TOC |
|
By submitting this Internet-Draft, each author represents that any applicable patent or other IPR claims of which he or she is aware have been or will be disclosed, and any of which he or she becomes aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as “work in progress.”
The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html.
This Internet-Draft will expire on May 13, 2008.
This specification suggests two changes to the Host Identity Protocol (HIP) checksum calculation. Specifically, only the HIP header and payload fields would be included in the checksum calculation, and the CRC32c algorithm would be used to compute the checksum. The HIP version number would be incremented if these suggestions are accepted, to reflect a different checksum algorithm.
1.
Introduction
2.
Terminology used in this document
3.
Background for this Proposal
4.
Changes to Checksum Coverage
5.
Proposed HIP Checksum Coverage
6.
Proposed HIP Version Change
7.
Security Considerations
8.
IANA Considerations
9.
References
9.1.
Normative References
9.2.
Informative References
§
Authors' Addresses
§
Intellectual Property and Copyright Statements
TOC |
This specification suggests two changes to the Host Identity Protocol (HIP) checksum calculation. Each of these changes should be considered separately:
The HIP version number would be incremented if these suggestions are accepted, to reflect a different checksum algorithm.
The checksum calculation described in this specification is used only when HIP is carried directly over IP. Considerations for checksum calculations when an intervening transport protocol is used are left to [I‑D.ietf‑hip‑nat‑traversal] (Komu, M., Henderson, T., Tschofenig, H., Melen, J., and A. Keranen, “Basic HIP Extensions for Traversal of Network Address Translators,” October 2009.).
TOC |
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119] (Bradner, S., “Key words for use in RFCs to Indicate Requirement Levels,” March 1997.).
TOC |
In section 5.1.1, the HIP base protocol draft [I‑D.ietf‑hip‑base] (Moskowitz, R., Nikander, P., Jokela, P., and T. Henderson, “Host Identity Protocol,” October 2007.) now specifies the following:
Since the checksum covers the source and destination addresses in the IP header, it must be recomputed on HIP-aware NAT devices.
If IPv6 is used to carry the HIP packet, the pseudo-header [RFC2460] contains the source and destination IPv6 addresses, HIP packet length in the pseudo-header length field, a zero field, and the HIP protocol number (see Section 4) in the Next Header field. The length field is in bytes and can be calculated from the HIP header length field: (HIP Header Length + 1) * 8.
In case of using IPv4, the IPv4 UDP pseudo header format [RFC0768] is used. In the pseudo header, the source and destination addresses are those used in the IP header, the zero field is obviously zero, the protocol is the HIP protocol number (see Section 4), and the length is calculated as in the IPv6 case.
Although the use of pseudo-headers in transport checksums has been universal practice for decades, this design choice is proving problematic for several applications that perform HIP-level packet relays. For example:
Although a HIP-level relay is attractive for these mechanisms, the HIP packet checksum is recomputed at each relay, because the source and destination IP addresses are currently included in the pseudo-header covered by the HIP checksum.
In addition to the checksum calculation overhead at each relay, intermediate recalculation means that checksum protection only covers the part of the path to the next HIP-aware device that recalculates the checksum.
We also note that excluding the source and destination IP addresses from the HIP checksum calculation would improve the ability of HIP connections to survive interface selection changes, would better accommodate multihoming, and would better detect checksum failures in scenarios where intermediate nodes forward at the HIP layer. For example, in [I‑D.ietf‑hip‑nat‑traversal] (Komu, M., Henderson, T., Tschofenig, H., Melen, J., and A. Keranen, “Basic HIP Extensions for Traversal of Network Address Translators,” October 2009.), checksums are recalculated when packets traverse HIP-aware NATs (so checksums do not protect the packets over an entire end-to-end path) and checksums are set to 0 when packets traverse HIP-unaware NATs (so that checksums are disabled completely).
TOC |
This specification recommends removing pseudo-header fields from the checksum calculation, so that the checksum does not need to be recalculated when pseudo-header field values change. Most important (and probably most controversial) is the removal of source and destination IP addresses from the checksum calculation.
The only bytes included in the checksum calculation are the HIP header and HIP payload bytes.
The resulting checksum does protect the HIP header and HIP payload, but does not protect the pseudo-header fields associated with the HIP header and HIP payload. The resulting checksum is "end-to-end" - it protects the HIP header and HIP payload for packets that traverse HIP relays, where the current checksum calculation does not - it is recalculated at each HIP relay, so errors at intermediate HIP relays may not be caught if the checksum was recalculated after the error was introduced at the HIP relay.
We believe that removal of the source and destination IP addresses from the transport checksum calculation is a reasonable change to the HIP protocol. If these fields are exluded from the transport checksum calculation, we see no reason to include other IP-level fields as part of a transport pseudo-header in the checksum calculation.
TOC |
This proposal uses the same checksum algorithm that is used in SCTP, except that no pseudo-header fields are prepended to the HIP header and payload before the checksum is calculated.
Note that the current HIP base specification uses a 16-bit checksum field. This checksum field must be expanded to 32 bits, in order to accommodate the crc32c checksum (also used by SCTP). Also note that a reserved field is also added to preserve 8-byte alignment, as required in [RFC2460] (Deering, S. and R. Hinden, “Internet Protocol, Version 6 (IPv6) Specification,” December 1998.) to ensure alignment of subsequent IPv6 extension headers.
The resulting modified header format is as follows:
0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Next Header | Header Length |0| Packet Type | VER. | RES.|1| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Checksum | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Controls | (Reserved) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | (Reserved) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Sender's Host Identity Tag (HIT) | | | | | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Receiver's Host Identity Tag (HIT) | | | | | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | / HIP Parameters / / / | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
The following text is taken from [RFC4960] (Stewart, R., “Stream Control Transmission Protocol,” September 2007.), with modifications (reflecting its use for HIP):
When sending a HIP packet, the endpoint MUST strengthen the data integrity of the transmission by including the crc32c checksum value calculated on the packet, as described below.
After the packet is constructed, the transmitter shall:
When a HIP packet is received, the receiver MUST first check the crc32c checksum:
The default procedure for handling invalid HIP packets is to silently discard them.
TOC |
Because this change is not backward-compatible with current HIP specifications ([I‑D.ietf‑hip‑base] (Moskowitz, R., Nikander, P., Jokela, P., and T. Henderson, “Host Identity Protocol,” October 2007.)) or with conformant implementations to this specification, we recommend changing the HIP version number from 1 to 2 for packets processed using this specification.
Although it is certainly possible to make this change backward-compatible by adding a version negotiation mechanism and continuing to use HIP Version 1 with hosts that do not respond to the negotiation mechanism, we believe that making this change to HIP at this time, without providing such a negotiation mechanism, is appropriate because
TOC |
The following security considerations are in addition to the security considerations identified in the base HIP protocol specification ([I‑D.ietf‑hip‑base] (Moskowitz, R., Nikander, P., Jokela, P., and T. Henderson, “Host Identity Protocol,” October 2007.)).
This change to the HIP checksum coverage does make source and destination IP addresses less "visible" to a receiving host, but this is judged to be an acceptable risk, for these reasons:
TOC |
The current HIP base protocol specification ([I‑D.ietf‑hip‑base] (Moskowitz, R., Nikander, P., Jokela, P., and T. Henderson, “Host Identity Protocol,” October 2007.)) includes as part of its IANA considerations a request that IANA create a new namespace for HIP Version Numbers, and add an entry for HIP Version 1. This specification defines HIP Version 2, so we also request an entry in this namespace for HIP Version 2, as described in this specification.
TOC |
TOC |
[I-D.ietf-hip-base] | Moskowitz, R., Nikander, P., Jokela, P., and T. Henderson, “Host Identity Protocol,” draft-ietf-hip-base-10 (work in progress), October 2007 (TXT). |
[RFC2119] | Bradner, S., “Key words for use in RFCs to Indicate Requirement Levels,” BCP 14, RFC 2119, March 1997 (TXT, HTML, XML). |
[RFC4960] | Stewart, R., “Stream Control Transmission Protocol,” RFC 4960, September 2007 (TXT). |
TOC |
[I-D.ietf-hip-nat-traversal] | Komu, M., Henderson, T., Tschofenig, H., Melen, J., and A. Keranen, “Basic HIP Extensions for Traversal of Network Address Translators,” draft-ietf-hip-nat-traversal-09 (work in progress), October 2009 (TXT). |
[I-D.ietf-hip-rvs] | Laganier, J. and L. Eggert, “Host Identity Protocol (HIP) Rendezvous Extension,” draft-ietf-hip-rvs-05 (work in progress), June 2006 (TXT). |
[I-D.matthews-p2psip-hip-hop] | Cooper, E., “A Distributed Transport Function in P2PSIP using HIP for Multi-Hop Overlay Routing,” draft-matthews-p2psip-hip-hop-00 (work in progress), June 2007 (TXT). |
[RFC0768] | Postel, J., “User Datagram Protocol,” STD 6, RFC 768, August 1980 (TXT). |
[RFC2460] | Deering, S. and R. Hinden, “Internet Protocol, Version 6 (IPv6) Specification,” RFC 2460, December 1998 (TXT, HTML, XML). |
TOC |
XingFeng Jiang | |
Huawei Technologies | |
Huihong Mansion,No.91 Baixia Rd | |
Nanjing, Jiangsu 210001 | |
P. R. China | |
Phone: | +86(25)84565462 |
Email: | jiang.x.f@huawei.com |
Philip Matthews | |
Avaya | |
100 Innovation Drive | |
Ottawa, Ontario K2K 3G7 | |
Canada | |
Phone: | +1 613 592 4343 x224 |
Email: | philip_matthews@magma.ca |
Spencer Dawkins (editor) | |
Huawei Technologies (USA) | |
1547 Rivercrest Blvd. | |
Allen, TX 75002 | |
USA | |
Phone: | +1 214 755 3870 |
Email: | spencer@mcsr-labs.org |
TOC |
Copyright © The IETF Trust (2007).
This document is subject to the rights, licenses and restrictions contained in BCP 78, and except as set forth therein, the authors retain all their rights.
This document and the information contained herein are provided on an “AS IS” basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
The IETF takes no position regarding the validity or scope of any Intellectual Property Rights or other rights that might be claimed to pertain to the implementation or use of the technology described in this document or the extent to which any license under such rights might or might not be available; nor does it represent that it has made any independent effort to identify any such rights. Information on the procedures with respect to rights in RFC documents can be found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any assurances of licenses to be made available, or the result of an attempt made to obtain a general license or permission for the use of such proprietary rights by implementers or users of this specification can be obtained from the IETF on-line IPR repository at http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any copyrights, patents or patent applications, or other proprietary rights that may cover technology that may be required to implement this standard. Please address the information to the IETF at ietf-ipr@ietf.org.