Internet DRAFT - draft-zhang-mobopts-agent-mip4rr

draft-zhang-mobopts-agent-mip4rr






Network Working Group                                           J. Zhang
Internet-Draft                                                 D. Pearce
Expires: February 11, 2006                            University of York
                                                         August 10, 2005


 Agent-Based Return Routability Test for Mobile IPv4 Route Optimization
                draft-zhang-mobopts-agent-mip4rr-00.txt

Status of this Memo

   By submitting this Internet-Draft, each author represents that any
   applicable patent or other IPR claims of which he or she is aware
   have been or will be disclosed, and any of which he or she becomes
   aware will be disclosed, in accordance with Section 6 of BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt.

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

   This Internet-Draft will expire on February 11, 2006.

Copyright Notice

   Copyright (C) The Internet Society (2005).

Abstract

   This document is to propose a more deployable route optimization
   scheme for Mobile IPv4, which is transparent to fixed IPv4 end nodes,
   and does not need any preconfigured security associations.
   Specifically, we propose to adapt the Mobile IPv6 Return Routability
   Test for Mobile IPv4 route optimization, on the basis of an agent-
   based architecture.  In order to achieve this, six new message types
   and formats are defined for Mobile IPv4.




Zhang & Pearce          Expires February 11, 2006               [Page 1]

Internet-Draft          Agent-Based RR for MIPv4             August 2005


Table of Contents

   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  3
   2.  Requirements . . . . . . . . . . . . . . . . . . . . . . . . .  4
   3.  Related Work . . . . . . . . . . . . . . . . . . . . . . . . .  4
   4.  Return Routability Test for Mobile IPv4  . . . . . . . . . . .  7
   5.  New Message Format . . . . . . . . . . . . . . . . . . . . . .  9
   6.  Security Considerations  . . . . . . . . . . . . . . . . . . . 16
   7.  IANA Considerations  . . . . . . . . . . . . . . . . . . . . . 16
   8.  References . . . . . . . . . . . . . . . . . . . . . . . . . . 17
     8.1   Normative References . . . . . . . . . . . . . . . . . . . 17
     8.2   Informative References . . . . . . . . . . . . . . . . . . 17
       Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . 17
       Intellectual Property and Copyright Statements . . . . . . . . 18





































Zhang & Pearce          Expires February 11, 2006               [Page 2]

Internet-Draft          Agent-Based RR for MIPv4             August 2005


1.  Introduction

   IP Mobility Support for IPv4, or Mobile IPv4 (MIPv4) [RFC3344], is a
   routing protocol standardized by the IETF to offer mobility functions
   for mobile hosts.  It is designed based on the top of the current
   IPv4 infrastructure, and no modifications are required in existing
   fixed hosts and routers that do not understand the protocol.  As a
   result, all datagrams destined for a Mobile Node (MN) away from home
   are still sent to its home network, and are then redirected by the
   Home Agent (HA) using the tunnelling technique to the current
   location (care-of address) of the MN.  However, datagrams sent by the
   MN are forwarded directly to its Correspondent Nodes (CNs) in normal
   cases.  This leads to the problem called triangle routing.  In some
   situation, where the ingress filtering policy needs to be tackled in
   foreign networks, datagrams sent by the MN MAY be reversed tunnelled
   to the HA by the Foreign Agent (FA) or the MN itself, and then routed
   normally from the home network to the CNs.  In both cases, datagrams
   are routed in an inefficient way, because they need to travel a
   longer path than in normal routing system.  Moreover, the home
   network and the HA may incur a big burden for processing datagrams
   when there are a large number of MNs with heavy data traffics.

   To increase the routing efficiency of MIPv4, several route
   optimization schemes have been proposed to help datagrams be routed
   directly between MNs and their CNs when they are in foreign networks.
   However, all these schemes face a security challenge, since a
   Security Association (SA) needs to be set up between the two
   communication parties before they can run any route optimization
   scheme.  Currently, there are still no standardized solutions to
   dynamically set up SAs between two random nodes in the IPv4
   infrastructure.  Manual SA configuration greatly discourages any
   MIPv4 route optimization scheme to be standardized and deployed.

   Mobility Support in IPv6, or Mobile IPv6 (MIPv6) [RFC3775], is
   another mobility support protocol designed by the IETF based on IPv6
   networks.  One of the major differences between MIPv6 and MIPv4 is
   that MIPv6 integrates route optimization support as a fundamental
   part of the standard, which is due to the expectation of a better
   support for mobility and security functions in every IPv6 node.
   Specifically, a method called Return Routability (RR) test is
   introduced to run the route optimization process between an MN and
   any CN.  Using RR, no preconfigured SA and authentication
   infrastructure are required between the MN and the CN, and the
   possibility of suffering from attacks is limited to a very low level.

   In this document, we propose to adapt the MIPv6 RR test for MIPv4
   route optimization.  Our design goal is two fold: 1) to achieve route
   optimization in MIPv4 with the same security level as that in MIPv6;



Zhang & Pearce          Expires February 11, 2006               [Page 3]

Internet-Draft          Agent-Based RR for MIPv4             August 2005


   2) to maintain the original MIPv4 design goal that mobility support
   protocol should be transparent to existing fixed nodes and ordinary
   routers.

   The structure of this paper is as follows.  First an introduction on
   some related work on route optimization is given in section 3.  Then
   our designed architecture and MIPv4 Return Routability test procedure
   are described in section 4.  Afterwards in section 5 the proposed
   message formats are presented.  Finally, security considerations and
   IANA considerations are outlined in section 6 and 7 respectively.

2.  Requirements

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in [RFC2119].

3.  Related Work

   In this section, a couple of related MIPv4 route optimization schemes
   and the MIPv6 RR test are reviewed.

   A. MIPv4 Route Optimization Extension

   Perkins et al. proposed the route optimization extension [Perki02]
   for MIPv4, which provides a means for CNs to maintain a binding cache
   for MNs in order to tunnel datagrams directly to them, bypassing
   their HA.  Basically, an MN's HA and its CNs exchange the Binding
   Update (BU) message and the Binding Acknowledgement (BAck) message to
   manage the binding cache in the CNs.  Obviously, in order to support
   this scheme, CNs MUST be modified to understand the protocol.
   Moreover, since the BU message needs to be authenticated, a
   preconfigured SA is needed between an MN's HA and a CN.  These cause
   great difficulties for wide deployment.

   B. Agent-Based MIPv4 Route Optimization

   More recently, Vadali et al. designed an agent-based MIPv4 route
   optimization scheme [Vadal01], whose key idea is to introduce
   Correspondent Agents (CAs) in networks to maintain binding caches and
   tunnel datagrams on behalf of each individual CN.  In this way, the
   route optimization function is transparent to end nodes, and hence no
   modifications are required in CNs.  In addition, a CA MAY manage the
   binding caches for a number of end nodes in the same subnet.  When
   multiple CNs in the same subnet are communicating with an MN, only
   one BU message is required to update the mobility binding, which
   reduces signalling traffics.  However, the security challenge still
   exists since it is hard to guarantee that an MN's HA shares a SA with



Zhang & Pearce          Expires February 11, 2006               [Page 4]

Internet-Draft          Agent-Based RR for MIPv4             August 2005


   any CA that it will communicate with.

   C. Mobile IPv6 Return Routability Test for Route Optimization

   In MIPv6 route optimization, a mobility option called Binding
   Authorization Data option [RFC3775] is defined to carry
   authentication data for protecting Binding Update messages.  A
   binding management key, Kbm, which can be established through the RR
   test procedure, is employed in this option.  The RR test involves
   four types of messages, which are Home Test Init (HoTI), Care-of Test
   Init (CoTI), Home Test (HoT), and Care-of Test (CoT).  The RR
   procedure can be briefly described as follows:

   Each CN holds a secret node key, or Kcn. Each CN also periodically
   generates nonces.  Each nonce is associated with a nonce index.  An
   MN initiates a RR test by sending an HoTI (usually reverse tunnelled
   using IPsec (IP Security) encapsulating security payload (ESP) to the
   HA first) and a CoTI to a CN.  Specifically, a 64-bit random number
   called the "home init cookie" is included in the HoTI, and another
   called the "care-of init cookie" is included in the CoTI by the MN.
   These cookies are to be returned by the CN in the HoT and the CoT
   respectively later, in order to verify that the HoT and the CoT match
   the HoTI and the CoTI respectively.

   On receipt of the HoTI, the CN returns an HoT, containing the home
   init cookie, home keygen token, and the index of the nonce used to
   calculate the home keygen token.  The home keygen token is
   cryptographically generated from calculating a hash function over the
   concatenation of the Kcn, the source address of the HoTI message (the
   MN's home address), and a nonce:

   home keygen token = hash (Kcn | MN's home address | nonce | 0).

   The HoT is usually sent to the MN's HA in plain text first, and then
   forwarded to the MN using the IPsec ESP tunnel.

   On receipt of the CoTI, the CN returns a CoT, containing the care-of
   init cookie, care-of keygen token, and the index of the nonce used to
   calculate the care-of keygen token.  The home keygen token is
   cryptographically generated from calculating a hash function over the
   concatenation of the Kcn, the source address of the CoTI message (the
   MN's current care-of address), and a nonce:

   care-of keygen token = hash (Kcn | MN's care-of address | nonce | 1).

   The CoT is sent directly to the MN in plain text.

   After receiving both HoT and CoT, the MN is able to create a binding



Zhang & Pearce          Expires February 11, 2006               [Page 5]

Internet-Draft          Agent-Based RR for MIPv4             August 2005


   management key (Kbm) using a hash function over the home keygen token
   and the care-of keygen token obtained:

   Kbm = hash (home keygen token | care-of keygen token).

   Then the MN can send a BU message to the CN protected by the Kbm
   contained in the Binding Authorization Data option.  Since the BU
   also contains both the MN's home address and care-of address, and the
   indices of the nonces used to generate the keygen tokens, given the
   Kcn, the CN is able to re-generate the keygen tokens, and then
   calculate the Kbm in order to authenticate the BU.  A BAck message
   may be returned by the CN in response.

   Figure 1 shows the message flow of the MIPv6 route optimization
   procedure.


        MN                          HA                            CN
         |  HoTI-Reverse Tunnelled   |   HoTI(home init cookie)    |
         |-------------------------->|---------------------------->|
         |                           |                             |
         |             CoTI(care-of init cookie)                   |
         |-------------------------------------------------------->|
         |      HoT-Tunnelled        | HoT(home init cookie,home   |
         |<--------------------------|<----------------------------|
         |                           | keygen token,nonce index)   |
         |CoT(care-of init cookie,care-of keygen token,nonce index)|
         |<--------------------------------------------------------|
         |           BU(Kbm, HoA, CoA, nonce indices)              |
         |-------------------------------------------------------->|
         |          BAck(Kbm, binding status if sent)              |
         |<--------------------------------------------------------|
         |                      data packets                       |
         |<------------------------------------------------------->|
         |                                                         |

               Figure 1. MIPv6 Route Optimization Procedure

   A successful RR test means that the node initiating the test is
   reachable at its claimed care-of address and its home address.  In
   this way, route optimization can be run without the need for
   preconfigured SAs.  Since the Kbm is available to any nodes who can
   get both the HoT and the CoT messages, the RR test can not prevent
   attacks from nodes with such capabilities.  However, these nodes can
   launch similar attacks even without the use of Mobile IPv6.






Zhang & Pearce          Expires February 11, 2006               [Page 6]

Internet-Draft          Agent-Based RR for MIPv4             August 2005


4.  Return Routability Test for Mobile IPv4

   Since currently IPv4 networks are dominant and may still be used for
   a long time, in order to overcome the obstacles to MIPv4 route
   optimization deployment as discussed in section 1, and achieve a
   similar promising situation as in MIPv6, adapting the MIPv6 RR test
   for use in MIPv4 is proposed in this section.  In this scheme, in
   order to maintain the original MIPv4 design goal that mobility
   support should be transparent to existing fixed IPv4 nodes, the
   agent-based architecture introduced in section 3.B is adopted.

   Figure 2 shows the basic considered architecture and the RR procedure
   in MIPv4.  The RR procedure is very similar to that in MIPv6, unless
   route optimization is transparent to CNs and performed using
   Correspondent Agents.  Here only the modifications needed to the
   basic MIPv4 protocol are discussed.


   MN                          HA                            CA    CN(s)
    |  HoTI-Reverse Tunnelled   |   HoTI(home init cookie)    |      |
    |-------------------------->|---------------------------->|      |
    |                           |                             |      |
    |             CoTI(care-of init cookie)                   |      |
    |-------------------------------------------------------->|      |
    |      HoT-Tunnelled        | HoT(home init cookie,home   |      |
    |<--------------------------|<----------------------------|      |
    |                           | keygen token,nonce index)   |      |
    |CoT(care-of init cookie,care-of keygen token,nonce index)|      |
    |<--------------------------------------------------------|      |
    |          RRBU(Kbm, HoA, CoA, nonce indices)             |      |
    |-------------------------------------------------------->|      |
    |          RRBA(Kbm, binding status if sent)              |      |
    |<--------------------------------------------------------|      |
    |                      data packets                       |      |
    |<------------------------------------------------------->+<---->|
    |                                                         |      |

          Figure 2. Agent-Based Return Routability Test for
                        Mobile IPv4 Route Optimization

   A. New Messages

   Four message types for the RR test need to be defined for MIPv4: the
   HoTI, CoTI, HoT and CoT.  In MIPv6, these messages are carried in the
   Mobility header.  In MIPv4, we propose to send these messages by way
   of UDP (User Datagram Protocol) packets using the well-known port
   number 434, with different type values to distinguish them from other
   mobility messages.  These message formats MUST be defined with the



Zhang & Pearce          Expires February 11, 2006               [Page 7]

Internet-Draft          Agent-Based RR for MIPv4             August 2005


   capability to contain all required data for performing the RR test
   described in section 3.C.

   In addition, two other message types for managing binding caches need
   to be defined.  In order to be distinguishable from the Binding
   Update and Binding Acknowledgement messages defined in [Perki02],
   they are called RR Binding Update (RRBU) and RR Binding
   Acknowledgement (RRBA).  These messages are also proposed to be sent
   by way of UDP (port 434), with different type values to distinguish
   from other mobility messages.  Specifically RRBU and RRBA MUST be
   defined with the capability to contain the authentication data
   (Binding Authorization Data).

   Having these six new messages, whether or not MIPv4 RR is supported
   does not affect other proposed route optimization protocols such as
   the basic MIPv4 route optimization extension [Perki02] described in
   section 3.A. This guarantees that other features (if needed)
   supported by other proposed route optimization scheme are not
   eliminated by MIPv4 RR route optimization.  For example, [Perki02]
   defines Binding Warning and Binding Request messages in order to
   managing binding caches more efficiently.

   B. Correspondent Agent Considerations

   Correspondent Agents (CAs) are used in this scheme in order to mask
   the RR and route optimization procedures from CNs.  CAs MAY be co-
   located with a gateway router of any IPv4 network that wishes to
   support the route optimization function for IPv4 mobility.

   CAs are supposed to be able to perform RR tests on behalf of each
   individual CN in their managed subnet.  Therefore, a CA MUST hold a
   secret node key (Kcn), and periodically generate nonces with indices
   for each CN.  It is responsible for refreshing the Kcn for each CN at
   any suitable time.  It MUST be able to process the HoTI and CoTI
   messages, calculate keygen tokens, and compose the HoT and CoT
   messages.  It MUST be able to process the RRBU message, verify the
   Kbm established during the RR test, and compose the RRBA message with
   correct status.

   Moreover, a CA is responsible for tunnelling datagrams from a CN that
   has a valid binding cache entry with an MN for route optimization.
   Note that a binding cache entry can only be created after receiving a
   successful RRBU from an MN after an RR test: this is different from
   the basic MIPv4 route optimization extension [Perki02], where a
   binding cache entry can be created on receiving a successful BU sent
   by an MN, its HA or even its FA, and a BU can be triggered by various
   methods determining when a binding cache entry should be set up.




Zhang & Pearce          Expires February 11, 2006               [Page 8]

Internet-Draft          Agent-Based RR for MIPv4             August 2005


   C. Home Agent Considerations

   The MIPv4 HA MUST be enhanced to be able to correctly forward the
   HoTI and HoT messages.  As mentioned earlier, the HoTI is reversed
   tunnelled from the MN to the HA and then redirected to the CN/CA; the
   HoT is sent from the CN/CA to the HA and then tunnelled to the MN.
   To protect the HoTI and HoT along the path between the HA and the MN,
   IPsec ESP tunnel mode or any other suitable protecting method is
   RECOMMENDED.

   D. Foreign Agent Considerations

   There are no particular requirements on the FA in order to support
   the MIPv4 RR route optimization.

   E. Mobile Node Considerations

   The MN MUST be able to initiate RR tests by sending the HoTI and CoTI
   messages containing the newly generated cookies at a suitable time
   (normally after a new CoA registration to the HA or whenever the MN
   needs a new keygen token).  It MUST be able to reverse tunnel the
   HoTI and de-tunnel HoT messages, optionally using a suitable
   protecting method (such as IPsec ESP tunnel mode) negotiated with its
   HA.  It MUST be able to process the HoT and CoT messages, generate
   Kbm accordingly, compose the RRBU message, and process the RRBA
   message.

5.  New Message Format

   A. MIPv4 HoTI Message Format

   The proposed MIPv4 HoTI message format is shown in Figure 3.


        0                   1                   2                   3
        0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |     Type      |                   Reserved                    |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |                                                               |
       +                      Home Init Cookie                         +
       |                                                               |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

             Figure 3. MIPv4 Home Test Init (HoTI) Message Format

   IP fields:




Zhang & Pearce          Expires February 11, 2006               [Page 9]

Internet-Draft          Agent-Based RR for MIPv4             August 2005


   o  Source Address: The MN's HoA.

   o  Destination Address: The CN's address.

   UDP fields:

   o  Source Port: Variable.

   o  Destination Port: 434.

   HoTI fields:

   o  Type: An 8-bit value that can be distinguished from other mobility
      messages.  To be defined by IANA.

   o  Reserved: A 24-bit field reserved for future use.

   o  Home Init Cookie: A 64-bit field containing the home init cookie.

   B. MIPv4 CoTI Message Format

   The proposed MIPv4 CoTI message format is shown in Figure 4.


        0                   1                   2                   3
        0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |     Type      |                   Reserved                    |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |                                                               |
       +                    Care-of Init Cookie                        +
       |                                                               |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

            Figure 4. MIPv4 Care-of Test Init (CoTI) Message Format

   IP fields:

   o  Source Address: The MN's CoA.

   o  Destination Address: The CN's address.

   UDP fields:








Zhang & Pearce          Expires February 11, 2006              [Page 10]

Internet-Draft          Agent-Based RR for MIPv4             August 2005


   o  Source Port: Variable.

   o  Destination Port: 434.

   CoTI fields:

   o  Type: An 8-bit value that can be distinguished from other mobility
      messages.  To be defined by IANA.

   o  Reserved: A 24-bit field reserved for future use.

   o  Care-of Init Cookie: A 64-bit field containing the care-of init
      cookie.

   C. MIPv4 HoT Message Format

   The proposed MIPv4 HoT message format is shown in Figure 5.


        0                   1                   2                   3
        0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |     Type      |  Reserved   |       Home Nonce Index          |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |                                                               |
       +                      Home Init Cookie                         +
       |                                                               |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |                                                               |
       +                      Home Keygen Token                        +
       |                                                               |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

               Figure 5. MIPv4 Home Test (HoT) Message Format

   IP fields:

   o  Source Address: The CN's address.

   o  Destination Address: The MN's HoA.

   UDP fields:

   o  Source Port: Variable.







Zhang & Pearce          Expires February 11, 2006              [Page 11]

Internet-Draft          Agent-Based RR for MIPv4             August 2005


   o  Destination Port: 434.

   HoT fields:

   o  Type: An 8-bit value that can be distinguished from other mobility
      messages.  To be defined by IANA.

   o  Reserved: An 8-bit field reserved for future use.

   o  Home Nonce Index: A 16-bit field containing the index of the nonce
      used to create the home keygen token.

   o  Home Init Cookie: A 64-bit field containing the home init cookie.

   o  Home Keygen Token: A 64-bit field containing the home keygen
      token.

   D. MIPv4 CoT Message Format

   The proposed MIPv4 CoT message format is shown in Figure 6.


        0                   1                   2                   3
        0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |     Type      |  Reserved   |      Care-of Nonce Index        |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |                                                               |
       +                    Care-of Init Cookie                        +
       |                                                               |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |                                                               |
       +                    Care-of Keygen Token                       +
       |                                                               |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

              Figure 6. MIPv4 Care-of Test (CoT) Message Format

   IP fields:

   o  Source Address: The CN's address.

   o  Destination Address: The MN's CoA.

   UDP fields:






Zhang & Pearce          Expires February 11, 2006              [Page 12]

Internet-Draft          Agent-Based RR for MIPv4             August 2005


   o  Source Port: Variable.

   o  Destination Port: 434.

   CoT fields:

   o  Type: An 8-bit value that can be distinguished from other mobility
      messages.  To be defined by IANA.

   o  Reserved: An 8-bit field reserved for future use.

   o  Care-of Nonce Index: A 16-bit field containing the index of the
      nonce used to create the care-of keygen token.

   o  Care-of Init Cookie: A 64-bit field containing the care-of init
      cookie.

   o  Care-of Keygen Token: A 64-bit field containing the care-of keygen
      token.

   E. MIPv4 RRBU Message Format

   The proposed MIPv4 RRBU message format is shown in Figure 7.


        0                   1                   2                   3
        0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |     Type      |A|M|G|Reserved |           Lifetime            |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |       Home Nonce Index        |      Care-of Nonce Index      |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |                       MN Home Address                         |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |                     MN Care-of Address                        |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |                                                               |
       +                        Identification                         +
       |                                                               |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |                                                               |
       +                                                               +
       |                        Authenticator                          |
       +                                                               +
       |                                                               |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

           Figure 7. MIPv4 Return Routability Binding Update (RRBU)



Zhang & Pearce          Expires February 11, 2006              [Page 13]

Internet-Draft          Agent-Based RR for MIPv4             August 2005


                                   Message Format

   IP fields:

   o  Source Address: The MN's CoA.

   o  Destination Address: The CN's address.

   UDP fields:

   o  Source Port: Variable.

   o  Destination Port: 434.

   RRBU fields:

   o  Type: An 8-bit value that can be distinguished from other mobility
      messages.  To be defined by IANA.

   o  A: The 'A' bit is set when an RRBA is required in response to the
      RRBU.

   o  M: The 'M' bit is set when datagrams may be tunnelled to the MN
      using the minimal encapsulation protocol [RFC2004].

   o  G: The 'G' bit is set when datagrams may be tunnelled to the MN
      using Generic Routing Encapsulation (GRE) [RFC1702].

   o  Reserved: 5-bit field reserved for future use.

   o  Lifetime: A 16-bit field containing the number of seconds left
      before the binding cache entry MUST be considered expired.  A
      value of zero means that the binding (if exists) for the MN MUST
      be deleted.

   o  Home Nonce Index: A 16-bit field containing the index of the nonce
      used to create the home keygen token.

   o  Care-of Nonce Index: A 16-bit field containing the index of the
      nonce used to create the care-of keygen token.

   o  MN Home Address: The MN's HoA.

   o  MN care-of address: The MN's current CoA.  When it is set equal to
      the MN's HoA, it means that the binding (if any exists) for the MN
      MUST be deleted.





Zhang & Pearce          Expires February 11, 2006              [Page 14]

Internet-Draft          Agent-Based RR for MIPv4             August 2005


   o  Identification: A 64-bit number used by the receiving node to
      sequence RRBUs and by the sending node to match returned RRBAs.

   o  Authenticator: The 96-bit Binding Authorization Data.  The
      calculation method of the authenticator is the same as that in
      MIPv6, except that the data input to the hash function are the
      Kbm, and the RRBU data excluding the authenticator field itself.

   E. MIPv4 RRBA Message Format

   The proposed MIPv4 RRBA message format is shown in Figure 8.


        0                   1                   2                   3
        0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |     Type      |           Reserved            |    Status     |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |                       MN Home Address                         |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |                                                               |
       +                        Identification                         +
       |                                                               |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |                                                               |
       +                                                               +
       |                        Authenticator                          |
       +                                                               +
       |                                                               |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

           Figure 8. MIPv4 Return Routability Binding Acknowledgement
                                (RRBA) Message Format

   IP fields:

   o  Source Address: The CN's address.

   o  Destination Address: The MN's CoA.

   UDP fields:

   o  Source Port: Variable.








Zhang & Pearce          Expires February 11, 2006              [Page 15]

Internet-Draft          Agent-Based RR for MIPv4             August 2005


   o  Destination Port: 434.

   RRBU fields:

   o  Type: An 8-bit value that can be distinguished from other mobility
      messages.  To be defined by IANA.

   o  Reserved: A 16-bit field reserved for future use.

   o  Status: An 8-bit field containing the value indicating the status
      of the responded RRBU.  The value of zero indicates the success of
      an RRBU.  Otherwise, 8 other values are to be defined to indicate
      various failure status: "reason unspecified", "administratively
      prohibited", "insufficient resources", "sending node failed
      authentication", "poorly formed RRBU", "expired home nonce index",
      "expired care-of nonce index", and "expired nonces".

   o  MN Home Address: The MN's HoA.

   o  Identification: A 64-bit number copied from the identification
      field of the responded RRBU.

   o  Authenticator: The 96-bit Binding Authorization Data.  The
      calculation method of the authenticator is the same as that in
      MIPv6, except that the data input to the hash function are the
      Kbm, and the RRBA data excluding the authenticator field itself.

6.  Security Considerations

   The proposed MIPv4 RR test cannot prevent attacks from nodes who can
   receive both the HoT and CoT messages: this provides the same
   security level as the MIPv6 RR test.  However, nodes with this
   capability can launch similar attacks even without the use of MIPv4
   RR test.

   Due to the inherent security vulnerabilities of the RR test, a number
   of enhancing schemes have been proposed in the IRTF recently.  Many
   of these enhancement schemes could possibly be adapted for use in the
   MIPv4 RR test in a similar way in the future.

7.  IANA Considerations

   IANA should record the values for the newly defined MIPv4 messages
   described in section 5, in order to distinguished them from other
   mobility messages.

8.  References




Zhang & Pearce          Expires February 11, 2006              [Page 16]

Internet-Draft          Agent-Based RR for MIPv4             August 2005


8.1  Normative References

   [RFC1702]  Hanks, S., Li, T., Farinacci, D., and P. Traina, "Generic
              Routing Encapsulation over IPv4 networks", RFC 1702,
              October 1994.

   [RFC2004]  Perkins, C., "Minimal Encapsulation within IP", RFC 2004,
              October 1996.

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119, March 1997.

   [RFC3344]  Perkins, C., "IP Mobility Support for IPv4", RFC 3344,
              August 2002.

   [RFC3775]  Johnson, D., Perkins, C., and J. Arkko, "Mobility Support
              in IPv6", RFC 3775, June 2004.

8.2  Informative References

   [Perki02]  Perkins, C. and D. Johnson, "Route Optimization in Mobile
              IP", draft-ietf-mobileip-optim-11.txt , April 2002.

   [Vadal01]  Vadali, R., Li, J., Wu, Y., and G. Cao, "Agent-Based Route
              Optimization for Mobile IP", IEEE VTC, October 2001.


Authors' Addresses

   Ji Zhang
   Communications Research Group, University of York.
   Heslington
   York  YO10 5DD
   United Kingdom

   Phone: +44 1904 432310
   Email: jz105@ohm.york.ac.uk


   David Pearce
   Communications Research Group, University of York.
   Heslington
   York  YO10 5DD
   United Kingdom

   Phone: +44 1904 432390
   Email: dajp1@ohm.york.ac.uk




Zhang & Pearce          Expires February 11, 2006              [Page 17]

Internet-Draft          Agent-Based RR for MIPv4             August 2005


Intellectual Property Statement

   The IETF takes no position regarding the validity or scope of any
   Intellectual Property Rights or other rights that might be claimed to
   pertain to the implementation or use of the technology described in
   this document or the extent to which any license under such rights
   might or might not be available; nor does it represent that it has
   made any independent effort to identify any such rights.  Information
   on the procedures with respect to rights in RFC documents can be
   found in BCP 78 and BCP 79.

   Copies of IPR disclosures made to the IETF Secretariat and any
   assurances of licenses to be made available, or the result of an
   attempt made to obtain a general license or permission for the use of
   such proprietary rights by implementers or users of this
   specification can be obtained from the IETF on-line IPR repository at
   http://www.ietf.org/ipr.

   The IETF invites any interested party to bring to its attention any
   copyrights, patents or patent applications, or other proprietary
   rights that may cover technology that may be required to implement
   this standard.  Please address the information to the IETF at
   ietf-ipr@ietf.org.


Disclaimer of Validity

   This document and the information contained herein are provided on an
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
   ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
   INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
   INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.


Copyright Statement

   Copyright (C) The Internet Society (2005).  This document is subject
   to the rights, licenses and restrictions contained in BCP 78, and
   except as set forth therein, the authors retain all their rights.


Acknowledgment

   Funding for the RFC Editor function is currently provided by the
   Internet Society.




Zhang & Pearce          Expires February 11, 2006              [Page 18]