One document matched: draft-oneill-mip-regtun-mods-00.txt


Personal                                                        A. O'Neill 
Internet Draft                                        Flarion Technologies
Document: draft-oneill-mip-regtun-mods-00.txt                 9 April 2002
Expires: August 2002

                    Modifications to Regional Tunneling
                   <draft-oneill-mip-regtun-mods-00.txt>

Status of this Memo

   This document is an Internet-Draft and is in full conformance with
   all provisions of Section 10 of RFC2026.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet- Drafts as reference
   material or to cite them other than as work in progress.

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt
   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

Copyright Notice
   Copyright (C) The Internet Society (2002). All Rights Reserved.


Abstract

   Regional Registration modifies the normal MIP Registration signalling    
   back to the HA so that the signalling can traverse an intermediate 
   Gateway Foreign Agent (GFA). The registered binding is between the Home 
   Address (HoA) and the GFA Care-of Address (GFA-CoA) in the Home Agent 
   (HA), and between the GFA-CoA and the Foreign Agent (FA-CoA) in the GFA. 
   Two extensions are defined to support this new Registration processing 
   these being the Hierarchical Foreign Agent extension (HFAext) and the GFA 
   IP address extension (GFAIPext). The former is used to carry the FA CoA 
   to the GFA and the latter is used by the FA to allocate a GFA to the MN, 
   and by the FA, GFA, HA to securely return the GFA IP address to the MN.

   The present processing rules for the HA registration enable the FA to 
   advertise the GFA to the MN in a Foreign Agent Advertisement (FAA) and 
   for the MN to include that GFA address into the CoA field of the MIP home 
   Registration. This however assumes a number of things about the GFA 
   address in the FAA and the addressing realms between the FA-GFA and GFA-
   HA.. Specifically, the GFA CoA and the GFA IP address must potentially be 
   from two different addressing plans and hence cannot be in the same FAA. 
   This draft describes the issues and suggests a solution that requires 
   slight modifications to the required extensions, that generalises the 
   Home Registration signalling for arbitrary intermediate MIP nodes, and 
   only slightly modifies the processing rules for the MIP Home 
   Registration. This draft also describes a way to support dynamic HA 
   allocation along-side Regional Registrations.


A.W. O'Neill                 Expires Sept 2002                    [Page 1]

INTERNET-DRAFT      Modifications to Regional Tunneling        09 Apr 2002

INDEX

Abstract                                                          

   1. Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . 2

   2. Conventions used in this document . . . . . . . . . . . . . . . . . 4                           

   3. Terminology used in this document . . . . . . . . . . . . . . . . . 4              

   4. Home Registration Modifications . . . . . . . . . . . . . . . . . . 4
      4.1. GFA address. . . . . . . . . . . . . . . . . . . . . . . . . . 4
	4.2. HA address . . . . . . . . . . . . . . . . . . . . . . . . . . 4
      4.3. GFA CoA. . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
      4.4. Reverse Tunneling Implications . . . . . . . . . . . . . . . . 5
      4.5. Naming Modifications . . . . . . . . . . . . . . . . . . . . . 5

   5. Security Considerations . . . . . . . . . . . . . . . . . . . . . . 6

   6. Notice Regarding Intellectual Property Rights . . . . . . . . . . . 6

   7. References. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6


1. Introduction

   The present processing rules for the HA registration in [RegTun] enable 
   the FA to advertise the GFA to the MN in a Foreign Agent Advertisement 
   (FAA) and for the MN to include that GFA address into the CoA field of 
   the MIP home Registration. In the case of a dynamically allocated GFA, 
   the MN instead leaves the CoA field blank so that the FA can dynamically 
   allocate a GFA and place the address into the GFAIPext extension. These 
   procedures however assume a number of things about the addressing plans, 
   the type of CoA used in the GFA, and the design of the GFA forwarding.

   Specifically, the GFA address advertised in the FAA must be the GFA CoA 
   if that address is to be put into the CoA field by the MN. The GFA CoA 
   must be routable between the HA and the GFA. At the same time, the GFA 
   address known to the FA must be the address towards which the FA sends 
   MIP Registrations. This obviously requires the GFA address to be routable 
   between the FA and the GFA. If the two addressing and routing plans 
   either side of the GFA are different then it is impossible for the GFA 
   address advertised by the FAA to be both the GFA CoA and the GFA address 
   as defined above. The advertised GFA address cannot therefore safely be 
   placed into the MIP Reg CoA field.

 
          HA1 ------Realm 1------------+
                                       |
                                    (CoA1)
          HA2 ------Realm 2-----(CoA2)GFA-------Realm 2--------FA






A.W. O'Neill                 Expires Sept 2002                    [Page 2]

INTERNET-DRAFT      Modifications to Regional Tunneling        09 Apr 2002

   One way to solve the problem would be to advertise independent addresses, 
   one as the GFA address reachable from the HA, and one as the GFA CoA 
   address reachable from the FA. The FA, however, must advertise the GFA 
   address in the FAA as this is required for GFA change detection (to 
   trigger a new home registration) and so there is no place for the GFA CoA 
   at present. Even if both addresses could be advertised, there are many 
   cases in which the FA could not know in advance of a GFA CoA that is 
   routable between the GFA and the HA. This is especially true if the GFA 
   uses a different addressing realm to communicate with different HAs, in 
   which case the FA will need to know the MN's HoA/NAI before it can 
   advertise the correct GFA CoA and even then it is not clear that the FA 
   can make the distinction successfully. Given that it is unlikely that the 
   MN could differentiate between these cases it is safer if the MN never 
   inserts the advertised address into the MIP Reg CoA field. As an example, 
   it is quite normal to use private address space for communication between 
   routers within the operator domain, whilst using public addresses for 
   user flows. This would imply that the GFA address required for the MIP 
   Registration signals between the FA and the GFA would likely be a private 
   address whilst the GFA CoA would likely to be a public address. Even 
   worse, if different interfaces on the GFA point to both public and/or 
   private networks and associated HAs, then the FA would need to have a 
   different GFA CoA for each different addressing/routing plan. It would 
   then have the impossible task of having to advertise the correct GFA CoA 
   to a MN in advance of seeing the associated Registration that would   
   define the required GFA interface. 

   Essentially, the FA is generally not in a position to advertise a valid 
   GFA CoA to the MN and therefore neither should it advertise such an 
   address nor should the MN insert that address into the MIP Reg CoA. This 
   also enables the GFA to always be in a position to dynamically allocate 
   the GFA CoA based on the MIP Registration information. This could be 
   because of different routings requiring different numbering plans, or 
   could alternatively be due to the GFA handing out different CoAs for 
   different traffic aggregates (VPN traffic, different QoS levels etc). 
   Further, the FA in [RegTun] already cannot advertise the GFA CoA to the 
   MN if the GFA is to be dynamically assigned at the time of the MIP Home 
   Registration. There is therefore already a reason for the MN to send a 
   blank CoA in the MIP home Reg, and a method, the GFAIPext, to communicate 
   the dynamically allocated GFA address to the other MIP elements to be 
   used as a GFA CoA. Once again, we have the GFA address or GFA CoA overlap 
   to resolve, the solution to which can at the same time enable the FA to 
   still dynamically allocate the GFA, the GFA to dynamically allocate the 
   GFA CoA, and both to communicate the right addresses to the other MIP 
   nodes.

   Finally, there is no existing way for a dynamically allocated HA, 
   delivered to the FA by the AAA system, to be supported in [RegTun]. This 
   is because the FA does not presently have a way to inform the GFA of the 
   dynamically assigned HA address so that the GFA can onward forward to 
   that HA. This provides additional motivation for defining a general MIP 
   extension that can carry forward the address of a dynamically assigned 
   MIP element. 

   This draft suggests solutions to these problems that require minimal 
   changes to the required extensions, and that generalize the processing  
   rules for the MIP Home Registration.

A.W. O'Neill                 Expires Sept 2002                    [Page 3]

INTERNET-DRAFT      Modifications to Regional Tunneling        09 Apr 2002

2. Conventions used in this document

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", 
   "SHOULD", "SHOULD NOT", "RECOMMENDED",  "MAY", and "OPTIONAL" in this 
   document are to be interpreted as described in RFC-2119 [RFC2119]. 


3. Terminology used in this document

   Much of the terminology used in this document borrows from Mobile IPv4 
   [MIPv4], Regional Tunneling [RegTun] and MIP Reverse Tunneling [RevTun]. 
   The following introduces additional terminology.

   GFA address - the address of the GFA as seen by the assigning FA or AAA 
   GFA CoA - the address of the GFA as seen by the Home Agent for the 
             Data path forwarding.
   HAIPext - the address of the dynamically allocated Home Agent
   HFAIPext - the HFA IP address extension for exchanging dynamically 
              allocated MIP element addresses.


4. Home Registration Modifications

   4.1. GFA Address

   The GFA address in the FA Advertisement to the MN must not be inserted by 
   the MN into the CoA field of an MIP Reg. This address can however still 
   be used to detect GFA changes and can also be used as the destination 
   address for an MIP CCoA Registration that is sent direct to the GFA.

   The FA should not use the GFAIPext to communicate the GFA CoA of a 
   dynamically allocated GFA. This is so that the GFA has the freedom to 
   dynamically allocate the GFA CoA. The GFAIPext can be used by the FA to 
   carry the address of the dynamically allocated GFA to that GFA, to the HA 
   and back to the MN. However, the FA only needs to do this if the 
   allocated GFA address is different to the one advertised to the MN in the 
   FAA. The GFA can tell if the MN already knows the GFA address by the 
   absence of the GFAIPext. The GFAIPext is used also between the GFA and 
   the HA so that the dynamic GFA address can be returned, as in [RegTun], 
   to the MN to trigger appropriate Registration behaviour. The GFA IP 
   address is returned to the MN by the HA including the GFAIPext in the MIP 
   Registration Reply, secured by the HA-MN authentication extension. 


   4.2 HA Address

   If the MN does not have a statically configured HA address then the FA 
   needs to obtain a dynamic HA for the MN, via the AAA system and based on 
   the MN-NAI, as described in RFC 2794. Now when the HA is delivered to the 
   FA it is necessary for the FA to communicate the HA address to the GFA so 
   that the GFA can send the registration on to that HA. The FA can do so by 
   sending a HAIPext to the GFA, formatted similarly to that of the 
   GFAIPext, and secured by the FA-FA auth extension. The HFAext does not 
   need to be forwarded to the HA and returned to the MN because the HA will 
   already be included in the Registration Reply along with the dynamically 
   allocated HoA.

A.W. O'Neill                 Expires Sept 2002                    [Page 4]

INTERNET-DRAFT      Modifications to Regional Tunneling        09 Apr 2002


   4.3. GFA CoA

   The HFAext in [RegTun] is presently employed by the FA to inform the GFA 
   of the FA CoA to be used when forwarding for a specific HoA. The HFAext 
   is protected by the FA-FA authentication extension in [RegTun]. 
   Similarly, the HFAext, rather than the GFAIPext, should be used by the 
   GFA to communicate the GFA CoA to the HA. It does this by including the 
   HFAext in the MIP Registration to the HA, secured by the GFA-HA 
   authentication extension. The GFA consumes the HFAext from the FA that 
   contains the FA CoA, and replaces it with a HFAext with the assigned GFA 
   CoA. This enables the GFA to dynamically generate the CoA, it avoids the 
   FA needing to be aware of the addressing plan between the HA and the GFA, 
   and finally it enables the address in the GFAIPext and the HFAext to be 
   different.

   The HA consumes the received HFAext, extracting the GFA CoA and inserting 
   it into the binding for the HoA. The MIP Reply is then returned with the 
   HFAext carrying the GFA CoA to the MN, protected by the MN-HA 
   authentication extension. The HFAext is required by the MN to enable it 
   to include the GFA CoA in MIP Registrations to the HA. The use of the 
   HFAext in this way provides a general signaling method for one MIP 
   element to inform another MIP element of the CoA to be used when 
   encapsulating and forwarding between those elements. The pair of elements 
   affected by the HFAext is identified by the inner most authentication 
   extension used to authenticate the HFAext.


   4.4. Reverse Tunneling Implications

   Reverse tunneling requires the source CoA in the encapsulating header to 
   match the binding in the receiving node. This means that the downstream 
   MIP element must encapsulate using the CoA that it sent to the upstream 
   node in the HFAext, at any point in the reverse tunneling hierarchy.


   4.5. Naming Modifications

   The HFAext, according to this draft, specifically carries a Care of 
   Address for the data plane. The HFAext is sufficiently general to enable 
   it to be used at any point within a MIP hierarchy. However the GFAIPext,  
   which is now suggested by this draft as carrying the GFA address rather 
   than the GFA CoA, has a name that binds it closely to a GFA intermediate 
   node, and the carriage of a GFA address. It cannot therefore be used to 
   carry the HA address to the GFA for example. A HFAIPext might 
   alternatively be a better name instead of GFAIPext which would enable 
   arbitrary nodes to exchange control plane IP addresses. The HFAIPext 
   would then provide a general method for a MIP node to inform another MIP 
   node of a dynamically allocated MIP node address. In the case of 
   [RegTun], the MIP node address is that of the GFA which is communicated 
   to the MN via the FA, GFA and HA. In the case of the HA address, it is 
   the FA that communicates it to the GFA. In the cases of both the HFAext 
   and the HFAIPext the nature of the enclosed address can be determined 
   from the authentication extension used to protect it, although a more 
   general model would be to state the address type and associated 
   processing in the extension itself through an address code. 

A.W. O'Neill                 Expires Sept 2002                    [Page 5]

INTERNET-DRAFT      Modifications to Regional Tunneling        09 Apr 2002

   This then leads to the use of a single type value for hierarchical CoAs  
   and hierarchical IP address carriage formatted as follows, where the 
   address code field then distinguishes address types such as GFA CoA, GFA 
   IP address, HA address etc...

       0                   1                   2                   3
       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |     Type      |     Length    |       Address code
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
              IP Address ....      |       IP Address ....
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   The home MIP Registration process then becomes general enough to be 
   applicable to registrations via arbitrary intermediate static/dynamically 
   allocated MIP nodes. The GFA specific signaling and naming is then more 
   appropriately limited to the Regional Registration messages between MN, 
   FA and the GFA, for the localization of the MIP hand-off and registration 
   refresh.


5. Security Considerations

   No new security issues are raised by this draft than are already 
   considered in the design of [MIPv4], [RegTun] and [RevTun].


6. Notice Regarding Intellectual Property Rights 
    
   Flarion's submissions will conform with RFC 2026.  Flarion may seek 
   patent protection on some or all of the technical information submitted 
   by its employees in connection with the IETF's standards process.  If 
   part(s) of a submission by Flarion is (are) included in a standard and 
   Flarion owns patent(s) and/or pending patent application(s) that are 
   essential to implementation of such included part(s) in said standard, 
   Flarion is prepared to grant a license on fair, reasonable, reciprocal 
   (license back) and non-discriminatory terms on such included part(s).


7. References

   [RFC2026] Bradner, S., "The Internet Standards Process -- Revision 3", 
   BCP 9, RFC 2026, October 1996.

   [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement 
   Levels", BCP 14, RFC 2119, March 1997 

   [MIPv4] C.E. Perkins, Ed., `` IP Mobility Support for IPv4," RFC3220, 
   January 2002

   [RegTun] E. Gustafsson. Ed., " Mobile IPv4 Regional Registration, 
   Internet-draft, draft-ietf-mobileip-reg-tunnel-06.txt, 1March 2002                                  

   [RevTun] G. Montenegro, Ed., "Reverse Tunneling for Mobile IP, revised," 
   Internet RFC 3024, January 2001.


A.W. O'Neill                 Expires Sept 2002                    [Page 6]

INTERNET-DRAFT      Modifications to Regional Tunneling        09 Apr 2002


Author's Addresses

Alan O'Neill
Flarion Technologies
Phone: +1 908 947 7033
Email: oneill@flarion.com


















































A.W. O'Neill                 Expires Sept 2002                    [Page 7]

PAFTECH AB 2003-20262026-04-24 04:31:53