MIP6 Working Group V. Devarapalli Internet-Draft Nokia Expires: August 24, 2005 February 20, 2005 Mobile IPv6 Operation with IKEv2 and the revised IPsec Architecture draft-ietf-mip6-ikev2-ipsec-01.txt Status of this Memo This document is an Internet-Draft and is subject to all provisions of Section 3 of RFC 3667. By submitting this Internet-Draft, each author represents that any applicable patent or other IPR claims of which he or she is aware have been or will be disclosed, and any of which he or she become aware will be disclosed, in accordance with RFC 3668. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt. The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html. This Internet-Draft will expire on August 24, 2005. Copyright Notice Copyright (C) The Internet Society (2005). Abstract This document describes Mobile IPv6 operation with the revised IPsec architecture and IKEv2. Devarapalli Expires August 24, 2005 [Page 1] Internet-Draft Mobile IPv6 with IKEv2 and revised IPsec February 2005 Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 4 3. What is applicable from RFC 3776? . . . . . . . . . . . . . . 5 3.1 Packet Formats . . . . . . . . . . . . . . . . . . . . . . 5 3.2 Requirements . . . . . . . . . . . . . . . . . . . . . . . 5 3.2.1 Home Agent Requirements . . . . . . . . . . . . . . . 5 3.2.2 Mobile Node Requirements . . . . . . . . . . . . . . . 6 4. Manual Configuration . . . . . . . . . . . . . . . . . . . . . 7 4.1 Binding Update and Acknowledgements . . . . . . . . . . . 7 4.2 Return Routabililty Messages . . . . . . . . . . . . . . . 8 4.3 Mobile Prefix Discovery Messages . . . . . . . . . . . . . 9 4.4 Payload Packets . . . . . . . . . . . . . . . . . . . . . 10 5. Dynamic Configuration . . . . . . . . . . . . . . . . . . . . 11 5.1 Security Policy Database Entries . . . . . . . . . . . . . 11 5.1.1 Binding Updates and Acknowledgements . . . . . . . . . 11 5.1.2 Return Routability Messages . . . . . . . . . . . . . 12 5.1.3 Mobile Prefix Discovery Messages . . . . . . . . . . . 13 5.1.4 Payload Packets . . . . . . . . . . . . . . . . . . . 13 5.2 Security Association negotiation using IKEv2 . . . . . . . 14 6. The use of EAP authentication . . . . . . . . . . . . . . . . 17 7. Dynamic Home Address Configuration . . . . . . . . . . . . . . 19 8. Security Considerations . . . . . . . . . . . . . . . . . . . 21 9. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 22 10. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 23 11. References . . . . . . . . . . . . . . . . . . . . . . . . . 24 11.1 Normative References . . . . . . . . . . . . . . . . . . . 24 11.2 Informative References . . . . . . . . . . . . . . . . . . 24 Author's Address . . . . . . . . . . . . . . . . . . . . . . . 25 Intellectual Property and Copyright Statements . . . . . . . . 26 Devarapalli Expires August 24, 2005 [Page 2] Internet-Draft Mobile IPv6 with IKEv2 and revised IPsec February 2005 1. Introduction RFC 3776 describes how IPsec [11] is used with Mobile IPv6 [2] to protect the signaling messages. It also illustrates examples of Security Policy Database and Security Association Database entries that can be used to protect Mobile IPv6 signaling messages. The IPsec architecture has been revised [5]. Among the many changes, the list of selectors has been expanded to included the Mobility Header message type. This has an impact on how security policies and security associations are configured for protecting mobility header messages. It becomes easier to differentiate between the various Mobility Header messages based on the type value instead of checking if a particular mobility header message is being sent on a tunnel interface between the mobile node and the home agent, as it was in RFC 3776. The revised IPsec architecture specification also includes ICMP message type and code as selectors. This makes it possible to protect Mobile Prefix Discovery messages without applying the same security associations to all ICMPv6 messages. This document discusses new requirements for the Home Agent and the mobile node to use the revised IPsec architecture and IKEv2. Section 3.2 lists the requirements. Section 3 describes the differences with RFC 3776. Section 4 describes the required Security Policy Database (SPD) and Security Association Database (SAD) entries. The Internet Key Exchange (IKE) has also been substantially revised and simplified [4]. This document describes how IKEv2 can be used to setup security associations for Mobile IPv6. The use of EAP within IKEv2 is allowed to authenticate the mobile node to the Home Agent. This is described in Section 6. A method for dynamically configuring a home address from the Home Agent using the Configuration Payload in IKEv2 is described in Section 7. Devarapalli Expires August 24, 2005 [Page 3] Internet-Draft Mobile IPv6 with IKEv2 and revised IPsec February 2005 2. Terminology The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [1]. Devarapalli Expires August 24, 2005 [Page 4] Internet-Draft Mobile IPv6 with IKEv2 and revised IPsec February 2005 3. What is applicable from RFC 3776? 3.1 Packet Formats The mobile node and the Home Agent must support the packet formats as defined in Section 3 of RFC 3776. This document does not update the packet formats described in RFC 3776. 3.2 Requirements The mobile node and the Home Agent MUST support the requirements listed in Section 4 of RFC 3776 with the following exceptions. o It is not required to configure security policies per interface in order to protect return routability signaling messages. Since the Mobility Header message type is a selector, it is easy to differentiate HoTi and HoT messages from other Mobility Header messages. o It is necessary to avoid a condition where a mobile node could use its security association to send a Binding Update on behalf of another mobile node. With manual IPsec configuration, the Home Agent MUST be able to verify that a security association was created for a particular home address. With dynamic keying, it should be possible for the Home Agent to verify that the identity presented in the IKE_AUTH exchange is allowed to create security associations for a particular home address. o The mobile node should use its Care-of Address as source address in protocol exchanges, when using dynamic keying. However, the security associations MUST be created for the home address of the mobile node. o The mobile node and the Home Agent MUST create security associations based on the home address, so that the security associations survive change in Care-of Address. When using IKEv2 as the key exchange protocol, the home address should be carried in the TSi payload during the CREATE_CHILD_SA exchange [4]. 3.2.1 Home Agent Requirements This section describes additional requirements on the Home Agent. o The Home Agent MUST support Mobility Header message type as an IPsec selector. Devarapalli Expires August 24, 2005 [Page 5] Internet-Draft Mobile IPv6 with IKEv2 and revised IPsec February 2005 o The Home Agent MUST support ICMPv6 message type as an IPsec selector. o The Home Agent MUST be able to distinguish between HoTi messages sent to itself, when it is acting as a Correspondent Node, from those sent to Correspondent Nodes when it is acting as a Home Agent, based on the destination address of the packet. o The Home Agent MAY use the Peer Authorization Database (PAD) [5] to store per-mobile node state. The PAD entry for a mobile node can contain a shared key, public key or a trust anchor to verify the mobile node's certificate for authenticating the mobile node. o The Home Agent MAY support remote configuration of home address as described in Section 7. When the Home Agent receives a configuration payload with a CFG_REQUEST for INTERNAL_IP6_ADDR, it must reply with a valid home address for the mobile node. The Home Agent could pick a home address from a local database or from a DHCPv6 server on the home link. o The Home Agent MAY support authentication using EAP in IKEv2 as described in Section 2.16 of [4]. 3.2.2 Mobile Node Requirements This section describes additional requirements on the mobile node. o The mobile node MUST support Mobility Header message type as an IPsec selector. o The mobile node MUST support ICMPv6 message type as an IPsec selector. o The mobile node MAY support EAP as an authentication mechanism when using IKEv2 to setup security associations for protecting Mobile IPv6 signaling messages. o The mobile node MAY support the mechanism described in Section 7 to dynamically configure a home address. Devarapalli Expires August 24, 2005 [Page 6] Internet-Draft Mobile IPv6 with IKEv2 and revised IPsec February 2005 4. Manual Configuration This section describes the SPD and SAD entries that can be used to protect Mobile IPv6 signaling messages. For the examples described in this document, a mobile node with home address, "home_address_1", a Home Agent with address, "home_agent_1" and a user of the mobile node with identity "user_1" are assumed. If the home address of the mobile node changes, the SPD and SAD entries need to re-created or updated for the new home address. 4.1 Binding Update and Acknowledgements The following are the SPD and SAD entries on the mobile node and the Home Agent to protect Binding Updates and Acknowledgements. Devarapalli Expires August 24, 2005 [Page 7] Internet-Draft Mobile IPv6 with IKEv2 and revised IPsec February 2005 mobile node SPD-S: - IF source = home_address_1 & destination = home_agent_1 & proto = MH & mh_type = BU Then use SA SA1 mobile node SPD-I: - IF source = home_agent_1 & destination = home_address_1 & proto = MH & mh_type = BAck Then use SA SA2 mobile node SAD: - SA1(OUT, spi_a, home_agent_1, ESP, TRANSPORT): source = home_address_1 & destination = home_agent_1 & proto = MH & mh_type = BU - SA2(IN, spi_b, home_address_1, ESP, TRANSPORT): source = home_agent_1 & destination = home_address_1 & proto = MH & mh_type = BAck home agent SPD-S: - IF source = home_agent_1 & destination = home_address_1 & proto = MH & mh_type = BAck Then use SA SA2 home agent SPD-I: - IF source = home_address_1 & destination = home_agent_1 & proto = MH & mh_type = BU Then use SA SA1 home agent SAD: - SA2(OUT, spi_b, home_address_1, ESP, TRANSPORT): source = home_agent_1 & destination = home_address_1 & proto = MH & mh_type = BAck - SA1(IN, spi_a, home_agent_1, ESP, TRANSPORT): source = home_address_1 & destination = home_agent_1 & proto = MH & mh_type = BU 4.2 Return Routabililty Messages The following are the SPD and SAD entries on the mobile node and the Home Agent to protect Return Routability messages. Devarapalli Expires August 24, 2005 [Page 8] Internet-Draft Mobile IPv6 with IKEv2 and revised IPsec February 2005 mobile node SPD-S: - IF source = home_address_1 & destination = any & proto = MH & mh_type = HoTi Then use SA SA3 mobile node SPD-I: - IF destination = home_address_1 & source = any & proto = MH & mh_type = HoT Then use SA SA4 mobile node SAD: - SA3(OUT, spi_c, home_agent_1, ESP, TUNNEL): source = home_address_1 & destination = any & proto = MH & mh_type = HoTi - SA4(IN, spi_d, care_of_address_1, ESP, TUNNEL): source = any & destination = home_address_1 & proto = MH & mh_type = HoT home agent SPD-S: - IF destination = home_address_1 & source = any & proto = MH & mh_type = HoT Then use SA SA4 home agent SPD-I: - IF source = home_address_1 & destination = any & proto = MH & mh_type = HoTi Then use SA SA3 home agent SAD: - SA4(OUT, spi_d, care_of_address_1, ESP, TUNNEL): source = any & destination = home_address_1 & proto = MH & mh_type = HoT - SA3(IN, spi_c, home_agent_1, ESP, TUNNEL): source = home_address_1 & destination = any & proto = MH & mh_type = HoTi 4.3 Mobile Prefix Discovery Messages The following are the SPD and SAD entries used to protect Mobile Prefix Discovery messages. Devarapalli Expires August 24, 2005 [Page 9] Internet-Draft Mobile IPv6 with IKEv2 and revised IPsec February 2005 mobile node SPD-S: - IF source = home_address_1 & destination = home_agent_1 & proto = ICMPv6 & icmp6_type = MPS Then use SA SA5. mobile node SPD-I: - IF source = home_agent_1 & destination = home_address_1 & proto = ICMPv6 & icmp6_type = MPA Then use SA SA6 mobile node SAD: - SA5(OUT, spi_e, home_agent_1, ESP, TRANSPORT): source = home_address_1 & destination = home_agent_1 & proto = ICMPv6 & icmp6_type = MPS - SA6(IN, spi_f, home_address_1, ESP, TRANSPORT): source = home_agent_1 & destination = home_address_1 & proto = ICMPv6 & icmp6_type = MPA home agent SPD-S: - IF source = home_agent_1 & destination = home_address_1 & proto = ICMPv6 & icmp6_type = MPA Then use SA SA6 home agent SPD-I: - IF source = home_address_1 & destination = home_agent_1 & proto = ICMPv6 & icmp6_type = MPS Then use SA SA5 home agent SAD: - SA6(OUT, spi_f, home_address_1, ESP, TRANSPORT): source = home_agent_1 & destination = home_address_1 & proto = ICMPv6 & icmp6_type = MPA - SA5(IN, spi_e, home_agent_1, ESP, TRANSPORT): source = home_address_1 & destination = home_agent_1 & proto = ICMPv6 & icmp6_type = MPS 4.4 Payload Packets Payload traffic tunneled through the Home Agent can be protected by IPsec, if required. The mobile node and the Home Agent use ESP in tunnel mode to protect the tunneled traffic. The SPD and SAD entries shown in Section 5.2.4 of [3] are applicable here. Devarapalli Expires August 24, 2005 [Page 10] Internet-Draft Mobile IPv6 with IKEv2 and revised IPsec February 2005 5. Dynamic Configuration This section describes the use of IKEv2 to setup the required security associations. 5.1 Security Policy Database Entries The following sections describe the security policy entries on the mobile node and the Home Agent. In the examples shown below, the identity of the user of the mobile node is assumed to be user_1, the home address of the mobile node is assumed to be home_address_1 and the IPv6 address of the Home Agent is assumed to be home_agent_1. 5.1.1 Binding Updates and Acknowledgements The following are the SPD entries on the mobile node and the Home Agent for protecting Binding Updates and Acknowledgements. mobile node SPD-S: - IF destination = home_agent_1 & proto = MH & mh_type = BU Then use SA ESP transport mode IDi = user_1, IDr = home_agent_1, TSi = home_address_1 mobile node SPD-I: - IF source = home_agent_1 & proto = MH & mh_type = BAck Then use SA ESP transport mode IDi = user_1, IDr = home_agent_1, TSi = home_address_1 home agent SPD-S: - IF source = home_agent_1 & proto = MH & mh_type = BAck Then use SA ESP transport mode IDr = user_1, IDi = home_agent_1, TSr = home_address_1 home agent SPD-I: - IF destination = home_agent_1 & proto = MH & mh_type = BU Then use SA ESP transport mode IDr = user_1, IDi = home_agent_1, TSr = home_address_1 In the examples shown above, the home address of the mobile node might not be available all the time. When the mobile node acquires a new home address, it must add the address to the corresponding SPD entries. The Mobility Header type is negotiated by placing it in the most Devarapalli Expires August 24, 2005 [Page 11] Internet-Draft Mobile IPv6 with IKEv2 and revised IPsec February 2005 significant eight bits of the 16 bit local "port" selector during IKEv2 exchange. For more details, refer to [5]. The TSi and TSr payloads in the above examples will contain many other selectors apart from home_address_1. For the sake of brevity, they are not shown here. 5.1.2 Return Routability Messages The following are the SPD entries on the mobile node and the Home Agent for protecting the Return Routability messages. mobile node SPD-S: - IF proto = MH & mh_type = HoTi Then use SA ESP tunnel mode IDi = user_1, outer src addr = coa outer dst addr = home_agent_1, inner src addr = home_address_1 mobile node SPD-I: - IF destination = home_address_1 & proto = MH & mh_type = HoT Then use SA ESP tunnel mode IDi = user_1, outer src addr = home_agent_1, outer dst addr = coa, home agent SPD-S: - IF proto = MH & mh_type = HoT Then use SA ESP tunnel mode IDr = user_1, outer src addr = home_agent_1, outer dst addr = coa, inner dst addr = home_address_1 home agent SPD-I: - IF proto = MH & mh_type = HoTi Then use SA ESP tunnel mode IDr = user_1, outer src addr = coa, outer dst addr = home_agent_1, inner src addr = home_address_1 When the mobile node's Care-of Address changes the SPD entries on both the mobile node and the Home Agent must be updated. The Home Agent knows about the change in Care-of Address of the mobile node when it receives a Binding Update from the mobile node. Devarapalli Expires August 24, 2005 [Page 12] Internet-Draft Mobile IPv6 with IKEv2 and revised IPsec February 2005 5.1.3 Mobile Prefix Discovery Messages The following are the SPD entries on the mobile node and the Home Agent for protecting Mobile Prefix Discovery messages. mobile node SPD-S: - IF destination = home_agent_1 & proto = ICMPv6 & icmp6_type = MPS Then use SA ESP transport mode IDi = user_1, IDr = home_agent_1, TSi = home_address_1 mobile node SPD-I: - IF source = home_agent_1 & proto = ICMPv6 & icmp6_type = MPA Then use SA ESP transport mode IDi = user_1, IDr = home_agent_1, TSi = home_address_1 home agent SPD-S: - IF source = home_agent_1 & proto = ICMPv6 & icmp6_type = MPA Then use SA ESP transport mode IDr = user_1, IDi = home_agent_1, TSr = home_address_1 home agent SPD-I: - IF destination = home_agent_1 & proto = ICMPv6 & icmp6_type = MPS Then use SA ESP transport mode IDr = user_1, IDi = home_agent_1, TSr = home_address_1 In the examples shown above, the home address of the mobile node might not be available all the time. When the mobile node acquires a new home address, it must add the address to the corresponding SPD entries. The TSi and TSr payloads in the above examples will contain many other selectors apart from home_address_1. For brevity, they are not show here. 5.1.4 Payload Packets The following are the SPD entries on the mobile node and the Home Agent if payload traffic exchanged between the mobile node and its Correspondent Node needs to be protected. The SPD entries are similar to the entries for protecting Return Routability messages and have lower priority than the above SPD entries. Devarapalli Expires August 24, 2005 [Page 13] Internet-Draft Mobile IPv6 with IKEv2 and revised IPsec February 2005 mobile node SPD-S: - IF interface = IPv6 tunnel to home_agent_1 & proto = X Then use SA ESP tunnel mode IDi = user_1, outer src addr = coa outer dst addr = home_agent_1, inner src addr = home_address_1 mobile node SPD-I: - IF destination = home_address_1 & proto = X & source = any_cn Then use SA ESP tunnel mode IDi = user_1, outer src addr = home_agent_1, outer dst addr = coa, home agent SPD-S: - IF interface = IPv6 tunnel to home_address_1 & proto = X Then use SA ESP tunnel mode IDr = user_1, outer src addr = home_agent_1, outer dst addr = coa, inner dst addr = home_address_1 home agent SPD-I: - IF interface = IPv6 tunnel to home_address_1 & proto = X Then use SA ESP tunnel mode IDr = user_1, outer src addr = coa, outer dst addr = home_agent_1, inner src addr = home_address_1 5.2 Security Association negotiation using IKEv2 Mobile IPv6 signaling messages are typically initiated by the mobile node. The mobile node sends a Binding Update to the Home Agent whenever it moves and acquires a new Care-of Address. The mobile node initiates an IKEv2 protocol exchange if the required security associations are not present. The default mechanism used for mutual authentication is a shared secret between the mobile node and the Home Agent. The Home Agent uses the identity of the mobile node to identify the corresponding shared secret. If public key based mechanism is used, the Home Agent and the mobile node use their Devarapalli Expires August 24, 2005 [Page 14] Internet-Draft Mobile IPv6 with IKEv2 and revised IPsec February 2005 private keys to generate the AUTH payload. The mobile node and the Home Agent should use CERTREQ and CERT payloads if the identities need to be verified. If the mobile node is configured with the Home Agent information including the public key that corresponds to the Home Agent, then the mobile node MAY exclude the CERTREQ payload in message 3. Similarly, the Home Agent MAY exclude the CERTREQ payload in message 2, if it is configured with the mobile node information. If a shared secret is being used, the mobile node uses the shared secret to generate the AUTH payload in the IKE_AUTH exchange. If the mobile node is using a public key based mechanism, then it uses its private key to generate the AUTH payload in the IKE_AUTH exchange. Mobile Node Home Agent ----------- ---------- HDR, SAi1, KEi, Ni --> <-- HDR, SAr1, KEr, Nr, [CERTREQ] HDR, SK {IDi, [CERT,] [CERTREQ,] [IDr,] AUTH, SAi2, TSi, TSr} --> <-- HDR, SK {IDr, [CERT,] AUTH, SAr2, TSi, TSr} The mobile node MUST always includes its identity in the IDi payload in the IKE_AUTH exchange. The mobile node could use the following different types of identities to identity itself to the Home Agent. o Home Address - The mobile node could use its statically configured home address as its identity. In this case the ID Type field is set to ID_IPV6_ADDR. o FQDN - The mobile node can use a Fully Qualified Domain Name as the identifier and set the ID Type field to ID_FQDN. o RFC 822 identifier - If the mobile node uses a RFC 822 identifier [9], it sets the ID Type field to ID_RFC822_ADDR. After the IKE_AUTH exchange completes, the mobile node and the Home Agent initiate CREATE_CHILD_SA exchanges to negotiate security associations for protecting Binding Update/Binding Ack messages, Return Routability signaling, Mobile Prefix Discovery messages and optionally payload traffic. The CREATE_CHILD_SA exchanges are protected by the security association created during the IKE_AUTH exchange. It is important that the security associations are created based on the home address of the mobile node, so that the security Devarapalli Expires August 24, 2005 [Page 15] Internet-Draft Mobile IPv6 with IKEv2 and revised IPsec February 2005 associations survive Care-of Address change. The mobile node MUST set the TSi (Traffic Selector-initiator) payload to its home address in the CREATE_CHILD_SA exchange in order to create the security associations for the home address. Mobile Node Home Agent ----------- ---------- HDR, SK {[N], SA, Ni, [KEi], [TSi, TSr]} --> <-- HDR, SK {SA, Nr, [KEr], [TSi, TSr]} Devarapalli Expires August 24, 2005 [Page 16] Internet-Draft Mobile IPv6 with IKEv2 and revised IPsec February 2005 6. The use of EAP authentication In addition to using public key signatures and shared secrets, EAP [10] can be used with IKEv2 for authenticating the mobile node to the Home Agent. The mobile node indicates that it wants to use EAP by including the IDi payload but leaving out the AUTH payload in the first message during the IKE_AUTH exchange. The Home Agent then includes an EAP payload if it is willing to use an extensible authentication method. Security associations are not created until the subsequent IKE_AUTH exchange after successful EAP authentication. The use of EAP adds at least two round trips to the IKE negotiation. Mobile Node Home Agent ------------ ---------- HDR, SAi1, KEi, Ni --> <-- HDR, SAr1, KEr, Nr, [CERTREQ] HDR, SK {IDi, [CERTREQ,] [IDr,] SAi2, TSi, TSr}--> <-- HDR, SK {IDr, [CERT,] AUTH, EAP } HDR, SK {EAP} --> <-- HDR, SK {EAP (success)} HDR, SK {AUTH} --> <-- HDR, SK {AUTH, SAr2, TSi, TSr} Some EAP methods generate a shared key on the mobile node and the Home Agent once the EAP authentication succeeds. In this case, the shared key is used to generate the AUTH payloads in the subsequent messages. The shared key, if used to generate the AUTH payloads, MUST NOT be used for any other purpose. For more details, refer to [4]. The use of EAP between the mobile node and the Home Agent might require the Home Agent to contact an authorization server like the AAA Home server, on the home link, to authenticate the mobile node. Please refer to [7] for more details. The IKEv2 specification [4] requires that public key based mechanism Devarapalli Expires August 24, 2005 [Page 17] Internet-Draft Mobile IPv6 with IKEv2 and revised IPsec February 2005 be used to authenticate the Home Agent to the mobile node, when EAP is used. But, if the EAP method that is used, supports mutual authentication and and key generation, then the mobile node could use EAP itself to authenticate the Home Agent. The mobile node can request that the Home Agent also use EAP to authenticate itself, by including the EAP_ONLY_AUTHENTICATION notification payload [8] in message 3. If the Home Agent agrees to use EAP, it omits the public key based AUTH and CERT payloads in message 4. More details can be found in [8]. Devarapalli Expires August 24, 2005 [Page 18] Internet-Draft Mobile IPv6 with IKEv2 and revised IPsec February 2005 7. Dynamic Home Address Configuration The mobile node can dynamically configure a home address by including a Configuration Payload in the IKE_AUTH exchange, with a request for an address from the home link. The mobile node should include an INTERNAL_IP6_ADDRESS attribute in the CFG_REQUEST Payload. The mobile node MAY also include the INTERNAL_IP6_SUBNET attribute if it wants to obtain information about the IPv6 prefixes on the home link. If the mobile node wants to configure a DNS server from the home link it can request for the DNS server information by including an INTERNAL_IP6_DNS attribute in the CFG_REQUEST payload. When the Home Agent receives a configuration payload with a CFG_REQUEST for INTERNAL_IP6_ADDRESS, it replies with a valid home address for the mobile node. The INTERNAL_IP6_ADDRESS attribute in the CFG_REPLY contains the prefix length of the home prefix in addition to a 128 bit home address. The Home Agent could use a local database or contact a DHCPv6 server on the home link to allocate a home address. The Home Agent should also include an INTERNAL_ADDRESS_EXPIRY attribute to indicate to the mobile node, the duration for which the dynamically allocated home address is valid. Mobile Node Home Agent ----------- ---------- HDR, SK {IDi, [CERT,] [CERTREQ,] [IDr,] AUTH, CP(CFG_REQUEST), SAi2, TSi, TSr} --> <-- HDR, SK {IDr, [CERT,] AUTH, CP(CFG_REPLY), SAr2, TSi, TSr} The mobile node could suggest a home address that it wants to use in the CFG_REQUEST. For example, this could be a home address that it was allocated before or could be an address the mobile node auto-configured from the IPv6 prefix on the home link. The Home Agent could let the mobile node use the same home address by setting the INTERNAL_IP6_ADDRESS attribute in the CFG_REPLY payload to the same home address. If the Home Agent wants the mobile node to use a different home address, it sends a new home address in the INTERNAL_IP_ADDRESS attribute in the CFG_REPLY payload. The Mobile Node MUST stop using its old home address and start using the newly allocated home address. In case the Home Agent is unable to allocate a home address for the mobile node during the IKE_AUTH exchange, it MUST send a Notify Payload with an INTERNAL_ADDRESS_FAILURE message. Devarapalli Expires August 24, 2005 [Page 19] Internet-Draft Mobile IPv6 with IKEv2 and revised IPsec February 2005 If the CFG_REQUEST from the mobile node had the INTERNAL_IP6_SUBNET attribute, the Home Agent SHOULD send prefix information for the all prefixes on the home link. Note, that this prefix information in the INTERNAL_IP6_SUBNET does not carry all the information that is typically present when received through a router advertisement. The mobile node should still rely on Mobile Prefix Discovery [2] to obtain complete information about the prefixes on the home link. Devarapalli Expires August 24, 2005 [Page 20] Internet-Draft Mobile IPv6 with IKEv2 and revised IPsec February 2005 8. Security Considerations This document describes how IPsec can be used to secure Mobile IPv6 signaling messages. Please refer to RFC 3775 and RFC 3776 for security considerations related to the use of IPsec with Mobile IPv6. Devarapalli Expires August 24, 2005 [Page 21] Internet-Draft Mobile IPv6 with IKEv2 and revised IPsec February 2005 9. IANA Considerations This document requires no action from IANA. Devarapalli Expires August 24, 2005 [Page 22] Internet-Draft Mobile IPv6 with IKEv2 and revised IPsec February 2005 10. Acknowledgements The author would like to thank Mika Joutsenvirta and Pasi Eronen for reviewing the draft. Devarapalli Expires August 24, 2005 [Page 23] Internet-Draft Mobile IPv6 with IKEv2 and revised IPsec February 2005 11. References 11.1 Normative References [1] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997. [2] Johnson, D., Perkins, C. and J. Arkko, "Mobility Support in IPv6", RFC 3775, June 2004. [3] Arkko, J., Devarapalli, V. and F. Dupont, "Using IPsec to Protect Mobile IPv6 Signaling Between Mobile Nodes and Home Agents", RFC 3776, June 2004. [4] Kaufman, C., "Internet Key Exchange (IKEv2) Protocol", Internet-Draft draft-ietf-ipsec-ikev2-17, October 2004. [5] Kent, S. and K. Seo, "Security Architecture for the Internet Protocol", Internet-Draft draft-ietf-ipsec-rfc2401bis-05, December 2004. [6] Kent, S., "IP Encapsulating Security Payload (ESP)", Internet-Draft draft-ietf-ipsec-esp-v3-09, October 2004. 11.2 Informative References [7] Giaretta, G., "Goals for AAA-HA interface", Internet-Draft draft-giaretta-mip6-aaa-ha-goals-00, September 2004. [8] Eronen, P., "Extension for EAP Authentication in IKEv2", Internet-Draft draft-eronen-ipsec-ikev2-eap-auth-02, October 2004. [9] Crocker, D., "Standard for the format of ARPA Internet text messages", STD 11, RFC 822, August 1982. [10] Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J. and H. Levkowetz, "Extensible Authentication Protocol (EAP)", RFC 3748, June 2004. [11] Kent, S. and R. Atkinson, "Security Architecture for the Internet Protocol", RFC 2401, November 1998. [12] Harkins, D. and D. Carrel, "The Internet Key Exchange (IKE)", RFC 2409, November 1998. Devarapalli Expires August 24, 2005 [Page 24] Internet-Draft Mobile IPv6 with IKEv2 and revised IPsec February 2005 Author's Address Vijay Devarapalli Nokia Research Center 313 Fairchild Drive Mountain View, CA 94043 USA Email: vijay.devarapalli@nokia.com Devarapalli Expires August 24, 2005 [Page 25] Internet-Draft Mobile IPv6 with IKEv2 and revised IPsec February 2005 Intellectual Property Statement The IETF takes no position regarding the validity or scope of any Intellectual Property Rights or other rights that might be claimed to pertain to the implementation or use of the technology described in this document or the extent to which any license under such rights might or might not be available; nor does it represent that it has made any independent effort to identify any such rights. Information on the procedures with respect to rights in RFC documents can be found in BCP 78 and BCP 79. Copies of IPR disclosures made to the IETF Secretariat and any assurances of licenses to be made available, or the result of an attempt made to obtain a general license or permission for the use of such proprietary rights by implementers or users of this specification can be obtained from the IETF on-line IPR repository at http://www.ietf.org/ipr. The IETF invites any interested party to bring to its attention any copyrights, patents or patent applications, or other proprietary rights that may cover technology that may be required to implement this standard. Please address the information to the IETF at ietf-ipr@ietf.org. Disclaimer of Validity This document and the information contained herein are provided on an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Copyright Statement Copyright (C) The Internet Society (2005). This document is subject to the rights, licenses and restrictions contained in BCP 78, and except as set forth therein, the authors retain all their rights. Acknowledgment Funding for the RFC Editor function is currently provided by the Internet Society. Devarapalli Expires August 24, 2005 [Page 26]