One document matched: draft-ietf-mobileip-ft-req-00.txt
Mobile IP Working Group V. Gupta
INTERNET DRAFT SUN Microsystems
S. Glass
FTP Software
January 20, 1997
Firewall Traversal for Mobile IP: Goals and Requirements
draft-ietf-mobileip-ft-req-00.txt
Status of this Memo
This document is a submission by the Mobile IP Working Group of the
Internet Engineering Task Force (IETF). Comments should be submitted
to the mobile-ip@SmallWorks.COM mailing list.
Distribution of this memo is unlimited.
This document is an Internet-Draft. Internet-Drafts are working
documents of the Internet Engineering Task Force (IETF), its areas,
and its working groups. Note that other groups may also distribute
working documents as Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
To learn the current status of any Internet-Draft, please check the
"1id-abstracts.txt" listing contained in the Internet-Drafts Shadow
Directories on ftp.is.co.za (Africa), nic.nordu.net (Europe),
munnari.oz.au (Pacific Rim), ds.internic.net (US East Coast), or
ftp.isi.edu (US West Coast).
Abstract
This document discusses problems arising out of the use of Mobile IP
in a security conscious Internet and presents a list of solution
requirements deemed important. These problems may need to be resolved
in several stages. A priority order in which these problems should be
solved is also proposed.
All firewalls are assumed to implement standard mechanisms [RFCs
1825,1826,1827] for authentication and encryption proposed by the
IPSec working group of the IETF.
Gupta & Glass Expires July 20, 1997 [Page 1]
INTERNET DRAFT Firewall Traversal for Mobile IP January 1997
1. Introduction
The IETF Mobile IP protocol [Per96a] allows a mobile node (MN) to
continue sending and receiving IP datagrams using a fixed address,
its home address, even when it is no longer connected to its home
subnet. When a mobile node visits a foreign subnet, it obtains a
care-of address on that network and registers that address with its
home agent (HA), a special entity residing on its home subnet. The
home agent, in turn, intercepts datagrams meant for the mobile node
and tunnels them to the registered care-of address. Tunneling refers
to the process of enclosing the original datagram, as data, inside
another datagram with a new IP header [Per96b, Per96c]. The new
header carries the mobile node's care-of address in the destination
field. The care-of address may belong to a specially designated node
-- the foreign agent (FA) -- or may be a temporary address assigned
to one of the interfaces of the mobile node, e.g. through DHCP or
PPP. In the latter case, the mobile node is said to have a co-located
care-of address. This mode of operation obviates the need for
explicit mobility support, in the form of a FA, on the foreign
subnet. The recipient of a tunneled packet recovers the original
datagram before processing it further.
Mobile IP assumes that routing of unicast traffic is based solely on
the destination address. Many Internet routers now include other
considerations in their forwarding decision, e.g. in an effort to
guard against IP-spoofing attacks, source-filtering routers drop
datagrams that arrive on an interface inconsistent with their source
address [CA9621]. Such a router, if present on the foreign network,
will block all datagrams generated by a visiting mobile node carrying
its home address as source. A solution to this problem is to use a
reverse tunnel directed from the mobile node's care-of address to its
home agent [Mont96]. Under this arrangement, datagrams sent from MN
to a correspondent node (CN) now carry the care-of address (rather
than the home address) as source in the outermost IP header and pass
unchallenged through source-filtering routers to the mobile node's
home agent. The home agent strips the outer IP header and recovers
the original packet. From then on, the packet is forwarded as if the
mobile node were on its home subnet.
Additionally, many organizations use firewalls to protect their
networks from the general Internet. These firewalls impose additional
constraints, e.g. they may drop unsolicited datagrams from untrusted
external hosts [ChZw95]. Such a policy is enforced by carefully
screening the source and destination addresses, as well as ports, on
all transport level packets. For TCP packets, the firewall may also
monitor the ACK bit. In this situation, a mobile node's registration
requests are likely to be dropped by a firewall protecting its home
network. Note that source-filtering is not an issue here because
Gupta & Glass Expires July 20, 1997 [Page 2]
INTERNET DRAFT Firewall Traversal for Mobile IP January 1997
registration requests arrive with a topologically correct source
address - namely the current care-of address of the mobile node.
To complicate matters, organizations often hide the topology of their
internal network by using private addresses. These addresses are not
advertised to the general Internet. Such addresses include, but are
not restricted to, those defined in RFC 1918. The Internet's routing
fabric is unable to route packets to these addresses (resulting in
ICMP unreachables). To allow connections from the internal network to
the general Internet, application relays (also called application
gateways or proxies) are used. In a typical configuration, the
internal network is separated from the general Internet by a
"perimeter network" on which the firewall and proxies are located
[ChZw95] (see Figure 1). Hosts on the peripheral network use public
addresses, i.e. their addresses are advertised to the general
Internet. When a host on the internal network wishes to connect to
the Internet, two separate connections are set up: one between the
internal host and the proxy and another between the proxy and the
outside host. To the external host, the user at the other end appears
to be on the proxy host.
I
N
T
Firewall w/ [FW] E
application +---+ +------[R1]----------- R
proxies | | | Exterior/ N
| | | Access E
+-+-+ | Router T**
| |
----+--------+------------+--
| Perimeter Network**
Interior/ |
Choke [R2]
Router |
| * = Uses Private Addresses
Internal Network* ** = Uses Public Addresses
Figure 1: Screened-subnet firewall architecture.
The use of private addresses on firewall-protected networks poses an
additional challenge. A mobile node belonging to such a network can
not use its home address (a private address) to communicate directly
with correspondent nodes when it is outside the protected domain as
replies from correspondent nodes to the private address are likely to
generate a "host unreachable" ICMP message. If, somehow, a reverse
tunnel can be established from the mobile node to its home agent, the
Gupta & Glass Expires July 20, 1997 [Page 3]
INTERNET DRAFT Firewall Traversal for Mobile IP January 1997
mobile node can continue using its private home address. Datagrams
generated by the mobile node using its home address will appear to
emerge from its home network and connections to external hosts will
still involve an intermediate proxy.
The presence of intermediate firewall(s) disrupts free flow of
packets from a mobile node on the outside to its home agent on the
inside. Appropriate security mechanisms are required to successfully
traverse these firewalls to achieve required connectivity.
2. Proposed Solution Framework
The firewall traversal problem in its most general form (e.g.
multiple firewalls under different administrative controls with
limited mutual trust) does not lend itself directly to an easy
solution. Therefore, it is reasonable to try solving this problem in
several phases starting with the simplest (and still useful) variant
described below.
Consider Mobile IP operation for a mobile node (e.g. a notebook
computer belonging to a corporate employee) when it is moved outside
its firewall protected home domain into the general internet (e.g. a
university or ISP environment) which imposes no access restrictions
other than network ingress filtering. In order to reach it's home
subnet, packets from a mobile node may need to traverse Multiple
firewalls. However, they all belong to the mobile node's protected
domain and their existence and relative placement (with respect to a
mobile node's current location) is known apriori.
The simplified problem does not address the case when some of the
intermediate firewalls belong to administrative domains other than
the mobile node's, nor does it address the case when a correspondent
node (outside the mobile node's protected domain) is itself protected
by a firewall. This latter issue, however, is orthogonal to mobility
since the problem is unchanged even when the mobile node is at home.
A reasonable aim is to provide a mobile node with the same
connectivity (modulo performance penalties) outside its protected
network that it enjoys at home. Additionally, it should be possible
to encrypt all traffic to/from the mobile node in an effort to
preserve the level of privacy that a mobile node enjoys at home.
The problem of dynamically discovering intermediate firewalls should
be treated separately at a later time (see item (e) in Section 3).
3. Issues to Consider
Gupta & Glass Expires July 20, 1997 [Page 4]
INTERNET DRAFT Firewall Traversal for Mobile IP January 1997
This section discusses several important issues that should be
considered while solving the firewall traversal problem for Mobile
IP.
(a) Security processing of registrations requests sent on behalf of
(or by) a Mobile node must not depend on its reachability at its home
address. A violation of this assumption will create a circular
dependency since a Mobile Node's reachability at its home address is
at best uncertain until the registration request gets past the
firewall.
Solutions that involve a separate phase in which the mobile node
negotiates access parameters with the firewall should attempt to
minimize the number of round-trip delays.
(b) Colocating Home Agent and Firewall functionality on the same host
considerably simplifies the firewall traversal problem. However,
doing so effectively restricts the number of networks with mobility
support. For example, in Figure 1, hosts on the perimeter network
would enjoy mobility support but none on the internal network.
Therefore, a solution must not require Home Agent and Firewall
functionality to be colocated.
(c) It is possible to configure intermediate firewalls such that UDP
packets sent to port 434 of "well known" Home Agents are allowed to
pass through without any IPSEC processing. This solves the firewall
traversal problem for registration requests but not for reverse
tunneled traffic. This approach also involves administrative
maintenance of the list of "well known" home agents and assumes that
all processes running on port 434 of these hosts are trusted.
Ideally, a firewall should decide to let in a packet based solely on
its IPSEC characteristics (e.g. is it authenticated, encrypted or
both) rather than any higher level information. A solution that does
not require Firewalls to understand Mobile IP is preferred.
(d) If firewalls are unable to parse Mobile IP registrations,
complications arise when the mobile node uses a care-of address
belonging to a Foreign Agent (rather than a co-located address). The
main problem is that even if the Foreign Agent (FA) implements IPSEC
and is able to establish a security association with the Mobile
Node's firewall (FW), it can not win the Firewall's trust. A valid
authentication header on a packet generated by a FA only tells a FW
that the packet was indeed generated by the FA. However, the FW has
no way of knowing whether it was generated on behalf of a trusted
mobile node. The FA may have generated this packet on its own and the
FW may not trust the FA. (Obviously, a mobile node must not divulge
the secret it shares with the FW to its FA just so registrations can
go through.)
Gupta & Glass Expires July 20, 1997 [Page 5]
INTERNET DRAFT Firewall Traversal for Mobile IP January 1997
Consider the case of a FA relaying a mobile node's (MN) registration
request. For this request to pass through FW, it must have an
authenticator based on a security association between FW and MN. We
could have MN precompute an "IP Authentication Header (AH)" [RFC
1826] authenticator which, if inserted by the FA in the relayed
datagram, will pass authentication at the firewall. The tricky part
here is that the AH authenticator includes the Identifier field of
the immediately preceding IP header and there is no easy way for MN
to predetermine its value generated by FA for the relayed request.
There is a questionable solution. The MN could generate its own
Identifier and convey it to the FA with the understanding that the FA
must use this value in the IP header of the relayed request. This
value, the AH authenticator and the firewall address etc could all be
bundled in a new MN to FA registration extension. With this
mechanism, the FA need not even be an IPSEC node. For the case we are
considering (FA belongs to a trusting university/ISP environment), it
is quite likely that none of the mobility agents are capable of IPSEC
processing. However, this approach gets more convoluted when a
mobile node must separately authenticate itself to multiple firewalls
(see item (e) below).
In contrast, Mobile nodes operating with a co-located care-of address
are a lot simpler to deal with. In this case, requests seen by the
firewall are generated directly by a mobile node for which a trusted
relationship already exists.
Solving the firewall traversal problem for mobile nodes registered
through foreign agents may perhaps be postponed to a later phase.
(e) When multiple firewalls within the home domain must be traversed,
each firewall may require a different level of trust, e.g. a large
corporation may have one firewall guarding its connection to the
Internet and another guarding the finance department network from the
rest of the company (Figure 2). Amongst all the employees that are
allowed access through the main firewall, only a small subset may be
allowed in through the finance firewall.
Gupta & Glass Expires July 20, 1997 [Page 6]
INTERNET DRAFT Firewall Traversal for Mobile IP January 1997
[FW1]-------------------- INTERNET
|
|
[R]
/ \
/ \
{Engineering} [FW2]
|
{Finance}
Figure 2: Nested firewalls requiring different levels
of trust.
In this scenario, a mobile node on the outside that wishes to
communicate with its home agent in the finance network must be able
to explicitly (separately) authenticate itself to each intervening
firewall.
(f) Many organizations use firewalls along with private addresses.
If private addresses are used by the Mobile node's home domain, these
addresses must not be exposed to routers on the outside. This may
require additional tunneling e.g. a tunnel from the care-of address
to at least the (outer most) Firewall may be needed to hide/bury the
Home Agent's 'private' address as destination on reverse tunneled
traffic.
The problem is complicated when routers within the home domain are
(by design) kept unaware of external destinations. Analogously, extra
tunneling may be needed even on the inside, e.g. in Figure 2, a
tunnel may be needed between a home agent on the finance network and
(the proxy) FW1 to hide the 'external' care-of destination address on
encapsulated packets meant for a mobile node roaming outside.
So far we've only considered the problem of exposing addresses as
destinations to routers that are unaware of them. To make things
worse, routers are likely to disallow unknown addresses even in the
source field of the datagrams they forward. For example, internal
routers may disallow an external care-of address as source on reverse
tunneled traffic. This may necessitate additional tunneling within
the protected domain even for incoming packets e.g. an external
care-of address may need to be hidden from R (Figure 2) on reverse-
tunneled traffic. Similarly, extra tunneling may be required to hide
internal addresses (e.g. home agent's) from appearing as source on
outgoing packets routed by external routers.
Due to the widespread use of private addresses, solutions to the
firewall traversal problem must accommodate private addresses.
Gupta & Glass Expires July 20, 1997 [Page 7]
INTERNET DRAFT Firewall Traversal for Mobile IP January 1997
(g) Proposals for dynamic discovery of intervening firewalls must not
rely on firewalls generating ICMP "administratively unreachable"
messages since many firewalls are designed to hide as much of their
presence as possible.
According to Chapman and Zwicky [ChZw95, Chap 6, Section titled
"Returning ICMP Error Codes"]:
"Returning the new 'host administratively unreachable' or the fact
that there is a packet filtering system at your site, which you may
or may not want to do. These codes may also cause excessive reactions
in faulty IP implementations."
"If your router returns an ICMP error code for every packet that
violates your filtering policy, you're also giving an attacker a way
to probe your filtering system. By observing which packets evoke an
ICMP error response, attackers can discover what types of packets do
and don't violate your policy. You should not give this information
away, because it greatly simplifies the attacker's job. The attacker
knows that packets that don't get the ICMP error are going somewhere,
and can concentrate on those protocols, where you actually have
vulnerabilities. You'd rather that the attacker spent plenty of time
sending you packets you happily throw away."
"All in all, the safest thing to do seems to be to drop packets
without returning any ICMP error codes. If your router offers
flexibility, it might make sense to configure it to return ICMP error
codes to internal systems (which would like to know immediately that
something is going to fail, rather than wait for a timeout), but not
to external systems ... "
(h) The Authenticated Firewall Traversal (AFT) working group of the
IETF has developed the SOCKS protocol [LGLKKJ96] as a general
mechanism for firewall traversal. The protocol is conceptually a
"shim-layer" between the application layer and the transport layer,
and as such does not provide network layer gateway services, such as
forwarding of ICMP (or even IPinIP) messages. IPinIP messages (from
HA to MN) would have to be encapsulated within UDP or TCP in order to
use SOCKS. Beside the resulting inefficiency, there are other
concerns regarding its appropriateness for the problem at hand
[MoGu96].
The SOCKS solution requires that the mobile node -- or another node
on its behalf -- establish a TCP session to exchange UDP traffic with
each firewall. SOCKS incurs a minimum delay of four round-trips (six
with GSS-API) before a client is able to pass data through the
firewall. It seems unlikely that this negotiation will be efficient
enough to allow a mobile node to change its point of attachment as
Gupta & Glass Expires July 20, 1997 [Page 8]
INTERNET DRAFT Firewall Traversal for Mobile IP January 1997
often as once per second, as specified in [Per96a].
Given the likelihood that most firewalls in the future will be based
on IPSEC mechanisms, it is imperative that a solution be based on
standard IPSEC protocols, e.g. ISAKMP/Oakley.
4. Security Considerations
Mobile IP assumes that routing of unicast datagrams is based solely
on the destination address. Packet filtering routers and Firewalls
include additional considerations in their routing decisions. Special
mechanisms are needed to ensure Mobile IP operation in the presence
of these and related (e.g. use of private addresses) security
measures currently becoming popular on the Internet.
Acknowledgments
Ideas in this document have benefited from discussions with at least
the following people: Gabriel Montenegro, Rich Skrenta and Tsutomo
Shimomura.
References
[CA9621] CERT Advisory CA-96.21, "TCP SYN Flooding and IP
Spoofing Attacks", available at ftp://info.cert.org/pub/
cert_advisories/CA-96.21.tcp_syn_flooding.
[ChZw95] D. B. Chapman and E. Zwicky, "Building Internet
Firewalls", O'Reilly & Associates, Inc., Sept. 1995.
[LGLK96] M. Leech, M. Ganis, Y. Lee, R. Kuris, D. Koblas and
L. Jones, "SOCKS Protocol Version 5", RFC 1928, March 1996.
[Leec96] M. Leech, "Username/Password Authentication for SOCKS
V5", RFC 1929, March 1996.
[McMa96] P. McMahon, "GSS-API Authentication Method for SOCKS
Version 5", RFC 1961, June 1996.
[Mont96] G. Montenegro, "Bi-directional Tunneling for Mobile IP",
Draft <draft-montenegro-tunneling-01.txt>-- work in progress,
Sept. 1996.
[MoGu96] G. Montenegro and V. Gupta, "Firewall Support for Mobile
IP". Draft <draft-montenegro-firewall-sup-00.txt>, work
in progress, Sept. 1996.
Gupta & Glass Expires July 20, 1997 [Page 9]
INTERNET DRAFT Firewall Traversal for Mobile IP January 1997
[Per96a] C. Perkins, "IP Mobility Support", RFC 2002.
[Per96b] C. Perkins, "IP Encapsulation within IP", RFC 2003.
[Per96c] C. Perkins, "Minimal Encapsulation within IP", RFC 2004.
Author's Address
Vipul Gupta
Sun Microsystems, Inc.
2550 Garcia Avenue
Mailstop UMPK 15-214
Mountain View, CA 94043-1100
Tel: (415) 786 3614
Fax: (415) 786 6445
EMail: vipul.gupta@eng.sun.com
Steven M. Glass
FTP Software
2 High Street
North Andover, MA 01949
Tel: (508) 685 4000
Fax: (508) 684 6105
EMail: glass@ftp.com
Gupta & Glass Expires July 20, 1997 [Page 10]
| PAFTECH AB 2003-2026 | 2026-04-20 12:52:05 |