Draft HA Reliability July 2008
7.3.1. Requesting Hello Message
A home agent can solicit HA-HELLO to a particular home agent in the
same redundant home agent set by unicasting HA-HELLO with the R-flag
set. The sender MUST fill the fields of the HA-HELLO with its home
agent information. If a home agent needs to request HA-HELLO to all
the home agents, it sends the HA-HELLO with R-flag set to the
all_homeagent_multicast_address. Requesting HA-HELLO SHOULD be
operated when:
1. A new home agent needs to collect the information of all the
other home agents in the same redundant home agent set. The HA-
HELLO with R-flag set is multicasted to
all_homeagent_multicast_address.
2. A home agent entry in the redundant home agent list is about to
be removed due to home agent lifetime expiration. The HA-HELLO
with R-flag set is unicasted to the home agent whose lifetime is
soon expired.
3. HA-HELLO has not been received during the specified hello
interval. The HA-HELLO with R-flag set is unicasted to the
target home agent.
7.3.2. Sending Hello Message
Each home agent periodically sends HA-HELLO for the home agent's
failure detection. The interval time is configured at each home
agent. Each home agent MUST also send a HA-HELLO in following case:
1. when a home agent receives a HA-HELLO with the R-flag set
2. When a home agent detects its local information such as home
agent preference, home agent lifetime, and registration status
change.
3. When a new home agent boots up, it SHOULD solicit Hello messages
by multicasting a Hello message with the R-flag set in parallel
with sending its own Hello message.
When a home agent sends HA-HELLO, the following rule MUST be applied.
o Whenever a home agent generates HA-HELLO, it MUST increment in the
Sequence Number. The Sequence Number SHOULD be initialized to
zero for the first Hello message. To accomplish sequence number
rollover, if the sequence number has already been assigned to be
the largest possible number representable as a 16-bit unsigned
integer, then when it is incremented it will then have a value of
Wakikawa (Editor) Expires January 15, 2009 [Page 24]
Internet-Draft HA Reliability July 2008
zero (0).
o It MUST also specify its own Group ID in HA-HELLO.
o If a home agent is the active home agent, it MUST set the A-flag
in HA-HELLO.
o In the Home Agent Hard Switch mode, the source IPv6 address of HA-
HELLO MUST be the home agent address.
o In the Home Agent Virtual Switch mode, the home agent local
address MUST be used.
7.3.3. Receiving Hello Message
When a home agent receives HA-HELLO, it SHOULD verify the HA-HELLO as
follows:
o If the HA-HELLO is not protected by IPsec ESP, it SHOULD be
discarded. Note that, only if the HA-HELLO is sent on a dedicated
link between the home agents, IPsec protection might not be always
required. This depends on the operational policy.
o If HA-HELLO is sent from non global IPv6 address, it MUST be
discarded.
o If the source IPv6 address of HA-HELLO is not belong to one of the
home agents in the redundant home agent set, the HA-HELLO MUST be
ignored.
o If the Group ID field of the received HA-HELLO and the receiver's
Group ID is different, HA-HELLO MUST be discarded. HA-HELLO MUST
NOT be sent to home agents whose Group ID is different from the
sender.
o If the Sequence Number value in the HA-HELLO is equal to or less
than the last received Sequence Number value stored in the home
agent list entry, the HA-HELLO MUST be discarded.
o HA-HELLO satisfying all of above tests MUST be processed by
receiver. The receiver copies home agent information in HA-HELLO
to the corresponding home agent list entry. The home agent
address of the sender is retrieved from the Source Address field
of the IPv6 header of the HA-HELLO.
o If the home agent lifetime field in the HA-HELLO is set to 0, the
receiver removes the sender from the home agents list.
Wakikawa (Editor) Expires January 15, 2009 [Page 25]
Internet-Draft HA Reliability July 2008
o If the R-flag is set in the received HA-HELLO, the receiver MUST
send a new HA-HELLO to the originator as described in
Section 7.3.2.
7.4. Processing State Synchronization Messages
It is necessary for standby home agents to synchronize the state
information of each mobile node registered with the active home
agent. In the Home Agent Hard Switch mode, it is not necessary for
the home agents to synchronize the complete binding cache
information. The standby home agent needs the mapping information of
the active home agent and the mobile node. The information is used
to send the Home Agent Switch messages to all the mobile node served
by the failed home agent.
7.4.1. Requesting State of a Particular Mobile Node(s)
When a home agent needs the state information for a particular mobile
node or a subset of mobile nodes, it sends a SS-REQ message
constructed as follows:
o It MUST set the Type field to 0 (Request).
o It MUST set a random value in the Identifier field that does not
coincide with any other currently pending Requests.
o It MUST include an IP address mobility option(s) which subtype is
set to the home address if the target is mobile node(s).
o It MUST include a Mobile Network Prefix mobility option(s) for
mobile router(s).
o It MUST set the unspecified address (0::0) in the Home Address
mobility option if it solicits the state of all the mobile nodes
and mobile routers registering at the receiver of SS-REQ
(i.e.destination of SS-REQ).
o In the Home Agent Virtual Switch, the sender of the SS-REQ MUST be
a home agent local address of one of the home agents in the same
redundant home agent set.
o In the Home Agent Hard Switch, the sender of the SS-REQ MUST be a
home agent address of one of the home agents in the same redundant
home agent set.
o The destination of the SS-REQ MUST be the active home agent for
the requesting home address or mobile network prefix. The standby
home agent MUST NOT reply the SS-RREP to the sender.
Wakikawa (Editor) Expires January 15, 2009 [Page 26]
Internet-Draft HA Reliability July 2008
When a home agent receives the SS-REQ, it MUST verify if SS-REQ is
constructed with the above rules. If SS-REQ satisfy all the above
tests, the receiver of the SS-REQ MUST reply SS-REP including the
state information of the requested mobile node(s) and/or mobile
network prefix(es) as described in Section Section 7.4.2.
7.4.2. Synchronizing State
State synchronization messages SHOULD be sent when:
1. The active home agent receives SS-REQ.
2. The active home agent creates a binding cache entry for a
particular mobile node.
3. The active home agent deletes a binding cache entry for a
particular mobile node.
The active home agent MAY additionally send state synchronization
message in following cases:
1. The active home agent update the state information for all
sessions that changed since the last update in a periodic
interval
2. Only for the Home Agent Virtual Switch mode, the active home
agent updates a binding cache entry for a particular mobile node
whenever the binding cache entry is updated. In the Home Agent
Hard Switch mode, standby home agents only need the mapping
information of a home address of the mobile node/router and the
home agent address of the active home agent to which the mobile
node/router is currently registering. This mapping is used to
send a Home Agent Switch message.
If an active home agent sends a State Synchronization message
whenever the local state information changes, such as a binding cache
change, the number of the State Synchronization messages sent can be
quite large.
All the state information of the requested mobile nodes is stored in
the SS-REP. Following rules must be applied when the active home
constructs SS-REP.
o If the SS-REP is sent in response to the SS-REQ, the active home
agent MUST copy the Identifier field of the State Synchronization
request message to the Identifier field in the SS-REP. Otherwise,
it MUST set the Identifier field to 0.
Wakikawa (Editor) Expires January 15, 2009 [Page 27]
Internet-Draft HA Reliability July 2008
o When the active home agent stores the state of multiple mobile
nodes in a SS-REP, a Binding Cache Information option is used as a
separator. For each mobile node, a Binding Cache Information
option is placed first, followed by any other options such as AAA
option. When the next Binding Cache Information option is reached
in the State Synchronization message, it indicates the information
of a different mobile node.
o If the unspecified address is found in the Home Address mobility
option carried with the SS-REQ, the active home agent MUST return
the state of all the active mobile nodes and mobile routers by the
SS-REP. The IP fragmentation can be occurred depending on the
total size of all the states.
o A SS-REP MUST be authenticated and encrypted by IPsec ESP.
o The destination and source home agents MUST belong to the same
redundant home agent set.
o In the Home Agent Hard Switch, the IPv6 source address MUST be set
to the home agent address of the sender.
o In the Home Agent Virtual Switch, the IPv6 source address MUST be
set to the home agent local address of the sender.
When a home agent receives a SS-REP, it MUST verify whether the SS-
REP is constructed with the above rules or not. If the SS-REP does
not satisfy all the rules above, it is discarded. Otherwise, the
following operation must be taken.
o The receiver of SS-REP MUST update its binding cache and all other
necessary information such as AAA and vendor specific information
in the particular database.
o In the Home Agent Hard Switch mode, the receiver MUST record the
IPv6 address of the sender as the active home agent of the mobile
node.
7.4.3. Reliable Transmission by Explicit Acknowledgement
Signaling messages of the Home Agent Reliability protocol are not
guaranteed reliable transmission due to the Mobility Header use.
This is not always critical, because the link between home agents is
carefully managed as stable and reliable. However, operators may
need more explicit notification to confirm the message exchanges
between home agents. This specification provides an optional
acknowledgment to SS-REP messages.
Wakikawa (Editor) Expires January 15, 2009 [Page 28]
Internet-Draft HA Reliability July 2008
If an active home agent requires an acknowledgment of SS-REP, it set
the Ack flag in the SS-REP. The receiver of such SS-REP will send
back a SS-ACK. The receiver MUST copy the Identifier value received
in the SS-REP into SS-ACK in order to match the SS-REP and SS-ACK.
7.5. Processing Home Agent Control Messages
7.5.1. Standby Home Agent becomes an Active Home Agent
When a standby home agent decides to become an active home agent, the
standby home agent sends a SO-REQ to the active home agent. This
message MUST be unicasted to the active home agent and MUST be
encrypted and authenticated by IPsec ESP. The active home Agent MUST
NOT generate this message.
When an active home agent receives a SO-REQ, it MUST operate the
following verification and operations:
o If the SO-REQ is not protected by IPsec, it MUST be discarded.
o If the receiver of the SO-REQ is not an active home agent, it MUST
send a SO-REP with the Status field set to 130 (Not active home
agent).
o If the sender home agent does not belong to the same redundant
home agent set, a SO-REP message MUST be sent to the sender with
the Status field set to 132 (Not in same redundant home agent
set).
o If the receiver is an active home agent, there is case where the
active home agent cannot be standby home agent. In such case, the
active home agent can reply a SO-REP with the Status field set to
129 (Administratively prohibited).
o Otherwise, the active home agent MUST become a standby home agent
and reply with a SO-REP message with the Status field set to 0
(Success).
The SO-REP MUST be also protected by IPsec ESP. Otherwise, the
message MUST be silently discarded. If the receiver of SO-REP did
not send a SO-REQ message (i.e. unexpected SO-REP), the message MUST
be ignored. If the Status field of the SwitchOver Reply message is 0
(Success), the receiving standby home agent immediately becomes an
active home agent as described in Section 8.2. If the value in the
Status field is greater than 128 an error has occurred. In this
case, the receiver MUST NOT attempt to be an active home agent.
Wakikawa (Editor) Expires January 15, 2009 [Page 29]
Internet-Draft HA Reliability July 2008
7.5.2. Active Home Agent becomes in-active
When an active home agent decides to become a standby home agent, it
sends a SB-REQ to one of standby home agent. The reason for the
active home agent to send this message can be administrative
intervention, and events like Monitored Server Failure by the active
home agent or Routing Peer/Link Failure. This message MUST be
unicasted to one of the standby home agents and MUST be encrypted and
authenticated by IPsec ESP. A standby home agent MUST NOT generate
this message.
When a home agent receives a SwitchBack Request message, it first
verifies the message.
o If the SwitchBack Request message is not protected by IPsec ESP,
it MUST be discarded.
o If the sender home agent of the SB-REQ is not an active home
agent, the receiver MUST reply a SB-REP with the Status field is
set to 130 (Not active home agent).
o If the sending home agent does not belong to the same redundant
home agent set, a SB-REP MUST be sent in which the Status field
set to 132 (Not in same redundant home agent set).
o Otherwise, the receiving home agent MUST send a SB-REP with the
Status field is set to 0 (Success).
After sending the SwitchBack reply, it MUST NOT become an active home
agent immediately. This is because the active home agent is still
active until it receives the SB-REP which is acknowledging the SB-
REQ. The standby home agent SHOULD change to active at least after
LINK_TRAVERSAL_TIME.
If a home agent receives a SB-REP, it MUST be protected by IPsec ESP,
otherwise the message MUST be silently discarded. If the receiving
home agent did not send a SB-REQ matched to the received SB-REP, the
message MUST be silently discarded. If the Status field of the SB-
REP is 0 (Success), the active home agent immediately becomes a
standby home agent. The sender home agent of SB-REP becomes active
home agent as described in Section 8.2. If the value in the Status
field is greater than 128, the receiver of SB-REP (active home agent)
cannot become a standby home agent and MUST continue to be an active
home agent.
Wakikawa (Editor) Expires January 15, 2009 [Page 30]
Internet-Draft HA Reliability July 2008
7.6. Interworking with VRRP
VRRP and HSRP specify an election protocol that dynamically assigns
responsibility for a virtual router to one of the VRRP routers on a
LAN. This operation is similar to the Home Agent Virtual Switch
operation. For example, the VRRP router controlling the IP
address(es) associated with a virtual router is called the Master,
and forwards packets sent to these IP addresses. The election
process provides dynamic fail over in the forwarding responsibility
should the Master become unavailable. Although VRRP is used to
guarantee home agent address reachability, it cannot be used for
state synchronization and explicit switching of Master and Backup.
Thus, the Home Agent Reliability protocol cannot be replaced by VRRP.
This section explains how VRRP can interwork with the Home Agent
Reliability protocol.
When VRRP is available, VRRP can replace the Hello message described
in Section 5.1.3. However, some of information is missed by using
VRRP. After receiving a VRRP message, each home agent SHOULD process
the message and store the information as if it receives Home Agent
Hello messages Section 7.3.3. The Home Agents SHOULD still perform
binding cache synchronization as described in Section 7.4 and SHOULD
support the Home Agent Switch message as described in Section 9.2.
In addition to this, VRRP is useful only if all home agents are
located on the same link. If the home agents are topologically
separated, the Home Agent Reliability protocol MUST be used.
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|Version| Type | Virtual Rtr ID| Priority |Count IPv6 Addr|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|(rsvd) | Adver Int | Checksum |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
+ +
| IPv6 Address(es) |
+ +
+ +
+ +
+ +
| |
+ +
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Wakikawa (Editor) Expires January 15, 2009 [Page 31]
Internet-Draft HA Reliability July 2008
Figure 12: VRRP Packet Format
The message format of VRRP is described in Figure 12. Each field is
mapped as follows:
Virtual Rtr ID
Group ID is stored in the Virtual Rtr ID field.
Priority
Home Agent Preference is stored in the Priority field. Note that
VRRP only has 8 bits for the Priority field. Therefore, values
larger than 255 MUST NOT be assigned to the preference value.
Count IPv6 IPv6 Addr
This field MUST be always be 1.
Advert Int
This field MUST be mapped to the Hello Interval field of the Home
Agent Hello message, though it only has 12 bytes.
IPv6 address
A home agent address is stored in this field.
Home Agent Lifetime, Sequence Number and Flags field are missing in
the VRRP packet format. Therefore, operators SHOULD use the same
statically configured value for Home Agent Lifetime. Each home agent
does not check freshness of received VRRP message because of no
sequence number. If VRRP is used, a home agent cannot determine the
active home agent from the VRRP message due to lack of A flag, and
cannot request a VRRP advertisement to other home agents.
7.7. Retransmissions and Rate Limiting
Standby and active home agents are responsible for retransmissions
and rate limiting of a SS-REQ, SO-REQ, SB-REQ messages for which they
expect a response. The home agent MUST determine a value for the
initial transmission timer:
o If the home agent sends a SS-REQ message, it SHOULD use an initial
retransmission interval of INITIAL_STATE_SYNC_REQ_TIMER.
o If a standby home agent sends a SO-REQ message, it SHOULD use an
initial retransmission interval of INITIAL_SWICHOVER_REQ_TIMER.
Wakikawa (Editor) Expires January 15, 2009 [Page 32]
Internet-Draft HA Reliability July 2008
o If an active home agent sends a SB-REQ message, it SHOULD use an
initial retransmission interval of INITIAL_SWICHBACK_REQ_TIMER .
If the sending home agent fails to receive a valid matching response
within the selected initial retransmission interval, it SHOULD
retransmit the message until a response is received. All of the
above constants are specified in Section 11.
The retransmission MUST use an exponential backoff process as
described in [RFC-3775] until either the home agent receives a
response, or the timeout period reaches the value
MAC_HARELIABILITY_TIMEOUT (16sec). The home agent SHOULD use a
separate back-off process for different message types and different
destinations. The rate limiting of Mobility Header messages is the
same as one in [RFC-3775]. A home agent MUST NOT send Mobility
Header Messages to a particular home agent more than MAX_UPDATE_RATE
(3) times a second, which is specified in [RFC-3775].
Wakikawa (Editor) Expires January 15, 2009 [Page 33]
Internet-Draft HA Reliability July 2008
8. Home Agent Virtual Switch
8.1. Consideration of Routing and Neighbor Discovery Protocol
This section gives a brief explanation of how a home agent interacts
with routing and Neighbor Discovery Protocol (NDP) when the Home
Agent Virtual Switch mode is used.
When a standby home agent becomes active in the Home Agent Virtual
Switch mode, it MUST start to advertise the home agent address and
the home prefix of the home addresses serviced by the redundant home
agent set into the routing infrastructure. This operation is
normally done using a route selector such as BGP or an OSPF modifier.
For example, we can use the AS_Path prepend operation for BGP, and
the Metric field in OSPF for the route selection. When each home
agent participates in OSPF routing, each home agent should be
configured with the appropriate metric matched to the home agent
preference value. When the active home agent fails, OSPF detects the
failure and can dynamically switch the route to the standby home
Agent based on the OSPF cost value. If this cost conflicts with the
home agent preference value due to configuration errors, the routers
on the home link may not route packets to the desired standby home
agent. In order to change the OSPF cost correctly and dynamically,
The operator takes other existing approaches. For example, most of
router vendors have a private MIB to set the cost via SNMP, though
this is a vendor-specific function.
When an active home agent activates a home agent address, it SHOULD
use a virtual MAC address as introduced in [RFC-3768]. When the
active home agent is changed, the neighbor cache of the active home
agent is not necessarily updated on mobile nodes located on the home
link. Otherwise, the new home agent MUST update the neighbor cache
entry for the home agent address on all the mobile nodes located on
the home link. In addition, Mobile IPv6 uses proxy NDP to intercept
packets meant for mobile nodes which are away from the home link.
However, it is unnecessary for the new active home agent to overwrite
the existing proxy neighbor entries of the mobile nodes.
8.2. Home Agent Recovery
After detecting the active home agent has failed, the standby home
agent whose preference value is the highest MUST take over the failed
home agent. The standby home agent MUST activate the virtual home
agent address. If a virtual MAC address as introduced in [RFC-3768]
is used, the standby home agent MUST start using that virtual MAC
address as well. Since all the necessary state has already been
transferred to this standby home agent before the active home agent
failed, it can immediately start acting as the active home agent.
Wakikawa (Editor) Expires January 15, 2009 [Page 34]
Internet-Draft HA Reliability July 2008
9. Home Agent Hard Switch
9.1. Home Agent Recovery
After detecting the active home agent has failed, the standby home
agent whose preference value is the highest MUST take over the failed
home agent. The standby home agent MUST send a Home Agent Switch
message to all the mobile nodes that were registered at the failed
home agent as described in Section 9.2, using the pre-established
IPsec SA. The standby Home Agent MUST set its own address in the
Home Agent Address field in the Home Agent Switch message so that it
will receive the binding update from the mobile node as an
acknowledgment of the sent Home Agent Switch message. The home agent
switch-over is complete when it receives binding updates from all the
mobile nodes. It is important to remark that sending Home Agent
Switch messages to all the mobile nodes at once may bring non-
negligible overhead to the home agent.
This overhead cannot be avoided if the active home agent suddenly
stop serving mobile node because of unexpected reasons (crash,
network trouble, etc). However, if this switch over is operated
under the administrative operation (maintenance, etc), the previous
active home agent may continue serving the mobile nodes until the
switch over is completed. Until the mobile node sends a binding
update to the new active home agent, it still sends the packet to the
previous home agent in the Home Agent Hard Switch. Therefore, the
new active home agent can notify the completion of switch-over to the
previous active home agent by using Home Agent Control message as
described in Section 9.3. As soon as this message is received, the
previous active home agent can be shutdown or detached from the
network safely.
9.2. Sending Home Agent Switch Messages
The standby home agent which is going to be active MUST send a Home
Agent Switch message as defined in [RFC-5142] to all the mobile nodes
that were being served by the failed home agent. The Home Agent
Switch message must be securely sent to the mobile node by using
IPsec ESP. The standby home agent MUST include only its own home
agent address in the Home Agent Switch message. If there are a large
number of mobile nodes served by the failed home agent, the overhead
sending Home Agent Switch messages is high. Until a mobile node
receives this Home Agent Switch messages, the mobile node's
communication is discontinued. Therefore, until the standby home
agent completes sending the Home Agent Switch message to all the
mobile nodes and receives Binding Updates from all the mobile node,
the failed home agent SHOULD serve mobile nodes if possible. This is
the case when the active home agent is replaced by administrative
Wakikawa (Editor) Expires January 15, 2009 [Page 35]
Internet-Draft HA Reliability July 2008
operation with the Home Agent Control messages as described in
Section 9.3.
When a failed home agent recovers, it MUST re-establish an IPsec SA
with each mobile node served by its redundant home agent set.
Otherwise, it cannot be either a standby or active home agent for the
mobile nodes. Therefore, as soon as the active home agent detects
the recovery of the failed home agent, it sends a Home Agent Switch
message with the I-flag set to all the mobile nodes serving by other
home agents in the same redundant home agent set, and includes the
recovered home agent address in the Home Agent Addresses field. The
mobile node will re-key the SA, but it will not change the home agent
by this home agent switch message which I-flag is set.
9.3. Notification of Home Agent Switch Completion
If the new active home agent completes the switch-over as described
in Section 8.2, it SHOULD send a SW-COMP to the previous active home
agent in the Home Agent Hard Switch case. Until the previous home
agent receives this message, it SHOULD continue serving any mobile
nodes that are registered with it. Once the previous home agent
receives the SW-COMP message, it can stop home agent services.
9.4. Mobile Node Operation
9.4.1. Home Agent Addresses Discovery
In the Home Agent Hard Switch mode, a mobile node authenticates
itself to two or more home agents and creates IPsec SAs with them
during bootstrapping. When the active home agent fails, another home
agent can use the pre-existing SA to notify the mobile node about the
failure by sending a Home Agent Switch message.
In order to discover multiple home agent addresses, two different
mechanisms are defined in the bootstrapping solution in the split
scenario [RFC-5026]. One is DNS lookup by home agent Name, the other
is DNS lookup by Service Name. DHCPv6 can also be used in the
integrated scenario [ID-BOOTINT] to provide home agent provisioning
to mobile nodes.
In the split scenario, a mobile node can use DNS lookup by Service
Name to discover the home agents, as defined in [RFC-5026]. For
example, if home agent reliability is required by a mobile node, DNS
lookup by Service Name method is recommended for the mobile node to
discover multiple home agents addresses. Therefore, mobile nodes
will query the DNS SRV records with a service name of mip6 and
protocol name of ipv6. The DNS SRV records includes multiple home
agent addresses and different preference values and weights. The
Wakikawa (Editor) Expires January 15, 2009 [Page 36]
Internet-Draft HA Reliability July 2008
mobile node SHOULD choose two or more home agents from the home
agents list according to their preference value. Then the mobile
node should authenticate itself to these home agents via an IKEv2
exchange.
In the integrated scenario, a mobile node can use DHCPv6 to get home
agent provisioning from an MSP or ASP, as already defined in [ID-
BOOTINT]. The only requirement is that the DHCPv6 response must
include multiple home agents' information in order to support home
agent reliability.
9.4.2. IKE/IPsec pre-establishment to Home Agents
After a mobile node obtains multiple home agent addresses, it needs
to trigger multiple IKE exchanges with the multiple home agents
selected from the home agent list. Since both IKEv1 and IKEv2 can be
used to bootstrap Mobile IPv6, this solution does not introduce any
new operations to co-operate with IKEv1 or IKEv2. It should initiate
IKE for home agents as soon as home registration is complete.
The mobile node MUST follow the standard IKEv2 exchange in the
bootstrapping solution of the split scenario [RFC-5026]. Home
Address configuration maybe also be included, if necessary, for the
first IKE exchange. After its Home Address is assigned or approved
by the first home agent, mobile node SHOULD register itself with the
second home agent with IKE using the same Home Address. Therefore,
no home address configuration should be used in the second IKEv2
procedure. Note that the mobile node only sends a Binding Update
message to the first home agent.
9.4.3. Receiving Home Agent Switch message
A mobile node must follow the operation specified in [RFC-5142] when
it receives a Home Agent Switch message.
If the I-flag is set in the received Home Agent Switch message, the
mobile node MUST re-key the SA with the home agent addresses stored
in the Home Agent Addresses field. The mobile node MUST NOT change
its active home agent when the I-flag is set. If the home agent
address is not known from the bootstrapping described in
Section 9.4.1, the mobile node MUST NOT start an IKE session with the
unknown home agent. Instead, it SHOULD re-start home agent discovery
again to update its home agent address information.
When the mobile node receives a Home Agent Switch message without
I-flag set, and if the message contains the IPv6 address of a standby
home agent, it MUST select the standby home agent in the switch
message as the active home agent and send a new Binding Update
Wakikawa (Editor) Expires January 15, 2009 [Page 37]
Internet-Draft HA Reliability July 2008
message to it. Note that the standby home agent address in the Home
Agent Switch MUST be equal to the sender of the Home Agent Switch
message. The standby Home agent expects the Binding Update as an
acknowledgment of the Home Agent Switch message. The mobile node
already has a pre-established SA with the standby home agents and
should use that SA to send the Binding Update. If the address stored
in the Home agent address field is different from the sender, the
mobile node MUST send a binding update to the sender.
Wakikawa (Editor) Expires January 15, 2009 [Page 38]
Internet-Draft HA Reliability July 2008
10. Security Considerations
Since Mobile IPv6 operation requires ESP in transport mode between
the mobile node and the home agent, we will discuss the ESP field
synchronization issues between the mobile node and the redundant set
of home agents. This synchronization is required only for Home Agent
Virtual Switch mode. Most of fields should be synchronized based on
[RFC-4301]. The ESP header has the following fields:
SPI
This field identifies the SAD at the receiver.
The mobile node negotiates only one IPsec SA. Hence, the SPI
value will remain unchanged upon home agent failover.
Sequence Number
This field is used for "anti-replay" feature of ESP. The
transmitter must include this monotonically increasing number.
The receiver may process the sequence number based on local
policy.
The mobile node and the redundant home agent set will have the
same set of sequence numbers for transmit and receive. Hence,
synchronization of the sequence number field is mandatory in this
mode of operation.
The SA1, SA2, SA3, SA4 could be synchronized between the home
agents as these messages are not sent continuously. Moreover for
the Binding Update case, if the mobile node is in the middle of
sending a Binding Update to an active home agent for a binding
refresh, and the active home agent is not available at that
moment, the mobile node will not get any response from the active
home agent. After a standby home agent becomes active, the mobile
node will retry and it will receive the Binding Update from the
mobile node with a sequence number that is +n from its last known
sequence number for SA1. For the Binding Acknowledgment case
(SA2), the standby home agent SHOULD add a random number to the
last known sequence number over and above the replay window to
ensure that the packet passes the replay check at the mobile node.
The same applies to HoTi and HoT messages with SA3 and SA4. Note
that this windowing of the sequence numbers for Mobile IPv6
signaling is only needed to cover the corner cases when Binding
Update or HoTi is in-flight and the active home agent fails.
Wakikawa (Editor) Expires January 15, 2009 [Page 39]
Internet-Draft HA Reliability July 2008
The technique explained above should work for user data packets if
ESP is used to encrypt user data traffic as well. The actual
switchover time and the routing infrastructure convergence time is
the only latency that the user may perceive.
Initialization Vector
Since the Initialization Vector will be delivered in each exchange
between a mobile node and home agent, this field is not
necessarily synchronized between home agents.
Others
Other fields should be synchronized based on RFC4301 [RFC-4301]
In the Home Agent Hard Switch mode, the standby home agent needs to
send a Home Agent Switch message using IPsec encryption. Since the
mobile node has pre-established an IPsec SA with both the active and
standby home agents, the standby home agent can send the message to
the mobile node with the pre-established IPsec SA.
Wakikawa (Editor) Expires January 15, 2009 [Page 40]
Internet-Draft HA Reliability July 2008
11. Protocol Constants
INITIAL_STATE_SYNC_REQ_TIMER: 3sec
INITIAL_SWICHOVER_REQ_TIMER: 1sec
INITIAL_SWICHBACK_REQ_TIMER 1sec
LINK_TRAVERSAL_TIME 150msec
Wakikawa (Editor) Expires January 15, 2009 [Page 41]
Internet-Draft HA Reliability July 2008
12. IANA Considerations
o The values for following mobility header message MUST be assigned
by IANA.
* State Synchronization Message
* Home Agent Control Message
* Home Agent Hello Message
* Home Agent Switch Message
o The values for following mobility options MUST be assigned by
IANA.
1. Binding Cache Information Option
2. AAA Information Option
o New Option Code for the IP address option defined in [RFC-5268]
Wakikawa (Editor) Expires January 15, 2009 [Page 42]
Internet-Draft HA Reliability July 2008
13. Additional Authors
This document is a result of discussions in the Mobile IPv6 Home
Agent Reliability Design Team. The members of the design team that
are listed below are authors that have contributed to this document:
Samita Chakrabarti
samita.chakrabarti@azairenet.com
Kuntal Chowdhury
kchowdhury@starentnetworks.com
Hui Deng
denghui@chinamobile.com
Vijay Devarapalli
vijay.devarapalli@azairenet.com
Sri Gundavelli
sgundave@cisco.com
Brian Haley
brian.haley@hp.com
Behcet Sarikaya
bsarikaya@huawei.com
Ryuji Wakikawa
ryuji@sfc.wide.ad.jp
14. Acknowledgements
This document includes a lot of text from [ID-LOCALHAHA] and [ID-
HAHA]. Therefore the authors of these two documents are
acknowledged. We would also like to thank the authors of the home
agent reliability problem statement [ID-PS-HARELIABILITY] for
describing the problem succinctly and Alice Qin for her work on the
hello protocol.
Wakikawa (Editor) Expires January 15, 2009 [Page 43]
Internet-Draft HA Reliability July 2008
15. References
15.1. Normative References
[RFC-2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC-3775] Johnson, D., Perkins, C., Arkko, J., "Mobility Support in
IPv6", RFC 3775, June 2004.
[RFC-3963] Devarapalli, V., Wakikawa, R., Petrescu, A., and P.
Thubert, "Network Mobility (NEMO) Basic Support Protocol", RFC 3963,
January 2005.
[RFC-5094] Devarapalli, V., "Mobile IPv6 Vendor Specific Option", RFC
5094, October 2007.
[RFC-5142] Haley, B., "Mobility Header Home Agent Switch Message",
RFC-5142, November 2007.
[RFC-5026] Giaretta, G., "Mobile IPv6 bootstrapping in split
scenario", RFC 5026, October 2007.
[ID-BOOTINT] Chowdhury, K. and A. Yegin, "MIP6-bootstrapping via
DHCPv6 for the Integrated Scenario",
draft-ietf-mip6-bootstrapping-integrated-dhc-06 (work in progress),
April 2008.
15.2. Informative References
[RFC-3768] Hinden, R., "Virtual Router Redundancy Protocol (VRRP)",
RFC 3768, April 2004.
[RFC-2281] Li, T., Cole, B., Morton, P., and D. Li, "Cisco Hot
Standby Router Protocol (HSRP)", RFC 2281, March 1998.
[RFC-3776] Arkko, J., Devarapalli, V., and F. Dupont, "Using IPsec to
Protect Mobile IPv6 Signaling Between Mobile Nodes and Home Agents",
RFC 3776, June 2004.
[RFC-4301] Kent, S. and Atkinson, R., "Security Architecture for the
Internet Protocol", RFC 4301, December 2005.
[RFC-3753] Manner, J. and M. Kojo, "Mobility Related Terminology",
RFC 3753, June 2004.
[RFC-5268] Koodli, R., "Mobile IPv6 Fast Handovers", RFC 5268, June
Wakikawa (Editor) Expires January 15, 2009 [Page 44]
Internet-Draft HA Reliability July 2008
2008.
[ID-HAHA] Wakikawa, R., "Inter Home Agents Protocol Specification",
draft-wakikawa-mip6-nemo-haha-spec-01 (expired), March 2006.
[ID-LOCALHAHA] Devarapalli, V., "Local HA to HA protocol",
draft-devarapalli-mip6-nemo-local-haha-01 (expired), March 2006.
[ID-PS-HARELIABILITY] Faizan, J., "Problem Statement: Home Agent
Reliability", draft-jfaizan-mipv6-ha-reliability-01 (expired),
February 2004.
Wakikawa (Editor) Expires January 15, 2009 [Page 45]
Internet-Draft HA Reliability July 2008
Appendix A. Change Log From Previous Versions
Changes from draft-ietf-mip6-hareliability-03
o Only Editorial Update and No Technical Change
Author's Address
Ryuji Wakikawa
Toyota ITC
6-6-20 Akasaka, Minato-ku
Tokyo 107-0052
Japan
Phone: +81-3-5561-8276
Fax: +81-3-5561-8292
Email: ryuji@jp.toyota-itc.com
Wakikawa (Editor) Expires January 15, 2009 [Page 46]
Internet-Draft HA Reliability July 2008
Full Copyright Statement
Copyright (C) The IETF Trust (2008).
This document is subject to the rights, licenses and restrictions
contained in BCP 78, and except as set forth therein, the authors
retain all their rights.
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Intellectual Property
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Acknowledgment
Funding for the RFC Editor function is provided by the IETF
Administrative Support Activity (IASA).
Wakikawa (Editor) Expires January 15, 2009 [Page 47]
| PAFTECH AB 2003-2026 | 2026-04-23 09:49:29 |