NSIS Working Group M. Stiemerling Internet-Draft NEC Expires:November 19, 2004January 17, 2005 H. Tschofenig Siemens M. Martin NEC C. Aoun Nortel NetworksMay 21,July 19, 2004 NAT/Firewall NSIS Signaling Layer Protocol (NSLP)draft-ietf-nsis-nslp-natfw-02draft-ietf-nsis-nslp-natfw-03 Status of this Memo This document is an Internet-Draft and isin full conformance withsubject to all provisions ofSection 10section 3 of RFC 3667. By submitting this Internet-Draft, each author represents that any applicable patent or other IPR claims of which he or she is aware have been or will be disclosed, and any ofRFC2026.which he or she become aware will be disclosed, in accordance with RFC 3668. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed athttp://www.ietf.org/ietf/1id-abstracts.txt.http:// www.ietf.org/ietf/1id-abstracts.txt. The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html. This Internet-Draft will expire onNovember 19, 2004.January 17, 2005. Copyright Notice Copyright (C) The Internet Society (2004). All Rights Reserved. Abstract This memo defines the NSIS Signaling Layer Protocol (NSLP) for Network Address Translators and Firewalls. This NSLP allows hosts to signal along a data path for Network Address Translators and Firewalls to be configured according to the data flow needs. The network scenarios, problems and solutions for path-coupled Network Address Translator and Firewall signaling are described. The overall architecture is given by the framework and requirements defined by the Next Steps in Signaling (NSIS) working group.This is one of two NSIS Signaling Layer Protocols (NSLPs) the working group will address during its work.Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . .45 1.1 Terminology and Abbreviations . . . . . . . . . . . . . .56 1.2 Middleboxes . . . . . . . . . . . . . . . . . . . . . . .78 1.3General Scenario for NATFW TraversalNon-Goals . . . . . . . . . . .8 2. Network Environment. . . . . . . . . . . . . 9 1.4 General Scenario for NATFW Traversal . . . . . . . .10 2.1. . . 9 2. Network Deployment Scenariosfor Protocol Functionalityusing NATFW NSLP . . . . . . .10 2.1.1. 11 2.1 FirewalltraversalTraversal . . . . . . . . . . . . . . . . . .10 2.1.2. . 11 2.2 NAT with two private Networks . . . . . . . . . . . .11 2.1.3. . 12 2.3 NAT withprivate networkPrivate Network onsender sideSender Side . . . . . . . . . 122.1.42.4 NAT withprivate networkPrivate Network onreceiver side . .Receiver Side Scenario . . . .12 2.1.513 2.5 Both End Hosts behind twice-NATs . . . . . . . . . . .13 2.1.6. . 14 2.6 Both End Hostsbehind sameBehind Same NAT . . . . . . . . . . . .14 2.1.7. . 15 2.7 IPv4/v6 NAT with twoprivate networksPrivate Networks . . . . . . . . . . 152.1.82.8 Multihomed Network with NAT . . . . . . . . . . . . . . . 162.2 Trust Relationship and Authorization3. Protocol Description . . . . . . . . . . .17 2.2.1 Peer-to-Peer Trust Relationship. . . . . . . . . . 18 3.1 Policy Rules . . . . . . . . . . . .17 2.2.2 Intra-Domain Trust Relationship. . . . . . . . . . . 182.2.3 End-to-Middle Trust Relationship3.2 Basic protocol overview . . . . . . . . . . .19 3. Protocol Description. . . . . . 18 3.3 Protocol Operations . . . . . . . . . . . . . . .21 3.1 Basic protocol overview. . . . 20 3.3.1 Creating Sessions . . . . . . . . . . . . . . . . . . 213.2 Protocol Operations3.3.2 Reserving External Addresses . . . . . . . . . . . . . 23 3.3.3 NATFW Session refresh . . . . . .23 3.2.1 Creating. . . . . . . . . . 27 3.3.4 Deleting Sessions . . . . . . . . . . . . . . . . . .23 3.2.2 Reserving External Addresses28 3.3.5 Reporting Asynchronous Events . . . . . . . . . . . . 29 3.3.6 QUERY capabilities within the NATFW NSLP protocol . . 30 3.3.7 QUERY Message semantics . . . . . . . . . . . . . . . 31 3.4 NATFW NSLP proxy mode of operation . . . . . . . .25 3.2.3. . . . 32 3.4.1 Reserving External Addresses and triggering CreateSessionmessages . . .28 3.2.4 Prolonging Sessions. . . . . . . . . . . . . . . . .28 3.2.5 Deleting Sessions. . . 32 3.4.2 Using CREATE messages to Trigger Reverse Path CREATE Messages . . . . . . . . . . . . . . .29 3.2.6 Authorization. . . . 35 3.4.2.1 CREATE Responses Sent on Previously Pinned Down Reverse Path . . . . . . . . . . . . . . . .30 3.2.7 Calculation of Lifetimes35 3.4.2.2 CREATE Responses Sent on Separately Established Reverse Path . . . . . . . . . . . . . 36 3.5 Calculation of Session Lifetime . . . . . .30 3.2.8. . . . . . . 37 3.6 Middlebox Resource . . . . . . . . . . . . . . . . . .31 3.2.9. . 39 3.7 De-Multiplexing at NATs . . . . . . . . . . . . . . .31 3.2.10. . 39 3.8 SelectingDestination IP addressesOpportunistic Addresses for REA . . . . . .32 3.3. . 40 4. NATFW NSLPMessages ComponentsNTLP Requirements . . . . . . . . . . . . . .33 3.3.1. . . 42 5. NATFW NSLPHeaderMessage Components . . . . . . . . . . . . . . . . 43 5.1 NSLP Header . . . . .33 3.3.2 NSLP message types. . . . . . . . . . . . . . . . . .34 3.3.343 5.2 NSLPObjectsmessage types . . . . . . . . . . . . . . . . . . . . 43 5.3 NSLP Objects .34 3.3.3.1 Session ID Object. . . . . . . . . . . . . . . .35 3.3.3.2. . . . . . 44 5.3.1 Session Lifetime Object . . . . . . . . . . . . .35 3.3.3.3. . 44 5.3.2 External Address Object . . . . . . . . . . . . .36 3.3.3.4. . 45 5.3.3 Extended Flow Information Object . . . . . . . . .37 3.3.3.5 Error. . 46 5.3.4 Response Code Object . . . . . . . . . . . . . . . . . 47 5.3.5 Response Type Object . .37 3.4 Message Formats. . . . . . . . . . . . . . . 47 5.3.6 Message Sequence Number Object . . . . . .38 3.4.1 Policy Rules. . . . . . 48 5.3.7 Scoping Object . . . . . . . . . . . . . . .38 3.4.2 Create. . . . . 48 5.3.8 Bound Session(CRS)ID Object . . . . . . . . . . . . . . . 49 5.3.9 Notify Target Object . .39 3.4.3 Reserve External Address (REA). . . . . . . . . . . .39 3.4.4 Reserve-Create (REC). . . 49 5.4 Message Formats . . . . . . . . . . . . . .39 3.4.5 Prolong Session (PLS). . . . . . . 50 5.4.1 CREATE . . . . . . . . .39 3.4.6 Delete Session (DLS). . . . . . . . . . . . . . . 50 5.4.2 RESERVE-EXTERNAL-ADDRESS (REA) . .40 3.4.7 Path Succeeded (PS). . . . . . . . . . 50 5.4.3 TRIGGER . . . . . . .40 3.4.8 Path Deleted (PD). . . . . . . . . . . . . . . . 51 5.4.4 RESPONSE . .40 3.4.9 Return External Address (RA). . . . . . . . . . . . .40 3.4.10 Error Response (ER). . . . . . . . 51 5.4.5 QUERY . . . . . . . . .41 4.. . . . . . . . . . . . . . . 51 5.4.6 NOTIFY . . . . . . . . . . . . . . . . . . . . . . . . 52 6. NSIS NAT and Firewalltransitions issuesTransition Issues . . . . . . . . . . .42 5.53 7. Security Considerations . . . . . . . . . . . . . . . . . . .43 6.54 7.1 Trust Relationship and Authorization . . . . . . . . . . . 54 7.1.1 Peer-to-Peer Trust Relationship . . . . . . . . . . . 55 7.1.2 Intra-Domain Trust Relationship . . . . . . . . . . . 56 7.1.3 End-to-Middle Trust Relationship . . . . . . . . . . . 57 8. Open Issues . . . . . . . . . . . . . . . . . . . . . . . . .45 7.59 9. Contributors . . . . . . . . . . . . . . . . . . . . . . . . .46 8.60 10. References . . . . . . . . . . . . . . . . . . . . . . . . .. 47 8.161 10.1 Normative References . . . . . . . . . . . . . . . . . . . .47 8.261 10.2 Informative References . . . . . . . . . . . . . . . . . . .4761 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . .4964 A. Problems and Challenges . . . . . . . . . . . . . . . . . . .5165 A.1 Missing Network-to-Network Trust Relationship . . . . . .5165 A.2 Relationship with routing . . . . . . . . . . . . . . . .5266 A.3 Affected Parts of the Network . . . . . . . . . . . . . .5366 A.4 NSIS backward compatibility with NSIS unaware NAT and Firewalls . . . . . . . . . . . . . . . . . . . . . . . .5366 A.5 Authentication and Authorization . . . . . . . . . . . . .5467 A.6 Directional Properties . . . . . . . . . . . . . . . . . .5467 A.7 Addressing . . . . . . . . . . . . . . . . . . . . . . . .5468 A.8 NTLP/NSLP NAT Support . . . . . . . . . . . . . . . . . .5568 A.9 Combining Middlebox and QoS signaling . . . . . . . . . .5568 A.10 Inability to know the scenario . . . . . . . . . . . . . .5569 B. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . .5770 Intellectual Property and Copyright Statements . . . . . . . .5871 1. Introduction Firewalls and Network Address Translators (NAT) havebeenboth been used throughout the Internet for manyyearsyears, and they willberemain presentinfor the foreseeable future.UsingFirewallsbrings securityare used to protect networks against certain types of attacks from the outside, and in times of IPv4 addressdepletiondepletion, NATs virtually extend the IP address space.In general, bothBoth types of devices may be obstacles to many applications, since they only allowspecifictraffic created by a limited set of applications to traverse them(i.e.,(e.g., most HTTPtraffic or in generaltraffic, and client/serverapplications).applications), due to the rather static properties of those protocols. Other applications,for instance,such as IP telephonyor anyand most other peer-to-peerapplication,applications with more dynamicproperties suffer from Firewalls andproperties, create traffic which is unable to traverse NATsso that they do not work at all. Therefore,and Firewalls unassisted. In practice, the traffic from many applications cannot traverseFirewallFirewalls orNATs.NATs, even if they work autonomously in an attempt to restore the transparency of the network. Several solutions to enableany applicationapplications to traversethose boxessuch entities have been proposed and are currentlyused.in use. Typically, application level gateways (ALG) have been integratedand so configuring Firewalls and NATswith the Firewall or NAT to configure the Firewall or NAT dynamically. Another approach is middlebox communication (MIDCOM, currently under standardization at the IETF). In thisapproachapproach, ALGs external to the Firewallandor NATexternal ALGsconfigurethemthe corresponding entity via the MIDCOM protocol [7]. Several otherwork aroundwork-around solutions are available as well,seesuch as STUN[32][35] and[31].TURN [37]. However, all of these approaches introduce other problems that are hard tosolve; likesolve, such as dependencies oncertainthe type of NATimplementationsimplementation (full-cone, symmetric, ...), ordependencydependencies on a certain network topology. NAT and Firewall (NATFW) signaling share a property with Quality of Service (QoS)signaling, i.e., insignaling. Namely, bothcases it is required to reachrequire that any device on the data path that is involved in QoS or NATFW treatment of datapackets.packets is reached. For both, NATFW and QoS, signaling travels path-coupled, meaning that the signaling messages follow exactly the same pathasthat the data packetsdo.take. RSVP [14] is an exampleforof a current QoS signalingprotocol.protocol that is path-coupled. This memo defines a path-coupled signaling protocolin the framework of NSISfor NAT and Firewallconfiguration,configuration within the framework of NSIS, called the NATFW NSIS Signaling Layer Protocol (NSLP). The general requirements for NSIS are defined in [2]. The general framework of NSIS is outlined in[1] and[1]. It introduces the split between an NSIS transport layer and an NSIS signaling layer. The transport of NSLP messages is handled by an NSIS Network Transport Layer Protocol (NTLP,see [3]) and takes care about NSLP message transport.with GIMPS [3] being the implementation of the abstract NTLP). The signaling logic for QoS and NATFW signaling is implemented in the different NSLPs. The QoS NSLP is defined in [4],furthermorewhile thegeneral requirements for NSIS are defined in [2]. There is a series of related documents toNATFW NSLPdiscussing several other aspects of path-coupled NATFW signaling, including security [20], migration [17], intrarealm signaling [18], and inter-working with SIP [19].is defined in this document. The NATFW NSLPallows requestingis designed to request the configuration of NATsand/orand/ or Firewalls along the data path to enable data flows to traverse these devices without being obstructed. A simplified example: A source host sends a NATFW NSLP signaling message towards its data destination. This message follows the datapath and everypath. Every NATFW NSLP NAT/Firewall along the data path intercepts these messages, processesitthem, and configures itself accordingly. Afterwards, the actual data flow can traverse every configured Firewall/NAT. NATFW NSLP runs in two different modes, one is thepath directedCREATE modewhere Firewallsin which state at firewalls and NATsare configured alongis created. In thedata path as pointed outabove example, this takes place in theabove example.direction from the data sender to the data receiver. Thesecond oneother mode is thereserveRESERVE mode. In this mode,whereNATs aredetecteddiscovered by the NSLP/NTLPwithin the networksignaling messages, and apublicpublicly reachable IP address and a port number arereserved.reserved at each NAT. Thisreservemode enables hosts locatedbehind NATsin a private addressing realm delimited by a NAT to receive data originated in the publicInternet on the reverse data path.network. Both modes create NATFW NSLP and NTLP state in network entities. NTLP state allows signaling messages to travel in thenetwork. Theforward (downstream ) and the reverse (upstream) direction along the path between an NAT/Firewall NSLPstate is maintained viasender and asoft-state mechanism. State includes not only signaling state, but as well ascorresponding receiver. NAT bindings andFirewall rules.firewall rules are NAT/Firewall specific state. This state ismaintained viamanaged using alifetimesoft-state mechanism, i.e., it expires unless it is refreshed every now andmust be kept alive viathen by alifetime extension mechanism if needed. Two signaling messages arecertain message. If state is to be deleted explicitly before it automatically expires, another message can be used fordeletingthat. To find out which stateexplicitly and extending state's lifetime. In general, all NATFW NSLP signaling messages are exchanged end-to-end. Traversal of non NATFW NSLPs or the NTLPisout of scope of this document. Furthermore, only Firewalls and NATs are consideredcurrently installed inthis document,NSIS NAT/Firewall nodes, a query message can be used at anyother device, for instance IPSec security gateway, is out of scope.time. Section 2 describes the network environment for NATFW NSLPsignaling and highlightssignaling, highlighting therequiredtrustrelationship/ authorization.relationships and authorization required. Section 3 defines the NATFW signalingprotocol with its message components, message formats,protocol. Section 5 defines the messages andprotocol operations. Theand message components. In the remainingdocument refers inparts of the main body of the document, Section4 to6 covers transitionissues andissues, while Section 7 addresses securityconsiderations are handledconsiderations, with more extensive discussions of security issues currently being contained in [20]. Currently unsolved problems and challenges are listed and discussed in Appendix A. Please note that readers familiar withpossible locations ofFirewalls andNAT inNATs and their possible location within networks can safely skip Section 2. 1.1 Terminology and Abbreviations The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119. This document uses a number of terms defined in [2].Furthermore, theseThe following additional terms are used: o NSIS NAT Forwarding State:TheThis term"NSIS NAT Forwarding State" in this contextrefers to a state used to forward the NSIS signaling message beyond the targeted destinationaddress; that state is typically used when the NSIS Responder address is not known o Sender-/Receiver Initiated Signaling Sender-initiated: NAT bindings and Firewall rules are created immediately when the "path" message hits the NSIS nodes. With "path" message we refer to the signaling message traveling from the data sender towards the data receiver. Receiver-initiated: NAT bindings and Firewall rules are created when the "reserve" message returns from the other end. With "reserve" message we refer to a signaling message on the reverse path, this means from the receiver to the sender (i.e. backwards routed). Note that these definitions have nothing to do with number of roundtrips, who performs authorization etc.address. o Policy rule:In general, aA policy rule is "a basic building block of a policy-based system. It is the binding of a set of actions to a set of conditions - where the conditions are evaluated to determine whether the actions areperformed." [RFC3198].performed" [38]. In the context of NSIS NATFWNSLPNSLP, the condition is a specification of a set of packets to which rules are applied. The set of actions always contains just a single element per rule, and is limited to either action"reserved""reserved", "deny" or action"enable"."allow". o Firewall: A packet filtering device that matchespacketpackets against a set of policy rules and applies the actions. In the context of NSIS NATFW NSLP we refer to this device as Firewall. o Network Address Translator: Network Address Translation is a method by which IP addresses are mapped from one realm to another, in an attempt to provide transparent routingtobetween hosts (see[9]).[8]). Network Address Translators are devices that perform this method. o Middlebox:from [12]:"A middlebox is defined as any intermediate device performing functions other than the normal, standard functions of an IP router on the datagram path between a source host and a destinationhost". The term middlebox inhost" [12]. In the context of this document and inNSISNSIS, the term middlebox refers to Firewalls and NATs only. Other types of middlebox are currently outside the scope. o Security Gateway: IPsec based gateways. o NSIS Initiator (NI):theThe signalingentity, whichentity that makesthea resource request, usually as a result of user application request. o NSIS Responder (NR):theThe signaling entity, whichthat acts as the final destination for thesignaling andsignaling. It can optionally interact with applications as well. o NSIS Forwarder (NF):theA signaling entity between an NI and an NR which propagates NSIS signaling further through the network. o Receiver (DR or R):theThe node in thenetwork, whichnetwork that is receiving the data packets of a flow. o Sender (DS or S):theThe node in thenetwork, whichnetwork that is sending the data packets of a flow. o NATFW NSLP session:ApplicationAn application layer flow of information for which some network control state information is to be manipulated or monitored (as defined in [1]). The control state for NATFW NSLPisconsists of NSLP state and associated policy rules atthea middlebox. o NSIS peer or peer: An NSIS node with whichaan NSIS adjacency has been created as defined in [3]. o Edge NAT:ByAn edge NATwe refer to theis a NATdevice, whichdevice that is reachable fromoutsidethe public Internet and that has a globally routable IP address. o Edge Firewall: An edge Firewall is a Firewall device that is located on the demarcation line of an administrative domain. o Public Network:Definition according to [8] is"A Global or Public Network is an address realm with unique network addresses assigned by Internet Assigned Numbers Authority (IANA) or an equivalent address registry. This network is also referred as External network during NATdiscussions."discussions" [8]. o Private/Local Network:Definition according to [8] is " A"A private network is an address realm independent of external network addresses. Private network may also be referred alternately as Local Network. Transparent routing between hosts in private realm and external realm is facilitated by a NATrouter."router" [8]. IP address space allocation for private networks is recommended in[33][36] o Public/Global IP address: An IP address located in the publicnetwork.network according to Section 2.7 of [8]. o Private/Local IP address: An IP address located in the privatenetwork.network according to Section 2.8 of [8]. o Initial CREATE: A CREATE message creating a new session. 1.2 Middleboxes The term middleboxraises different expectations about functionality provided by suchcovers adevice. Middleboxesrange of devices which intercept the flow of packets between end hosts and perform actions other than standard forwarding expected in an IP router. As such, middleboxes fall into a number of categories with a wide range of functionality not all of which is pertinent to the NATFW NSLP. Middlebox categories in the scope of this memo are Firewalls that filter data packets againsttheira set of filterrulesrules, and NATs that translate packet addresses from one address realm to another address realm. Othertypescategories of middleboxes,for instancesuch as QoS traffic shapers and security gateways, are out of scope. The term NAT used in this document is placeholder for a range of different NAT flavors. We considerthosethese types of NATs: o traditional NAT (basic NAT and NAPT) o Bi-directional NAT o Twice-NAT o Multihomed NAT For definitions and a detailed discussion about the characteristics of each NAT type please see [8]. Both types of middleboxes under consideration here use policy rulesforto make a decision on data packet treatment. Policy rules consist of a5-tupleflow identifier (which is typically a 5-tuple) and an associatedaction. Dataaction; data packets matchingthis 5-tuple experiencethe flow identifier are subjected to the policy rule action. A 5-tupleconsists of:selector matches the following fields of a packet to configured values: o SourceIP addressandport number o Destinationdestination IPaddress and port numberaddresses o Transport protocol number o Transport source and destination port numbers For further examples of flow identifiers see Section 5.1 of [3]. Actions for Firewalls areusually:usually one or more of: o Allow: forward data packet o Deny: block data packet and discard it o Other actions like logging, diverting, duplicating, etc Actions for NATsareinclude (amongst many others): o Change source IP address and transport port number to aglobalglobally routeable IP address and associated port number. o Change destination IP address and transport port number to a private IP address and associated port number. 1.3 Non-Goals Traversal of non-NSIS and non-NATFW NSLP aware NATs and Firewalls is outside the scope of this document. Only Firewalls and NATs are considered in this document, any other types of devices, for instance IPSec security gateway, are out of scope. The exact implementation of policy rules and their mapping toFirewallfirewall rule sets and NAT bindings or sessions at the middlebox is an implementation issue and thus out of scope of this document. Some devicesentitledcategorized asFirewallsfirewalls only accept traffic after cryptographic verification(i.e.(i.e., IPsec protected data traffic). Particularly for network accessscenariosscenarios, either link layer or network layer data protection is common. Hence we do not address these types of devices (referred to as security gateways) since per-flow signaling is rather uncommon in this environment.For a discussion of network access authentication and associated scenarios the reader is referred to the PANA working group (see [26]).Discovering security gateways, which was also mentioned as an application for NSIS signaling, for the purpose of executing an IKE to create an IPsec SA, isalready solved without requiring NSIS.outside the scope of this document. In mobilityscenarios an often experiencedscenarios, a common problem is the traversal of a security gateway at the edge ofthea corporate network. Network administratorsoften rely on the policy thatallow only authenticated datatraffic is allowedto enter the network. A problem statement for the traversal of these security gateways in the context of Mobile IP can be foundat [25]). Other proposals for path-coupled NAT and Firewall traversal like RSVP and CASP are describedin[27] and [28]. 1.3[28]). This topic is not within the scope of the present document. 1.4 General Scenario for NATFW Traversal The purpose of NSIS NATFW signaling is to enableanycommunication between endpoints across networks even in the presence of NAT and Firewall middleboxes. It isexpectedassumed thatthosethese middleboxes will be statically configured in such a way that NSIS NATFW signaling messagesitselfthemselves are allowed to traverse them. NSIS NATFW NSLP signaling is used to dynamically installsuchadditional policy rules in all NATFW middleboxes along the data path. Firewalls are configured to forward data packets matching the policy rule provided by the NSLP signaling. NATs are configured to translate data packets matching the policy rule provided by the NSLP signaling. The basic high-level picture of NSIS usage is thatendhostsend hosts are located behind middleboxes (NAT/FW in Figure 1). Applications located at theseendhostsend hosts try to establish communicationbetween them and usewith corresponding applications on other such end hosts. They trigger the NSIS entity at the local host to provide for middlebox traversal along the prospective data path (e.g., via an API call). The NSIS entity in turn uses NSIS NATFW NSLP signaling to establish policy ruleson aalong the data path,which allowsallowing thesaiddata to travel from the sender to the receiver unobstructed.The applications can somehow trigger middlebox traversal (e.g. via an API call) at the NSIS entity at the local host.Application Application Server (0, 1, or more) Application +----+ +----+ +----+ | +------------------------+ +------------------------+ | +-+--+ +----+ +-+--+ | | | NSIS Entities NSIS Entities | +-+--+ +----+ +-----+ +-+--+ | +--------+ +----------------------------+ +-----+ | +-+--+ +-+--+ +--+--+ +-+--+ | | ------ | | | | //// \\\\\ | | +-+--+ +-+--+ |/ | +-+--+ +-+--+ | | | | | Internet | | | | | | +--------+ +-----+ +----+ +-----+ | +----+ +----+ |\ | +----+ +----+ \\\\ ///// sender NAT/FW (1+) ------ NATFW (1+) receiver Figure 1: Generic View on NSIS in a NAT / Firewall case Forrunningend-to-end NATFWsignalingsignaling, it is necessary that eachFirewallfirewall and each NATinvolved inalong the path between the data sender and the data receiver implement thesignaling communication runs anNSIS NATFWentity.NSLP. There might be several NATs and FWs in various possible combinations on a path between two hosts.The reader is referred toSection2.1 where different2 presents a number of likely scenariosare presented.with different combinations of NATs and firewalls. 2. NetworkEnvironment 2.1 NetworkDeployment Scenariosfor Protocol Functionalityusing NATFW NSLP This section introduces several scenarios formiddleboxes in the Internet.middlebox placement within IP networks. Middleboxes arelocatedtypically found at various different locations,i.e.including at Enterprise network borders, within enterprise networks, as mobile phone network gateways, etc.In general,Usually, middleboxes are placedmorerather towards the edge of networksand lessthan in network cores.Those middleboxes are not onlyFirewalls and NATs may be found at these locations eitherFirewallalone, orNAT and anythey may be combined; othertypecategories ofcombination is possible. Thus,middleboxes may also be found at such locations, possibly combined with the NATs and/or Firewalls. To reduce the number of network elements needed, combined Firewall and NATsarehave been made available. NSIS initiators (NI)are sendingsend NSIS NATFW NSLP signaling messages via the regular data path to the NSIS responder (NR). On the datapathpath, NATFW NSLP signaling messages reach different NSIS peers thathaveimplement the NATFWNSLP implemented.NSLP. Each NATFW NSLP node processes the signaling messages according to Section 3and installs,and, if necessary, installs policy rules for subsequent data packets. Each of the followingsectionsub-sections introduces a different scenario for a different set of middleboxes and their ordering within the topology. It is assumed that each middlebox implements the NSIS NATFW NSLP signaling protocol.2.1.12.1 FirewalltraversalTraversal This section describes a scenario with Firewallsonly andonly; NATs are not involved.BothEach endhosts arehost is behind aFirewall that isFirewall. The Firewalls are connected via the public Internet. Figure 2 shows the topology. The part labeled "public" is the Internetconnectionconnecting both Firewalls. +----+ //----\\ +----+ NI -----| FW |---| |------| FW |--- NR +----+ \\----// +----+ private public private FW: Firewall NI: NSIS Initiator NR: NSIS Responder Figure 2: Firewall Traversal Scenario Each Firewallon-pathon the data path must provide traversal service for NATFW NSLP in order to permit the NSIS message to reach the other end host. All Firewalls process NSIS signaling and establish appropriate policy rules, so that the required data packet flow can traverse them.2.1.22.2 NAT with two private Networks Figure 3 shows a scenario with NATs at both ends of the network. Therefore, each application instance, NSIS initiator and NSIS responder, are behind NATs. The outermost NAT at each side is connected to the public Internet. The NATs are generically labeled as MB (for middlebox), since those devices definitely implementat least NAT-only,NAT functionality, but can implementFirewallingfirewall functionality as well. Only two middleboxes MB are shown in Figure 3 at each side, but ingeneral more than one MBgeneral, any number of MBs on each side must be considered. +----+ +----+ //----\\ +----+ +----+ NI --| MB |-----| MB |---| |---| MB |-----| MB |--- NR +----+ +----+ \\----// +----+ +----+ private public private MB: Middlebox NI: NSIS Initiator NR: NSIS Responder Figure 3: NAT with twoprivate networksPrivate Networks Scenario Signaling traffic from NI to NR has to traverse allfourthe middleboxes on thepathpath, and allfourthe middleboxes must be configured properly to allow NSIS signaling totraverse.traverse them. The NATFW signaling must configure all middleboxes and consider any address translation that will result from this configuration in further signaling. The sender (NI) has to know the IP address of the receiver (NR) in advance, otherwisehe cannotit will not be possible to senda singleany NSIS signalingmessagemessages towards the responder. Note that this IP address is not the private IP address of the responder. Instead a NAT binding (including a public IP address) has to beobtained frompreviously installed on the NAT that subsequently allows packetshittingreaching the NAT to be forwarded to the receiver within the private address realm. This generally requires further support from an application layer protocol for the purpose of discovering and exchanging information. The receiver might have a number of ways to learn its public IP address and port number and might need to signal this information to the sender using the application level signaling protocol.2.1.32.3 NAT withprivate networkPrivate Network onsender sideSender Side This scenario shows an application instance at the sending node that is behind one or more NATs (shown asMB).generic MB, see discussion in Section 2.2). The receiver is located in the public Internet. +----+ +----+ //----\\ NI --| MB |-----| MB |---| |--- NR +----+ +----+ \\----// private public MB: Middlebox NI: NSIS Initiator NR: NSIS Responder Figure 4: NAT withprivate networkPrivate Network onsender scenarioSender Side Scenario The traffic from NI to NR has to traverseonlymiddleboxes only on the sender's side. The receiver has a public IP address. The NI sends its signaling message directly to the address of the NSIS responder. Middleboxes along the path intercept the signaling messages and configure the policy rules accordingly. Note that the data sender does not necessarily know whether the receiver is behind a NAT or not, hence, it is the receiving side that has to detect whether itself is behind a NAT or not. As described in Section3.2.23.3.2 NSIS can also provide help for this procedure.2.1.42.4 NAT withprivate networkPrivate Network onreceiver sideReceiver Side Scenario The application instance receiving data is behind one or moreNATs.NATs shown as MB (see discussion in Section 2.2). //----\\ +----+ +----+ NI ---| |---| MB |-----| MB |--- NR \\----// +----+ +----+ public private MB: Middlebox NI: NSIS Initiator NR: NSIS Responder Figure 5: NAT withprivate networkPrivate Network onreceiverReceiver Scenario Initially, the NSIS responder must determine its public reachable IP address at the external middlebox and notify the NSIS initiator about this address. One possibility is that an application level protocol is used, meaning that the public IP address is signaled via this protocol to the NI. Afterwards the NI can start its signaling towards the NR and so establishing the path via thebothmiddleboxesMB.in the receiver side private network. This scenario describes the use case for thereserveRESERVE mode of the NATFW NSLP.2.1.52.5 Both End Hosts behind twice-NATs This is a special case, where the main problemis to detectconsists of detecting that bothnodesend hosts are logically within the same address space, but are alsobehindin two partitions of the address realm on either side of a twice-NAT (see [8] for a discussionaboutof twice-NAT functionality). Sender and receiver are both within a single private address realmandbut the two partitions potentially have overlapping IPaddresses.address ranges. Figure 6 shows theorderingarrangement of NATs. This is a common configuration inseveralnetworks, particularly after the merging of companies that have used the same private address space,thus having overlapping addressesresulting inmany cases.overlapping address ranges. public +----+ +----+ //----\\ NI --| MB |--+--| MB |---| | +----+ | +----+ \\----// | | +----+ +--| MB |------------ NR +----+ private MB: Middlebox NI: NSIS Initiator NR: NSIS Responder Figure 6: NAT topublic, senderPublic, Sender andreceiver behindReceiver on either side of a twice-NAT Scenario The middleboxes shown in Figure 6 are twice-NATs,i.e.i.e., they map IP addresses and port numbers on both sides, at private and public interfaces. This scenario requires assistance of application level entities,likesuch as a DNS server.ThoseThe application level gateways must handlerequestrequests that are based on symbolicnamesnames, and configure the middleboxes so that data packets are correctly forwarded from NI to NR. The configuration of those middleboxes may require other middlebox communication protocols, like MIDCOM [7]. NSIS signaling is not required in the twice-NAT only case, since the middleboxes oftypethe twice-NAT type are normally configured by other means. Nevertheless, NSIS signaling might by useful when there are Firewalls on path. In this case NSIS will not configure any policy rule at twice-NATs, but will configure policy rules at theintermediate Firewalls.Firewalls on the path. The NSIS signaling protocol must be at least robust enough to survive this scenario.2.1.62.6 Both End Hostsbehind sameBehind Same NAT When NSIS initiator and NSIS responder are behind the same NAT (thus being in the same address realm, see Figure 7), they are most likely not aware of this fact. As in Section2.1.42.4 the NSIS responder must determine its public IP address in advance and transfer it to the NSIS initiator. Afterwards, the NSIS initiator can start sending the signaling messages to the responder's public IP address. During this process, a public IP address will be allocated for the NSIS initiator at the same middlebox as for the responder. Now, the NSIS signaling and the subsequent data packets will traverse the NATtwo times:twice: from initiator to public IP address of responder (first time) and from public IP address of responder to responder (second time). This is the worstcase,case in which both sender and receiver obtain a public IP address at theNATNAT, and the communication path is certainly not optimalanymore.in this case. NI public \ +----+ //----\\ +-| MB |----| | / +----+ \\----// NR private MB: Middlebox NI: NSIS Initiator NR: NSIS Responder Figure 7: NAT topublic, both host behind samePublic, Both Hosts Behind Same NAT The NSIS NATFW signaling protocol should support mechanisms to detect such a scenario. The signaling shoulddirectly bybe exchanged directly between NI and NR without involving the middlebox.2.1.72.7 IPv4/v6 NAT with twoprivate networksPrivate Networks This scenario combines theusageuse casementioneddescribed in Section2.1.22.2 with the IPv4 to IPv6 transitionscenario, i.e.scenario involving address and protocol translation, i.e., using Network Address and Protocol Translators (NAT-PT, [11]). The differencetofrom the other scenarios is the use of IPv6 to IPv4 (and vice versa) address and protocol translation. Additionally, the base NTLP musttake care of this case for its own functionalitysupport transport offorwardingmessagesbetweenin mixed IPv4 and IPv6 networks where some NSISpeers.peers provide translation. +----+ +----+ //---\\ +----+ //---\\ +----+ +----+ NI --| MB |--| MB |--| |--| MB |-| |--| MB |--| MB |-- NR +----+ +----+ \\---// +----+ \\---// +----+ +----+ private public public private IPv4 IPv6 MB: Middlebox NI: NSIS Initiator NR: NSIS Responder Figure 8: IPv4/v6 NAT with twoprivate networksPrivate Networks This scenario needs the same type of application level support as described in Section2.1.52.5, and sothosethe issuesofrelating to twice-NATs apply here as well.2.1.82.8 Multihomed Network with NAT The previouschapterssub-sections sketched network topologies whereNAT andseveral NATs and/or Firewalls are ordered sequentially on the path. Thischaptersection describes a multihomed scenario with two NATs placed on alternative paths to theInternet.public network. +----+ NI -------| MB |\ \ +----+ \ //---\\ \ -| |-- NR \ \\---// \ +----+ | --| MB |-------+ +----+ private private public MB: Middlebox NI: NSIS Initiator NR: NSIS Responder Figure 9: Multihomed Network withtwoTwo NATs Depending on the destinationtheor load balancing requirements, either one or the other middlebox is used for the data flow. Which middlebox is used depends on local policy or routing decisions. NATFW NSLP must be able to handle this situationproper,properly, see Section3.2.23.3.2 fora more elaboratedan expanded discussion of this topic with respect to NATs.2.2 Trust Relationship and Authorization Trust relationships3. Protocol Description This section defines messages, objects, andauthorization are very importantprotocol semantics for theprotocol machinery. Trust and authorization are closely related to each other inNATFW NSLP. Section 3.1 introduces thesense that a certain degreebase constituent element oftrust is required to authorizeaparticular action. For any action (e.g. "create/delete /prolong policy rules" then authorization is very important due tosession state, thenature of middleboxes. It is particularly not surprising that different degrees of required authorization in a QoS signaling environment and middlebox signaling exist. As elaborated in [23], establishment of a financial relationship is very important for QoS signaling, whereas for middlebox signaling is not directly of interest. For middlebox signaling a stronger or weaker degree of authorization might be needed. Different trust relationships that appear in middlebox signaling environments are described inpolicy rule. Section 3.2 introduces thesubsequent sections. Peer-to-peer trust relationships are those, which are used in QoS signaling todayprotocol andseem to bethesimplest. However, there are reasons to believe that thisprotocol behavior isnotdefined in Section 3.3. Section 5 defines theonly typesyntax oftrust relationship found in today's networks. 2.2.1 Peer-to-Peer Trust Relationship Starting withthesimplest scenario it is assumed that neighboring nodes trust each other. The required security association to authenticatemessages and objects. 3.1 Policy Rules Policy rules, bounded toprotectasignaling message is either available (manual configuration) or dynamically established with the help of an authentication and key exchange protocol. If nodessession, arelocated closely together it is assumed that security association establishment is easier than establishing it between far distant node. It is, however, difficult to describe this relationship generally due to the different usage scenarios and environments. Authorization heavily depends on the participating entities but for this scenario it is assumed that neighboring entities trust each other (at least forthepurposebuilding block ofpolicy rule creation, maintenance and deletion). Note that Figure 10 does not illustrate the trust relationship between the end host and the access network. +------------------------+ +-------------------------+ | | | | | Network A | | Network B | | | | | | +---------+ +---------+ | | +-///-+ Middle- +---///////----+ Middle- +-///-+ | | | | box 1 | Trust | box 2 | | | | | +---------+ Relationship +---------+ | | | | | | | | | | | | | | | | | | | | | | Trust | | Trust | | | | Relationship | | Relationship | | | | | | | | | | | | | | | | | | | | | +--+---+ | | +--+---+ | | | Host | | | | Host | | | | A | | | | B | | | +------+ | | +------+ | +------------------------+ +-------------------------+ Figure 10: Peer-to-Peer Trust Relationship 2.2.2 Intra-Domain Trust Relationship In larger corporations often more than onemiddleboxis used to protect different departments. In many casesdevices considered in theentire enterprise is controlled by a security department, which gives instructions toNATFW NSLP. For Firewalls thedepartment administrators. In such a scenariopolicy rule consists usually of apeer-to-peer trust-relationship might be prevalent. Sometimes it might be necessary to preserve authentication5-tuple, source/destination address, transport protocol, andauthorization information within the network. As a possible solution a centralized approach could be used wherebysource/destination port number, plus aninteraction betweenaction like allow or deny. For NATs theindividual middleboxes and a central entity (for example apolicydecision point - PDP) takes place. As an alternative individual middleboxes could exchange the authorization decision to another middlebox within the same trust domain. Individual middleboxes within an administrative domain should exploit their trust relationship insteadrule consists ofrequesting authenticationaction 'translate this address to realms address pool' andauthorization offurther mapping information, that might be in thesignaling initiator againmost simply case internal IP address andagain. Thereby complex protocol interaction is avoided. This provides both a performance improvement without a security disadvantage since a single administrative domain can be seen as a single entity. Figure 11 illustrates a network structure, which uses a centralized entity. +-----------------------------------------------------------+ | | | Network A | | | | | | +---------+ +---------+ | +----///--------+ Middle- +------///------++ Middle- +--- | | | box 2 | | box 2 | | | +----+----+ +----+----+ | | | | | | +----+----+ | | | | | Middle- +--------+ +---------+ | | | | box 1 | | | | | | +----+----+ | | | | | | | | | | | - | | | | | - | +----+-----+ | | | | | |external IP address. Policy| | | | +--+---+ +-----------+ Decision +----------+ | | | Host | | Point | | | | A | +----------+ | | +------+ | +-----------------------------------------------------------+ Figure 11: Intra-domain Trust Relationship 2.2.3 End-to-Middle Trust Relationshiprules are usually carried in one piece in signaling applications. Insome scenarios a simple peer-to-peer trust relationship between participating nodes is not sufficient. Network B might require additional authorization ofNSIS thesignaling message initiator. If authentication and authorization informationpolicy rule isnot attached to the initial signaling message thendivided into thesignaling message arriving at Middlebox 2 would causefilter specification, anerror message to be created, which indicates theallow or deny action, and additionalauthorization requirement. In many cases the signaling message initiatorinformation. The filter specification isalready aware of the additionally required authorization before the signalingcarried within NTLP's messageexchange is executed. Replay protection is a requirement for authentication to the non-neighboring middlebox, which might be difficult to accomplish without addingrouting information (MRI) and additionalroundtrips to the signaling protocol (e.g. by adding a challenge/response type of message exchange). Figure 12 shows the slightly more complex trust relationshipsinformation is carried inthis scenario. +----------------------+ +--------------------------+ | | | | | Network A | | Network B | | | | | | | Trust | | | | Relationship | | | +---------+ +---------+ | | +-///-+ Middle- +---///////----+ Middle- +-///-+ | | | | box 1 | +-------+ box 2 | | | | | +---------+ | +---------+ | | | | | | | | | | |Trust | | | | | | |Relationship | | | | | | | | | | Trust | | | | | | | Relationship| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | +--+---+ | | | +--+---+ | | | Host +----///----+------+ | | Host | | | | A | |Trust | | B | | | +------+ |Relationship | +------+ | +----------------------+ +--------------------------+ Figure 12: End-to-Middle Trust Relationship 3. Protocol Description The protocol description section defines the NSIS NATFW NSLP with its messages, objects, and the protocol semantics. Section 3.1 introduces the protocol and Section 3.3 definesNSLP's objects. Additional information is, for example, thesyntaxlifetime ofthe messages and objects. The protocol behavior is defined in Section 3.2. 3.1a policy rule or session. 3.2 Basic protocol overview The NSISSignaling Layer Protocol (NSLP) for NAT and FW traversalNATFW NSLP is carried over the NSIS Transport Layer Protocol (NTLP) defined in [3]. NATFW NSLP messages are initiated by the NSIS initiator (NI), handled by NSIS forwarders (NF) and finally processed by the NSIS responder (NR). It is required that at least NI and NR implement this NSLP, intermediate NF only implement this NSLP when they provide middlebox functions.ForwardersNSIS forwarders that do not have any NATFW NSLP functions just forward thesemessages; those forwarders implement NTLP and one or more other NSLPs.packets when they have no interest (which is expected to happen in most cases). A Data Sender(DS) that is(DS), intending to send data to a Data Receiver (DR) must first start its NATFW NSLP signaling.SoIn the next step, the NI at the data sender (DS) starts NSLP signaling towards the address of data receiver DR (see Figure13).10). Although the above NATFW NSLP usage is expected to be the most common, this specification does not prevent scenarios where the data sender and NI reside on different hosts. +-------+ +-------+ +-------+ +-------+ | DS/NI |<~~~| MB1/ |<~~~| MB2/ |<~~~| DR/NR | | |--->| NF1 |--->| NF2 |--->| | +-------+ +-------+ +-------+ +-------+ ========================================> Data Traffic Direction ---> : NATFW NSLP request signaling ~~~> : NATFW NSLP response signaling DS/NI : Data sender and NSIS initiator DR/NR : Data receiver and NSIS responder MB1 : Middlebox 1 and NSIS forwarder 1 MB2 : Middlebox 2 and NSIS forwarder 2 Figure13:10: General NSIS signaling The sequence of NSLP events is as follows: o NSLP request messages are processed each time a NF with NATFW NSLP support is passed.ThoseThese nodes process the message, check local policies for authorization and authentication, possibly create policy rules, and forward the signaling message to the next NSIS node. The request message is forwarded until it reaches the NSIS responder. o NSIS responders will check received messages and processthosethem if applicable. NSIS responders generate response messages andsentsend them hop-by-hop back to the NI via the same chain ofNFs.NFs (traversal of the same NF chain is guaranteed through the established reverse message routing state in the NTLP). o The response message is processed at eachNI forwarderNF implementing NATFW NSLP.Theo Once the NI has received a successful response, the Data Sender can start sending its data flow to the DataReceiver, when the signaling was successful, meaning that NI has received a successful response. In general,Receiver. NATFW NSLP signaling follows the data path from DS toDR. ThisDR, this enables communication between both hosts for scenarios with only Firewalls on the data path or NATs on sender side. For scenarios with NATs on the receiver side certain problems arise, see also Section 2. WhenData receiver (DR)the NR andData Sender (DS)the NI are located in different address realms andDRthe NR is behind a NAT,DSthe NI cannot signal toDRthe NR directly.DRThe NR is not reachable fromDSthe NIs and thus no NATFW signaling messages can be sent to the DR's address. Therefore,DRthe NR must firstdetermine an address atobtain a NAT binding that is reachable forDS, for instance DR must determine its public IP address.the NI. OnceDRthe NR has determined a publicaddressIP address, it forwards this information to the DS via a separatemechanism, which may be application level signaling like SIP.protocol (such as SIP). This applicationlevel signalinglayer signaling, out of scope of the NATFW NSLP, may involve third parties that assist in exchangingthis information. This separate mechanism is out of scope of NATFW NSLP.these messages. NATFW NSLP signaling supports thispublic address fixing with this mechanism: o First, DRscenario by using the RESERVE mode of operation : 1. The NR determines a public address by signaling on the reverse path(DR(NR towardsDS)NI) and thus making itself available to other hosts. This process of determining a public addresses is called reservation. This way DR reserves publicly reachable addresses and ports, but this address/port cannot be used by data traffic at this point of time.o Second, DS is signaling2. The NI signals directlyto DRthe NR asDSNI would do if there is no NAT in between, andso creatingcreates policy rules at middleboxes. Note, that the reservation mode will make reservations only, which will be "activated" by the signaling fromDSNI towardsDR.NR. The first mode is detailed in the Section3.2.23.3.2 The protocol works on a soft-state basis, meaning thatthatwhatever state is installed or reserved on a middlebox, it will expire, and thus be de-installed/ forgotten after a certain period of time. To prevent this, the NATFW nodes involvedboxeswill have to specifically request a session extension. An explicit NATFW NSLP state deletionmessagecapability is also provided by the protocol. Middleboxes shouldreport backreturn an error in case oferror, soa failure, such that appropriatemeasures and debuggingactions can beperformed.taken; this ability would allow debugging and error recovery. Error messages could be sent upstream (for errors related to received messages as well as asynchronous error notification messages) towards the NI as well as downstream towards the NR (case of asynchronous error notification messages). The next sections define the NATFW NSLP message types and formats, protocol operations, and policy rule operations.3.23.3 Protocol Operations This section defines the protocol operations, how to create sessions, maintain them, and how to reserve addresses.3.2.1All the protocols messages require C-mode handling by the NTLP and cannot be piggybacked to D-mode NTLP messages used during the NTLP path discovery/refresh phase. The protocol messages NTLP usage is described in more details within Section 5. The protocol uses six messages: o CREATE: a request message used for creating, changing, refreshing and deleting NATFW NSLP sessions. o RESERVE-EXTERNAL-ADDRESS (REA): a request message used for reserving an external address o RESPONSE: used to response to CREATE, REA and QUERY messages with Success or Error information o QUERY: a request message used by authorized NATFW NEs for querying NATFW on installed stated o NOTIFY: an asynchronous message used by NATFW NEs to alert upstream and/or downstream NATFW NEs about specific events (mainly failures). o TRIGGER: a message sent upstream to trigger CREATE messages to be sent. The following sections will present the semantics of these messages by exhibiting their impact on the protocol state machine. 3.3.1 Creating Sessions Allowing two hosts to exchange data even in the presence of middleboxes is realized in the NATFW NSLP by the'create session''CREATE ' request message. The data sender generates a'create session'CREATE message as defined in Section3.4.25.4.1 andhandleshands it to the NTLP. The NTLP forwards the whole message on the basis of theflowmessage routing information towardsDR.the NR. Each NSISforwardersforwarder along the path that is implementing NATFWNSLP processNSLP, processes the NSLPmessage, thismessage. Forwarding isdonethus managed NSLP hop-by-hop but may pass transparently through NSIS forwarders which do not contain NATFW NSLP functionality and non-NSIS aware routers between NSLPhop-by-hop. Finally,hop waypoints. When the messageis approaching DR, DRreaches the NR, the NR can accept the request or reject it.DRNR generates a response to therequest,request and this response is transportedhop by hophop-by-hop towards(XXX terminology) DS.the NI. NATFW NSLP forwarders may reject requests at any time. Figure1411 sketches the message flow between NI (DS), a NF (NAT), and NR (DR). NI Private Network NF Public Internet NR | | | |CreateCREATE | | |----------------------------->| | | | | |Error (if necessary) |RESPONSE[Error](if necessary)| | |<-----------------------------|CreateCREATE | | |--------------------------->| | | | | |Path Succeeded/ErrorRESPONSE[Success/Error] | |Path Succeeded/ErrorRESPONSE[Success/Error] |<---------------------------| |<-----------------------------| | | | | | | | Figure14:11: Creation message flowProcessingSince the CREATE message is used for several purposes within the lifetime of'create session'a session, there are several processing rules for NATFW NEs when generating and receiving CREATE messages. The different processing methods depend not only if the CREATE is used to create, modify, refresh or delete a session but also on the node at which the processing happens. For an initial CREATE message the processing of CREATE messages isdifferently perdifferent for every NSISnode:node type: o NSLP initiator: NI onlygenerate 'create session'generates initial CREATE messages andhandlehands them over to the NTLP. After receiving a'path succeeded'successful response, the data path is configured and theNIDS can start sending its data toNR.the DR. After receiving an 'error' response message the NI MAY try to generate the'create session'CREATE message again or give up, depending on the error condition. o NATFW NSLP forwarder:NSLP forwardersNFs receiving'create session' messagesan initial CREATE message MUST first check authentication and authorization before any further processing is executed. The NF SHOULD check with its local policies ifheit can accept the desired policy rule givenbythe combination of the NTLP's 'Message-Routing-Information' (MRI) [3] (the flowrouting information. Furtherdescription information) and the CREATE payload (behavior to be enforced on the packet stream). The NSLP message processing depends on the middlebox type: * NAT: When the'create session'initial CREATE message is received at the public sidea network external node is trying to open a NAT binding. First,of the NAT, it looks for a reservation made inadvanceadvance, bymeans of 'reserve external address'using a REA message Section 3.3.2 , that matches the destination address/port of theflow routing informationMRI provided by the NTLP. Ifthere isno reservation had been made in advance the NSLP SHOULD return an error response message of type 'no reservation found' and discard the request. If there is a reservation, NSLP stores the data sender's address as part of the policy rule to be loaded and forwards the message with the address set to the internal (private in most cases) address of the next NSIS node. When the'create session' messageinitial CREATE message, for a new session, is received at the private side the NAT binding is reserved, but not activated. The NSLP message is forwarded to next hop with source address set to the NAT's externaladdress.address from the newly reserved binding. * Firewall: When the'create session'initial CREATE message is received the NSLP just remembers the requested policy rule, but does not install any policy rule. Afterwards, the message is forwarded to the next NSLP hop. There is a difference between requests from trusted (authorized NIs) and un-trusted (un-authorized NIs); requests from trusted NIs will be pre-authorized, whereas requests from un-trusted NIs will not be pre-authorized. This difference is required to speed-up the protocol operations as well as for the proxy mode usage (please refer to Section 3.4 and [17]). * Combined NAT and Firewall: Processing at combined Firewall and NAT middleboxes is the same as in the NAT case. No policy rules are installed. Implementations MUST takecare aboutinto account the order of packet processing in the Firewall and NAT functions within the device.Order of functions is toThis will beinterpretedreferred to ashow packets experience'order of functions' and is generally different depending on whether thetreatmentpacket arrives at the external or internal side ofthose functions.the middlebox. o NSLP receiver: NRs receiving'create session'initial CREATE messages MUST reply with a'path succeeded''success' (response object has success information) RESPONSE message if they accept the CREATE request message. Otherwise they SHOULD generate a RESPONSE message with an errormessage. Bothcode. RESPONSE messages are sent back NSLP hop-by-hop towardsNI.the NI, independently of the response codes, either success or error. Policy rules at middleboxes MUST be only installed upon receiving a successfulresponse of type 'path succeeded'.response. This is a countermeasure to several problems, forinstance, loadedexample wastage of resources due to loading policy rules at intermediate NFwithout reachingwhen theactual NR. 3.2.2CREATE message does not reach the final the NR for some reason. 3.3.2 Reserving External Addresses NSIS signaling is intended to travel end-to-end, even in the presence of NATs and Firewalls on-path. This works well in cases where the data sender is itself behind a NATand (covered byas described in Section3.2.1).3.3.1. For scenarios where the data receiver is located behind a NAT and it needs to receive data flows from outside its own network (see Figure 5)itthe problem is more troublesome. NSIS signaling, as well as subsequent data flows, are directed to a particular destination IP address that must be known in advance and reachable. +-------------+ AS-Data Receiver Communication +-------->| Application |<-----------------------------+ | | Server | | | +-------------+ | | IP(R-NAT_B) | | NSIS Signaling Message +-------+--+ | +------------------------------------------>| NAT/NAPT | | | | B | | | +-------+--+ | | | AS-Data| | | Receiver| | +----------+ | Comm.| | | NAT/NAPT | | | | | A | | | | +----------+ | | | | | | | | | | | | | v | IP(R) v +--------+ +---------+ | Data | | Data | | Sender | | Receiver| +--------+ +---------+ Figure15:12: The Data Receiver behind NAT problem Figure1512 describes a typical message communication in a peer-to-peer networking environment whereby the two end points learn of each others existence with the help of a third party (referred as Application Server). The communicationwithbetween the application serverandeach of the two end points (data sender and datareceivers) serves a number of functions. As one of the most important functions itreceiver) enables the two end hosts to learnthe IP address ofeachother.others IP address. The approach described in this memo supports this peer-to-peer approach, but is not limited to it. Some sort of communication between the data sender/data receiver and a third party is typically necessary (independently of NSIS). NSIS signaling messages cannot be used to communicate application level relevant end point identifiers (in the generic case at least) as a replacement for the communication with the application server. If the data receiver is behind a NAT then an NSIS signaling message will be addressed to the IP address allocated at the NAT (if there was one allocated). If no corresponding NSIS NAT Forwarding State at NAT/NAPT B exists (binding IP(R-NAT B) <-> IP(R)) then the signaling message will terminate at the NAT device (most likely without proper response message). The signaling message transmitted by the data sender cannot install the NAT binding or NSIS NAT Forwarding State "on-the-fly" since this would assume that the data sender knows the topology at the data receiver side(i.e.(i.e., the number and the arrangement of the NAT and the private IP address(es) of the data receiver). The primary goal of path-coupled middlebox communication was not to force end hosts to have this type of topology knowledge. Public Internet Private Address Space Edge NI(DS) NAT NAT NR(DR) NR+ NI+ | | | | | | | | | | | | | |Reserve | Reserve | | |<---------|<----------------|REA | REA | | |<----------------------|<----------------------| | | |Return|ext addr/Error| |RESPONSE[Success/Error]|RESPONSE[Success/Error]| ||--------->|---------------->||---------------------->|---------------------->| | | | | | | | |====================================================>============================================================> Data Traffic Direction Figure16:13: Reservation message flow Figure1613 shows the message flow for reserving an external address/ port at a NAT. In this case the roles of the different NSIS entities are: o Theactualdata receiver (DR) for the anticipated data traffic is the NSIS initiator (NI+) for the'reserved external address'RESERVE-EXTERNAL-ADDRESS (REA) message, but becomes the NSIS responder (NR) for'create session' messagesfollowinglater.CREATE messages. o The actual data sender (DS) will be the NSIS initiator (NI) for later'create session'CREATE messages and may be the NSIS target of the signaling (NR+). o The actual target of the'reserved external address'REA message may be an arbitraryaddress NR+.address, the Opportunistic Address (OA) that would force the message to get intercepted by the far outmost NAT in the network. . The NI+ agent (could be on the data receiver DRstarts to signal an 'reserve external address' message intoor on any other host within he private network) sends a the"wrong direction". By "wrong" we referREA message targeted to theusual behavior of path-coupled signaling where the data sender starts signalingOpportunistic Address (OA). The OA selection for this message is discussed inorder to tackle with routing asymmetry.Section 3.8. Thedata receiver would typically return signaling messages tomessage routing for thedata senderREA message is in the reverse directionby utilizing state created at nodes along the path (i.e.toreverse routethe normal message routing used for path-coupled signalingmessages). In case ofwhere the signaling is sent downstream (as opposed to upstream in this case). When establishing NAT bindings (and NSIS NAT Forwarding State) the direction does not matter since the data path is modified through route pinning due to the external NAT address. Subsequent NSIS messages (and also data traffic) will travel through the same NAT boxes. Thesignaling target address selection for this message is discussed in Section 3.2.10. TheREA signaling message creates NSIS NAT Forwarding State at any intermediate NSIS NATnode(s).node(s) encountered. Furthermore it has to be ensured that the edge NAT device is discovered as part of this process. The end host cannot be assumed to know this device - instead the NAT box itself is assumed to know that ithas such a capability.is located at the outer perimeter of the private network. Forwarding of the'reserve external address'REA ' message beyond this entity is not necessary, and should be prohibited as it provides information on the capabilities of internalhosts capabilities.hosts. The edge NAT deviceis respondingresponds to the REA message with a'return external address'RESPONSE message containing a success object carrying the public reachable IP address/port number. Processing of'reserve external address'REA messages isdifferently perspecific to the NSISnode:node type: o NSLP initiator: NI+ only generate'reserve external address'REA messages and should never receive them. o NSLP forwarder: NSLP forwarders receiving'reserve external address'REA messages MUST first check authentication and authorization before any further processing is executed. The NF SHOULD check with its local policies ifheit can accept the desired policy rule given by NTLP'sflowmessage routinginformation.information (MRI). Further processing depends on the middlebox type: * NAT: NATs check whether the message is received at thepublicexternal (public in most cases) address or at theprivateinternal (private) address. If received at thepublicinternal address a NF MAY generate a RESPONSE message with an errormessageof type'requested external address'REA received from outside'. If received at theprivateinternal address, an IP address/port is reserved. In the case it is an edge-NAT, the NSLP message is not forwarded anymore and aresponse of type 'returnRESPONSE message with the externaladdress'address and port information is generated. If it is not an edge-NAT, the NSLP message is forwardedfurther.further with the translated IP address/port (if required by the NI+). * Firewall: Firewalls MUST not change their configuration upon a'reserve external address'REA message. They simply MUST forward the message and MUST keep NTLP state. Firewalls that are configured as edge-Firewalls(XXX, do definition!)MAY return an error of type 'no NAT here'. * Combined NAT and Firewall: Processing at combined Firewall and NAT middleboxes is the same as in the NAT case. o NSLP receiver: This type of message should never be received by any NR and it SHOULD be discarded silently. Processing of'returna RESPONSE message with an externaladdress' messagesaddress object isdifferently perdifferent for every NSISnode:node type: o NSLP initiator: Upon receiving a'return external address'RESPONSE message with an external address object, the NI+ can use theobtainedIP address and portnumberpairs carried for further application signaling. o NSLP forwarder: NFs simply forward this message as long as they keep state for the requested reservation. o NSIS responder: This type of message should never be received byanyan NR and it SHOULD be discarded silently.3.2.3 Reserving External Addresses and Create Session Some migration scenarios need specialized support to cope with the situation where the receiving side is running NSIS only. End-to-end signaling is going to fail without NSIS support at both sides. For this the 'create-reverse' signaling mode is supported. In this case, a DR can signal towards the DS like in the 'reserve external address' message scenario. The message is forwarded until it reaches the edge-NAT and retrieves a public IP address and port number. Unlike in the 'reserve external address' no 'return external address' response message is created, the forwardingo Edge-NATs: This type ofthe requestmessagestops and a 'create session' message is generatedshould never be received bythe edge-NAT. This request message is sent towards DR with DS as source addressany Edge-NAT andfollows the regular processing orders as 'create session' messages do. The exact definition of this mode is toit SHOULD bedone. 3.2.4 Prolonging Sessionsdiscarded silently. 3.3.3 NATFW Session refresh NATFW NSLP sessions are maintained on a soft-state base. After a certaintimeouttimeout, sessions and corresponding policy rules are removed automatically by the middlebox, if they are notrefreshed byrefreshed. The protocol uses aprolong session message. NI is sending prolongCREATE messagetowards NR andto refresh sessions. Even if used for refresh purposes the CREATE message requires to be responded back, to allow the intermediate NFs to propose a refresh period that would align to their local policies. The NI sends CREATE messages destined for the NR. Upon reception by each NSISforwarder maintainingforwarder, the state for the given session IDextendsis extended by thelifetimesession refresh period, a period ofthe session.time calculated based on a proposed refresh message period. Extending lifetime of a session is calculated as current local time pluslifetime.proposed lifetime value (session refresh period). Section3.2.7 is defining3.5 defines the process of calculating lifetimes in detail. NI Public Internet NAT Private address NR | | space | |ProlongCREATE[lifetime > 0] | | |----------------------------->| | | | | |ErrorRESPONSE[Error] (ifnecessary)needed) | | |<-----------------------------|ProlongCREATE[lifetime > 0] | | |--------------------------->| | | | | |Error (if necessary)RESPONSE[Success/Error] | |Error (if necessary)RESPONSE[Success/Error] |<---------------------------| |<-----------------------------| | | | | | | | Figure17: Prolongation message flow14: State Refresh Message Flow Processing of'prolong session'session refresh CREATE messages isdifferently perdifferent for every NSISnode:node type: o NSLP initiator: NI can generate'prolong session'session refresh CREATE messages before the session times out. The rate at which the refresh CREATE messages are sent and their relation to the session state lifetime are further discussed in Section 3.5. The message routing information and the extended flow information object MUST be set equal to the values of the initial CREATE request message. o NSLP forwarder: NSLP forwarders receiving'prolong session'session refresh messages MUST first check authentication and authorization before any further processing is executed. The NF SHOULD check with its local policies ifheit can accept the desired lifetime extension for the session referred by the session ID. Processing of this message is independent of the middlebox type. o NSLP responder:NIsNRs accepting thisprolongsession refresh CREATE message generate a'path succeeded' message. 3.2.5RESPONSE message with response object set to success. 3.3.4 Deleting Sessions NATFW NSLP sessions may be deleted at any time. NSLP initiators can trigger this deletionvia the 'delete session' message,by using a CREATE messages with a lifetime value set to 0, as shown in Figure17.15. NI Public Internet NAT Private address NR | | space | |DeleteCREATE[lifetime=0] | | |----------------------------->| | | | | | |DeleteCREATE[lifetime=0] | | |--------------------------->| | | | Figure18:15: Delete message flow NSLP nodes receiving this message MUST delete the session immediately. Corresponding policy rules to this particular session MUST be deleted immediately, too. This message is forwarded until it reaches the final NR. The'delete'CREATE request message with a lifetime value of 0, does not generate any response, neither positive nor negative, since there is no NSIS state left at the nodes along the path.3.2.6 Authorization Authorization3.3.5 Reporting Asynchronous Events NATFW NSLP forwarders andsecurity issuesNATFW NSLP responders must have the ability to report asynchronous events to other NATFW NSLP nodes, especially reporting back to the NATFW NSLP initiator. Such asynchronous events may be premature session termination, changes in local polices, or any other reason that indicates change of the NATFW NSLP session state. Currently, only asynchronous session termination is defined as event, but other events may be defined in later versions of this memo. NFs and NRs may generate NOTIFY messages upon asynchronous events, with a response object indicating the reason of the event. There arecurrently discussedtwo suggested mode of operations: 1. NOTIFY messages are sent hop-by-hop upstream towards NI. Those NOTIFY messages may be sent downstream towards NR, if generated by a NF, if needed. TBD: Should there be a way to configure whether NOTIFY messages are sent downstream, too? 2. During session creation, via CREATE or REA, NIs may insert a special 'notify address' object into the NSLP message, indicating a node's address that should be notified about this event. TBD: When this object is used, is it desired to send the NOTIFY to both, NI and the other node? Sending to both could end up in one asynchronous event generating three messages: NOTIFY to NI (upstream), NOTIFY to NR (downstream), and NOTIFY to notify address. Processing is different for every NATFW NSLP node type and only defined for asynchronous session termination events: o NSLP initiator: NIs receiving NOTIFY messages MUST first check for authentication and authorization. After successfully doing so, NIs MUST remove the NSLP session as indicated by the NOTIFY message. NIs MUST NOT generate NOTIFY messages. o NSLP forwarder: NFs receiving NOTIFY messages MUST first check for authentication and authorization. After successfully doing so, NFs MUST remove the NSLP session and corresponding policy rules immediately and MUST forward the NOTIFY message. NFs occurring an asynchronous event generate NOTIFY messages and set the response object to 'session termination' code. NOTIFY messages are sent hop-by-hop upstream towards NI (This depends on above mentioned design choice). o NSLP responder: NRs may generate NOTIFY messages. NRs receiving NOTIFY messages MUST first check for authentication and authorization. After successfully doing so, NRs MUST remove the NSLP session immediately. NRs occurring an asynchronous event generate NOTIFY messages and set the response object to 'session termination' code. NOTIFY messages are sent hop-by-hop upstream towards NI (This depends on above mentioned design choice). 3.3.6 QUERY capabilities within the NATFW NSLP protocol The NATFW NSLP provides query capabilities that could be used by: o A session owner to track the session state, this would be used for diagnosis when no data packets were received and the policy rule was supposed to be created on the NATFW NFs. o A superuser to track user activities, detect misbehaving users and blocking them from using the NATFW NSLP on the NATFW NFs within the network. When doing so it is recommended that the QUERY message be scoped to the limits of the administrative domain. The QUERY message could be used to query the following information: o Session information: session id, flow source, destination and status of the state listed in best status to worst status: up, high traffic (used to detect DOS attack or unexpected traffic rate), pending, down. The status of the policy rule indicate sufficient diagnosis information, in case more diagnosis information is required it could be provided by the NATFW NF logs. Session status is only provided by an NF if no session status was provided in the QUERY message or the NF's session status is worst than the one provided by the queried upstream NEs. The Session information could be retrieved by sending a QUERY against a specific session id, a flow source and destination or user identifier with session id or flow source and destination. o User identifiers: the query would be used by a super-user to track activities of a suspected user, the query would return all the suspected user active sessions QUERY message processing is differentdocumentfor every NATFW NSLP node type: o NSLP initiator: NIs only generate QUERY messages, but never with session status information, in case received QUERY messages MUST be discarded. o NSLP forwarder: NFs receiving QUERY messages MUST first check for authentication and authorization. After successfully doing so, NFs will behave differently depending on the QUERY. * if the QUERY is about a specific session: if it contains a session status the NF compares it to the current local session status; if no session status is provided in the QUERY message the NF will insert its own session status in the QUERY message. If the current local session status is worst, it will incorporate its own session status field in the QUERY message. Every NF will provide the flow description in case it was not inside the QUERY. * if the QUERY is about a specific user, the NF will gather all the user's sessions and provide a list of them. Once the message processing is done, if the message was not scoped then NF will forward the QUERY message to the next downstream node. o NSLP responder: NRs (any node being the destination of the message)receiving QUERY messages MUST first check for authentication and authorization. After successfully doing so, NRs must process the message as the NFs and respond with a RESPONSE message to the NI. The RESPONSE message will travel along the established reverse path Message Routing State. Responses to QUERY messages are processed differently for every NATFW NSLP node type: o NSLP initiator: NIs receiving RESPONSEs to QUERY messages MUST first check for authentication and authorization. After successfully doing so, the objects within the RESPONSE messages are provided up to the application layers and the session state remains as it was unless the application triggers NATFW NSLP state changes. o NSLP forwarder: NFs receiving RESPONSEs to QUERY messages MUST first check for authentication and authorization. After successfully doing so, NFs forward the message upstream without any interpretation. o NSLP responder: if an NR received a RESPONSE to QUERY message it MUST discard it. 3.3.7 QUERY Message semantics From a semantics perspective, the QUERY messages may require the following information incorporated within the messages: o Session ID o User ID o Flow source (address and port) and destination (address and port), in case the flow doesn't use a transport protocol a protocol number would beincludedused with another identifier (SPI for IPsec) QUERY responses should provide the following information: o List of active sessions associated to a user o Related information to a session: session ID, flow description and policy rule state information 3.4 NATFW NSLP proxy mode of operation 3.4.1 Reserving External Addresses and triggering Create messages Some migration scenarios need specialized support to cope with cases where only the receiving side is running NSIS. End-to-end signaling is going to fail without NSIS support at both data sender and data receiver, unless the NATFW NSLP also gives the NR the ability to install sessions. In this case, a NR can signal towards the Opportunistic Address as is done in the standard REA message handling scenario Section 3.3.2. The message is forwarded until it reaches the edge-NAT and retrieves a public IP address and port number. Unlike the standard REA message handling case no RESPONSE message is sent. Instead a CREATE message is generated by the edge-NAT. This CREATE request message is sent towards NR with DS as source address (if the source address is known, otherwise the edge NAT address is used as source address) and thereafter follows the regular processing rules as for CREATE messages sent by the NI. DS Public Internet NAT Private address NR No NI | space | | REA[CREATE] | | |<------------------------- | | | CREATE | | | ------------------------> | | | RESPONSE[Error/Success] | | | ---------------------- > | | | | | | | Figure 16: REA Triggering Sending of CREATE Message This behavior requires within the REA message an indication to the edge NAT if either a RESPONSE message or a CREATE message should be used. In addition when the CREATE message is requested (as opposed to a RESPONSE message) the REA message the data sender address. A slight variant, shown in Figure 17 , could also be handled by requesting within the REA message that a RESPONSE message needs to be sent on the existing pinned down path as well as a CREATE message on a newly discovered path between the Edge NAT and the NR. This variant would allow the handling of asymmetric routes, which could go through internal firewalls, within the local network. DS Public Internet NAT Private address NR No NI | space | | REA[CREATE, DISC] | | |<------------------------- | | | RESPONSE[Error/Success] | | | ---------------------- > | | | CREATE | | | ------------------------> | | | RESPONSE[Error/Success] | | | ---------------------- > | | | | | | | Figure 17: REA Triggering Sending of CREATE Message on Separate Reverse Path In case a CREATE message is received from the far end NI and relates the installed session, that CREATE message would have precedence over the previous CREATE. The CREATE sent by the NI would allow to have a more granular policy rule as only the data sender could send data whereas in the REA triggered CREATE message any data source can send packets to the data receiver. The edge NAT is not aware of the applications context for which the CREATE messages were required. Hence it is up to the NR to inform the Edge NAT if there was a possibility to reduce the number of accepted data sources to the real data sender, as well as to inform the Edge NAT to refresh the established session. For that purpose the NR will send TRIGGER messages, to the edge NAT that responded to the REA message. These messages are sent upon reception, from the user application, of further information on the Data Sender (either explicit information or implied information such as data sender address data reception address and same for the transport port). The TRIGGER messages would be sent periodically to the Edge NAT that responded to the REA. The TRIGGER messages would be sent until either a CREATE message is received from the far-end or when the user application no longer needs the NSIS session. Figure 18 shows how TRIGGER messages would be used afterreaching consensus ( [20]). 3.2.7the message sequences of Figure 16 or Figure 17. In case a CREATE message is received from the far end NI and relates to the installed session, that CREATE message would have precedence over the triggered CREATE messages. TRIGGER messages do not require to be responded back with a RESPONSE message on the existing established reverse path. The benefits of using REA triggering a CREATE and then using the TRIGGER messages are that an end-host doesnt need to know if the far-end support the NSIS protocol. Foo.com Public Internet Bar.com DS NAT Firewall NR No NI | | TRIGGER[DSinfo] TRIGGER[DSinfo]<-------------| <-------------| | |CREATE | |----------->|CREATE | | |-------------->| | | RESPONSE[SUCCESS] | | <-------------| RESPONSE[SUCCESS] | |<-----------| | Refresh period expiry | or updates to Data Sender information | | | | TRIGGER[DSinfo] TRIGGER[DSinfo]<-------------| <-------------| | |CREATE | |----------->|CREATE | | |-------------->| | | RESPONSE[SUCCESS] | | <-------------| RESPONSE[SUCCESS] | |<-----------| | Figure 18: TRIGGER message usage 3.4.2 Using CREATE messages to Trigger Reverse Path CREATE Messages In certain network deployments, where a NATFW NE might not be available on the end-host (Figure 19) or the NSIS messages are scoped (Figure 20) implicitly or explicitly with a scoping object, a CREATE message could be used to trigger another CREATE message sent by the last NF terminating the CREATE message. There are two options for this mode: o The returning CREATE message could follow the established reverse path using GIMPS routing state ([3],Section 3.4.2.1) o Trigger the GIMPS layer to discover the reverse path, which would require that the first CREATE message provides the message target address (Section 3.4.2.2). 3.4.2.1 CREATE Responses Sent on Previously Pinned Down Reverse Path Public NI/NR Host foo.com FW Internet FW bar.com Host foo | | bar | | | CREATE[CREATE, NoNR] | | | |<------------------------- | | | | | | | CREATE[CREATE] | | | ,|<-----------------+ | | ' | | | | ' | CREATE[] | | | `'|--------------- ->| | | | | CREATE[] | | | | ------------------------->| | | | RESPONSE[Success/Error] | | | | <------------------------ | | |RESPONSE[Success/Error]| | | | <----------------| Figure 19: CREATE triggering CREATE Message Sending with no Scoping and using Existing Reverse Path State In Figure 19, the first CREATE indicates that if the message can not reach its destination, a CREATE message should be sent back to the NI by the last reached NATFW NE. As in Section 3.4.1 this mode of operation requires that the CREATE message indicate the type of required response which in this case is a CREATE message. However this response type is subject to a condition: only if the NR can not respond. This conditional behavior requires a specific flag to indicate it. In this example, the NI does not require that the last NATFW NF responds via a different reverse path than that already pinned down. Public NI/NR Host foo.com FW Internet FW bar.com Host foo | | bar | | | CREATE[CREATE,Scope] | | | |<------------------------- | | | | | | | | CREATE/RESPONSE[Error] | | | | ------------------------->| | | | RESPONSE[Success/Error] | | | | <------------------------ | Figure 20: CREATE Triggering CREATE Message Sending with Scoping and using Existing Reverse Path State In Figure 20, the first CREATE indicates that once the end of the scope is reached, the last NATFW NSLP will respond with a CREATE message (if the first CREATE request was successful). As in Section 3.4.1, this mode of operation requires that the CREATE message indicate the type of response required which in this case is a CREATE message. As the CREATE needs to terminate at a scope end, the scope need to be provided within the CREATE message. In this example, the NI doesnt require that the last NATFW NF responds via a different reverse path than the already pinned down. 3.4.2.2 CREATE Responses Sent on Separately Established Reverse Path In certain network topologies, where several NATFW NSLP are deployed on alternate paths, it is better to minimize asymmetric route issues that could occur when sending the CREATE message on the existing pinned down reverse path. Foo.com Public Internet Bar.com 2-RESPONSE1 /-------------|--------------------- / --> FW1-NF --------------------- \ V / 1-CREATE1[CREATE,DISC,NoNR]| \ \ Host Foo/ | | NF3-NF Host Bar NI/NR ^ | | |^ \ \ | 3-CREATE2 | || \ \--- FW2-NF --------------------------| \----/ \-------------------------- | 4-RESPONSE2 | Figure 21: CREATE Triggering Sending of CREATE Message with Scoping and Using Separate Reverse path To minimize the asymmetric route problem, the node responding with a CREATE message would request the NTLP to rediscover the reverse path. A RESPONSE message would be sent on the existing pinned down reverse path (Step 2 in Figure 21), and a CREATE would be sent on a newly discovered reverse path (Step 3 in Figure 21). Upon reception of the latter message, the initiating NI will respond with a RESPONSE message (Step 4 in Figure 21) as is done for the normal CREATE message operations (Section 3.3.1). The CREATE message would need to indicate to the last NATFW NF that a CREATE must be sent on a separately discovered path and that a RESPONSE message needs to be sent on the established pinned down reverse path. The new CREATE message need to indicate to the NI that this session is bound to the previous session. In addition the first message should indicate that the last available NATFW NF will need to terminate the message and start the above procedures (similar to Figure 19). The model could also be applied when a scope is used, instead of terminating on the last NATFW NF, the message will terminate on the end of the scope. 3.5 Calculation ofLifetimesSession Lifetime NATFW NSLP sessions, and the corresponding policy rulespossiblywhich may have been installed, are maintained viasoft-state.soft-state mechanism. Each session is assigned a lifetime andthey arethe session is kept alive as long as the lifetime is valid. After the expiration of thelifetimelifetime, sessions and policy rules MUST be removed automatically and resources bound to them should be freed as well. Session lifetime is kept at every NATFW NSLP node. The NSLP forwarders and NSLP responder are not responsible for triggering lifetimeprolonginationextension refresh messages (see Section3.2.4),3.3.3): this is the task of the NSIS initiator. NSIS initiator MUST choose a session lifetime (expressed in seconds) value beforethey can sentsending any message (except 'delete session' messages) to other NSLP nodes.ThisThe session lifetime valueshould consideris calculated based on: o The number of lost refresh messages to cope with o The end to end delay between the NI and NR o Network vulnerability due to session hijacking ([21]). Session hijacking is made easier when the NI does not remove explicitly the session. o The user application'sneeds, i.e., durationdata exchange duration, in terms of seconds, minutes orhours,hours and networkingneeds, i.e., valuesneeds. This duration is modeled as M x R, with R the message refresh period (in seconds) and M a multiple of R. As opposed to the NTLP Message Routing state [3] lifetime, the NSLP session lifetime doesnt require to have a small value since the NSLP state refresh is not handling routing changes but security related concerns. [14] provides a good algorithm to calculate the session lifetime as well as how to avoid refresh message synchronization within the network. [14] recommends: 1. The refresh message timer to be randomly set to a value in the rangeless than 30 seconds[0.5R, 1.5R]. 2. To avoid premature loss of state, L (with L being the session lifetime) must satisfy L >= (K + 0.5)*1.5*R, where K is a small integer. Then in the worst case, K-1 successive messages maynotbeuseful.lost without state being deleted. Currently K = 3 is suggested as the default. However, it may be necessary to set a larger K value for hops with high loss rate. Other algorithms could be used to define the relation between the session lifetime and the refresh message period, the provided algorithm is only listed as an example. This requested lifetime value is placed in the'lifetime object''lifetime' object of the NSLP message and messages are forwarded to the next NATFW NSLP node. NATFWNSLP forwardersNFs processing the request message along the path MAYlowerchange therequestrequested lifetimegivento fit their needs and/or local policy.NATFW forwardersIf an NF changes the lifetime value it must also indicate the corresponding refresh message period. NFs MUST NOT increase the lifetimevalue;value unless the lifetime value was below their acceptable range; they MAY reject the requested lifetime immediately and MUST generate an error response message of type 'lifetime too big' upon rejection. The NSLP request message is forwarded until it reaches the NSLP responder. NSLP responder MAY reject the requested lifetime value and MUST generate an error response message of type 'lifetime too big' upon rejection. The NSLP responder MAY also lower the requested lifetimeas welltoa granted lifetime.an acceptable value (based on its local policies). NSLP responders generate their appropriate response message for the received request message, sets the lifetime value to the above granted lifetime and sends the message back hop-by-hop towards NSLP initiator. Each NSLP forwarder processes the response message, reads and stores the granted lifetime value. The forwarders SHOULD accept the granted lifetime, as long as the value isequal or lower thanwithin therequested lifetime.tolerable lifetime range defined in their local policies. They MAY reject the lifetime and generate a 'lifetime not acceptable' error response message. Figure1922 shows the procedure with an example, where an initiator requests 60minutesseconds lifetime in'create session'the CREATE message and the lifetime is shortened along the path by the forwarder to 20minutesseconds and by the responder to5 minutes.15 seconds. +-------+CREATE(lt=60m)CREATE(lt=60s) +-----------+CREATE(lt=20m)CREATE(lt=20s) +--------+ | |---------------->| NSLP |---------------->| | | NI | | | | NR | | |<----------------| forwarder |<----------------| | +-------+OK(lt=5m)RESPONSE(lt=15s +-----------+OK(lt=5m)RESPONSE(lt=15s +--------+ MRR=3s) MRR=3s) lt = lifetimeCREATEMRR ='create session' message OK = 'path succeeded' messageMessage Refresh Rate Figure19:22: Lifetime Calculation Example3.2.83.6 Middlebox Resource TBD: This section needs to be done and should describe how to map flow routing information to middlebox policy rules. Further, this section should clarify wildcarding.XXX 3.2.93.7 De-Multiplexing at NATs Section3.2.23.3.2 describes how NSIS nodes behind NATs can obtain apublicpublicly reachable IP address and port number at a NAT. The information IP address/port number can then be transmitted via a signaling protocol and/or third party to the communication partner that would like to send datatowards.towards hosts behind the NAT. However, NSIS signaling flows are sent towards the address of the NAT at which this particular IP address and port number is allocated. The NATFW NSLP forwarder at this NAT needs to know how the incoming NSLP requests are related to reserved addresses, meaning how to de-multiplex incoming requests.Two options forThe de-multiplexingincoming NSLP requests are: 1. Based on flow routing information, like protocol number and TCP port numbers. 2. Based on NSIS session IDs. Approach 2) would require that both NSIS ends, initiator and responder, use the same session ID in NSIS signaling. Since session IDs are usually generated randomly, application level signaling would have to be adapted to carry NSIS session IDs used during reservation to the other end (the NSIS initiator sending the 'create session' message). This approach SHOULD NOT be used. Approach 1)method uses information stored at NATs(like(such as mapping of public IP address to private, transport protocol, port numbers) and information given by NTLP's flow routinginformation to de-multiplex NSIS messages. This approach is RECOMMENDED. 3.2.10information. 3.8 SelectingDestination IP addressesOpportunistic Addresses for REARequest messages of type 'reserve external address'REA do need, as any other message type as well, a final destination IP address to reach. But as many applications do not provide a destination IP addressatin the first place, there is a need to choose a destination address forthe 'reserve external address'REA messages. This destination address can be the final target, but forthe mentioned type of application,applications which do not provide an upfront address, the destination addresscanhas to bearbitrary. Takingchosen independently. Choosing the"correct"'correct' destination IP addressmightmay be difficult and it is possible there is noright answer.'right answer'. [19] shows choices for SIP and this section provides some hints about choosing a good destination IPaddress in general.address. 1. Public IP address of the data sender: * Assumption: + The data receiver already learned the IP address of the data sender(e.g.(e.g., via a third party). * Problems: + The data sender might also be behind a NAT. In this case the public IP address of the data receiver is the IP address allocated at this NAT. + Due to routing asymmetry it might be possible that the routes taken by a) the data sender and the application server b) the data sender and NAT B might bedifferent.different, this could happen in a network deployment such as in Figure 12. As a consequence it might be necessary to advertise a new (and different) external IP addresswith SIPwithin the application (which may or may not allow that) after using NSIS to establish a NAT binding. 2. Public IP address of the data receiver (allocated at NAT B): * Assumption: + The data receiver already learned his externally visible IP address(e.g.(e.g., based on the third party communication). * Problems: + Communication with a third party is required. 3. IP addressatof the Application Server: * Assumption: + An application server (or a different third party) is available. * Problems: + If the NSIS signaling message is not terminated at the NAT of the local network then an NSIS unaware application server might discard the message. + Routing might not be optimal since the route between a) the data receiver and the application server b) the data receiver and the data sender might be different.3.34. NATFW NSLPMessagesNTLP Requirements The NATFW NSLP requires the following capabilities from the NTLP: o Ability to detect that the NSIS Responder does not support NATFW NSLP. This capability is key to launching the proxy mode behavior as described in Section 3.4 and [17]. o Detection of NATs and their support of the NSIS NATFW NSLP. If the NTLP discovers that the NSIS host is behind an NSIS aware NAT, the NR will send REA messages to the opportunistic address. If the NTLP discovers that the NSIS host is behind a NAT that does not support NSIS then the NSIS host will need to use a separate NAT traversal mechanism. o Message origin authentication and message integrity protection o Transport of information used for correlation purposes between the NSIS protocol suite and user application layers. This requirement allows NSLP NATFW to check that the message was solicited by prior application message exchanges before an NTLP messaging association is established between an NR and the upstream NF. o Detection of routing changes o Protection against malicious announcement of fake path changes, this is needed to mitigate a threat discussed in section 7 of [21] 5. NATFW NSLP Message Components A NATFW NSLP message consists of a NSLP header and one or more objects following the header. The NSLP header is common for all NSLPs and objects are Type-Length-Value (TLV) encoded using big endian (network ordered) binary data representations. Header and objects areboundaligned to 32bitsbit boundaries andobjectsobject lengths thatdoare notfall intomultiples of 32 bitsboundariesmust be padded to the next higher 32bits.bit multiple. The whole NSLP message is carriedinas payload of a NTLP message. Note that the notation 0x is used to indicate hexadecimal numbers.3.3.15.1 NSLP Header The NSLP header is common to all NSLPs and is the first part of all NSLP messages. It contains two fields, the NSLP message type and a reserved field. The total length is 32 bits. The layout of the NSLP header is defined by Figure20.23. 0 16 31 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | NSLP message type | reserved | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Figure20:23: Common NSLP header The reserved field MUST be set to zero in the NATFW NSLP header before sending and MUST be ignored during processing of the header. Note that other NSLPs use this field as a flag field.3.3.25.2 NSLP message types The message types identify requests and responses. Defined messages types for requests are: o 0x0101 :createCREATE o 0x0102 :reserveRESERVE-EXTERNAL-ADDRESS(REA) o 0x0103 :reserve-createQUERY o 0x0104 :prolongNOTIFY o 0x0105 :deleteRESPONSE o 0x0106 : TRIGGER Defined message types for responsesare: o 0x0201 : path_succeed o 0x0202 : path_deleted o 0x0203 : ret_ext_addrare (TBD): o0x0204 : error 3.3.3TBD 5.3 NSLP Objects NATFW NSLP objects use a common header format defined by Figure21.24. Objects are Type-Length-Value (TLV) encoded using big endian (network ordered) binary data representations. The object header contains two fields, the NSLP object type and the object length. Its total length is 32 bits. Note that all objects MUST be padded always to 32 bits. 0 16 31 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | NSLP object type | NSLP object length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Figure21:24: Common NSLP object header The length is the total length of the object without the object header. The unit is a word, consisting of 4 bytes. The particular values of type and length for each NSLP object are listed in the subsequentchapterssections that define the NSLP objects.3.3.3.1 Session ID Object The session ID object carries an identifier for the sessionTBD: Processing of unknown options is currently subject to discussions within thesignaled flow. The only fieldworking group. It is proposed to extend thesession ID of 16 bytes length. 0 16 31 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | 0x0001 | 16 bytes | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | // 16 bytes session id // | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Figure 22: Session IDNSLP object header with some bits that indicate treatment of unknown options. Thesession ID is generated in random way bycompatibility bits (CP) are coded into two 2 bits and determine theNSIS initiator. 3.3.3.2action to take upon receiving an unknown option. The applied behavior based on the CP bits is: 00 - Abort processing and report error 01 - Ignore object and do not forward 10 - Ignore object and do forward All other combinations MUST NOT be set and objects carrying these other CP bit combinations MUST discarded. 5.3.1 Session Lifetime Object The session lifetime object carries the requested or granted lifetime of a NATFW NSLP session measured in seconds. The object consists only of the 4 bytes lifetime field. 0 16 31 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |0x0002OID_NATFW_LT |4 bytes0x0001 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | NATFW NSLP session lifetime | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Figure23:25: Lifetime object3.3.3.35.3.2 External Address Object The external address objects can be included inret_ext_addr responsesRESPONSE messages (Section3.4.9)5.4.4) only. It contains the external IP address and port number allocated at the edge-NAT.Note that this address/ port may be either reserved or reserve-create.Two fields are defined, the external IP address, and the external port number. For IPv4 the object with value0x0010OID_NATFW_IPv4 is defined. It has a length of 8 bytes and is shown in Figure24.26. 0 16 31 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |0x0010OID_NATFW_IPv4 |8 bytes0x0002 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | port number | reserved | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | IPv4 address | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Figure24:26: External Address Object for IPv4 addresses For IPv6 the object with value0x0011OID_NATFW_IPv6 is defined. It has a length of 20 bytes and is shown in Figure25.27. 0 16 31 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |0x0011OID_NATFW_IPv6 |20 bytes0x0005 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | port number | reserved | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | + + | | + IPv6 address + | | + + | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Figure25:27: External Address Object for IPv6 addresses3.3.3.45.3.3 Extended Flow Information Object In general, flow information is kept at the NTLP level during signaling. The message routing information of the NTLP carries all necessary information. Nevertheless, some additional information may be required for NSLP operations. The 'extended flow information' object carries this additional information aboutnumber ofaction to be taken on the installed policy rules and subsequentportnumbersthat should be allocated at middleboxes.of policy rules. These fields are defined for the policy rule object: o Rule action: This field indicates the action for the policy rule to be activated. Allow values are 'allow' (0x01) and 'deny' (0x02) o Number of ports: This field gives the number of ports that should be allocatedbeginnigbeginning at the port given in NTLP'sflowmessage routing information. 0 16 31 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |0x0011OID_NATFW_FLOW |4 bytes0x0001 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | rule action | number of ports |reserved |+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Figure26:28: Extended Flow Information3.3.3.5 Error5.3.4 Response Code ObjectThe errorThis object carries thereasonresponse code, which may be indications foran error. It has only one field,either a successful request or failed request depending on theerror code, and is 2 bytes long.value of the 'response code' field. 0 16 31 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |0x0002OID_NATFW_RESPONSE |4 bytes0x0001 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |errorresponse code |reserved |+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Figure27: Error29: Response Code Object TBD: Defineerror clasesresponse classes, success codes anddefine theerrorcoded.codes. Possible error classes are: o Policy rule errors o Authentication and Authorization errors o NAT Currently in this memo defined errors: o lifetime too big o lifetime not acceptable o no NAT here o no reservation found o requested external address from outside3.45.3.5 Response Type Object The response type object indicates that a specific response is needed to the NSLP responder. 0 16 31 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | OID_NATFW_RESP_TYPE | 0x0001 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |C|S|L| reserved | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Source IP address | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Figure 30: Response Type Object If the C bit is set to 1 the required response is a CREATE request message, otherwise a RESPONSE message. If the S bit is set to 1 the scoping object MUST be used. If the L bit is set to 1 the CREATE request message is ONLY sent if the message does not reach its target, even though the if the C bit is set. The source IP address is optional and may be set to a zero IP address or to a real IP address. If set to a real address, NATFW NSLP uses this address as assumed data sender's address. 5.3.6 Message Sequence Number Object XXX Text is missing. 0 16 31 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | OID_NATFW_MSN | 0x0001 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | message sequence number | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Figure 31: Message Sequence Number Object 5.3.7 Scoping Object The scoping object determines the allowed scope for the particular message. 0 16 31 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | OID_NATFW_SCOPE | 0x0001 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | message scope | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Figure 32: Scoping Object These 'message scope' values are allowed: region, single hop. 5.3.8 Bound Session ID Object This object carries a session ID and is used for QUERY messages only. 0 16 31 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | OID_NATFW_BID | 0x0001 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | bound session ID | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Figure 33: Bound Session ID Object 5.3.9 Notify Target Object This object carries the IP address of the notify target node. TBD: Details on this, like IPv6 version etc. 0 16 31 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | OID_NATFW_NOTIFY_TGT | 0x0001 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | notify nodes' IPv4 address | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Figure 34: Notify Target Object 5.4 Message Formats This section defines the content of each NATFW NSLP message type. The message types are defined in Section3.3.2.5.2. First, the request messages are defined with their respective objects to be included in the message. Second, the response messages are defined with their respective objects to be included. Basically, each message is constructed of NSLP header and one or more NSLP objects. The order of objects is not defined, meaning that objects may occur in any sequence. Objects are marked either with mandatory [M] or optional [O]. Where [M] implies that this particular object MUST be included within the message and where [O] implies that this particular object is OPTIONAL within the message. Each section elaborates the required settings and parameters to be set by the NSLPatfor the NTLP, for instance, how theflowmessage routing information is set.3.4.1 Policy Rules Policy rules are the building block of middlebox devices considered in the NATFW NSLP. For Firewalls the policy rule consists usually of a 5-tuple, source/destination address, transport protocol, and source/destination port number, plus an action like allow or deny. Other actions are available depending on the implementation of the Firewall, but NATFW NSLP uses only allow action, since a default to deny policy at the middlebox is assumed. For NATs the policy rule consists of action 'map this another address realm' and further mapping information, that might be in the most simply case internal IP address and external IP address. Policy rules are usually carried in one piece in signaling applications. In NSIS the policy rule is divided into the filter specification, an implicit allow action, and additional information. The filter specification is carried within NTLP's flow routing information and additional information is carried in NSLP's objects. Additional information is for instance the lifetime of a policy rule or session. 3.4.2 Create Session (CRS)5.4.1 CREATE Thecreate sessionCREATE request message is used to create NSLP sessions andat middleboxesto create policy rules.The create sessionFurthermore, CREATE messages are used to refresh sessions and to delete them. The CREATE message carries these objects: oSession IDLifetime object [M] oLifetimeExtended flow information object [M] o Message sequence number object [M] o Respose type object [O] o Scoping object[O] o Notify target [O] Theflowmessage routing information in the NTLP MUST be set to DS as source address and DR as destination address. All other parameters MUST be set according the required policy rule.3.4.3 Reserve External Address (REA)When the CREATE messages is received by a node operating in proxy mode Section 3.4 the NI address is the NR address from the message that triggered the CREATE to be sent, if that address is not valid (wildcarded) the proxy node address is used instead. Thereserve externalNR address would be the NI's address provided by the message routing information of the message that triggered the CREATE. 5.4.2 RESERVE-EXTERNAL-ADDRESS (REA) The RESERVE-EXTERNAL-ADDRESS (REA) request message is used tolookuptarget a NAT and to allocated an external IP address and possibly port number, so that the initiator of the REA request has a public reachable IP address/port number. The REA request message carries these objects: oSession IDLifetime object [M] oLifetimeMessage sequence number object [M] o Response type object [M] o Scoping object [M] o Extended flow information [O] The REA message needs special NTLP treatment. First of all, REA messages travel the wrong way, from the DR towards DS. Second, the DS' address used during the signaling may be not the actual DS (see Section3.2.10).3.8). Therefore, the NTLP flow routing information is set to DR as initiator and DS as responders, a special field is given in the NTLP: The signaling destination.3.4.4 Reserve-Create (REC) XXX This is a proposal for a new message to support the reservation and simultaneous/implicit create message generation.5.4.3 TRIGGER Thereserve-create message carries these objects: o Session ID object o Lifetime object NTLP issues: TBD. 3.4.5 Prolong Session (PLS) The prolongTRIGGER request message is usedto prolong (extend) the lifetime of a NATFW NSLP and policy rules at middleboxes.in proxy mode operation. XXX Theprolong sessionTRIGGER request message carries these objects: oSession IDLifetime object [M] oLifetimeMessage sequence number objectThe[M] o Response type object [M] o Scoping object [M] o Extended flowroutinginformationin the NTLP MUST be set[O] XXX 5.4.4 RESPONSE RESPONSE messages are responses toDS as source addressCREATE, REA, andDR as destination address. All other parameters MUST be set according the required policy rule. 3.4.6 Delete Session (DLS)QUERY messages. Thedelete request message is used to delete NATFW NSLP sessions. The delete sessionRESPONSE message carries these objects: oSession IDLifetime objectThe flow routing information in the NTLP MUST be set to DS as source[M] o Response object [M] o External addressand DR as destination address. All other parameters MUST be set according the required policy rule. 3.4.7 Path Succeeded (PS) The path succeeded responseobject ([M] for success responses to REA) This message is routed upstream. 5.4.5 QUERY QUERY messages are usedto acknowledge a successful create and prolong.for diagnosis purposes. Thepath succeededQUERY message carries these objects: oSession IDResponse object [M] olifetimeMessage sequence number object [M] o Scoping object [M] o Bound session ID [O] This message is routedon the reverse path. 3.4.8 Path Deleted (PD)downstream. 5.4.6 NOTIFY Thepath deleted response messageNOTIFY messages is used toacknowledge a successful delete request message. Thereport asynchronous events happening along the signaled pathdeletedto other NATFW NSLP nodes. The NOTIFY message carries this object: oSession IDResponse code objectThis message is routed on the reverse path. 3.4.9 Return External Address (RA)with NOTIFY code [M]. Thereturn external address responsemessageis sent back as a positive result of reserve external address request. It containsrouting information in thereserved external IPNTLP MUST be set to DS as source address andport number. The path succeeded message carries these objects: o Session ID object o Lifetime object o External address object (either IPv4 or IPv6 type) This messageDR as destination address, forwarding direction isrouted onupstream (Note that Section 5.4.6 discusses some design options regarding thereverse path. 3.4.10 Error Response (ER) The error responsemessageis sent back by any NSIS node involved intransport). The session id object must be set to the corresponding session thatoccurs an error condition. The error message carries these objects: o Session ID object o Error object This messageisrouted on the reverse path. 4.effected by this asynchronous event. 6. NSIS NAT and Firewalltransitions issuesTransition Issues NSIS NAT and Firewall transition issues are premature and will be addressed in a separate draft (see [17]). An update of this section will be based on consensus.5.7. Security Considerations Security is of major concern particularly in case of Firewall traversal.GenericSecurity threats for NSIS signaling in general have beendiscusseddescribed in [6] and they are applicablehere as well. Itto this document. [21] extends this threat investigtion by considering NATFW NSLP specific threats. Based on the identified threats a list of security requirements have been defined. As an important requirement for security protection it is necessary to provideproper signaling messageo data origin authentication o replay protection o integrity protection andproper authorization.o optionally confidentiality protection between neighboring NATFW NSLP nodes. To consider the aspect of authentication and key exchange we aim to reuse the mechanisms provided in [3] between neighboring nodes. Some scenarios also demand security between non-neighboring nodes but this aspect is still in discussions. A possible commonality with the QoS NSLP has been identified and CMS [24] has been investigated as a possible candidate for security protection between non-neighboring entities. Note that this aspect also includes some more sophisticated user authentication mechanisms, as described in [23]. With regard to end-to-end security theNATneed for a binding between an NSIS signaling session and application layer session has been described in Section 3.3 of [6]. In order to solicit feedback from the IETF community on some hard security problems for path-coupled NATFW signaling a more detailed description in [22] is available. The NATFW NSLP is a protocol which may involve a number of NSIS nodes and is, as such, not a two-party protocol. This fact requires more thoughts about scenarios, trust relationships and authorization mechanisms. This section lists a few scenarios relevant for security and illustrates possible trust reationships which have an impact to authorization. More problematic scenarios are described in Appendix A. 7.1 Trust Relationship and Authorization Trust relationships and authorization are very important for the protocol machinery. Trust and authorization are closely related to each other in the sense that a certain degree of trust is required to authorize a particular action. For any action (e.g. "create/delete /prolong policy rules), authorization is very important due to the nature of middleboxes. Different types of trust relationships may affect different categories of middleboxes. As explained in [26], establishment of a financial relationship is typically very important for QoS signaling, whereas financial relationships are less directly of interest for NATFW middlebox signaling. It is therefore not particularly surprising that there are differences in the nature and level of authorization likely to beco-located withrequired in aFirewallQoS signaling environment and in NATFW middlebox signaling. For NATFW middlebox signaling, a stronger or weaker degree of authorization mighttherefore require packet filters tobechangedneeded. Typically NATFW signaling requires authorization to configure and traverse particular nodes or networks which may derive indirectly from a financial relationship. This is a more 'absolute' situation either the usage is allowed or not, and the effect on both network owner and network user is 'binary'. Different trust relationships that appear inordermiddlebox signaling environments are described in the subsequent sub-sections. QoS signaling today uses peer-to-peer trust relationships. They are simplest kind of trust relationships. However, there are reasons toallowbelieve that this is not the only type of trust relationship found in today's networks. 7.1.1 Peer-to-Peer Trust Relationship Starting with the simplest scenario, it is assumed that neighboring nodes trust each other. The required security association to authenticate and to protect a signaling messageto processis either available (after manual configuration), or has been dynamically established with the help of an authentication and key exchange protocol. If nodes are located closely together, it is assumed that security association establishment is easier than establishing it between distant nodes. It is, however, difficult totraverse. This section aimsdescribe this relationship generally due toraise some itemsthe different usage scenarios and environments. Authorization heavily depends on the participating entities, but forfurther discussionthis scenario, it is assumed that neighboring entities trust each other (at least for the purpose of policy rule creation, maintenance, andillustratesdeletion). Note that Figure 35 does not illustrate theproblemstrust relationship between theauthors faced when creatingend host and the access network. +------------------------+ +-------------------------+ | | | | | Network A | | Network B | | | | | | +---------+ +---------+ | | +-///-+ Middle- +---///////----+ Middle- +-///-+ | | | | box 1 | Trust | box 2 | | | | | +---------+ Relationship +---------+ | | | | | | | | | | | | | | | | | | | | | | Trust | | Trust | | | | Relationship | | Relationship | | | | | | | | | | | | | | | | | | | | | +--+---+ | | +--+---+ | | | Host | | | | Host | | | | A | | | | B | | | +------+ | | +------+ | +------------------------+ +-------------------------+ Figure 35: Peer-to-Peer Trust Relationship 7.1.2 Intra-Domain Trust Relationship In larger corporations, often more than one middlebox is used to protect or serve different departments. In many cases, the entire enterprise is controlled by a securitysolutiondepartment, which gives instructions to the department administrators. In such a scenario, a peer-to-peer trust-relationship might be prevalent. Sometimes it might be necessary to preserve authentication and authorization information within the network. As a possible solution, a centralized approach could be used, whereby an interaction between the individual middleboxes and a central entity (for example a policy decision point - PDP) takes place. As an alternative, individual middleboxes could exchange the authorization decision with another middlebox within the same trust domain. Individual middleboxes within an administrative domain should exploit their trust relationship instead of requesting authentication and authorization of the signaling initiator again and again. Thereby complex protocol interactions are avoided. This provides both a performance improvement without a security disadvantage since a single administrative domain can be seen as a single entity. Figure 36 illustrates a network structure which uses a centralized entity. +-----------------------------------------------------------+ | | | Network A | | | | | | +---------+ +---------+ | +----///--------+ Middle- +------///------++ Middle- +--- | | | box 2 | | box 2 | | | +----+----+ +----+----+ | | | | | | +----+----+ | | | | | Middle- +--------+ +---------+ | | | | box 1 | | | | | | +----+----+ | | | | | | | | | | | - | | | | | - | +----+-----+ | | | | | | Policy | | | | +--+---+ +-----------+ Decision +----------+ | | | Host | | Point | | | | A | +----------+ | | +------+ | +-----------------------------------------------------------+ Figure 36: Intra-domain Trust Relationship 7.1.3 End-to-Middle Trust Relationship In some scenarios, a simple peer-to-peer trust relationship between participating nodes is not sufficient. Network B might require additional authorization of the signaling message initiator. If authentication and authorization information is not attached to the initial signaling message then the signaling message arriving at Middlebox 2 would result in an error message being created, which indicates the additional authorization requirement. In many cases the signaling message initiator is already aware of the additionally required authorization before the signaling message exchange is executed. Replay protection is a requirement for authentication to theNAT/ Firewall NSLP. Installingnon-neighboring middlebox, which might be difficult to accomplish without adding additional roundtrips to the signaling protocol (e.g., by adding a challenge/response type of message exchange). Figure 37 shows the slightly more complex trust relationships in this scenario. +----------------------+ +--------------------------+ | | | | | Network A | | Network B | | | | | | | Trust | | | | Relationship | | | +---------+ +---------+ | | +-///-+ Middle- +---///////----+ Middle- +-///-+ | | | | box 1 | +-------+ box 2 | | | | | +---------+ | +---------+ | | | | | | | | | | |Trust | | | | | | |Relationship | | | | | | | | | | Trust | | | | | | | Relationship| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | +--+---+ | | | +--+---+ | | | Host +----///----+------+ | | Host | | | | A | |Trust | | B | | | +------+ |Relationship | +------+ | +----------------------+ +--------------------------+ Figure 37: End-to-Middle Trust Relationship Finally it should be noted that installing packet filters provides some security, but also has some weaknesses, which heavily depend on the type of packet filter installed. A packet filter cannot prevent an adversary to inject traffic (due to the IP spoofing capabilities). This type of attack might not be particular helpful if the packet filter is a standard 5 tuple which is very restrictive. If packet filter installation, however, allows specifying a rule, which restricts only the source IP address, then IP spoofing allows transmitting traffic to an arbitrary address. NSIS aims to provide path-coupled signaling and therefore an adversary is somewhat restricted in the location from which attacks can be performed. Some trust is therefore assumed from nodes and networks along the path.Without doubts there is a dependency on the security provided by the NTLP. Section Appendix A and Section 2.2 motivates some trust relationship and authorization scenarios. These scenarios deserve a discussion since some of them (particularly one with a missing network-to-network trust relationship) is different to what is know from QoS signaling. To address some of these trust relationships and authorization issues requires security mechanisms between non-neighboring nodes at the NSLP layer. For the group of authors it seems that peer-to-peer and end-to-middle security needs to be provided. An NSLP security mechanism between neighboring8. Open Issues The NATFW NSLPpeers might be necessary if security mechanisms at the NTLP do not provide adequate protection mechanisms. This issue is, however, still in discussion. Ashas adesign goal it seems to be favorable to reuse existing mechanisms to the best extend possible. In most cases it is necessary to carry the objects for end-to-middle as NSLP payloads since the presenceseries ofNATs might prevent direct communication. Three security mechanisms have to be considered in more detail in a future versionrelated documents discussing several other aspects ofthis document: CMS [21] and Identity Representation for RSVP [15]. The authors believe that CMS more suitable (since it provides much more functionality). The details deserve further discussion and implementation experience. With regard to signal between two end hosts even though the receiver is behind a NAT this proposal suggests creating state by the data receiver first. This allows NSIS signaling messages to traverse a NAT at the receiver side (due to the established state at this NAT box) and simplifiespath-coupled NATFW signaling, including securityhandling. To achieve this behavior it is required to install NSIS NTLP and NSLP state. Furthermore, it is envisioned to associate the two[22], migration (i.e., traversal of nsis unaware NATs) [17], intra-realm signalingparts (one part from the data sender to the NAT[18], andthe other part from the NAT to the data receiver)inter-working withthe help of the Session Identifier. As such, the discussion in [15] is relevant for this document. Another interesting property of this protocol proposal is to prevent DenialSIP [19]. Summaries ofService attacks against NAT boxes whereby an adversary allocates NAT bindings withthehelp of data packets. Sinceoutcomes from thesedata packets do not provide any type of authentication and are not authorized any adversary is abledocuments may be added, depending on WG feedback, tomount such an attack. This attack has been mentioned at several places in the literature already and is particularly harmful if no NAPT functionality is used (i.e. ifanew NAT binding consumes one IP address of a poollater version ofIP addresses). Using the protocol described inthisdocument additional security can be achieved anddraft. A morefairnessdetailed list of open issue can beprovided. 6. Open Issues At least the following issues require further discussion: o Option processing rules in presence of unknown options. o Terminology w.r.t. the term wrong way. o NTLP: New object and semantics for REA. o NTLP and NATFW NSLP interaction o List of NTLP transport modes per NSLP message o Routing Change detection o Query message, definition of semantics needed o Is there a need for a QoS NSLP RSN like object/mechanism in NATFW NSLP? o Add IANA considerations section. o re-work security considerations. o Query message: Syntax and semantics. o Add text about asynchronous messages. o Anycast address for REA. o Check common formats with QoS NSLP o Change length field of objects to long words as unit? o Variable length for session id? o Meaning of 0 as session ID. o Extended flow object: Needs refinement 7.found at: http:// nsis.srmr.co.uk/cgi-bin/roundup.cgi/nsis-natfw-issues/index 9. Contributors A number of individuals have contributed to this draft. Since it was not possible to list them all in the authors section, it was decided to split it and move Marcus Brunner and Henning Schulzrinne into the contributors section. Separating into two groups was done without treating any one of them better (or worse) than others.8.10. References8.110.1 Normative References [1] Hancock et al, R., "Next Steps in Signaling: Framework", DRAFT draft-ietf-nsis-fw-05.txt, October 2003. [2] Brunner et al., M., "Requirements for Signaling Protocols", DRAFT draft-ietf-nsis-req-09.txt, October 2003. [3] Schulzrinne, H. and R. Hancock, "GIMPS: General Internet Messaging Protocol for Signaling", DRAFTdraft-ietf-nsis-ntlp-00.txt,draft-ietf-nsis-ntlp-02.txt, October 2003. [4] Van den Bosch, S., Karagiannis, G. and A. McDonald, "NSLP for Quality-of-Service signaling", DRAFT draft-ietf-nsis-qos-nslp-03.txt, May 2004. [5] IANA, "Special-Use IPv4 Addresses", RFC 3330, September 2002. [6] Tschofenig, H. and D. Kroeselberg, "Security Threats for NSIS", DRAFT draft-ietf-nsis-threats-01.txt, January 2003. [7] Srisuresh, P., Kuthan, J., Rosenberg, J., Molitor, A. and A. Rayhan, "Middlebox communication architecture and framework", RFC 3303, August 2002.8.210.2 Informative References [8] Srisuresh, P. and M. Holdrege, "IP Network Address Translator (NAT) Terminology and Considerations, RFC 2663", August 1999. [9] Srisuresh, P. and M. Holdrege, "Network Address Translator (NAT)Terminology and Considerations, RFC 2663". [10] Srisuresh, P. and E. Egevang, "Traditional IP Network Address Translator (Traditional NAT), RFC 3022", January 2001. [11] Tsirtsis, G. and P. Srisuresh, "Network Address Translation - Protocol Translation (NAT-PT), RFC 2766", February 2000. [12] Carpenter, B. and S. Brim, "Middleboxes: Taxonomy and Issues", RFC 3234, February 2002. [13] Srisuresh, P., Tsirtsis, G., Akkiraju, P. and A. Heffernan, "DNS extensions to Network Address Translators (DNS_ALG)", RFC 2694, September 1999. [14] Braden, B., Zhang, L., Berson, S., Herzog, S. and S. Jamin, "Resource ReSerVation Protocol (RSVP) -- Version 1 Functional Specification", September 1997. [15] Yadav, S., Yavatkar, R., Pabbati, R., Ford, P., Moore, T., Herzog, S. and R. Hess, "Identity Representation for RSVP", RFC 3182, October 2001. [16] Tschofenig, H., Schulzrinne, H., Hancock, R., McDonald, A. and X. Fu, "Security Implications of the Session Identifier", June 2003. [17] Aoun, C., Brunner, M., Stiemerling, M., Martin, M. and H. Tschofenig, "NAT/Firewall NSLP Migration Considerations", DRAFT draft-aoun-nsis-nslp-natfw-migration-01.txt, Februar 2004. [18] Aoun, C., Brunner, M., Stiemerling, M., Martin, M. and H. Tschofenig, "NATFirewall NSLP Intra-realm considerations", DRAFT draft-aoun-nsis-nslp-natfw-intrarealm-00.txt, Februar 2004. [19] Martin, M., Brunner, M. and M. Stiemerling, "SIP NSIS Interactions for NAT/Firewall Traversal", DRAFT draft-martin-nsis-nslp-natfw-sip-00.txt, Februar 2004. [20] Martin, M., Brunner, M., Stiemerling, M., Girao, J. and C. Aoun, "A NSIS NAT/Firewall NSLP Security Infrastructure", DRAFT draft-martin-nsis-nslp-natfw-security-01.txt,FebruarFebruary 2004. [21] Fessi, A., Brunner, M., Stiemerling, M., Thiruvengadam, S., Tschofenig, H. and C. Aoun, "Security Threats for the NAT/ Firewall NSLP", DRAFT draft-fessi-nsis-natfw-threats-01.txt, July 2004. [22] Tschofenig, H., "Path-coupled NAT/Firewall Signaling Security Problems", draft-tschofenig-nsis-natfw-security-problems-00.txt (work in progress), July 2004. [23] Tschofenig, H. and J. Kross, "Extended QoS Authorization for the QoS NSLP", draft-tschofenig-nsis-qos-ext-authz-00.txt (work in progress), July 2004. [24] Housley, R., "Cryptographic Message Syntax (CMS)", RFC 3369, August 2002.[22][25] Manner, J., Suihko, T., Kojo, M., Liljeberg, M. and K. Raatikainen, "Localized RSVP", DRAFT draft-manner-lrsvp-00.txt, November 2002.[23][26] Tschofenig, H., Buechli, M., Van den Bosch, S. and H. Schulzrinne, "NSIS Authentication, Authorization and Accounting Issues", March 2003.[24][27] Amini, L. and H. Schulzrinne, "Observations from router-level internet traces", DIMACS Workshop on Internet and WWW Measurement, Mapping and Modelin Jersey) , Februar 2002.[25][28] Adrangi, F. and H. Levkowetz, "Problem Statement: Mobile IPv4 Traversal of VPN Gateways", draft-ietf-mobileip-vpn-problem-statement-req-02.txt (work in progress), April 2003.[26][29] Ohba, Y., Das, S., Patil, P., Soliman, H. and A. Yegin, "Problem Space and Usage Scenarios for PANA", draft-ietf-pana-usage-scenarios-06 (work in progress), April 2003.[27][30] Shore, M., "The TIST (Topology-Insensitive Service Traversal) Protocol", DRAFT draft-shore-tist-prot-00.txt, May 2002.[28][31] Tschofenig, H., Schulzrinne, H. and C. Aoun, "A Firewall/NAT Traversal Client for CASP", DRAFT draft-tschofenig-nsis-casp-midcom-01.txt, March 2003.[29][32] Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M. and E. Schooler, "SIP: Session Initiation Protocol", RFC 3261, June 2002.[30][33] Brunner, M., Stiemerling, M., Martin, M., Tschofenig, H. and H. Schulzrinne, "NSIS NAT/FW NSLP: Problem Statement and Framework", DRAFT draft-brunner-nsis-midcom-ps-00.txt, June 2003.[31][34] Ford, B., Srisuresh, P. and D. Kegel, "Peer-to-Peer(P2P) communication Network Address Translators(NAT)", DRAFT draft-ford-midcom-p2p-02.txt, March 2004.[32][35] Rosenberg et al, J., "STUN - Simple Traversal of User Datagram Protocol (UDP) Through Network Address Translators (NATs)", RFC 3489, March 2003.[33][36] Rekhter et al, Y., "Address Allocation for Private Internets", RFC 1918, February 1996. [37] Rosenberg, J., "Traversal Using Relay NAT (TURN)", draft-rosenberg-midcom-turn-04 (work in progress), February 2004. [38] Westerinen, A., Schnizlein, J., Strassner, J., Scherling, M., Quinn, B., Herzog, S., Huynh, A., Carlson, M., Perry, J. and S. Waldbusser, "Terminology for Policy-Based Management", RFC 3198, November 2001. Authors' Addresses Martin Stiemerling Network Laboratories, NEC Europe Ltd. Kurfuersten-Anlage 36 Heidelberg 69115 Germany Phone: +49 (0) 6221 905 11 13 EMail: stiemerling@netlab.nec.de URI: HannesTschoefenigTschofenig Siemens AG Otto-Hahn-Ring 6 Munich 81739 Germany Phone: EMail: Hannes.Tschofenig@siemens.com URI: Miquel Martin Network Laboratories, NEC Europe Ltd. Kurfuersten-Anlage 36 Heidelberg 69115 Germany Phone: +49 (0) 6221 905 11 16 EMail: miquel.martin@netlab.nec.de URI: Cedric Aoun Nortel Networks France EMail: cedric.aoun@nortelnetworks.com Appendix A. Problems and Challenges This section describes a number of problems that have to be addressed for NSIS NAT/Firewall. Issues presented here are subject to further discussions. These issues might be also of relevance to other NSLP protocols. A.1 Missing Network-to-Network Trust Relationship Peer-to-peer trust relationship, as shown in Figure10,35, is a very convenient assumption that allows simplified signaling message processing. However, it might not always be applicable, especially between two arbitrary access networks (over a core network where signaling messages are not interpreted). Possibly peer-to-peer trust relationship does not exist because of the large number of networks and the unwillingness of administrators to have other network operators to create holes in their Firewalls without proper authorization.Hence in the following scenario we assume a somewhat different message processing and show three possible approaches to tackle the problem. None of these three approaches is without drawbacks or constraining assumptions.+----------------------+ +--------------------------+ | | | | | Network A | | Network B | | | | | | +---------+ Missing +---------+ | | +-///-+ Middle- | Trust | Middle- +-///-+ | | | | box 1 | Relation- | box 2 | | | | | +---------+ ship +---------+ | | | | | or | | | | | | Authorization| | | | | | | | | | | Trust | | Trust | | | | Relationship | | Relationship | | | | | | | | | | | | | | | | | | | | | +--+---+ | | +--+---+ | | | Host | | | | Host | | | | A | | | | B | | | +------+ | | +------+ | +----------------------+ +--------------------------+ Figure28:38: Missing Network-to-Network Trust Relationship Figure2838 illustrates a problem whereby an external node is not allowed to manipulate (create, delete, query, etc.) packet filters at a Firewall. Opening pinholes is only allowed for internal nodes or with a certain authorization permission. Hence the solution alternatives in Section3.2.23.3.2 focus on establishing the necessary trust with cooperation of internal nodes. A.2 Relationship with routing The data path is following the "normal" routes. The NAT/FW devices along the data path are those providing the service. In this case the service is something like "open a pinhole" or even more general "allow for connectivity between two communication partners". The benefit of using path-coupled signaling is that the NSIS NATFW NSLP does not need to determine what middleboxes or in what order the data flow will go through. Creating NAT bindings modifies the path of data packets between two end points. Without NATs involved, packets flow from endhost to endhost following the path given by the routing. With NATs involved, this end-to-end flow is not directly possible, because of separated address realms. Thus, data packets flow towards the external IP address at a NAT (external IP address may be a public IP address). Other NSIS NSLPs, for instance QoS NSLP, which do not interfere with routing - instead they only follow the path of the data packets. A.3 Affected Parts of the Network NATs and Firewalls are usually located at the edge of the network, whereby other signaling applications affect all nodes along the path. One typical example is QoS signaling where all networks along the path must provide QoS in order to achieve true end-to-end QoS. In the NAT/Firewall case, only some of the domains/nodes are affected (typically access networks), whereas most parts of the networks and nodes are unaffected(e.g.(e.g., the core network). This fact raises some questions. Should an NSIS NTLP node intercept every signaling message independently of the upper layer signaling application or should it be possible to make the discovery procedure more intelligent to skip nodes. These questions are also related to the question whether NSIS NAT/FW should be combined with other NSIS signaling applications. A.4 NSIS backward compatibility with NSIS unaware NAT and Firewalls Backward compatibility is a key for NSIS deployments, as such the NSIS protocol suite should be sufficiently robust to allow traversal of none NSIS aware routers (QoS gates, Firewalls, NATs, etc ). NSIS NATFW NSLP's backward compatibility issues are different than the NSIS QoS NSLP backward compatibility issues, where an NSIS unaware QoS gate will simply forward the QoS NSLP message. An NSIS unaware Firewall rejects NSIS messages, since Firewalls typically implement the policy "default to deny". The NSIS backward compatibility support on none NSIS aware Firewall would typically consist of configuring a static policy rule that allows the forwarding of the NSIS protocol messages (either protocol type if raw transport mode is used or transport port number in case a transport protocol is used). For NATs backward compatibility is more problematic since signaling messages are forwarded (at least in one direction), but with a changed IP address and changed port numbers. The content of the NSIS signaling message is, however, unchanged. This can lead to unexpected results, both due to embedded unchanged local scoped addresses and none NSIS aware Firewalls configured with specific policy rules allowing forwarding of the NSIS protocol (case of transport protocols are used for the NTLP). NSIS unaware NATs must be detected to maintain a well-known deterministic mode of operation for all the involved NSIS entities. Such a "legacy" NAT detection procedure can be done during the NSIS discover procedure itself. Based on experience it was discovered that routers unaware of the Router Alert IP option [RFC 2113] discarded packets, this is certainly a problem for NSIS signaling. A.5 Authentication and Authorization For both types of middleboxes, Firewall and NAT security is a strong requirement. Authentication and authorization means must be provided. For NATFW signaling applications it is partially not possible to do authentication and authorization based on IP addresses. Since NATs change IP addresses, such an address based authentication and authorization scheme would fail. A.6 Directional Properties There two directional properties that need to be addressed by the NATFW NSLP: o Directionality of the data o Directionality of NSLP signaling Both properties are relevant to NATFW NSLP aware NATs and Firewalls. With regards to NSLP signaling directionality: As stated in the previous sections, the authentication and authorization of NSLP signaling messages received from hosts within the same trust domain (typically from hosts located within the security perimeter delimited by Firewalls) is normally simpler than received messages sent by hosts located in different trust domains. The way NSIS signaling messages enters the NSIS entity of a Firewall (see Figure 2) might be important, because different policies might apply for authentication and admission control. Hosts deployed within the secured network perimeter delimited by a Firewall, are protected from hosts deployed outside the secured network perimeter, hence by nature the Firewall has more restrictions on flows triggered from hosts deployed outside the security perimeter. A.7 Addressing A more general problem of NATs is the addressing of the end-point. NSIS signaling message have to be addressed to the other end host to follow data packets subsequently sent. Therefore, a public IP address of the receiver has to be known prior to sending an NSIS message. When NSIS signaling messages contain IP addresses of the sender and the receiver in the signaling message payloads, then an NSIS entity must modify them. This is one of the cases, where a NSIS aware NATs is also helpful for other types of signaling applicationse.g.e.g., QoS signaling. A.8 NTLP/NSLP NAT Support It must be possible for NSIS NATs along the path to change NTLP and/ or NSLP message payloads, which carry IP address and port information. This functionality includes the support of providing mid-session and mid-path modification of these payloads. As a consequence these payloads must not be reordered, integrity protected and/or encrypted in a non peer-to-peer fashion(e.g.(e.g., end-to-middle, end-to-end protection). Ideally these mutable payloads must be marked(e.g.(e.g., a protected flag) to assist NATs in their effort of adjusting these payloads. A.9 Combining Middlebox and QoS signaling In many cases, middlebox and QoS signaling has to be combined at least logically. Hence, it was suggested to combine them into a single signaling message or to tie them together with the help of some sort of data connection identifier, later on referred as Session ID. This, however, has some disadvantages such as: - NAT/FW NSLP signaling affects a much small number of NSIS nodes along the path (for example compared to the QoS signaling). - NAT/FW signaling might show different signaling patterns(e.g.(e.g., required end-to-middle communication). - The refresh interval is likely to be different. - The number of error cases increase as different signaling applications are combined into a single message. The combination of error cases has to be considered. A.10 Inability to know the scenario In Section2.12 a number of different scenarios are presented. Data receiver and sender may be located behind zero, one, or more Firewalls and NATs. Depending on the scenario, different signaling approaches have to be taken. For instance, data receiver with no NAT and Firewall can receive any sort of data and signaling without any further action. Data receivers behind a NAT must first obtain a public IP address before any signaling can happen. The scenario might even change over time with moving networks, ad-hoc networks or with mobility. NSIS signaling must assume the worst case and cannot put responsibility to the user to know which scenario is currently applicable. As a result, it might be necessary to perform a "discovery" periodically such that the NSIS entity at the end host has enough information to decide which scenario is currently applicable. This additional messaging, which might not be necessary in all cases, requires additional performance, bandwidth and adds complexity. Additional, information by the user can provide information to assist this "discovery" process, but cannot replace it. Appendix B. Acknowledgments We would like toacknowledgeacknowledge: Vishal Sankhla and Joao Girao for their input to thisdraft.draft; and Reinaldo Penno for his comments on the initial version of the document. Furthermore, we would like thank Elwyn Davis for his valuable help and input. Intellectual Property Statement The IETF takes no position regarding the validity or scope of anyintellectual propertyIntellectual Property Rights or other rights that might be claimed to pertain to the implementation or use of the technology described in this document or the extent to which any license under such rights might or might not be available;neithernor does it represent that it has made any independent effort to identify any such rights. Information on theIETF'sprocedures with respect to rights instandards-track and standards-related documentationRFC documents can be found inBCP-11.BCP 78 and BCP 79. Copies ofclaims of rightsIPR disclosures madeavailable for publicationto the IETF Secretariat and any assurances of licenses to be made available, or the result of an attempt made to obtain a general license or permission for the use of such proprietary rights byimplementorsimplementers or users of this specification can be obtained from the IETFSecretariat.on-line IPR repository at http://www.ietf.org/ipr. The IETF invites any interested party to bring to its attention any copyrights, patents or patent applications, or other proprietary rightswhichthat may cover technology that may be required topracticeimplement this standard. Please address the information to the IETFExecutive Director. Full Copyright Statement Copyright (C) The Internet Society (2004). All Rights Reserved. This document and translations of it may be copied and furnished to others, and derivative works that comment on or otherwise explain it or assist in its implementation may be prepared, copied, published and distributed, in whole or in part, without restriction of any kind, provided that the above copyright notice and this paragraph are included on all such copies and derivative works. However, this document itself may not be modified in any way, such as by removing the copyright notice or references to the Internet Society or other Internet organizations, except as needed for the purposeat ietf-ipr@ietf.org. Disclaimer ofdeveloping Internet standards in which case the procedures for copyrights defined in the Internet Standards process must be followed, or as required to translate it into languages other than English. The limited permissions granted above are perpetual and will not be revoked by the Internet Society or its successors or assignees.Validity This document and the information contained hereinisare provided on an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCEDISCLAIMSDISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Copyright Statement Copyright (C) The Internet Society (2004). This document is subject to the rights, licenses and restrictions contained in BCP 78, and except as set forth therein, the authors retain all their rights. Acknowledgment Funding for the RFC Editor function is currently provided by the Internet Society.