summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc4093.txt
diff options
context:
space:
mode:
authorThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
committerThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
commit4bfd864f10b68b71482b35c818559068ef8d5797 (patch)
treee3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc4093.txt
parentea76e11061bda059ae9f9ad130a9895cc85607db (diff)
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc4093.txt')
-rw-r--r--doc/rfc/rfc4093.txt1067
1 files changed, 1067 insertions, 0 deletions
diff --git a/doc/rfc/rfc4093.txt b/doc/rfc/rfc4093.txt
new file mode 100644
index 0000000..54ad36b
--- /dev/null
+++ b/doc/rfc/rfc4093.txt
@@ -0,0 +1,1067 @@
+
+
+
+
+
+
+Network Working Group F. Adrangi, Ed.
+Request for Comments: 4093 Intel
+Category: Informational H. Levkowetz, Ed.
+ Ericsson
+ August 2005
+
+
+ Problem Statement: Mobile IPv4 Traversal of
+ Virtual Private Network (VPN) Gateways
+
+Status of This Memo
+
+ This memo provides information for the Internet community. It does
+ not specify an Internet standard of any kind. Distribution of this
+ memo is unlimited.
+
+Copyright Notice
+
+ Copyright (C) The Internet Society (2005).
+
+Abstract
+
+ Deploying Mobile-IP v4 in networks that are connected to the Internet
+ through a Virtual Private Network (VPN) gateway presents some
+ problems that do not currently have well-described solutions. This
+ document aims to describe and illustrate these problems, and to
+ propose some guidelines for possible solutions.
+
+Table of Contents
+
+ 1. Introduction ....................................................2
+ 1.1. Overview of the Problem ....................................3
+ 1.2. Specification of Requirements ..............................3
+ 1.3. Terminology ................................................3
+ 2. MIP and VPN Deployment Scenarios ................................4
+ 2.1. MIPv4 HA(s) Inside the Intranet behind a VPN Gateway .......5
+ 2.2. VPN Gateway and MIPv4 HA(s) on the VPN Domain Border .......6
+ 2.3. Combined VPN Gateway and MIPv4 HA ..........................7
+ 2.4. MIPv4 HA(s) Outside the VPN Domain .........................8
+ 2.5. Combined VPN Gateway and MIPv4 HA(s) on the Local Link .....9
+ 3. Deployment Scenarios Selection ..................................9
+ 4. Problem Statement ..............................................10
+ 4.1. Registering in Co-Located Mode ............................11
+ 4.2. Registering via an FA .....................................12
+ 4.3. Summary: MIP Incompatibilities with IPsec-Based
+ VPN Gateways ..............................................13
+
+
+
+
+
+Adrangi & Levkowetz Informational [Page 1]
+
+RFC 4093 MIPv4 VPN Traversal Problem Statement August 2005
+
+
+ 5. Solution Guidelines ............................................14
+ 5.1. Preservation of Existing VPN Infrastructure ...............14
+ 5.2. Software Upgrades to Existing VPN Client and Gateways .....14
+ 5.3. IPsec Protocol ............................................14
+ 5.4. Multi-Vendor Interoperability .............................14
+ 5.5. MIPv4 Protocol ............................................15
+ 5.6. Handoff Overhead ..........................................15
+ 5.7. Scalability, Availability, Reliability, and Performance ...15
+ 5.8. Functional Entities .......................................15
+ 5.9. Implications of Intervening NAT Gateways ..................15
+ 5.10. Security Requirements ....................................16
+ 6. Security Considerations ........................................16
+ 7. Acknowledgements ...............................................16
+ 8. References .....................................................17
+ 8.1. Normative References ......................................17
+ 8.2. Informative References ....................................17
+
+1. Introduction
+
+ Mobile IP [RFC3344] agents are being deployed in enterprise networks
+ to enable mobility across wired and wireless LANs while roaming
+ inside the enterprise Intranet. With the growing deployment of IEEE
+ 802.11 access points ("hot spots") in public places such as hotels,
+ airports, and convention centers, and with wireless WAN data networks
+ such as General Packet Radio Service (GPRS), the need is increasing
+ for enabling mobile users to maintain their transport connections and
+ constant reachability while connecting back to their target "home"
+ networks protected by Virtual Private Network (VPN) technology. This
+ implies that Mobile IP and VPN technologies have to coexist and
+ function together in order to provide mobility and security to the
+ enterprise mobile users.
+
+ The goal of this document is to:
+
+ o Identify and describe practical deployment scenarios for Mobile IP
+ and VPN in enterprise and operator environments.
+
+ o Identify example usage scenarios for remote users roaming outside
+ the "home" network protected by a VPN gateway.
+
+ o Articulate the problems resulting from Mobile IP and VPN
+ coexistence.
+
+ o Specify a set of framework guidelines to evaluate proposed
+ solutions for supporting multi-vendor seamless IPv4 mobility
+ across IPsec-based VPN gateways.
+
+
+
+
+
+Adrangi & Levkowetz Informational [Page 2]
+
+RFC 4093 MIPv4 VPN Traversal Problem Statement August 2005
+
+
+1.1. Overview of the Problem
+
+ Access to the Intranet is typically guarded by both a firewall and a
+ VPN device. The Intranet can only be accessed by respecting the
+ security policies in the firewall and the VPN device.
+
+ When MIP is deployed in a corporate Intranet (also referred to as a
+ VPN domain), roaming between the Intranet (i.e., trusted domain) and
+ the Internet (i.e., untrusted domain) becomes problematic. It would
+ be desirable to have seamless session mobility between the two
+ domains, because MIP was designed for session mobility regardless of
+ the network point of attachment. Unfortunately, the current MIP
+ standards fall short of this promise for an important customer
+ segment: corporate users (using VPN for remote access) who desire to
+ add mobility support because of a need to have continuous access to
+ Intranet resources while roaming outside the Intranet from one subnet
+ to another, or between the VPN domain and the Internet.
+
+ From the beginning, one explicitly stated restriction was that it was
+ assumed that installed firewalls and VPN gateways had to be kept
+ unchanged, rather than replaced or upgraded, because they have much
+ wider deployments than MIP at the time of writing. Therefore, any
+ solutions would need to minimize the impact on existing VPN and
+ firewall deployments, related standards, and "de facto" standards.
+
+1.2. Specification of Requirements
+
+ In this document, several words are used to signify the requirements
+ of the specification. These words are often capitalized. The key
+ words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD",
+ "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document
+ are to be interpreted as described in [RFC2119].
+
+1.3. Terminology
+
+ MIPv4 Mobile IP for IPv4 [RFC3344]
+
+ MIPv6 Mobile IP for IPv6
+
+ VPN Virtual Private Network
+
+ GW Gateway
+
+ VPN Domain An Intranet protected by a VPN gateway.
+
+
+
+
+
+
+
+Adrangi & Levkowetz Informational [Page 3]
+
+RFC 4093 MIPv4 VPN Traversal Problem Statement August 2005
+
+
+ DMZ (Demilitarized Zone) A small network inserted as a
+ "neutral zone" between a company's private network and
+ the outside public network to prevent outside users
+ from getting direct access to the company's private
+ network.
+
+ Home Network A network, possibly virtual, having a network prefix
+ matching that of a mobile node's home address.
+
+ Home Agent A router on a mobile node's home network which tunnels
+ datagrams for delivery to the mobile node when it is
+ away from home, and maintains current location
+ information for the mobile node.
+
+ MN Refers to a mobile node that runs both MIP and IPsec-
+ based VPN client software.
+
+ MIPv4 inside IPsec-ESP tunnel
+ MIPv4 packets are encapsulated in an IPsec-ESP tunnel
+ established between the Mobile Node and the VPN
+ gateway.
+
+ IPsec-ESP inside MIPv4 tunnel
+ IPsec-ESP packets are encapsulated in a MIPv4 tunnel
+ established between the Mobile Node and the home agent.
+
+2. MIP and VPN Deployment Scenarios
+
+ This section describes a set of deployment scenarios wherein MIP
+ agents and VPN gateways have to coexist to provide mobility and
+ security. The intention is to identify practical deployment
+ scenarios for MIP and VPNs where MIP technology might be extended to
+ solve problems resulting from the desire for co-existence.
+
+ The network topology in the following diagrams consists of an
+ Intranet connected to the public network (i.e., the Internet). Here,
+ the word "Intranet" refers to a private network (where private
+ addresses [RFC1918] are typically used) protected by a VPN gateway
+ and perhaps by a layer-3 transparent or non-transparent firewall.
+ When private addresses are used, the non-transparent firewall also
+ functions as a Network Address Translator (NAT) or Network Address
+ Port Translator (NAPT) bridging between the two address realms (i.e.,
+ the Intranet and the Internet).
+
+ Firewalls may be placed on either side of the VPN gateway; these are
+ referred to as inner and outer firewalls. The inner and outer
+ firewalls typically inspect outbound traffic (i.e., from the Intranet
+ to the Internet) and inbound traffic (i.e., from the Internet to the
+
+
+
+Adrangi & Levkowetz Informational [Page 4]
+
+RFC 4093 MIPv4 VPN Traversal Problem Statement August 2005
+
+
+ Intranet), respectively. When a firewall is present, it MUST be
+ configured to allow Mobile IP traffic (both control and tunneled data
+ packets) to go through. As our focus here is the relationship
+ between MIP and VPN, we have purposely omitted firewalls from the
+ following scenarios in order to keep things simple.
+
+ It is assumed that encryption is not enforced inside the VPN domain
+ because: 1) the VPN domain (Intranet) is viewed as a trusted network,
+ and users allowed inside the Intranet are also trusted, and 2) it is
+ a common VPN deployment practice where the VPN is used to guard the
+ Intranet resources from unauthorized users attached to an untrusted
+ network, and to provide a secure communication channel for authorized
+ users to access resources inside the Intranet from outside.
+
+ The following sub-sections introduce five representative combinations
+ of MIPv4 HA and VPN gateway placement.
+
+ In order to give a reasonably complete survey of MIPv4 and VPN co-
+ existence scenarios, those in Sections 2.3 and 2.5 are included even
+ though, as covered in more detail below, there are no co-existence
+ problems to be solved in these two cases.
+
+2.1. MIPv4 HA(s) Inside the Intranet behind a VPN Gateway
+
+ MIPv4 HAs are deployed inside the Intranet protected by a VPN
+ gateway, and are not directly reachable by the MNs outside the
+ Intranet.
+
+ ..Foreign Network.. .....VPN Domain..(Intranet).....
+ . . . .
+ . +----+ +----+ . +----+ +-------+ +-------+ .
+ . |MNs | | FA | . | VPN| | Router| | HA | .
+ . |away| | | .<=========>| | | 1..n | | 1..n | .
+ . +----+ +----+ . | GW | +-------+ +-------+ .
+ . . +----+ .
+ ................... . +-------+ +-------+ .
+ . | CN | | MNs | .
+ . | 1..n | | home | .
+ . +-------+ +-------+ .
+ . .
+ ................................
+
+ Figure 1
+
+ Direct application of MIPv4 standards [RFC3344] is successfully used
+ to provide mobility for users inside the Intranet. However, mobile
+ users outside the Intranet can only access the Intranet resources
+ (e.g., MIP agents) through the VPN gateway, which will allow only
+
+
+
+Adrangi & Levkowetz Informational [Page 5]
+
+RFC 4093 MIPv4 VPN Traversal Problem Statement August 2005
+
+
+ authenticated IPsec traffic inside. This implies that the MIPv4
+ traffic has to run inside IPsec, which leads to two distinct
+ problems:
+
+ 1. When the foreign network has an FA deployed (e.g., as in CDMA
+ 2000), MIPv4 registration becomes impossible. This is because
+ the MIPv4 traffic between MN and VPN gateway is encrypted, and
+ the FA (which is likely in a different administrative domain)
+ cannot inspect the MIPv4 headers needed for relaying the MIPv4
+ packets. Please see Section 4.2 for more details.
+
+ 2. In co-located mode, successful registration is possible but the
+ VPN tunnel has to be re-negotiated every time the MN changes its
+ point of network attachment.
+
+ These problems are articulated in Section 4.
+
+ This deployment scenario may not be common yet, but it is practical
+ and is becoming important as there is an increasing need for
+ providing corporate remote users with continuous access to the
+ Intranet resources.
+
+2.2. VPN Gateway and MIPv4 HA(s) on the VPN Domain Border
+
+ A MIPv4 HA is deployed on the VPN domain border (e.g., in the DMZ)
+ together with the VPN gateway, and it is directly reachable by MNs
+ inside or outside the Intranet.
+
+ ..Foreign Network.. .....VPN Domain..(Intranet).....
+ . . . .
+ . +----+ +----+ . +----+ +-------+ .
+ . |MNs | | FA | . | VPN| | Router| .
+ . |away| | | .<=========>| | | 1..n | .
+ . +----+ +----+ . /\ | GW | +-------+ .
+ . . || +----+ .
+ . . || +----+ +-------+ +-------+ .
+ . . ++====>| HA | | CN | | MNs | .
+ ................... | | | 1..n | | home | .
+ +----+ +-------+ +-------+ .
+ . .
+ ................................
+
+ Figure 2
+
+ Please note that in deployments where the security policy prohibits
+ direct communication between the MN (roaming outside the Intranet)
+ and outside machines, the HA can be configured to forward only
+ encrypted traffic from/to the MN.
+
+
+
+Adrangi & Levkowetz Informational [Page 6]
+
+RFC 4093 MIPv4 VPN Traversal Problem Statement August 2005
+
+
+ The MIPv4 HA has a public interface connected to the Internet, and a
+ private interface attached to the Intranet. Mobile users will most
+ likely have a virtual home network associated with the MIPv4 HA's
+ private interface, so that the mobile users are always away from home
+ and thus registered with the MIPv4 HA. Furthermore, in deployments
+ where the VPN gateway and the HA are placed in a corporate DMZ, this
+ implies that MIPv4 traffic will always be routed through the DMZ
+ (regardless of whether MNs are located outside or inside the
+ Intranet), which may not be acceptable to IT departments in large
+ corporations.
+
+ This deployment can be used with two different configurations: "MIPv4
+ inside IPsec-ESP tunnel" and "IPsec-ESP inside MIPv4 tunnel". The
+ "MIPv4 inside IPsec-ESP tunnel" has the same problems as the scenario
+ in Section 2.1. (Namely, MIPv4 registration becomes impossible when
+ the registration is to be done via an FA, and furthermore, in co-
+ located mode, the VPN tunnel has to be re-negotiated every time the
+ MN changes its point of attachment.) The "IPsec-ESP inside MIPv4
+ tunnel" does not have the problems described in Section 2.1; however,
+ it will require some modifications to the routing logic of the MIPv4
+ HA or the VPN gateway.
+
+2.3. Combined VPN Gateway and MIPv4 HA
+
+ This is similar to the deployment scenario described in Section 2.2,
+ with the exception that the VPN gateway and MIPv4 HA are running on
+ the same physical machine.
+
+ ..Foreign Network.. .....VPN Domain..(Intranet).....
+ . . . .
+ . +----+ +----+ . +----+ +-------+ .
+ . |MNs | | FA | . | VPN| | Router| .
+ . |away| | | .<==========| GW | | 1..n | .
+ . +----+ +----+ . | + | +-------+ .
+ . . | HA | .
+ ................... +----+ +-------+ +-------+ .
+ . | CN | | MNs | .
+ . | 1..n | | home | .
+ . +-------+ +-------+ .
+ . .
+ ................................
+
+ Figure 3
+
+
+
+
+
+
+
+
+Adrangi & Levkowetz Informational [Page 7]
+
+RFC 4093 MIPv4 VPN Traversal Problem Statement August 2005
+
+
+ Running MIPv4 HA and VPN on the same machine resolves routing-related
+ issues that exist in Section 2.2 when a "IPsec-ESP inside MIPv4
+ tunnel" configuration is used. However, it does not promote multi-
+ vendor interoperability in environments where MIPv4 HA and VPN
+ technologies must be acquired from different vendors.
+
+2.4. MIPv4 HA(s) Outside the VPN Domain
+
+ In this scenario, MIPv4 HAs are deployed outside the Intranet (e.g.,
+ in an operator network), as depicted in Figure 4, below.
+
+ ..Foreign Network.. .....VPN Domain..(Intranet).....
+ . . . .
+ . +----+ +----+ . +----+ +-------+ .
+ . |MNs | | FA | . | VPN| | Router| .
+ . |away| | | .<==========| GW | | 1..n | .
+ . +----+ +----+ . /\ | | +-------+ .
+ . . || | | .
+ ................... || | | +-------+ +-------+ .
+ || | | | CN | | MNs | .
+ .....MIPv4 Home.... || | | | 1..n | | home | .
+ . .<===++ | | +-------+ +-------+ .
+ . +------+ . +----+ .
+ . | HAs | . . .
+ . | 1..n | . ................................
+ . +------+ .
+ ...................
+
+ Figure 4
+
+ The IPsec tunnel endpoints will be the MN and the VPN gateway. The
+ 'home network' will most likely be a virtual home network, located at
+ the HA, through which authorized remote users (i.e., those that have
+ successfully established a connection to the corporate VPN) can reach
+ the Corporate Intranet and maintain their transport session
+ connectivity while roaming outside the Intranet from one subnet to
+ another. Please note that this deployment scenario does not support
+ mobility inside the Intranet.
+
+ In this case, it is most practical to run IPsec-ESP inside a MIPv4
+ tunnel (i.e., the MIPv4 tunnel endpoints are the MN and the HA; the
+ IPsec-ESP packet from the MN and to the VPN gateway is encapsulated
+ in the MIPv4 tunnel). This is because the MNs can register with the
+ HA without establishing an IPsec tunnel to the VPN gateway.
+
+
+
+
+
+
+
+Adrangi & Levkowetz Informational [Page 8]
+
+RFC 4093 MIPv4 VPN Traversal Problem Statement August 2005
+
+
+2.5. Combined VPN Gateway and MIPv4 HA(s) on the Local Link
+
+ This is similar to the deployment scenario described in Section 2.3,
+ with the difference that the VPN gateway/HA is sitting on the local
+ link. In this case, the VPN gateway and HA would most naturally be
+ co-located in the same box, although this is in no way a requirement.
+
+ The VPN/HA is assumed to be reachable from the external network;
+ i.e., it is assumed to have a public IP address, and the firewall is
+ assumed to be configured to allow direct access to the VPN/HA from
+ the external network.
+
+ ..Foreign Network.. .....VPN Domain..(Intranet).....
+ . . . .
+ . +----+ +----+ . +------+ +-------+ +-------+ .
+ . |MNs | | FA | . | Fire | | Router| | VPN/HA| .
+ . |away| | | .<=======>| wall | | 1..n | | 1..n | .
+ . +----+ +----+ . | | +-------+ +-------+ .
+ . . | NAT | .
+ ................... +------+ +-------+ +-------+ .
+ . | CN | | MNs | .
+ . | 1..n | | home | .
+ . +-------+ +-------+ .
+ . .
+ ................................
+
+ Figure 5
+
+ This deployment works today without any technical problems with
+ IPsec-ESP running inside a MIPv4 tunnel. If you were to run MIPv
+ inside the IPsec-ESP tunnel, it would have the same problems as in
+ Section 2.1, so it is deployed with the IPsec-ESP running inside the
+ MIPv4 tunnel. This deployment is not practical for large deployments
+ (on the order of thousands of users) because of the large and
+ distributed security perimeter.
+
+3. Deployment Scenarios Selection
+
+ The deployment scenarios described in Section 2 were evaluated to
+ identify those most in need of solving. The evaluation was done
+ based on two main criteria: 1) Is the deployment scenario common and
+ practical? and 2) Does the deployment scenario reveal any problems
+ resulting from MIPv4 and VPN coexistence?
+
+ The authors believe that the scenario in Section 2.1 is the most
+ important and practical one because of a rising need for providing
+ corporate remote users with continuous access to their Intranet
+ resources. After analyzing each scenario, one realizes that problems
+
+
+
+Adrangi & Levkowetz Informational [Page 9]
+
+RFC 4093 MIPv4 VPN Traversal Problem Statement August 2005
+
+
+ occurring in scenarios in Sections 2.2 and 2.4 are either the same as
+ those in the scenario in Section 2.1 or a subset of them. Therefore,
+ solving the scenario in Section 2.1 will also solve the scenarios in
+ Sections 2.2 and 2.4. The scenarios in Sections 2.3 and 2.5 do not
+ introduce functional problems resulting from MIPv4 and VPN co-
+ existence, and thus there is no need to seek a solution. A solution
+ for the deployment scenario in Section 2.1 is therefore seen as
+ essential, and this in turn can also be applied to solve problems in
+ other scenarios. In subsequent sections, we will articulate the
+ roaming scenarios, the problems, and the solution guidelines relevant
+ to the scenario in Section 2.1.
+
+4. Problem Statement
+
+ This section describes roaming scenarios corresponding to the
+ deployment scenario in Section 2.1 where an MN needs to have
+ continuous access to the Intranet resources regardless of whether it
+ is roaming inside or outside the Intranet, and their associated
+ problems. The scenarios are constructed based on a multi-subnetted,
+ MIPv4-enabled Intranet (hereafter referred to as Intranet or VPN
+ domain) protected by an IPsec-based VPN gateway as depicted in
+ Figure 6.
+
+ ....Internet....... .....VPN Domain..(Intranet).....
+ . . . .
+ . +----+ . +----+ +-------+ +-------+ .
+ . |MNs | . | VPN| | Router| | VPN/HA| .
+ . |away| .<=========>| | | 1..n | | 1..n | .
+ . +----+ . | GW | +-------+ +-------+ .
+ . . +----+ .
+ ................... . +-------+ +-------+ .
+ . | CN | | MNs | .
+ . | 1..n | | home | .
+ . +-------+ +-------+ .
+ . .
+ ................................
+
+ Figure 6: Intranet protected by a VPN gateway
+
+ The Intranet, as depicted in Figure 6, may include both wired (IEEE
+ 802.3) and IEEE 802.11 wireless LAN deployments. However, it is also
+ possible to see IEEE 802.11 deployments outside the Intranet due to
+ the perceived lack of current 802.11 security, as depicted in
+ Figure 7.
+
+
+
+
+
+
+
+Adrangi & Levkowetz Informational [Page 10]
+
+RFC 4093 MIPv4 VPN Traversal Problem Statement August 2005
+
+
+ ....Internet....... .....VPN Domain..(Intranet).....
+ . . . .
+ . +----+ . +----+ +-------+ +-------+ .
+ . |MNs | . | VPN| | Router| | VPN/HA| .
+ . |away| .<=========>| | | 1..n | | 1..n | .
+ . +----+ . | GW | +-------+ +-------+ .
+ . . | | .
+ ................... | | +-------+ +-------+ .
+ | | | CN | | MNs | .
+ ..802.11 Wireless.. <====>| | | 1..n | | home | .
+ . Network . +----+ +-------+ +-------+ .
+ . . . .
+ ................... ................................
+
+ Figure 7: IEEE 802.11 Wireless deployment outside the home network
+
+4.1. Registering in Co-Located Mode
+
+ In co-located mode, the IPsec tunnel endpoints would be at the MN and
+ the VPN gateway, which (supposing we have the scenario described in
+ Section 2.1) results in the mobile-ip tunnel from MN to HA being
+ encapsulated inside the IPsec tunnel. See Figure 8 below. This
+ scenario is still possible, but has some major drawbacks.
+
+ ....Internet....... .....VPN Domain..(Intranet).....
+ . . . .
+ . +----+ . +----+ +-------+ +-------+ .
+ . |MNs | . | VPN| | Router| | VPN/HA| .
+ . |away|<###################>| |-----| 1..n |->| 1..n | .
+ . +----+ . \ | GW | +-------+ +-------+ .
+ . . \ +----+ .
+ ................... mip . +-------+ +-------+ .
+ inside . | CN | | MNs | .
+ IPsec . | 1..n | | home | .
+ . +-------+ +-------+ .
+ . .
+ ................................
+
+ Figure 8
+
+ The MN obtains an address at its point of attachment (via DHCP
+ [RFC2131] or some other means), and then sets up an IPsec tunnel to
+ the VPN gateway, after which it can successfully register with its HA
+ through the IPsec tunnel. The IPsec tunnel SA (Security Association)
+ is identified by a triplet consisting of SPI (Security Parameter
+ Index), MN's IP destination address (i.e., the address obtained at
+ the point of attachment), and Security Protocol (AH or ESP)
+ Identifier as described in [RFC2401]. This means that as the MN's IP
+
+
+
+Adrangi & Levkowetz Informational [Page 11]
+
+RFC 4093 MIPv4 VPN Traversal Problem Statement August 2005
+
+
+ destination address changes on each IP subnet handoff, the IPsec
+ tunnel needs to be re-established. This could have noticeable
+ performance implications on real-time applications and in resource-
+ constrained wireless networks. In effect, we don't have mobility
+ support for the tunnel endpoint changes associated with MN movements.
+
+4.2. Registering via an FA
+
+ In the case where a mobile node is in a network where mobility
+ support is provided through the use of an FA, and no DHCP allocated
+ address and co-located mode is possible, we run into severe trouble.
+ This is illustrated in Figure 9 and explained below:
+
+ ..Foreign Network.. .....VPN Domain..(Intranet).....
+ . . . .
+ . +----+ +----+ . +----+ +-------+ +-------+ .
+ . |MNs | | FA | . | VPN| | Router| | VPN/HA| .
+ . |away|<??| |<###########>| |-----| 1..n |->| 1..n | .
+ . +----+ \ +----+ . \ | GW | +-------+ +-------+ .
+ . \ . \ +----+ .
+ ...........\....... mip . +-------+ +-------+ .
+ \ inside . | CN | | MNs | .
+ MN expects IPsec . | 1..n | | home | .
+ IPsec traffic . +-------+ +-------+ .
+ . .
+ ................................
+
+ Figure 9
+
+ When arriving at the visited network on the left in this figure, the
+ MN has to reach the FA with registration requests in order to have
+ the FA send them on to the HA. However, the MN in all likelihood
+ cannot register with the FA because the registration requests will be
+ sent encrypted, and the FA will not be able to decrypt them. If the
+ MN would have a policy that allowed split tunneling so that it could
+ reach the FA with clear text messages, then the FA would still not be
+ able to get through the VPN gateway unless the HA is reachable from
+ outside and the Intranet security policy allows MIP registration
+ packets to bypass the VPN gateway.
+
+ Even if the HA is reachable and the MIP registration succeeds, the FA
+ (which is likely in a different administrative domain) will not be
+ able to relay packets between the MN and the VPN gateway. Packets
+ from the MN will be encapsulated by the FA with IP-in-IP [RFC2003],
+ which the VPN gateway will drop, and packets from the VPN gateway
+ will have ESP payloads (with IP-in-IP inside), which the FA will drop
+ (as it expects IP-in-IP-encapsulated traffic to the MN).
+
+
+
+
+Adrangi & Levkowetz Informational [Page 12]
+
+RFC 4093 MIPv4 VPN Traversal Problem Statement August 2005
+
+
+ The use of a 'trusted FA' has also been suggested in this scenario,
+ meaning an FA that is actually a combined VPN GW and FA. The
+ scenario will work fine in this case, as the tunnel end-points are at
+ the FA and the VPN gateway as shown in Figure 10 below. However, we
+ cannot expect that the FA in access networks (e.g., wireless hot-
+ spots or CDMA 2000 networks) will have security associations with any
+ given corporate network, so this is not particularly realistic in the
+ general mobility case.
+
+ ..Foreign Network.. .....VPN Domain..(Intranet).....
+ . . . .
+ . +----+ +----+ . +----+ +-------+ +-------+ .
+ . | FA | | VPN| . | VPN| | Router| | VPN/HA| .
+ . | |<--| GW |<###########>| |-----| 1..n |->| 1..n | .
+ . +----+ +----+ . \ | GW | +-------+ +-------+ .
+ . | . \ +----+ .
+ . +----+ . mip . +-------+ +-------+ .
+ . |MNs | . inside . | CN | | MNs | .
+ . |away| . IPsec . | 1..n | | home | .
+ . +----+ . . +-------+ +-------+ .
+ ................... . .
+ ................................
+
+ Figure 10
+
+ Furthermore, this solution would leave the traffic between FA and MN
+ unprotected, and as this link in particular may be a wireless link,
+ this is clearly undesirable.
+
+4.3. Summary: MIP Incompatibilities with IPsec-Based VPN Gateways
+
+ An MN roaming outside the Intranet has to establish an IPsec tunnel
+ to its home VPN gateway first, in order to be able to register with
+ its home agent. This is because the MN cannot reach its HA (inside
+ the private protected network) directly from the outside. This
+ implies that the MIPv4 traffic from the MN to a node inside the
+ Intranet is forced to run inside an IPsec tunnel, and thus that it
+ will not be in the clear. This in turn leads to two distinct
+ problems depending on whether the MN uses co-located or non-co-
+ located modes to register with its HA.
+
+ In co-located mode, the IPsec tunnel needs to be re-established on
+ each IP subnet handoff, which will have performance implications on
+ real-time applications and resource-constrained wireless networks.
+
+ In non-co-located mode (i.e., using an FA care-of address), the
+ problem becomes severe, as the MN may be unable to register with its
+ HA through the FA because the FA cannot understand MIPv4 registration
+
+
+
+Adrangi & Levkowetz Informational [Page 13]
+
+RFC 4093 MIPv4 VPN Traversal Problem Statement August 2005
+
+
+ requests if they are encrypted in the IPsec tunnel (i.e., split
+ tunneling is not supported). Even if the MN could reach the FA with
+ non-encrypted registration requests (i.e., split tunneling is
+ supported), and the requests going from the FA to the HA can pass
+ through the VPN gateway, there would still be a problem with routing
+ of data packets between the Intranet and the internet. This is
+ because the VPN will not allow IP-in-IP-encapsulated packets from the
+ FA to go through. And furthermore, ESP-encapsulated packets from the
+ VPN gateway to the MN will be dropped by the FA, as it expects IP-
+ in-IP-encapsulated traffic to the MN.
+
+5. Solution Guidelines
+
+ This section describes guidelines for a solution to MIPv4 traversal
+ across VPN gateways.
+
+5.1. Preservation of Existing VPN Infrastructure
+
+ o The solution MUST work with currently deployed VPN gateways. This
+ is the whole raison d'etre of this investigation: Finding a way
+ to deploy Mobile-IP in cases where a VPN solution is already in
+ place.
+
+5.2. Software Upgrades to Existing VPN Client and Gateways
+
+ o The solution SHOULD minimize changes to existing VPN
+ client/gateway software.
+
+5.3. IPsec Protocol
+
+ o The solution SHOULD NOT require any changes to existing IPsec or
+ key-exchange standard protocols implemented by VPN gateways.
+
+ o The solution SHOULD NOT require that the VPN gateway or the VPN
+ client implement any new protocols in addition to the existing
+ standard protocols.
+
+5.4. Multi-Vendor Interoperability
+
+ o The solution MUST provide multi-vendor interoperability, whereby
+ MIPv4 mobility agents, mobility clients (MN), VPN server, and VPN
+ client solutions may come from four different vendors. This is
+ typical for medium and large enterprises that purchase and deploy
+ best-of-breed multi-vendor solutions for IP routing, VPNs,
+ firewalls, etc.
+
+
+
+
+
+
+Adrangi & Levkowetz Informational [Page 14]
+
+RFC 4093 MIPv4 VPN Traversal Problem Statement August 2005
+
+
+5.5. MIPv4 Protocol
+
+ o The solution MUST adhere to MIPv4 protocol [RFC3344]. That is,
+ the solution MUST NOT impose any changes that violate MIPv4
+ protocol.
+
+ o The solution MAY introduce new extensions to MIPv4 nodes per
+ guidelines specified in the MIPv4 protocol [RFC3344]. However, in
+ order to overcome barriers to deployment, it is highly desirable
+ to avoid any changes to MIPv4 mobility agents such as the FA and
+ HA.
+
+ o The solution MAY require more than one instance of MIPv4 running
+ in parallel (multiple encapsulation).
+
+5.6. Handoff Overhead
+
+ o It is imperative to keep the key management overhead down to a
+ minimum, in order to support fast handoffs across IP subnets.
+ Therefore, the solution MUST propose a mechanism to avoid or
+ minimize IPsec tunnel SA renegotiation and IKE renegotiation as
+ the MN changes its current point of network attachment.
+
+5.7. Scalability, Availability, Reliability, and Performance
+
+ o The solution complexity MUST increase at most linearly with the
+ number of MNs registered and accessing resources inside the
+ Intranet.
+
+ o The solution MAY introduce additional header or tunneling overhead
+ if needed.
+
+5.8. Functional Entities
+
+ o The solution MAY introduce new MIPv4-compliant functional
+ entities.
+
+5.9. Implications of Intervening NAT Gateways
+
+ o The solution MUST be able to work with the existing MIPv4 and
+ IPsec NAT traversal solutions [RFC3519] [RFC3715] [RFC3947].
+
+
+
+
+
+
+
+
+
+
+Adrangi & Levkowetz Informational [Page 15]
+
+RFC 4093 MIPv4 VPN Traversal Problem Statement August 2005
+
+
+5.10. Security Requirements
+
+ o The solution MUST provide security that is not inferior to what is
+ already provided to existing "nomadic computing" remote access
+ users; i.e., for confidentiality, authentication, message
+ integrity, protection against replay attacks, and related security
+ services.
+
+6. Security Considerations
+
+ This document describes an existing problem and proposes guidelines
+ for possible solutions; as such, its security implications are
+ indirect, through the guidelines it proposes for the solutions.
+ Section 5.10 gives the relevant security requirements.
+
+7. Acknowledgements
+
+ The authors who contributed text to this document were, in no
+ particular order: Farid Adrangi, Milind Kulkarni, Gopal Dommety, Eli
+ Gelasco, Qiang Zhang, Sami Vaarala, Dorothy Gellert, Nitsan Baider,
+ and Henrik Levkowetz.
+
+ The authors would like to thank other contributors, especially
+ Prakash Iyer, Mike Andrews, Ranjit Narjala, Joe Lau, Kent Leung,
+ Alpesh Patel, Phil Roberts, Hans Sjostrand, Serge Tessier, Antti
+ Nuopponen, Alan O'Neill, Gaetan Feige, and Brijesh Kumar, for their
+ feedback and help in improving this document.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Adrangi & Levkowetz Informational [Page 16]
+
+RFC 4093 MIPv4 VPN Traversal Problem Statement August 2005
+
+
+8. References
+
+8.1. Normative References
+
+ [RFC3344] Perkins, C., "IP Mobility Support for IPv4", RFC 3344,
+ August 2002.
+
+8.2. Informative References
+
+ [RFC1918] Rekhter, Y., Moskowitz, B., Karrenberg, D., de Groot, G.,
+ and E. Lear, "Address Allocation for Private Internets",
+ BCP 5, RFC 1918, February 1996.
+
+ [RFC2003] Perkins, C., "IP Encapsulation within IP", RFC 2003,
+ October 1996.
+
+ [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
+ Requirement Levels", BCP 14, RFC 2119, March 1997.
+
+ [RFC2131] Droms, R., "Dynamic Host Configuration Protocol", RFC
+ 2131, March 1997.
+
+ [RFC2401] Kent, S. and R. Atkinson, "Security Architecture for the
+ Internet Protocol", RFC 2401, November 1998.
+
+ [RFC3519] Levkowetz, H. and S. Vaarala, "Mobile IP Traversal of
+ Network Address Translation (NAT) Devices", RFC 3519, May
+ 2003.
+
+ [RFC3715] Aboba, B. and W. Dixon, "IPsec-Network Address Translation
+ (NAT) Compatibility Requirements", RFC 3715, March 2004.
+
+ [RFC3947] Kivinen, T., Swander, B., Huttunen, A., and V. Volpe,
+ "Negotiation of NAT-Traversal in the IKE", RFC 3947,
+ January 2005.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Adrangi & Levkowetz Informational [Page 17]
+
+RFC 4093 MIPv4 VPN Traversal Problem Statement August 2005
+
+
+Authors' Addresses
+
+ Farid Adrangi
+ Intel Corporation
+ 2111 N.E. 25th Avenue
+ Hillsboro OR
+ USA
+
+ Phone: +1 503-712-1791
+ EMail: farid.adrangi@intel.com
+
+
+ Henrik Levkowetz
+ Ericsson Research
+ Torshamsgatan 23
+ SE-164 80 Stockholm
+ SWEDEN
+
+ Phone: +46 7 08 32 16 08
+ EMail: henrik@levkowetz.com
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Adrangi & Levkowetz Informational [Page 18]
+
+RFC 4093 MIPv4 VPN Traversal Problem Statement August 2005
+
+
+Full Copyright Statement
+
+ Copyright (C) The Internet Society (2005).
+
+ This document is subject to the rights, licenses and restrictions
+ contained in BCP 78, and except as set forth therein, the authors
+ retain all their rights.
+
+ This document and the information contained herein are provided on an
+ "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
+ OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
+ ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
+ INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
+ INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
+ WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
+
+Intellectual Property
+
+ The IETF takes no position regarding the validity or scope of any
+ Intellectual Property Rights or other rights that might be claimed to
+ pertain to the implementation or use of the technology described in
+ this document or the extent to which any license under such rights
+ might or might not be available; nor does it represent that it has
+ made any independent effort to identify any such rights. Information
+ on the procedures with respect to rights in RFC documents can be
+ found in BCP 78 and BCP 79.
+
+ Copies of IPR disclosures made to the IETF Secretariat and any
+ assurances of licenses to be made available, or the result of an
+ attempt made to obtain a general license or permission for the use of
+ such proprietary rights by implementers or users of this
+ specification can be obtained from the IETF on-line IPR repository at
+ http://www.ietf.org/ipr.
+
+ The IETF invites any interested party to bring to its attention any
+ copyrights, patents or patent applications, or other proprietary
+ rights that may cover technology that may be required to implement
+ this standard. Please address the information to the IETF at ietf-
+ ipr@ietf.org.
+
+Acknowledgement
+
+ Funding for the RFC Editor function is currently provided by the
+ Internet Society.
+
+
+
+
+
+
+
+Adrangi & Levkowetz Informational [Page 19]
+