Individual Submission | B. Faria, Ed. |
Internet-Draft | Nokia Institute of Technology |
Intended status: Standards Track | B. Patil |
Expires: May 03, 2012 | G. Bajko |
Nokia | |
October 31, 2011 |
Negotiation of security protocol for Mobile IPv6 operation
draft-patil-mext-sec-negotiate-03
Mobile IPv6 has relied on IPsec and IKEv2 for securing the signaling and user traffic. A single security mechanism for Mobile IPv6 does not adequately address various deployment scenarios. The one-size-fits-all security approach is ill suited for Mobile IPv6, as different deployments have different security requirements. Multiple alternatives to securing signaling and user traffic have been proposed and are being considered for standardization. When multiple security protocols coexist for providing security for mobile IPv6 nodes, there is a need to negotiate the choice of security protocol between a mobile node and home agent a priori. This document proposes a method for negotiating the security protocol to be used between mobile IPv6 nodes.
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."
This Internet-Draft will expire on May 03, 2012.
Copyright (c) 2011 IETF Trust and the persons identified as the document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.
Mobile IPv6 has relied on IPsec and IKEv2 for securing the signaling and user traffic. A single security mechanism for Mobile IPv6 does not adequately address various deployment scenarios. The one-size-fits-all security approach is ill suited for Mobile IPv6, as different deployments need different security requirements. Multiple alternatives to securing signaling and user traffic have been proposed and are being considered for standardization. When multiple security protocols coexist for providing security for mobile IPv6 nodes, there is a need to negotiate the choice of security protocol between a mobile node and home agent a priori. This document proposes a method for negotiating the security protocol to be used between mobile IPv6 nodes based on the home agent controller (HAC) entity defined in [I-D.ietf-mext-mip6-tls].
Mobile IPv6 [RFC3775] security using IPsec and IKE is specified in [RFC3776] and [RFC4877]. A number of alternate security protocols for use by mobile IPv6 nodes have been proposed. Authentication protocol for Mobile IPv6 [RFC4285] is an example of one such. The use of such a mechanism is however restricted to networks with certain characteristics that are documented in the RFC.
More recently, other security mechanisms for use in Mobile IPv6 deployments have been proposed. Transport Layer Security-based Mobile IPv6 Security Framework for Mobile Node to Home Agent Communication [I-D.ietf-mext-mip6-tls] proposes a security solution that uses TLS between the mobile node (MN) and a home agent controller (HAC) to bootstrap Mobile IPv6 and the security protocol parameters between the MN and home agent (HA). Authorizing Mobile IPv6 Binding Update with Cryptographically Generated Addresses [I-D.laganier-mext-cga] proposes the use of CGA for securing the signaling between an MN and HA.
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119].
The terminology used in this I-D is based on the Mobile IPv6 terminology defined in [RFC3775].
Security for Mobile IPv6 signaling and user traffic can be achieved via the use of different mechanisms. At the present time the use of IPsec and IKEv2 is mandated and choice of any other security protocol does not exist. However the use of IPsec and IKE for providing security does not fit all deployments. Alternate security solutions have been proposed and could be used. The use of a security protocol by mobile IPv6 nodes should be driven by the needs and requirements of a specific deployment. An enterprise deployment of Mobile IPv6 will have a different set of security requirements as compared to a cellular operator offering mobile IPv6 service.
When Mobile IPv6 hosts have the option of choosing from multiple security protocols, there is a need to negotiate the use of a specific protocol between a mobile node and home agent prior to operation. This problem is dealt with in the scope of this draft and solutions proposed.
The home agent controller (HAC) is an entity that is defined in [I-D.ietf-mext-mip6-tls]. The HAC provides the MN with bootstrapping information of Mobile IPv6 such as assigned HA address, Home Network Prefix and MN IPv6 and/or IPv4 HoA. In addition, it assigns security parameters information to constitute the MN-HA security association. The HAC can generate IPSec SA information such as keys and SPI and provide it to the MN through the secure TLS secure connection without the use of IKEv2 for this purpose. The security association information is distributed by the HAC to the HA assigned to be used by the MN.
In the proposed solution, the HAC is the central entity which plays the role of negotiating the security protocol to be used between a mobile node and the home agent. The HAC is aware of the capabilities and security protocols of various home agents that it is associated with. An MN MUST contact the HAC to obtain the home agent and home address to use. The MN can also inform the HAC about the security protocols that it supports and can use for securing signaling and user traffic. Based on the security protocols the MN informed, the HAC will then assign the MN a valid home agent in addition to informing it of the security protocol to be used. Optionally, if the communication between the MN and the HA is to be protected by IPSec, the HAC may provide the MN and the assigned HA the relevant security parameters such as keys, SPI, ciphers etc. that constitutes an IPsec SA. The MN may be configured with the address of HACs or alternatively it may discover a HAC via DNS. This is dealt with in the [I-D.ietf-mext-mip6-tls] document.
MN HAC HA AAA | | | | |<===TLS connection====>|(1) | | | | | | |-Indicate capability-->|(2) | | | | | | | |<--Obtain profile, security-------->|(3) |<--Security protocol---|(4) | | | |--MN_ID, Sec----->|(5) | | | | | |<------Establish SA --------------------->|(6) | | | | | |<--------BU/BAck------------------------->| | | | | | | | | |
The mobile node establishes a TLS connection with the home agent controller (HAC) and exchanges a set of messages via this secure TLS tunnel to bootstrap mobile IPv6 as well as negotiate the choice of security protocol. The security protocol information is exchanged using the Request-Response messaging within the TLS secure tunnel. The signaling flow diagram below illustrates this negotiation mechanism:
This section describes the use of the proposed security negotiation protocol to negotiate the use of Authentication Protocol for MIPv6 as specified in [RFC4285]. That method can be applicable in network deployments where the home agent and home address is dynamically assigned to the mobile node and the security association is created via an out-of-band mechanism. That information is distribuited by the home agent controller via the TLS session established with the mobile node. The HAC fetches the security parameters that forms a mobility based security association from the AAA server and distribuite them to the mobile node and assigned home agent like security keys.
MN HAC HA AAA | | | | |<===TLS connection====>|(1) | | | | | | |---Indicate RFC4285--->|(2) | | | as security protocol | | | | |<--Obtain profile, security-------->|(3) |<---Set RFC4285 as --->|(4) | | | security protocol | | | | |--MN_ID, Sec----->|(5) | | | | | |<------Establish SA --------------------->|(6) | | | | | |<--------BU/BAck------------------------->| | | | | | | | | |
The mobile node establishes a TLS connection with the home agent controller and exchange a set of messages via this secure TLS tunnel to bootstrap mobile IPv6. The MN indicates the Authentication Protocol for MIPv6 as a supported security protocol. The diagram below illustrates the negotiation of Authentication Protocol for MIPv6 as the security protocol to be used:
This document does not have any IANA requests at the present time.
The signaling between the mobile node and home agent controller is secured by TLS. All the messages between the MN and HAC are tunneled within the TLS connection and hence secured. The MN and Home agent (HA) are either colocated or have a secure messaging interface between them. There exists the potential to downgrade the choice of the security protocol between an MN and HA. However the HAC chooses the security protocol to be used based on the capabilities of the MN as well as policy information from an entity such as AAA. In case the MN is incapable of more robust secure mechanisms, the HAC may assign such a home agent with limited capabilities and connectivity.
The choice of security protocols to be used in mobile IPv6 deployments increases the flexibility of the protocol and makes it viable for use in different deployment scenarios. This however does result in the need for negotiation of a security protocol to be used between the MN and HA. The capabilities of the MN and home agents available for use to an MN determine the security protocol that can be used. Use of a home agent controller provides Mobile IPv6 with a robust mechanism for bootstrapping as well negotiation the security protocol.
[I-D.ietf-mext-mip6-tls] | Korhonen, J, Patil, B, Tschofenig, H and D Kroeselberg, "Transport Layer Security-based Mobile IPv6 Security Framework for Mobile Node to Home Agent Communication", Internet-Draft draft-ietf-mext-mip6-tls-02, October 2011. |
[RFC2119] | Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997. |
[RFC3775] | Johnson, D., Perkins, C. and J. Arkko, "Mobility Support in IPv6", RFC 3775, June 2004. |
[RFC3776] | Arkko, J., Devarapalli, V. and F. Dupont, "Using IPsec to Protect Mobile IPv6 Signaling Between Mobile Nodes and Home Agents", RFC 3776, June 2004. |
[RFC4877] | Devarapalli, V. and F. Dupont, "Mobile IPv6 Operation with IKEv2 and the Revised IPsec Architecture", RFC 4877, April 2007. |
[RFC4285] | Patel, A., Leung, K., Khalil, M., Akhtar, H. and K. Chowdhury, "Authentication Protocol for Mobile IPv6", RFC 4285, January 2006. |
[I-D.laganier-mext-cga] | Laganier, J, "Authorizing Mobile IPv6 Binding Update with Cryptographically Generated Addresses", Internet-Draft draft-laganier-mext-cga-01, October 2010. |