© 2004 SafeNet, Inc. All rights reserved. Mobike Protocol Design draft-ietf-mobike-design-00.txt Tero Kivinen

Slides:



Advertisements
Similar presentations
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Advertisements

Mobile IPv6: An Overview Dr Martin Dunmore, Lancaster University.
Internet Area IPv6 Multi-Addressing, Locators and Paths.
IPv4 - IPv6 Integration and Coexistence Strategies Warakorn Sae-Tang Network Specialist Professional Service Department A Subsidiary.
1 Teredo - Tunneling IPv6 through NATs Date: Speaker: Quincy Wu National Chiao Tung University.
Enabling IPv6 in Corporate Intranet Networks
Understanding Internet Protocol
1 Address Selection, Failure Detection and Recovery in MULTI6 draft-arkko-multi6dt-failure-detection-00.txt Multi6 Design Team -- Jari Arkko, Marcelo Bagnulo,
Guide to Network Defense and Countermeasures Second Edition
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—5-1 WAN Connections Enabling the Internet Connection.
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
Network Security. Reasons to attack Steal information Modify information Deny service (DoS)
Module 5: Configuring Access for Remote Clients and Networks.
IKEv2 extension: MOBIKE Faisal Memon Erik Weathers CS 259.
© 2004 SafeNet, Inc. All rights reserved. Mobike Protocol Design draft-kivinen-mobike-design-00.txt Tero Kivinen
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
1 © 2005 Nokia mobike-transport.ppt/ MOBIKE Transport mode usage and issues Mohan Parthasarathy.
Wi-Fi Structures.
CCNA Guide to Cisco Networking Fundamentals Fourth Edition Chapter 9 Network Services.
Internet Protocol Security (IPSec)
K. Salah1 Security Protocols in the Internet IPSec.
Routing of Outgoing Packets with MP-TCP draft-handley-mptcp-routing-00 Mark Handley Costin Raiciu Marcelo Bagnulo.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
IPsec Remote Access Requirements Scott Kelly IPsec Remote Access Working Group 47th IETF.
Day15 IP Space/Setup. IP Suite of protocols –TCP –UDP –ICMP –GRE… Gives us many benefits –Routing of packets over internet –Fragmentation/Reassembly of.
Advanced Computer Networks - IAIK 1 Gsenger, Nindl, Pointner Graz, Secure Anycast Tunneling Protocol.
Mobile IP Traversal Of NAT Devices By, Vivek Nemarugommula.
Network Address Translation (NAT)
March 7, 2005MOBIKE WG, IETF 621 Mobility Protocol Options for IKEv2 (MOPO-IKE) Pasi Eronen.
Page 1 NAT & VPN Lecture 8 Hassan Shuja 05/02/2006.
Introduction to Network Address Translation
XTM Networking Tips and Tricks Carlo Alvarez Technical Trainer - APAC.
1 Design of the MOBIKE Protocol Editors: T. Kivinen H. Tschofenig.
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Routing and Routing Protocols
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 ver.2 Module 8 City College.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 11: Network Address Translation for IPv4 Routing And Switching.
© 2004 SafeNet, Inc. All rights reserved. Mobike Protocol draft-kivinen-mobike-protocol-00.txt Tero Kivinen
1 Lecture 13 IPsec Internet Protocol Security CIS CIS 5357 Network Security.
N ETWORK S ECURITY Network Address Translation. C ONTENTS What is NAT NAT Terminology How NAT works NAT translation Dynamic, static and overloading Advantages.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—1-1 Course Introduction.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—3-1 Route Selection Using Policy Controls Using Multihomed BGP Networks.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
K. Salah1 Security Protocols in the Internet IPSec.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—5-1 Customer-to-Provider Connectivity with BGP Connecting a Multihomed Customer to Multiple Service.
Chapter 5. An IP address is simply a series of binary bits (ones and zeros). How many binary bits are used? 32.
Securing Access to Data Using IPsec Josh Jones Cosc352.
CCNA4-1 Chapter 7-1 NAT Chapter 11 Routing and Switching (CCNA2)
HIP-Based NAT Traversal in P2P-Environments
LESSON Networking Fundamentals Understand IPv4.
NAT : Network Address Translation
Virtual Private Networks
Chapter 13 Network Address Translation
Network Address Translation (NAT)
Network Address Translation
SECURING NETWORK TRAFFIC WITH IPSEC
Network Address Translation (NAT)
Softwire Security Update
Introduction to Networking
IKEv2 Mobility and Multihoming Protocol (MOBIKE)
New Solutions For Scaling The Internet Address Space
CIS 82 Routing Protocols and Concepts Chapter 11 NAT
2 - IP Routing.
Chapter 11: Network Address Translation for IPv4
Mobile IP Outline Homework #4 Solutions Intro to mobile IP Operation
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Network Address Translation (NAT)
Computer Networks Protocols
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Presentation transcript:

© 2004 SafeNet, Inc. All rights reserved. Mobike Protocol Design draft-ietf-mobike-design-00.txt Tero Kivinen

© 2004 SafeNet, Inc. All rights reserved. Scenarios The design draft lists to basic scenarios, where the protocols should work o Roaming laptop scenario o Multihoming SGW scenario Those two scenarios can be combined, meaning that we have the roaming laptop on the other end and multihoming SGW on the other end

© 2004 SafeNet, Inc. All rights reserved. Roaming Laptop Scenario We have a roaming laptop with multiple connections to internet o Fixed ethernet, WLAN, GPRS etc Changes are either change of the interface, or change of the IP because of movement Connection is to the corporate SGW or similar Connection between two laptops is out of scope

© 2004 SafeNet, Inc. All rights reserved. Multihoming SGW Scenario We have the corporate SGW with multiple internet connections (from different ISPs) o Interfaces are fixed o IP addresses are mostly static Changes are because of change of used interface when one ISP used stops working The other end might be roaming laptop or similar SGW (site to site connection)

© 2004 SafeNet, Inc. All rights reserved. Basic Scenario SGW/B D E NAT A A A Internet WLAN Corporate network

© 2004 SafeNet, Inc. All rights reserved. Major Open Issues 3rd party bombing protection level Level of NAT-T and MOBIKE interaction Do we need to recover from problems that we did not hear about directly Scope of SA changes Other issues o Simultaneous movements o IPv4/IPv6

© 2004 SafeNet, Inc. All rights reserved. 3rd Party Bombing How much protection we offer against 3rd party bombing o almost none, [A-B] (IKEv2 NAT-T) o limited, [A-B and (B-C or A)] (return routability without cookies) o partial [A-B and B-C] (return routability with cookies) o Full [A inside path B-C] (authenticate outer IP- addresses, incompatible with NATs) o Terms A, B = MOBIKE hosts, C = host attacked A-B = along path between A and B B-C = along path between B and C o Do we care if A is the attacker

© 2004 SafeNet, Inc. All rights reserved. 3rd Party Bombing (cont) A B C M1 A/M3 M2

© 2004 SafeNet, Inc. All rights reserved. NATs and MOBIKE Related to 3rd party bombing issue o if we want to have full protection against 3rd party bombings, we cannot work with NATs o If we only want to use limited or partial protection then we can work through NATs o If we allow full protection to be downgraded, then attacker might force the protection to be downgraded before starting the attack => we didn't have full protection at all. Does the limited or partial protection offer that much compared to the normal IKEv2 NAT-T? Should we upgrade the protection offered by IKEv2 NAT-T to partial/limited Implicit address update is not mandated in IKEv2, it is only SHOULD

© 2004 SafeNet, Inc. All rights reserved. NAT and MOBIKE (cont) Problems with multihoming and NAT o Case 1: the host behind NAT is not multihoming and the other end is multihoming Option 1: Recovery is limited and done only by the host behind NAT. Option 2: The host behind NAT must send keepalives to all possible path combinations, and keep the mappings in NAT active all the time o Case 2: The host behind NAT is multihoming, with some of the interfaces using NAT and some not. Same problems with interfaces using NAT No problems with interfaces not using NAT, can use normal MOBIKE methods.

© 2004 SafeNet, Inc. All rights reserved. NAT-T and MOBIKE Options 1: Always use NAT-T o No multihoming in server o No protection against 3rd party bombing 2: NAT-T and MOBIKE are separate o If you move to NAT-T, just create new IKE SA which uses NAT-T o Mobike will have the active attack detector, which notices that there is NAT between. 3: NAT-T and MOBIKE are combined o Modify NAT-T and/or create combination using NAT- T and MOBIKE.

© 2004 SafeNet, Inc. All rights reserved. Combined NAT-T and MOBIKE With combined NAT-T and MOBIKE protocol we have some more questions: o Do we only allow NAT to appear only when IP- address or link status changes? o Do we want to switch back from the NAT-T to MOBIKE Save bandwidth (no UDP encapsulation) Better protection against 3rd party bombing o Attacker can force as to use NAT-T before attacking o We need to define our own NAT-T (or modify IKEv2), as IKEv2 NAT-T isn't enough for us Can only be enabled in the beginning Implicit address update is not mandatory Return routability checks not mandatory No detection of NAT disappearing

© 2004 SafeNet, Inc. All rights reserved. Recovery from Problems Which problems we try to recover o Only local problems (IP-address changes by dhcp, link goes down, network card is removed) o Also problems in the network (link breaking down somewhere along the path, routing infrastructure problems etc) o Do we need to act on information that no packets are received from other end? o Relates to the NAT-T issue, as there only initiator can fix things, thus it needs to detect problems

© 2004 SafeNet, Inc. All rights reserved. Recovery from Problems (cont) Minor issues related to this o Testing of all possible paths between hosts? o Which end starts recovery? o Do we need to know all addresses from other end?

© 2004 SafeNet, Inc. All rights reserved. Scope of SA Changes Do all IPsec SAs move along the IKE SA, or do we want to be able to set IP-addresses for each IPsec SA separately We can always simulate the moving them separately by creating multiple IKE SAs. o Those IKE SAs can be created at the same time, perhaps using the same authentication information.

© 2004 SafeNet, Inc. All rights reserved. Simultaneous Movements Real simultaneous movement where rendezvous server is needed are outside of the scope of MOBIKE. If we want recover from situations where link goes down along the path, we will see virtual simultaneous movements, i.e. both ends IP- addresses change at the same time (but to already known addresses). o The SGW will have fixed quite static set of IP- addresses, thus roaming host can know the IP- addresses of that SGW.

© 2004 SafeNet, Inc. All rights reserved. IPv4 vs IPv6 If we use tunnel mode and tunnel endpoint addresses (outer addresses) change from IPv4 to IPv6 or other way around, everything should still work. We are not discussing of changing the traffic selectors here.

© 2004 SafeNet, Inc. All rights reserved. Simplifications SGW side: o Number of IP-address and their type: Has one static global IP-address Has multiple static global IP-addresses Has one mostly static global IP-address (can be changed, but only when the link is still working) Has multiple mostly static global IP-addresses o Disallow NATs on SGW side, but allow them on other end

© 2004 SafeNet, Inc. All rights reserved. Simplifications (cont) Client side (roaming laptop side) o Allow NAT-T only when not using multihoming o Only allow one interface at time if NAT-T is used (no multiple NAT-T interfaces or non NAT-T interface at same time) (i.e. ignore other interfaces if the current one uses NAT). Recovery o If the initiator is behind NAT it takes care of recovery o Initiator takes all care of recovery always o Note Initiator == Client side (roaming laptop) in most of the cases

© 2004 SafeNet, Inc. All rights reserved. Summary There are some questions we need to answer before we can really even start designing the protocol. o 3rd Party Bombing Protection o Recovery model Answers to those will then give answer to some of the other questions