Internet DRAFT - draft-wan-netlmm-pmip6-bootstrapping
draft-wan-netlmm-pmip6-bootstrapping
Network Working Group C. Wan
Internet-Draft Southeast University
Expires: January 21, 2008 C. Ye
W. Yan
Y. Pan
Huawei Technologies
July 20, 2007
The bootstrapping for Proxy mobile IPv6
draft-wan-netlmm-pmip-bootstrapping-00.txt
Status of this Memo
By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on January 21, 2008.
Copyright Notice
Copyright (C) The Internet Society (2007).
Abstract
Proxy Mobile IPv6 (PMIP) describes a protocol that is based on
network mobility management. Before the network provides service for
the mobile node, there exists a mechanism that the Mobile Access
Gateway gets a home agent address and a home address and establishes
IPsec security association with the mobile node's home agent. This
Wan, et al. Expires January 21, 2008 [Page 1]
Internet-Draft PMIP Bootstrapping July 2007
document addresses this problem.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 4
3. Goals . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
4. Protocol operations . . . . . . . . . . . . . . . . . . . . . 5
4.1. Authentication . . . . . . . . . . . . . . . . . . . . . . 5
4.2. Home agent address discovery . . . . . . . . . . . . . . . 6
4.2.1. Pre-configuration . . . . . . . . . . . . . . . . . . 6
4.2.2. DNS lookup . . . . . . . . . . . . . . . . . . . . . . 6
4.2.3. Dynamic home agent address discovery . . . . . . . . . 7
4.3. IPsec Security Associations setup . . . . . . . . . . . . 7
4.4. Home Address assignment . . . . . . . . . . . . . . . . . 9
4.4.1. Pre-configuration . . . . . . . . . . . . . . . . . . 9
4.4.2. Auto-configuration by the Mobile Access Gateway . . . 10
4.4.3. Assignment by the home agent . . . . . . . . . . . . . 10
5. Handover . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
6. Security Considerations . . . . . . . . . . . . . . . . . . . 11
7. IANA Consideration . . . . . . . . . . . . . . . . . . . . . . 11
8. References . . . . . . . . . . . . . . . . . . . . . . . . . . 11
8.1. Normative References . . . . . . . . . . . . . . . . . . . 11
8.2. Informative References . . . . . . . . . . . . . . . . . . 12
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 13
Intellectual Property and Copyright Statements . . . . . . . . . . 14
Wan, et al. Expires January 21, 2008 [Page 2]
Internet-Draft PMIP Bootstrapping July 2007
1. Introduction
Mobile IPv6 (MIPv6) [RFC3775] specifies a localized mobility
management mechanism for mobile IPv6 node. It requires the mobile
node to know its home agent address, its home address for setting up
IPsec security association between the mobile node and its home agent
in order to protect mobile IPv6 signaling
[draft-ietf-mip6-bootstrapping-split-04]. It also requires
cryptographic materials between the mobile node and its home agent or
between the mobile node and AAA server to set up such a security
association. These cryptographic materials may be pre-configured in
the mobile node, the home agent or AAA server, which are used to set
up the security association between the mobile node and its home
agent.
Proxy Mobile IPv6 (PMIP) [draft-ietf-netlmm-proxymip6-01.txt],
however, describes a protocol that is based on network mobility
management. To provide mobility support to any IPv6 host within a
restricted and topologically localized portion of the network and
without requiring the participation of the host, proxy mobile IP
(PMIP) introduces a new function entity, the Mobile Access Gateway
(MAG), which performs mobile IPv6 signaling message on behalf of
mobile node.
Proxy mobile IPv6 requires the Mobile Access Gateway to send proxy
mobile signaling to the home agent on behalf of the mobile node.
That is, proxy mobile signaling is between the Mobile Access Gateway
and the mobile node's home agent. Therefore, the IPsec security
association should be set up between the Mobile Access Gateway and
the mobile node's home agent in order to protect the proxy mobile
signaling. IPsec Security association setup in proxy mobile IPv6
domain is different from security association setup in mobile IPv6
domain; in mobile IPv6, the security association is between the
mobile node and its home agent and it may be established during the
mobile node's bootstrapping. In proxy mobile IPv6, the security
association is between the Mobile Access Gateway and the mobile
node's home agent, so when the mobile node roams from a Mobile Access
Gateway to another, the IPsec security association may need to be re-
established.
As described above, in the mobile IPv6, cryptographic materials may
be configured between the mobile node and AAA server, or between the
mobile node and its home agent. During IKEv2 [IKEv2] exchange, the
mobile node can use these cryptographic materials to authenticate the
mobile node to the home agent or AAA server. However in proxy mobile
IPv6, to set up such a security association, it is little value to
pre-configure cryptographic materials between the Mobile Access
Gateway and the home agent or between the Mobile Access Gateway and
Wan, et al. Expires January 21, 2008 [Page 3]
Internet-Draft PMIP Bootstrapping July 2007
the AAA server.
This document describes a solution on bootstrapping under PMIP domain
including home agent discovery, home address assignment and IPsec
security association setup etc.
2. Terminology
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in BCP 14 RFC2119.
[STANDARDS]
Local Mobility Anchor (LMA):
Local Mobility Anchor is the home agent for the mobile node in the
Proxy Mobile IPv6 domain. It is the topological anchor point for
the mobile node's home prefix and is the entity that manages the
mobile node's reachability state. It is important to understand
that the LMA has the functional capabilities of a home agent as
defined in Mobile IPv6 base specification [RFC-3775] and with the
additional required capabilities for supporting Proxy Mobile IPv6
as defined in [draft-ietf-netlmm-nohost-req-05.txt].
Mobile Access Gateway (MAG):
Mobile Access Gateway (MAG) is the proxy mobility agent in the
network which manages the mobility related signaling for a mobile
node that is attached to its access link. It is the entity
responsible for tracking the mobile node's attachment to the link
and for signaling the mobile node's local mobility anchor.
Mobile Node (MN):
TThis document uses the term mobile node to refer to an IPv6 host.
This specification does not require the mobile node to have the
Mobile IPv6 client stack.
AAA:
Authentication, Authorization, and Accounting, AAA protocols with
EAP support include RADIUS [RFC3579] and Diameter [DIAM-EAP]. In
this document, the terms "AAA server" and "backend authentication
server" are used interchangeably.
Wan, et al. Expires January 21, 2008 [Page 4]
Internet-Draft PMIP Bootstrapping July 2007
3. Goals
The goals for this document are listed below:
To authenticate mutually between the mobile node and AAA server. The
Mobile Access Gateway gets the mobile node's profile in security from
AAA server. The Mobile Access Gateway knows if it performs the proxy
mobile signaling on behalf of the mobile node based on the mobile
node's profile. And also, a shared key is generated between the
Mobile Access Gateway and AAA server so that it can be used to set up
the IPsec security association between the Mobile Access Gateway and
the home agent.
To establish the security association between the Mobile Access
Gateway and the home agent (HA-MAG SA), for the Mobile Access Gateway
performs the proxy mobile signaling on behalf of the mobile node, the
HA-MAG SA is used to protect the proxy mobile signalings, such as
Proxy Binding Update and Proxy Binding Acknowledgment, between the
Mobile Access Gateway and the home agent. IKEv2 may be used to
establish such a security association.
To discovery the home agent address. The Mobile Access Gateway needs
to discovery the home address. Three methods are introduced for
discovering the home agent address in this document, pre-
configuration, DNS lookup and Dynamic Home Agent Address Discovery
(DHAAD). The Mobile Access Gateway can obtain the home agent address
by pre-configuration, but it is little value for the PMIP scale
deployment to get the home agent address by pre-configuration. So it
is recommended to dynamically obtain the home agent address (e.g.
DNS lookup and DHAAD).
To get the mobile node's HoA. The PMIP specification supports that
the home agent traffics data packets based on the home address. The
Mobile Access Gateway can get the home address from the mobile's
profile. The home address can also be assigned by the home address
or the Mobile Access Gateway during the IKE exchange of the
bootstrapping.
4. Protocol operations
4.1. Authentication
The access authentication is the first step where EAP and AAA
protocol may be involved in this process. Once the mobile node boots
up, it should send an identifier (e.g. NAI) to the Mobile Access
Gateway to get network attachment. Upon receiving the identifier,
the Mobile Access Gateway exchanges information with AAAH using AAA
Wan, et al. Expires January 21, 2008 [Page 5]
Internet-Draft PMIP Bootstrapping July 2007
protocol (e.g. RADIUS, Diameter). During authentication, EAP method
(for instance, EAP-TLS) [EAP-TLS] may be used for the mutual
authentication between the mobile node and AAA server and also for
generating MSK and EMSK if the PSK is not used. After authenticating
successfully, the AAAH sends the authentication successful result to
the mobile node via the Mobile Access Gateway and authorizes that the
mobile node can access the proxy mobile IPv6 network. And also the
AAAH sends the mobile node's profile to the Mobile Access Gateway so
that the Mobile Access Gateway see if it must perform proxy mobile
signaling on behalf of the mobile node.
According to [EAP], EAP method generates MSK and EMSK. MSK is
derived between the EAP peer and server and can be used to generate
other hierarchy level key while EMSK is never shred with a third
party and may be used for other AAA keys [EAP-KMF]. In this
document, a shared key which will be used for establishing IPsec SA
is generated between the mobile node and AAA server based on the EMSK
as a result of access authentication. AAA server delivers the shared
key to the Mobile Access Gateway so that the Mobile Access Gateway
can use it during establishing the IPsec security association between
the proxy mobile node and the home agent.
4.2. Home agent address discovery
Typically, after successful access authentication, the Mobile Access
Gateway obtains the mobile's profile which stores the mobile node's
information and parameters. Depending on these parameters and the
mobile node's information, the Mobile Access Gateway decides how to
obtain the mobile node's home agent address during the bootstrapping.
How a Mobile Access Gateway obtains the mobile node's home agent when
the mobile node roams from a Mobile Access Gateway to another is out
of scope in this document.
4.2.1. Pre-configuration
If the home agent address information is pre-configured in the mobile
node's profile, the Mobile Access Gateway can obtain the home agent
address from the profile after access authentication. In [PMIP], it
is recommended to pre-configure the mobile node's home agent
information in the mobile node's profile, where the Mobile Access
Gateway can obtain it after access authentication.
4.2.2. DNS lookup
Sometimes, however, there is not the home agent address information
but the domain name of the Mobility Service Provider in the mobile
node's profile. In this case, the Mobile Access Gateway can obtain
the information on Home Agent service from the DNS server whose
Wan, et al. Expires January 21, 2008 [Page 6]
Internet-Draft PMIP Bootstrapping July 2007
address can be pre-configured on the profile or obtained through
DHCPv6 [DHCP] from the visited link.
DNS lookup method may obtain the mobile node's home agent address by
Home Agent Name or by service name. In the former, the Mobile Access
Gateway obtains the Fully Qualified Domain Name of the Home Agent
from the mobile node's profile. The Mobile Access Gateway sends a
user request message with setting the QNAME to the name of the Home
Agent and the QTYPE to 'AAAA' (indicating a IPv6 address) and QCLASS
to 'IN' to DNS server. On receiving the response to the user request
message from the DNS server, the proxy mobile node obtains its home
agent from the ANSWER of response message.
In the later, the Mobile Access Gateway obtains service name from the
mobile node's profile. The Mobile Access Gateway sends a request
message with setting the QNAME to the name of service name and the
QTYPE to 'SRV' or 'HA'. According to different QTYPE, DNS server
will return a different the list of home agent. If QTYPE is 'SRV',
DNS server will return a list of service name which includes home
agents of this domain. The Mobile Access Gateway is responsible for
choosing a proper home agent based on the preference and weight
values of the DNS SRV record. There is a little different between
using SRV and HA. When setting QTYPE to 'HA', the DNS server only
returns a list of pure home agent and the 'HA' record must be pre-
established. Establishing such a 'HA' record is out of the scope in
this document. To avoid additionally requiring, it is recommended
that the IP addresses of home agents should be included in AAAA
records.
4.2.3. Dynamic home agent address discovery
If there is an unique Home Agent in home link, Dynamic Home Agent
Address Discovery is also a recommended way to get the mobile node's
home agent address. The Mobile Access Gateway can use Dynamic Home
Agent Address Discovery scheme to discover the home agent address.
In this case, the Mobile Access Gateway sends an ICMP Home Agent
Address Discovery Request message to the Mobile IPv6 Home Agent
anycast address for its home IP subnet prefix. Upon receiving Home
Agent Address Discovery Request message, the home agent should return
an ICMP Home Agent Address Discovery Reply message to the Mobile
Access Gateway with the source address of the Reply packet set to one
of its global unicast addresses. The further details of Dynamic Home
Agent Address Discovery may be found in [RFC3775].
4.3. IPsec Security Associations setup
Before the Mobile Access Gateway sends proxy mobile signaling, a/some
security association(s) must be established to protect the proxy
Wan, et al. Expires January 21, 2008 [Page 7]
Internet-Draft PMIP Bootstrapping July 2007
mobile signaling. In proxy mobile domain, there is actual mobile
signaling between the Mobile Access Gateway and the home agent, so an
IPsec SA should be established between the Mobile Access Gateway nd
the home agent. As described above, however, Proxy mobile IPv6
requires that the Mobile Access Gateway (MAG) performs the mobile
IPv6 signaling which is also called Proxy Mobile IPv6 Signaling on
behalf of the mobile node. Typically, the HA-MAG IPsec security
association (SA) is established after the access authentication by
using IKEv2 or other mechanisms to protect the Proxy Binding Update
and Proxy Binding Acknowledgment messages between the Mobile Access
Gateway and the home agent.
If there is a SA which is used for PMIP signaling between the MAG and
the LMA before the MN connects to the MAG, the MAG MUST not re-
establish a SA between them . If not, typically, the Mobile Access
Gateway initiates an IKEv2 exchange. If a shared key is pre-
configured between the Mobile Access Gateway and the home agent, the
Mobile Access Gateway may use the key for mutual authentication
[IEKv2]. Figure 1 shows the message flow under the case. In message
3 and 4, the option AUTH value is computed as:
AUTH = prf(prf(Shared key, "Key Pad for IKEv2"), <msg>)
Where shared key is the shared key pre-configured.
Initiator (the MAG) Responder (the HA,LMA)
----------- -----------
(1)HDR, SAi1, KEi, Ni-->
<-- HDR, SAr1, KEr, Nr, [CERTREQ](2)
(3)HDR, SK {AUTH} -->
<-- HDR, SK {AUTH, SAr2, TSi, TSr }(4)
Figure 1 the flow of IKEv2 exchange using shared key
However, it is a little advantageous for PMIP scale deployment to
have pre-shared secure previously between the proxy agent and the
home agent. Additionally, the MAG serving the mobile may be
different when the mobile node bootstraps every time. So it is
strongly recommended that shared authentication materials should be
generated during access authentication so that they can be used for
authentication during IKEv2 exchange. After access authentication,
the shared authentication materials can be generated and stored in
the Mobile Access Gateway and AAA server. The IKEv2 exchange may use
EAP methods defined in RFC 3748 [EAP]. If these methods may not
mutual and only can be used to authenticate the initiator to the
responder EAP, they must be used in conjunction with a public key
Wan, et al. Expires January 21, 2008 [Page 8]
Internet-Draft PMIP Bootstrapping July 2007
signature based authentication of the responder to the initiator.
Figure 2 shows the message flow under the case.
Initiator (the MAG) Responder (the HA)
----------- -----------
(1)HDR, SAi1, KEi, Ni -->
<-- HDR, SAr1, KEr, Nr, [CERTREQ](2)
--------------------- EAP exchange ---------------------
(3)HDR, SK {IDi, [CERTREQ,] [IDr,]
SAi2, TSi, TSr} -->
<-- HDR, SK {IDr, [CERT,] AUTH, EAP }(4)
.
.
.
(5)HDR, SK -->
<-- HDR, SK {EAP (success)}(6)
--------------------------------------------------------
(7)HDR, SK {AUTH} -->
<-- HDR, SK {AUTH, SAr2, TSi, TSr }(8)
Figure 2 the flow of IKEv2 exchange using EAP
The home agent will only perform DAD for the home address when the
Mobile Access Gateway has supplied a valid binding if there is
Shared-Prefix model. If DAD fails, the home agent should rejects the
Binding Update and send a Binding Acknowledgement with status 134 to
indicate DAD fails. Upon receiving the Binding Acknowledgement, the
Mobile Access Gateway must terminate the IKE_AUTH exchange and then
initiates a new IKE_SA_INIT and IKE_AUTH exchange. When DAD fails, a
new home address should also be generated by the home agent as
described in section 4.4.3 of this document.
4.4. Home Address assignment
Before running the proxy mobile, the Mobile Access Gateway should
also get the mobile node's home address. The Mobile Access Gateway
can obtain the home address from the mobile node's profile after
access authentication, where the home address is pre-configured. The
Mobile Access Gateway can also dynamically get the home address
during the IKEv2 exchange.
4.4.1. Pre-configuration
The home address information is configured previously in the mobile's
Wan, et al. Expires January 21, 2008 [Page 9]
Internet-Draft PMIP Bootstrapping July 2007
profile. After access authentication, the Mobile Access Gateway gets
the home agent from the mobile's profile. It is valuable for the
mobile's roam in the proxy MIP domain to pre-configure the home
address. However, the method of pre-configuring the home address is
disadvantage for the scale deployment of PMIP. It is recommended to
dynamically obtain the mobile's home address in this document.
4.4.2. Auto-configuration by the Mobile Access Gateway
The Mobile Access Gateway can auto-configure a home address for the
mobile node by the exchange with the home agent. First, the Mobile
Access Gateway gets the mobile's home prefix and the home prefix
length from the mobile's profile and the others. Once getting the
home prefix information, the Mobile Access Gateway generates a home
address based on the home prefix and sends the home agent to the home
agent in a Configuration Payload where CFG Type is set to CFG_REQUEST
and Attribute Type is set to INTERNAL_IP6_ADDRESS. If the home agent
determines that the home address provided by the Mobile Access
Gateway is valid, it has response to the request including an
INTERNAL_IP6_ADDRESS with the same address. If the home address is
not valid, the home agent must assign a different home address for
the mobile and sends the new address which is included in
INTERNAL_IP6_ADDRESS attribute to the Mobile Access Gateway. Upon
receiving the address, the Mobile Access Gateway must use the newly
assigned home address.
4.4.3. Assignment by the home agent
The Mobile Access Gateway can dynamically configure a home address by
including a Configuration Payload in the IKE_AUTH exchange, with a
request for an address from the home link [IKE-MIP]. During IKEv2
exchange, the Mobile Access Gateway may request a home address by
sending Configuration Payload with setting CFG Type to CFG_REQUEST
and Attribute Type to INTERNAL_IP6_ADDRESS. Further, if the Mobile
Access Gateway wants to get multiple home addresses, it may include
multiple instances of the INTERNAL_IP6_ADDRESS. On receiving the
request message, the home agent allocates a home address and returns
the home address which is included Configuration Attributes to the
Mobile Access Gateway. The home agent may use a local database or
contact a DHCPv6 server on the home link to allocate a home address.
In case the home agent is unable to allocate a home address for the
mobile node during the IKE_AUTH exchange, it MUST send a Notify
Payload with an NTERNAL_ADDRESS_FAILURE message. When the Mobile
Access Gateway receives a Notify Payload with an
INTERNAL_ADDRESS_FAILURE message, it should try to auto-configure a
home address as described in section 4.4.2 of this document.
Wan, et al. Expires January 21, 2008 [Page 10]
Internet-Draft PMIP Bootstrapping July 2007
5. Handover
In Proxy MIP domain, a new MAG MUST get neccessary mobile parameters
when the MN moves from current MAG to the new MAG. It is recommended
to use MN's policy profile to get these parameters in [PMIP].
However, it is disadvantageous for PMIP scale deployment to use the
method.
This document recommends that the MAG gets the MN's neccessary
parameters by using other methods, for example, the MAG can get MN's
parameters from the MN during access authentication, where these
paratmeters can be provided by notification[EAP-Noti]. The method
using notification can reduce the handover latency .
6. Security Considerations
During access authentication, AAA server may generate a shared key
which will be used for the IKEv2 exchange. If EAP is used for mutual
authentication between the Mobile Access Gateway and the home agent,
the AAA server must push the shared key to the Mobile Access Gateway.
It is assumes there is a pre-established Security association (PSA)
between the Mobile Access Gateway and AAA server for protecting the
shared key distribution [Sec-Mobile]. The PSA establishment is out
of scope for security considerations.
During IKEv2 exchange, the Mobile Access Gateway gets the home
address and home agent address. Security considerations for
obtaining the two addresses can be found in [IKE-MIP6] and [BT-
MIPv6]. This document has never introduced a new security threat.
7. IANA Consideration
This document does not require any actions by IANA.
8. References
8.1. Normative References
[DHCP] Droms, R., "DNS Configuration options for Dynamic Host
Configuration Protocol for IPv6 (DHCPv6)", Dec. 2003.
[DIAM-EAP]
Eronen, P., Hiller, T., and G. Zorm, "Diameter Extensible
Authentication Protocol (EAP) Application", Feb. 2004.
Wan, et al. Expires January 21, 2008 [Page 11]
Internet-Draft PMIP Bootstrapping July 2007
[EAP-Noti]
Pan, Y., Li, C., and C. Ye, "Transmission MIPv6
Authorization and Configuration Info By EAP Notification
Message", July 2007.
[EAP-TLS] Aboba, B. and D. Simon, "PPP EAP TLS Authentication
Protocol", Oct. 1999.
[IKE-MIP6]
Devarapalli, V., "Mobile IPv6 Operation with IKEv2 and the
revised IPsec Architecture", Dec 2006.
[IKEv2] Kaufman, C., "Internet Key Exchange (IKEv2) Protocol",
Jan 2004.
[RFC3579] Aboba, B. and P. Calhoun, "RADIUS (Remote Authentication
Dial In User Service) Support For Extensible
Authentication Protocol (EAP)", Sep. 2003.
[RFC3775] Johnson, D., Perkins, C., and J. Arkko, "Mobility Support
in IPv6", June 2004.
[draft-ietf-mip6-bootstrapping-split-04]
Giaretta, G., "Mobile IPv6 bootstrapping in split
scenario", Oct 2006.
[draft-ietf-netlmm-proxymip6-01.txt]
Leung, K., Devarapalli, V., and K. Chowdhury, "Proxy
Mobile IPv6", Jan 2007.
8.2. Informative References
[STANDARDS]
Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", Oct 1997,
<ftp://ftp.isi.edu/in-notes/rfc2119.txt>.
[Sec-Mobile]
Nakhjiri, madjid. and Mahsa. Nakhjiri, "AAA and network
security for mobile access: radius, diameter, EAP, PKI and
IP mobility", Jan 2005.
[draft-ietf-netlmm-nohost-req-05.txt]
Kempf, J., Leung, K., Roberts, P., Nishida, K., Giaretta,
G., and M. Liebsch, "Goals for Network-based Localized
Mobility Management", Oct 2006.
Wan, et al. Expires January 21, 2008 [Page 12]
Internet-Draft PMIP Bootstrapping July 2007
Authors' Addresses
Chagnsheng Wan
Southeast University
department of information science and engineering ,Southeast University.
Nanjing, China 210096
Phone:
Fax:
Email: wanchangsheng@ustc.edu
URI:
Chengping Ye
Huawei Technologies
Site A,Floor 10,HuiHong Mansion,No.91 BaiXia Rd.
Nanjing, China 210009
Phone: +86-25-84565458
Email: yechengping@huawei.com
Wei Yan
Huawei Technologies
Site A,Floor 10,HuiHong Mansion,No.91 BaiXia Rd.
Nanjing, China 210009
Phone: +86-25-84565458
Email: peteryan@huawei.com
Yunbo Pan
Huawei Technologies
Site A,Floor 10,HuiHong Mansion,No.91 BaiXia Rd.
Nanjing, 210009
China
Phone: +86-25-84565456
Email: panyunbo@huawei.com
Wan, et al. Expires January 21, 2008 [Page 13]
Internet-Draft PMIP Bootstrapping July 2007
Full Copyright Statement
Copyright (C) The IETF Trust (2007).
This document is subject to the rights, licenses and restrictions
contained in BCP 78, and except as set forth therein, the authors
retain all their rights.
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Intellectual Property
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Acknowledgment
Funding for the RFC Editor function is provided by the IETF
Administrative Support Activity (IASA).
Wan, et al. Expires January 21, 2008 [Page 14]