throbber
Internet Engineering Task Force Francis Dupont
`INTERNET DRAFT ENST Bretagne
`Expires in August 2001 February 22. 2001
`
` Mobility-aware IPsec ESP tunnels
`
` <draft-dupont-movesptun-00.txt>
`
`Status of this Memo
`
` This document is an Internet Draft and is in full conformance with
` all provisions of Section 10 of RFC 2026.
`
` This document is an Internet-Draft. Internet-Drafts are working
` documents of the Internet Engineering Task Force (IETF), its
` areas, and its working groups. Note that other groups may also
` distribute working documents as Internet-Drafts.
`
` Internet-Drafts are draft documents valid for a maximum of six
` months and may be updated, replaced, or obsoleted by other
` documents at any time. It is inappropriate to use Internet-
` Drafts as reference material or to cite them other than as
` "work in progress."
`
` The list of current Internet Drafts can be accessed at
`http://www.ietf.org/ietf/1id-abstracts.txt
`
` The list of Internet-Draft Shadow Directories can be accessed at
`http://www.ietf.org/shadow.html.
`
` Distribution of this memo is unlimited.
`
`Abstract
`
` A common usage of IPsec is bidirectional ESP tunnels (secure
` Virtual Private Networks): the original packet is encapsulated in
` a new IP header and protected (ESP can provide confidentiality,
` authentication, integrity and anti-replay) by IPsec ESP (in tunnel
` mode).
`
` This conflicts with all mobility devices [ID1, ID2] which are based
` on addresses for no good reasons when some of these mobility devices
` should be able to use the four addresses in the two headers.
`
` This document tries to solve this conflict in order to make secure
` and mobile supports colaborating, ie. to pay for the two features
` only once.
`
`draft-dupont-movesptun-00.txt [Page 1]
`
`Ex. 1010
`Apple v. MPH Techs. Oy
`IPR2019-00820
`
`

`

`INTERNET-DRAFT Mobility-aware IPsec ESP tunnels February 2001
`
`1. Introduction
`
` IPsec [RFC 2401] defines Encapsulation Security Payload (ESP)
` [RFC 2406] tunnel mode as an encapsulation of an original/inner
` IP packet in an outer IP packet:
`
` +--------------------+-------------------------------------------+
` | | +------------------------+ |
` | IP header | ESP header | original IP packet | |
` | | +------------------------+ |
` +--------------------+-------------------------------------------+
`
` Address based mobility protocols use two addresses for a mobile node:
` - the home address which is static but virtual
` - a care-of address which is temporary but denotes the current
` position of the mobile node.
` These protocols can use options (source routing header and home
` address destination option) for the optimized version or a tunnel
` for the unoptimized version. Both versions apply the same rules:
` - the mobile node should send packets with a care-of address as
` the outer source and the home address as the inner source.
` - a correspondent node should send packets with a care-of address
` as the outer destination and the home address as the inner
` destination.
`
` If an ESP tunnel is already used we want to add no option or new
` encapsulation. If security and mobility protocols can colaborate
` we shall get mobility support without overhead. This document
` describes how this colaboration can be archieved: packets are
` transported as for ESP tunnels, IPsec and mobility signaling
` control together outer addresses.
`
`2. IPsec issues
`
` IPsec specifications [RFC 2401] do not mandate any check of the
` outer source address in incoming processing but many implementations
` do this kind of check. They are (still) compliant but they cannot
` interoperate if the source address can change, ie. with an address
` based mobility device or a Network Address Translator.
`
`draft-dupont-movesptun-00.txt [Page 2]
`
`

`

`INTERNET-DRAFT Mobility-aware IPsec ESP tunnels February 2001
`
` There is no real issue with Internet Key Exchange [RFC 2409]
` but the phase one is done with a care-of address then:
` - the lifetime of ISAKMP Security Association built by the
` phase one should be in the same order than the lifetime of
` the care-of address.
` - the care-of address should not be used in an Identity payload
` (ie. user_FQDN Identity payload is recommended for phase one).
` - in some case the care-of address of the peer is not known then
` the initiator should be the mobile node.
` In phase two the home-address should be used in the Identity payload,
` the policy should tie the phase one identity with the home-address in
` order to authorize the setup and update of proper IPsec SAs.
`
` The PF_KEY API [RFC 2367] defines identities and addresses (three
` kind of addresses, source, destination and proxy) for SAs.
` For a mobile node the care-of address is the source and
` the home address the proxy according to section 5.2 example.
` The current specifications need to be updated in order to
` provide a way to update the source or the destination address.
`
` There is not yet a PF_POLICY document but the requirements are
` exactly the same than for PF_KEY: the source or the destination
` address of the outer headers must be updatable.
`
`3. Signaling
`
` Address based mobility protocols manage a care-of/home address
` pair on both ends of a mobility session. In the case covered
` by the document this pair is the outer/inner source address pair
` on the mobile node, the outer/inner destination address pair
` on the correspondent node.
`
` The signaling function provides a way to update the care-of address
` in this pair on correspondent nodes when the mobile node has moved,
` ie. has acquired a new care-of address.
`
` If the signaling is done inline, ie. signaling protocol elements
` are transported through the ESP tunnel from the mobile node to
` a correspondent, then ESP must provide authentication, integrity
` check and anti-replay protection.
`
` The signaling responder on correspondents MUST interoperate with
` IPsec management, for instance using standard extended APIs like
` PF_KEY as decribed before.
`
`draft-dupont-movesptun-00.txt [Page 3]
`
`

`

`INTERNET-DRAFT Mobility-aware IPsec ESP tunnels February 2001
`
`4. Extensions
`
` Most of this document was written with bidirectional tunnels in mind
` but it can be applied in the unidirectional case where previous
` issues are less critical but still exist.
`
` AH in tunnel mode is not commonly used but this document applies
` to it too. The only difference is that AH protects the whole outer
` header, including the outer source address.
`
`5. Security Considerations
`
` Signaling devices have some security requirements which can be
` provided by ESP.
`
` The correspondent policy have to authorize both the setup of SAs
` negociated by an initiator using a (a priori random) care-of address
` and the update of the mobile node outer address in these SAs.
`
`6. Acknowledgements
`
` I would like to thank Richard Draves (Microsoft Research) to point
` to that the interaction between mobile IPv6 and IPsec is near a
` complete disaster and something must be done.
`
`7. References
`
` [ID1] D. Johnson, C. Perkins, "Mobility Support in IPv6",
`draft-ietf-mobileip-ipv6-13.tx, work in progress,
` November 2000.
`
` [ID2] F. Dupont, "IPv6 over IPv4 tunnels for home to Internet
` access", draft-ietf-ngtrans-hometun-01.txt, work in progress,
` November 2000.
`
` [RFC 2401] S. Kent, R. Atkinson, "Security Architecture for the
` Internet Protocol", RFC 2401, November 1998.
`
` [RFC 2406] S. Kent, R. Atkinson, "IP Encapsulating Security
` Payload (ESP)", RFC 2406, November 1998.
`
` [RFC 2409] D. Harkins, D. Carrel, "The Internet Key Exchange (IKE)",
`RFC 2409, November 1998.
`
` [RFC 2367] D. McDonald, C. Metz, B. Phan, "PF_KEY Key Management
` API, Version 2", RFC 2367, July 1998.
`
`draft-dupont-movesptun-00.txt [Page 4]
`
`

`

`INTERNET-DRAFT Mobility-aware IPsec ESP tunnels February 2001
`
`8. Author’s Address
`
` Francis Dupont
` ENST Bretagne
` Campus de Rennes
` 2 rue de la Chataigneraie
` BP 78
` 35512 Cesson-Sevigne Cedex
` FRANCE
` Fax: +33 2 99 12 70 30
` EMail: Francis.Dupont@enst-bretagne.fr
`
`Expire in 6 months (August 22, 2001)
`
` [Page 5]
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket