diff options
Diffstat (limited to 'doc/rfc/rfc3024.txt')
-rw-r--r-- | doc/rfc/rfc3024.txt | 1683 |
1 files changed, 1683 insertions, 0 deletions
diff --git a/doc/rfc/rfc3024.txt b/doc/rfc/rfc3024.txt new file mode 100644 index 0000000..b0cf429 --- /dev/null +++ b/doc/rfc/rfc3024.txt @@ -0,0 +1,1683 @@ + + + + + + +Network Working Group G. Montenegro, Editor +Request for Comments: 3024 Sun Microsystems, Inc. +Obsoletes: 2344 January 2001 +Category: Standards Track + + + Reverse Tunneling for Mobile IP, revised + +Status of this Memo + + This document specifies an Internet standards track protocol for the + Internet community, and requests discussion and suggestions for + improvements. Please refer to the current edition of the "Internet + Official Protocol Standards" (STD 1) for the standardization state + and status of this protocol. Distribution of this memo is unlimited. + +Copyright Notice + + Copyright (C) The Internet Society (2001). All Rights Reserved. + +Abstract + + Mobile Internet Protocol (IP) uses tunneling from the home agent to + the mobile node's care-of address, but rarely in the reverse + direction. Usually, a mobile node sends its packets through a router + on the foreign network, and assumes that routing is independent of + source address. When this assumption is not true, it is convenient + to establish a topologically correct reverse tunnel from the care-of + address to the home agent. + + This document proposes backwards-compatible extensions to Mobile IP + to support topologically correct reverse tunnels. This document does + not attempt to solve the problems posed by firewalls located between + the home agent and the mobile node's care-of address. + + This document obsoletes RFC 2344. + + + + + + + + + + + + + + + +Montenegro Standards Track [Page 1] + +RFC 3024 Reverse Tunneling for Mobile IP, revised January 2001 + + +Table of Contents + + 1. Introduction ................................................... 3 + 1.1. Terminology .................................................. 4 + 1.2. Assumptions .................................................. 4 + 1.3. Justification ................................................ 5 + 2. Overview ....................................................... 5 + 3. New Packet Formats ............................................. 6 + 3.1. Mobility Agent Advertisement Extension ....................... 6 + 3.2. Registration Request ......................................... 6 + 3.3. Encapsulating Delivery Style Extension ....................... 7 + 3.4. New Registration Reply Codes ................................. 8 + 4. Changes in Protocol Behavior ................................... 9 + 4.1. Mobile Node Considerations ................................... 9 + 4.1.1. Sending Registration Requests to the Foreign Agent ......... 9 + 4.1.2. Receiving Registration Replies from the Foreign Agent ...... 10 + 4.2. Foreign Agent Considerations ................................. 10 + 4.2.1. Receiving Registration Requests from the Mobile Node ....... 11 + 4.2.2. Relaying Registration Requests to the Home Agent ........... 11 + 4.3. Home Agent Considerations .................................... 11 + 4.3.1. Receiving Registration Requests from the Foreign Agent ..... 12 + 4.3.2. Sending Registration Replies to the Foreign Agent .......... 12 + 5. Mobile Node to Foreign Agent Delivery Styles ................... 13 + 5.1. Direct Delivery Style ........................................ 13 + 5.1.1. Packet Processing .......................................... 13 + 5.1.2. Packet Header Format and Fields ............................ 13 + 5.2. Encapsulating Delivery Style ................................. 14 + 5.2.1 Packet Processing ........................................... 14 + 5.2.2. Packet Header Format and Fields ............................ 15 + 5.3. Support for Broadcast and Multicast Datagrams ................ 16 + 5.4. Selective Reverse Tunneling .................................. 16 + 6. Security Considerations ........................................ 17 + 6.1. Reverse-tunnel Hijacking and Denial-of-Service Attacks ....... 17 + 6.2. Ingress Filtering ............................................ 18 + 6.3. Reverse Tunneling for Disparate Address Spaces ............... 18 + 7. IANA Considerations ............................................ 18 + 8. Acknowledgements ............................................... 18 + References ........................................................ 19 + Editor and Chair Addresses ........................................ 20 + Appendix A: Disparate Address Space Support ....................... 21 + A.1. Scope of the Reverse Tunneling Solution ................... 21 + A.2. Terminating Forward Tunnels at the Foreign Agent .......... 24 + A.3. Initiating Reverse Tunnels at the Foreign Agent ........... 26 + A.4. Limited Private Address Scenario .......................... 26 + Appendix B: Changes from RFC2344 .................................. 29 + Full Copyright Statement .......................................... 30 + + + + + +Montenegro Standards Track [Page 2] + +RFC 3024 Reverse Tunneling for Mobile IP, revised January 2001 + + +1. Introduction + + Section 1.3 of the Mobile IP specification [1] lists the following + assumption: + + It is assumed that IP unicast datagrams are routed based on the + destination address in the datagram header (i.e., not by source + address). + + Because of security concerns (for example, IP spoofing attacks), and + in accordance with RFC 2267 [8] and CERT [3] advisories to this + effect, routers that break this assumption are increasingly more + common. + + In the presence of such routers, the source and destination IP + address in a packet must be topologically correct. The forward + tunnel complies with this, as its endpoints (home agent address and + care-of address) are properly assigned addresses for their respective + locations. On the other hand, the source IP address of a packet + transmitted by the mobile node does not correspond to the network + prefix from where it emanates. + + This document discusses topologically correct reverse tunnels. + + Mobile IP does dictate the use of reverse tunnels in the context of + multicast datagram routing and mobile routers. However, the source + IP address is set to the mobile node's home address, so these tunnels + are not topologically correct. + + Notice that there are several uses for reverse tunnels regardless of + their topological correctness: + + - Mobile routers: reverse tunnels obviate the need for recursive + tunneling [1]. + + - Multicast: reverse tunnels enable a mobile node away from home + to (1) join multicast groups in its home network, and (2) + transmit multicast packets such that they emanate from its home + network [1]. + + - The TTL of packets sent by the mobile node (for example, when + sending packets to other hosts in its home network) may be so + low that they might expire before reaching their destination. + A reverse tunnel solves the problem as it represents a TTL + decrement of one [5]. + + + + + + +Montenegro Standards Track [Page 3] + +RFC 3024 Reverse Tunneling for Mobile IP, revised January 2001 + + +1.1. Terminology + + The discussion below uses terms defined in the Mobile IP + specification. Additionally, it uses the following terms: + + Forward Tunnel + + A tunnel that shuttles packets towards the mobile node. It + starts at the home agent, and ends at the mobile node's care-of + address. + + Reverse Tunnel + + A tunnel that starts at the mobile node's care-of address and + terminates at the home agent. + + The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", + "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this + document are to be interpreted as described in RFC 2119 [9]. + +1.2. Assumptions + + Mobility is constrained to a common IP address space (that is, the + routing fabric between, say, the mobile node and the home agent is + not partitioned into a "private" and a "public" network). + + This document does not attempt to solve the firewall traversal + problem. Rather, it assumes one of the following is true: + + - There are no intervening firewalls along the path of the + tunneled packets. + + - Any intervening firewalls share the security association + necessary to process any authentication [6] or encryption [7] + headers which may have been added to the tunneled packets. + + The reverse tunnels considered here are symmetric, that is, they use + the same configuration (encapsulation method, IP address endpoints) + as the forward tunnel. IP in IP encapsulation [2] is assumed unless + stated otherwise. + + Route optimization [4] introduces forward tunnels initiated at a + correspondent host. Since a mobile node may not know if the + correspondent host can decapsulate packets, reverse tunnels in that + context are not discussed here. + + + + + + +Montenegro Standards Track [Page 4] + +RFC 3024 Reverse Tunneling for Mobile IP, revised January 2001 + + +1.3. Justification + + Why not let the mobile node itself initiate the tunnel to the home + agent? This is indeed what it should do if it is already operating + with a topologically correct co-located care-of address. + + However, one of the primary objectives of the Mobile IP specification + is not to require this mode of operation. + + The mechanisms outlined in this document are primarily intended for + use by mobile nodes that rely on the foreign agent for forward tunnel + support. It is desirable to continue supporting these mobile nodes, + even in the presence of filtering routers. + +2. Overview + + A mobile node arrives at a foreign network, listens for agent + advertisements and selects a foreign agent that supports reverse + tunnels. It requests this service when it registers through the + selected foreign agent. At this time, and depending on how the + mobile node wishes to deliver packets to the foreign agent, it also + requests either the Direct or the Encapsulating Delivery Style + (section 5). + + In the Direct Delivery Style, the mobile node designates the foreign + agent as its default router and proceeds to send packets directly to + the foreign agent, that is, without encapsulation. The foreign agent + intercepts them, and tunnels them to the home agent. + + In the Encapsulating Delivery Style, the mobile node encapsulates all + its outgoing packets to the foreign agent. The foreign agent + decapsulates and re-tunnels them to the home agent, using the foreign + agent's care-of address as the entry-point of this new tunnel. + + + + + + + + + + + + + + + + + + +Montenegro Standards Track [Page 5] + +RFC 3024 Reverse Tunneling for Mobile IP, revised January 2001 + + +3. New Packet Formats + +3.1. Mobility Agent Advertisement Extension + + 0 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Type | Length | Sequence Number | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Lifetime |R|B|H|F|M|G|V|T| reserved | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | zero or more Care-of Addresses | + | ... | + + The only change to the Mobility Agent Advertisement Extension [1] is + the additional 'T' bit: + + T Agent offers reverse tunneling service. + + A foreign agent that sets the 'T' bit MUST support the Direct + Delivery Style. Encapsulating Delivery Style SHOULD be supported as + well (section 5). + + Using this information, a mobile node is able to choose a foreign + agent that supports reverse tunnels. Notice that if a mobile node + does not understand this bit, it simply ignores it as per [1]. + +3.2. Registration Request + + Reverse tunneling support is added directly into the Registration + Request by using one of the "rsvd" bits. If a foreign or home agent + that does not support reverse tunnels receives a request with the 'T' + bit set, the Registration Request fails. This results in a + registration denial (failure codes are specified in section 3.4). + + Home agents SHOULD NOT object to providing reverse tunnel support, + because they "SHOULD be able to decapsulate and further deliver + packets addressed to themselves, sent by a mobile node" [1]. In the + case of topologically correct reverse tunnels, the packets are not + sent by the mobile node as distinguished by its home address. + Rather, the outermost (encapsulating) IP source address on such + datagrams is the care-of address of the mobile node. + + In Registration Requests sent by a mobile node, the Time to Live + field in the IP header MUST be set to 255. This limits a denial of + service attack in which malicious hosts send false Registration + Requests (see Section 6). + + + + +Montenegro Standards Track [Page 6] + +RFC 3024 Reverse Tunneling for Mobile IP, revised January 2001 + + + 0 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Type |S|B|D|M|G|V|T|-| Lifetime | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Home Address | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Home Agent | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Care-of Address | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Identification | + | | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Extensions ... + +-+-+-+-+-+-+-+- + + The only change to the Registration Request packet is the additional + 'T' bit: + + T If the 'T' bit is set, the mobile node asks its home + agent to accept a reverse tunnel from the care-of + address. Mobile nodes using a foreign agent care-of + address ask the foreign agent to reverse-tunnel its + packets. + +3.3. Encapsulating Delivery Style Extension + + The Encapsulating Delivery Style Extension MAY be included by the + mobile node in registration requests to further specify reverse + tunneling behavior. It is expected to be used only by the foreign + agent. Accordingly, the foreign agent MUST consume this extension + (that is, it must not relay it to the home agent or include it in + replies to the mobile node). As per Section 3.6.1.3 of [1], the + mobile node MUST include the Encapsulating Delivery Style Extension + after the Mobile-Home Authentication Extension, and before the + Mobile-Foreign Authentication Extension, if present. + + The Encapsulating Delivery Style Extension MUST NOT be included if + the 'T' bit is not set in the Registration Request. + + If this extension is absent, Direct Delivery is assumed. + Encapsulation is done according to what was negotiated for the + forward tunnel (that is, IP in IP is assumed unless specified + otherwise). For more details on the delivery styles, please refer to + section 5. + + + + + +Montenegro Standards Track [Page 7] + +RFC 3024 Reverse Tunneling for Mobile IP, revised January 2001 + + + Foreign agents SHOULD support the Encapsulating Delivery Style + Extension. + + 0 1 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Type | Length | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Type + + 130 + + Length + + 0 + +3.4. New Registration Reply Codes + + Foreign and home agent registration replies MUST convey if the + reverse tunnel request failed. These new reply codes are defined: + + Service denied by the foreign agent: + + 74 requested reverse tunnel unavailable + 75 reverse tunnel is mandatory and 'T' bit not set + 76 mobile node too distant + 79 delivery style not supported + + NOTE: Code 79 has not yet been assigned by IANA. + + and + + Service denied by the home agent: + + 137 requested reverse tunnel unavailable + 138 reverse tunnel is mandatory and 'T' bit not set + 139 requested encapsulation unavailable + + In response to a Registration Request with the 'T' bit set, mobile + nodes may receive (and MUST accept) code 70 (poorly formed request) + from foreign agents and code 134 (poorly formed request) from home + agents. However, foreign and home agents that support reverse + tunneling MUST use codes 74 and 137, respectively. + + In addition to setting the 'T' bit, the mobile node also MAY request + the Encapsulating Delivery Style by including the corresponding + extension. If a foreign agent does not implement the Encapsulating + + + +Montenegro Standards Track [Page 8] + +RFC 3024 Reverse Tunneling for Mobile IP, revised January 2001 + + + Delivery Style, it MUST respond to the mobile node with code 79 + (delivery style not supported). This also applies if the foreign + agent does not support a requested delivery style that may be defined + in the future. + + Absence of the 'T' bit in a Registration Request MAY elicit denials + with codes 75 and 138 at the foreign agent and the home agent, + respectively. + + Forward and reverse tunnels are symmetric, that is, both are able to + use the same tunneling options negotiated at registration. This + implies that the home agent MUST deny registrations if an unsupported + form of tunneling is requested (code 139). Notice that Mobile IP [1] + already defines the analogous failure code 72 for use by the foreign + agent. + +4. Changes in Protocol Behavior + + Unless otherwise specified, behavior specified by Mobile IP [1] is + assumed. In particular, if any two entities share a mobility + security association, they MUST use the appropriate Authentication + Extension (Mobile-Foreign, Foreign-Home or Mobile-Home Authentication + Extension) when exchanging registration protocol datagrams. An + admissible authentication extension (for example the Mobile-Home + Authentication Extension) MUST always be present to authenticate + registration messages between a mobile node and its home agent. + + Reverse tunneling imposes additional protocol processing requirements + on mobile entities. Differences in protocol behavior with respect to + Mobile IP [1] are specified in the subsequent sections. + +4.1. Mobile Node Considerations + + This section describes how the mobile node handles registrations that + request a reverse tunnel. + +4.1.1. Sending Registration Requests to the Foreign Agent + + In addition to the considerations in [1], a mobile node sets the 'T' + bit in its Registration Request to petition a reverse tunnel. + + The mobile node MUST set the TTL field of the IP header to 255. This + is meant to limit the reverse tunnel hijacking attack (Section 6). + + The mobile node MAY optionally include an Encapsulating Delivery + Style Extension. + + + + + +Montenegro Standards Track [Page 9] + +RFC 3024 Reverse Tunneling for Mobile IP, revised January 2001 + + +4.1.2. Receiving Registration Replies from the Foreign Agent + + Possible valid responses are: + + - A registration denial issued by either the home agent or the + foreign agent: + + a. The mobile node follows the error checking guidelines in + [1], and depending on the reply code, MAY try modifying the + registration request (for example, by eliminating the + request for alternate forms of encapsulation or delivery + style), and issuing a new registration. + + b. Depending on the reply code, the mobile node MAY try zeroing + the 'T' bit, eliminating the Encapsulating Delivery Style + Extension (if one was present), and issuing a new + registration. Notice that after doing so the registration + may succeed, but due to the lack of a reverse tunnel data + transfer may not be possible. + + - The home agent returns a Registration Reply indicating that the + service will be provided. + + In this last case, the mobile node has succeeded in establishing a + reverse tunnel between its care-of address and its home agent. If + the mobile node is operating with a co-located care-of address, it + MAY encapsulate outgoing data such that the destination address of + the outer header is the home agent. This ability to selectively + reverse-tunnel packets is discussed further in section 5.4. + + If the care-of address belongs to a separate foreign agent, the + mobile node MUST employ whatever delivery style was requested (Direct + or Encapsulating) and proceed as specified in section 5. + + A successful registration reply is an assurance that both the foreign + agent and the home agent support whatever alternate forms of + encapsulation (other than IP in IP) were requested. Accordingly, the + mobile node MAY use them at its discretion. + +4.2. Foreign Agent Considerations + + This section describes how the foreign agent handles registrations + that request a reverse tunnel. + + + + + + + + +Montenegro Standards Track [Page 10] + +RFC 3024 Reverse Tunneling for Mobile IP, revised January 2001 + + +4.2.1. Receiving Registration Requests from the Mobile Node + + A foreign agent that receives a Registration Request with the 'T' bit + set processes the packet as specified in the Mobile IP specification + [1], and determines whether it can accommodate the forward tunnel + request. If it cannot, it returns an appropriate code. In + particular, if the foreign agent is unable to support the requested + form of encapsulation it MUST return code 72. If it cannot support + the requested form of delivery style it MUST return code 79 (delivery + style not supported). + + The foreign agent MAY reject Registration Requests without the 'T' + bit set by denying them with code 75 (reverse tunnel is mandatory and + 'T' bit not set). + + The foreign agent MUST verify that the TTL field of the IP header is + set to 255. Otherwise, it MUST reject the registration with code 76 + (mobile node too distant). The foreign agent MUST limit the rate at + which it sends these registration replies to a maximum of one per + second. + + As a last check, the foreign agent verifies that it can support a + reverse tunnel with the same configuration. If it cannot, it MUST + return a Registration Reply denying the request with code 74 + (requested reverse tunnel unavailable). + +4.2.2. Relaying Registration Requests to the Home Agent + + Otherwise, the foreign agent MUST relay the Registration Request to + the home agent. + + Upon receipt of a Registration Reply that satisfies validity checks, + the foreign agent MUST update its visitor list, including indication + that this mobile node has been granted a reverse tunnel and the + delivery style expected (section 5). + + While this visitor list entry is in effect, the foreign agent MUST + process incoming traffic according to the delivery style, encapsulate + it and tunnel it from the care-of address to the home agent's + address. + +4.3. Home Agent Considerations + + This section describes how the home agent handles registrations that + request a reverse tunnel. + + + + + + +Montenegro Standards Track [Page 11] + +RFC 3024 Reverse Tunneling for Mobile IP, revised January 2001 + + +4.3.1. Receiving Registration Requests from the Foreign Agent + + A home agent that receives a Registration Request with the 'T' bit + set processes the packet as specified in the Mobile IP specification + [1] and determines whether it can accommodate the forward tunnel + request. If it cannot, it returns an appropriate code. In + particular, if the home agent is unable to support the requested form + of encapsulation it MUST return code 139 (requested encapsulation + unavailable). + + The home agent MAY reject registration requests without the 'T' bit + set by denying them with code 138 (reverse tunnel is mandatory and ' + T' bit not set). + + As a last check, the home agent determines whether it can support a + reverse tunnel with the same configuration as the forward tunnel. If + it cannot, it MUST send back a registration denial with code 137 + (requested reverse tunnel unavailable). + + Upon receipt of a Registration Reply that satisfies validity checks, + the home agent MUST update its mobility bindings list to indicate + that this mobile node has been granted a reverse tunnel and the type + of encapsulation expected. + +4.3.2. Sending Registration Replies to the Foreign Agent + + In response to a valid Registration Request, a home agent MUST issue + a Registration Reply to the mobile node. + + After a successful registration, the home agent may receive + encapsulated packets addressed to itself. Decapsulating such packets + and blindly injecting them into the network is a potential security + weakness (section 6.1). Accordingly, the home agent MUST implement, + and, by default, SHOULD enable the following check for encapsulated + packets addressed to itself: + + The home agent searches for a mobility binding whose care-of + address is the source of the outer header, and whose mobile node + address is the source of the inner header. + + If no such binding is found, or if the packet uses an encapsulation + mechanism that was not negotiated at registration the home agent MUST + silently discard the packet and SHOULD log the event as a security + exception. + + Home agents that terminate tunnels unrelated to Mobile IP (for + example, multicast tunnels) MAY turn off the above check, but this + practice is discouraged for the aforementioned reasons. + + + +Montenegro Standards Track [Page 12] + +RFC 3024 Reverse Tunneling for Mobile IP, revised January 2001 + + + While the registration is in effect, a home agent MUST process each + valid reverse tunneled packet (as determined by checks like the + above) by decapsulating it, recovering the original packet, and then + forwarding it on behalf of its sender (the mobile node) to the + destination address (the correspondent host). + +5. Mobile Node to Foreign Agent Delivery Styles + + This section specifies how the mobile node sends its data traffic via + the foreign agent. In all cases, the mobile node learns the foreign + agent's link-layer address from the link-layer header in the agent + advertisement. + +5.1. Direct Delivery Style + + This delivery mechanism is very simple to implement at the mobile + node, and uses small (non-encapsulated) packets on the link between + the mobile node and the foreign agent (potentially a very slow link). + However, it only supports reverse-tunneling of unicast packets, and + does not allow selective reverse tunneling (section 5.4). + +5.1.1. Packet Processing + + The mobile node MUST designate the foreign agent as its default + router. Not doing so will not guarantee encapsulation of all the + mobile node's outgoing traffic, and defeats the purpose of the + reverse tunnel. The foreign agent MUST: + + - detect packets sent by the mobile node, and + + - modify its forwarding function to encapsulate them before + forwarding. + +5.1.2. Packet Header Format and Fields + + This section shows the format of the packet headers used by the + Direct Delivery style. The formats shown assume IP in IP + encapsulation [2]. + + Packet format received by the foreign agent (Direct Delivery Style): + + IP fields: + Source Address = mobile node's home address + Destination Address = correspondent host's address + Upper Layer Protocol + + Packet format forwarded by the foreign agent (Direct Delivery Style): + + + + +Montenegro Standards Track [Page 13] + +RFC 3024 Reverse Tunneling for Mobile IP, revised January 2001 + + + IP fields (encapsulating header): + Source Address = foreign agent's care-of address + Destination Address = home agent's address + Protocol field: 4 (IP in IP) + IP fields (original header): + Source Address = mobile node's home address + Destination Address = correspondent host's address + Upper Layer Protocol + + These fields of the encapsulating header MUST be chosen as follows: + + IP Source Address + + Copied from the Care-of Address field within the Registration + Request. + + IP Destination Address + + Copied from the Home Agent field within the most recent + successful Registration Reply. + + IP Protocol Field + + Default is 4 (IP in IP [2]), but other methods of encapsulation + MAY be used as negotiated at registration time. + +5.2. Encapsulating Delivery Style + + This mechanism requires that the mobile node implement encapsulation, + and explicitly directs packets at the foreign agent by designating it + as the destination address in a new outermost header. Mobile nodes + that wish to send either broadcast or multicast packets MUST use the + Encapsulating Delivery Style. + +5.2.1 Packet Processing + + The foreign agent does not modify its forwarding function. Rather, + it receives an encapsulated packet and after verifying that it was + sent by the mobile node, it: + + - decapsulates to recover the inner packet, + + - re-encapsulates, and sends it to the home agent. + + If a foreign agent receives an un-encapsulated packet from a mobile + node which had explicitly requested the Encapsulated Delivery Style, + then the foreign agent MUST NOT reverse tunnel such a packet and + rather MUST forward it using standard, IP routing mechanisms. + + + +Montenegro Standards Track [Page 14] + +RFC 3024 Reverse Tunneling for Mobile IP, revised January 2001 + + +5.2.2. Packet Header Format and Fields + + This section shows the format of the packet headers used by the + Encapsulating Delivery style. The formats shown assume IP in IP + encapsulation [2]. + + Packet format received by the foreign agent (Encapsulating Delivery + Style): + + IP fields (encapsulating header): + Source Address = mobile node's home address + Destination Address = foreign agent's address + Protocol field: 4 (IP in IP) + IP fields (original header): + Source Address = mobile node's home address + Destination Address = correspondent host's address + Upper Layer Protocol + + The fields of the encapsulating IP header MUST be chosen as follows: + + IP Source Address + + The mobile node's home address. + + IP Destination Address + + The address of the agent as learned from the IP source address + of the agent's most recent successful registration reply. + + IP Protocol Field + + Default is 4 (IP in IP [2]), but other methods of encapsulation + MAY be used as negotiated at registration time. + + Packet format forwarded by the foreign agent (Encapsulating Delivery + Style): + + IP fields (encapsulating header): + Source Address = foreign agent's care-of address + Destination Address = home agent's address + Protocol field: 4 (IP in IP) + IP fields (original header): + Source Address = mobile node's home address + Destination Address = correspondent host's address + Upper Layer Protocol + + These fields of the encapsulating IP header MUST be chosen as + follows: + + + +Montenegro Standards Track [Page 15] + +RFC 3024 Reverse Tunneling for Mobile IP, revised January 2001 + + + IP Source Address + + Copied from the Care-of Address field within the Registration + Request. + + IP Destination Address + + Copied from the Home Agent field within the most recent + successful Registration Reply. + + IP Protocol Field + + Default is 4 (IP in IP [2]), but other methods of encapsulation + MAY be used as negotiated at registration time. + +5.3. Support for Broadcast and Multicast Datagrams + + If a mobile node is operating with a co-located care-of address, + broadcast and multicast datagrams are handled according to Sections + 4.3 and 4.4 of the Mobile IP specification [1]. Mobile nodes using a + foreign agent care-of address MAY have their broadcast and multicast + datagrams reverse-tunneled by the foreign agent. However, any mobile + nodes doing so MUST use the encapsulating delivery style. + + This delivers the datagram only to the foreign agent. The latter + decapsulates it and then processes it as any other packet from the + mobile node, namely, by reverse tunneling it to the home agent. + +5.4. Selective Reverse Tunneling + + Packets destined to local resources (for example, a nearby printer) + might be unaffected by ingress filtering. A mobile node with a co- + located care-of address MAY optimize delivery of these packets by not + reverse tunneling them. On the other hand, a mobile node using a + foreign agent care-of address MAY use this selective reverse + tunneling capability by requesting the Encapsulating Delivery Style, + and following these guidelines: + + Packets NOT meant to be reversed tunneled: + + Sent using the Direct Delivery style. The foreign agent MUST + process these packets as regular traffic: they MAY be + forwarded but MUST NOT be reverse tunneled to the home agent. + + + + + + + + +Montenegro Standards Track [Page 16] + +RFC 3024 Reverse Tunneling for Mobile IP, revised January 2001 + + + Packets meant to be reverse tunneled: + + Sent using the Encapsulating Delivery style. The foreign agent + MUST process these packets as specified in section 5.2: they + MUST be reverse tunneled to the home agent. + +6. Security Considerations + + The extensions outlined in this document are subject to the security + considerations outlined in the Mobile IP specification [1]. + Essentially, creation of both forward and reverse tunnels involves an + authentication procedure, which reduces the risk for attack. + +6.1. Reverse-tunnel Hijacking and Denial-of-Service Attacks + + Once the tunnel is set up, a malicious node could hijack it to inject + packets into the network. Reverse tunnels might exacerbate this + problem, because upon reaching the tunnel exit point packets are + forwarded beyond the local network. This concern is also present in + the Mobile IP specification, as it already dictates the use of + reverse tunnels for certain applications. + + Unauthenticated exchanges involving the foreign agent allow a + malicious node to pose as a valid mobile node and re-direct an + existing reverse tunnel to another home agent, perhaps another + malicious node. The best way to protect against these attacks is by + employing the Mobile-Foreign and Foreign-Home Authentication + Extensions defined in [1]. + + If the necessary mobility security associations are not available, + this document introduces a mechanism to reduce the range and + effectiveness of the attacks. The mobile node MUST set to 255 the + TTL value in the IP headers of Registration Requests sent to the + foreign agent. This prevents malicious nodes more than one hop away + from posing as valid mobile nodes. Additional codes for use in + registration denials make those attacks that do occur easier to + track. + + With the goal of further reducing the attacks the Mobile IP Working + Group considered other mechanisms involving the use of + unauthenticated state. However, these introduce the possibilities of + denial-of-service attacks. The consensus was that this was too much + of a trade-off for mechanisms that guarantee no more than weak (non- + cryptographic) protection against attacks. + + + + + + + +Montenegro Standards Track [Page 17] + +RFC 3024 Reverse Tunneling for Mobile IP, revised January 2001 + + +6.2. Ingress Filtering + + There has been some concern regarding the long-term effectiveness of + reverse-tunneling in the presence of ingress filtering. The + conjecture is that network administrators will target reverse- + tunneled packets (IP in IP encapsulated packets) for filtering. The + ingress filtering recommendation spells out why this is not the case + [8]: + + Tracking the source of an attack is simplified when the source is + more likely to be "valid." + +6.3. Reverse Tunneling for Disparate Address Spaces + + There are security implications involved with the foreign agent's + using link-layer information to select the proper reverse tunnel for + mobile node packets (section A.3). Unauthenticated link-layers allow + a malicious mobile node to misuse another's existing reverse tunnel, + and inject packets into the network. + + For this solution to be viable, the link-layer MUST securely + authenticate traffic received by the foreign agent from the mobile + nodes. Unauthenticated link-layer technologies (for example shared + ethernet) are not recommended to implement disparate address support. + +7. IANA Considerations + + The Encapsulating Delivery Style extension defined in section 3.3 is + a Mobile IP registration extension as defined in [1]. IANA assigned + the value of 130 for this purpose at the time of the publication of + RFC 2344. + + The Code values defined in section 3.4 are error codes as defined in + [1]. They correspond to error values associated with rejection by + the home and foreign agents. At the time of the publication of RFC + 2344, IANA assigned codes 74-76 for the foreign agent rejections and + codes 137-139 for the home agent rejections. The code for 'delivery + style not supported' has been assigned a value of 79 by the IANA for + this purpose. + +8. Acknowledgements + + The encapsulating style of delivery was proposed by Charlie Perkins. + Jim Solomon has been instrumental in shaping this document into its + present form. Thanks to Samita Chakrabarti for helpful comments on + disparate address space support, and for most of the text in section + A.4. + + + + +Montenegro Standards Track [Page 18] + +RFC 3024 Reverse Tunneling for Mobile IP, revised January 2001 + + +References + + [1] Perkins, C., "IP Mobility Support", RFC 2002, October 1996. + + [2] Perkins, C., "IP Encapsulation within IP", RFC 2003, October + 1996. + + [3] Computer Emergency Response Team (CERT), "IP Spoofing Attacks + and Hijacked Terminal Connections", CA-95:01, January 1995. + Available via anonymous ftp from info.cert.org in + /pub/cert_advisories. + + [4] Perkins, C. and D. Johnson, "Route Optimization in Mobile IP", + Work in Progress. + + [5] Manuel Rodriguez, private communication, August 1995. + + [6] Kent, S. and R. Atkinson, "IP Authentication Header", RFC 2402, + November 1998. + + [7] Kent, S. and R. Atkinson, "IP Encapsulating Payload", RFC 2406, + November 1998. + + [8] Ferguson, P. and D. Senie, "Network Ingress Filtering: Defeating + Denial of Service Attacks which employ IP Source Address + Spoofing", RFC 2267, January 1998. + + [9] Bradner, S., "Key words for use in RFCs to Indicate Requirement + Levels", BCP 14, RFC 2119, March 1997. + + [10] Farinacci, D., Li, T., Hanks, S., Meyer, D. and P. Traina, + "Generic Routing Encapsulation (GRE)", RFC 2784, March 2000. + + [11] Aboba, B. and M. Beadles, "The Network Access Identifier", RFC + 2486, January 1999. + + [12] Rekhter, Y., Moskowitz, B., Karrenberg, D., de Groot, G.J. and + E. Lear, "Address Allocation for Private Internets", BCP 5, RFC + 1918, February 1996. + + [13] Dommety, G., "Key and Sequence Number Extensions to GRE", RFC + 2890, August 2000. + + + + + + + + + +Montenegro Standards Track [Page 19] + +RFC 3024 Reverse Tunneling for Mobile IP, revised January 2001 + + +Editor and Chair Addresses + + Questions about this document may be directed at: + + Gabriel E. Montenegro + Sun Microsystems + Laboratories, Europe + 29, chemin du Vieux Chene + 38240 Meylan + FRANCE + + Phone: +33 476 18 80 45 + EMail: gab@sun.com + + + The working group can be contacted via the current chairs: + + Basavaraj Patil + Nokia Networks + 6000 Connection Drive + Irving, TX 75039 + USA + + Phone: +1 972-894-6709 + Fax : +1 972-894-5349 + EMail: Raj.Patil@nokia.com + + + Phil Roberts + Motorola + 1501 West Shure Drive + Arlington Heights, IL 60004 + USA + + Phone: +1 847-632-3148 + EMail: QA3445@email.mot.com + + + + + + + + + + + + + + + +Montenegro Standards Track [Page 20] + +RFC 3024 Reverse Tunneling for Mobile IP, revised January 2001 + + +Appendix A: Disparate Address Space Support + + Mobile IP [1] assumes that all the entities involved (mobile + node, foreign agent and home agent) have addresses within the + same globally routable address space. In many deployment + scenarios, when a mobile node leaves its home network it may + wander into a region where its home address is not routable or + known by the local routing fabric. Similarly, the IP addresses + of the foreign agent and the home agent may belong to disparate + address spaces, which precludes their exchanging registration + protocol messages directly. These issues are possible + particularly if the entities involved use addresses from the + ranges specified in RFC1918 [12] to support private networks. + + Accurately speaking, the use of private addresses is not the + only cause. It may, in fact, be the most common, but the root of + the problem lies in the use of disparate address spaces. For + example, corporations often have several properly allocated + address ranges. They typically advertise reachability to only a + subset of those ranges, leaving the others for use exclusively + within the corporate network. Since these ranges are not + routable in the general Internet, their use leads to the same + problems encountered with "private" addresses, even though they + are not taken from the ranges specified in RFC1918. + + Even if the mobile node, home agent and foreign agent all reside + within the same address space, problems may arise if the + correspondent node does not. However, this problem is not + specific to Mobile IP, and is beyond the scope of this + document. The next section limits even further the scope of the + issues relevant to this document. A subsequent section explains + how reverse tunneling may be used to tackle them. + +A.1. Scope of the Reverse Tunneling Solution + + Reverse tunneling (as defined in this document) may be used to + cope with disparate address spaces, within the following + constraints: + + - There are no provisions to solve the case in which the + correspondent node and the mobile node are in disparate + address spaces. This limits the scope of the problem to + only those issues specific to Mobile IP. + + - The foreign agent and the home agent are directly reachable + to each other by virtue of residing in the same address + space. This limits the scope of the problem to only the + simplest of cases. This also implies that the registration + + + +Montenegro Standards Track [Page 21] + +RFC 3024 Reverse Tunneling for Mobile IP, revised January 2001 + + + protocol itself has a direct path between the foreign + agent and the home agent, and, in this respect, is not + affected by disparate address spaces. This restriction + also applies to mobile nodes operating with a co-located + care-of address. In this case, reverse tunneling is a + complete and elegant solution. + + - There are no additional protocol elements beyond those + defined by Mobile IP [1] and reverse tunneling. In + particular, additional extensions to the registration + requests or replies, or additional bits in the + header--although potentially useful--are outside the scope + of this document. + + In spite of the limitations, reverse tunneling may be used to + solve the most common issues. The range of problems that can be + solved are best understood by looking at some simple diagrams: + + Figure A1: NON-ROUTABLE PACKETS IN DISPARATE ADDRESS SPACES + + Mc Fa Fb Hb Hc Yc + [MN]-----------------[FA]----------------[HA]---------------[Y] + Addr space A Addr space B Addr space C + + In this diagram, there are three disparate address spaces: A, B and + C. The home agent (HA) has one address each on address spaces B and + C, and the foreign agent (FA), on address spaces A and B. The mobile + node's (MN) has a permanent address, Mc, within address space C. + + In the most common scenario both A and C are "private" address + spaces, and B is the public Internet. + + Suppose MN sends a packet to correspondent node (Y) in its home + network. Presumably, MN has no difficulties delivering this packet + to the FA, because it does so using layer 2 mechanisms. Somehow, the + FA must realize that this packet must be reverse tunneled, and it + must fetch the proper binding to do so. Possible mechanisms are + outlined in section A.3. + + However, once the packet is in address space B it becomes non- + routable. Note that ingress filtering only exacerbates the problem, + because it adds a requirement of topological significance to the + source IP address in addition to the that of the destination address. + As Mobile IP matures, others entities may be defined (for example, + AAA servers). Their addition places even more requirements on the + address spaces in use. + + + + + +Montenegro Standards Track [Page 22] + +RFC 3024 Reverse Tunneling for Mobile IP, revised January 2001 + + + Reverse tunneling adds a topologically significant IP header to the + packet (source IP address of Fb, destination of Hb) during its + transit within address space B. Assuming IP in IP encapsulation + (although others, like GRE are also possible), this is what the + packet looks like: + + Figure A2: IP IN IP REVERSE TUNNELED PACKET FROM FA TO HA + + +-----------------+ + | +-------+| + | Fb->Hb | Mc->Yc|| + | +-------+| + +--------+--------+ + + HA receives this packet, recovers the original packet, and since it + is cognizant of address space C, delivers it to the appropriate + interface. + + Of course, for this to happen, the care-of address registered by the + MN is not the usual Fa, but Fb. How this happens is outside the + scope of this document. Some possible mechanisms are: + + - FA recognizes mobile nodes whose addresses fall within the + private address ranges specified by RFC1918. In this case, the + foreign agent could force the use of Fb as the care-of address, + perhaps by rejecting the initial registration request with an + appropriate error message and supplemental information. + + - FA could be configured to always advertise Fb as long as H->Fb + and Fb->H are guaranteed to be valid forward and reverse + tunnels, respectively, for all values of H. Here, H is the + address of any home agent whose mobile nodes may register via + FA. + + - FA could indicate that it supports disparate address spaces via + a currently undefined 'P' bit in its advertisements, and an + indication of the relevant address space for any or all of its + care-of addressed by including an NAI [11] or a realm indicator + (perhaps a variant of the NAI). Alternatively, mobile nodes so + configured could solicit the NAI or realm indicator information + in response to advertisements with the 'P' bit set. + + Additionally, the mobile node needs to supply the appropriate address + for its home agent: Hb instead of the usual Hc. How this happens is + outside the scope of this document. Some possible mechanisms are: + + - This determination could be triggered in response to using the + foreign agent's Fb as the care-of address. + + + +Montenegro Standards Track [Page 23] + +RFC 3024 Reverse Tunneling for Mobile IP, revised January 2001 + + + - The mobile node could always use Hb as its home agent address, + specially (1) if Hb is routable within address space C, or (2) + if MN is certain never to be at home (in some configurations, + the mobile nodes are always roaming). + + - The mobile node could be configured with different home agent + addresses and their corresponding address space (perhaps + indicated via an NAI [11] or a variant of it). + + Another major issue introduced by private addresses is that of two or + more mobile nodes with the same numeric IP address: + + Figure A3: MOBILE NODES WITH CONFLICTING ADDRESSES + + Mc=M H1b H1c + [MN1]-------+ +----[HA1]----+--------- + | | | Address + | | | space C + Address | | Address +---------- + Space Fa-[FA]-Fb Space + A | | B +--------- + | | | Address + | | | space D + [MN2]-------+ +----[HA2]----+--------- + Md=M H2b H2d + + Suppose there are two address spaces A and B, and a foreign agent + (FA) with interfaces on both. There are two home agents (HA1 and + HA2) in address space B, with addresses H1b and H2b, respectively. + Each of the home agents has an interface in a private address space + in addition to address space B: HA1 has H1c on C, and HA2 has H2d on + D. MN1 and MN2 are two mobile nodes with home addresses Mc and Md, + corresponding to address space C and D, respectively. + + If Mc and Md are private addresses as defined in RFC1918, they may be + numerically equivalent (both equal to M). Because of this, the + foreign agent can no longer rely on only the mobile node's home + address to disambiguate amongst its different bindings. + +A.2. Terminating Forward Tunnels at the Foreign Agent + + In figure A1, suppose the correspondent node Y sends a packet to the + mobile node at address Mc. The packet is intercepted by the home + agent at Hc and tunneled towards the mobile node via address Fb. + + + + + + + +Montenegro Standards Track [Page 24] + +RFC 3024 Reverse Tunneling for Mobile IP, revised January 2001 + + + Once the packet reaches FA (via address Fb), the foreign agent must + identify which of its registered mobile nodes is the ultimate + destination for the internal packet. In order to do so, it needs to + identify the proper binding via a tuple guaranteed to be unique among + all of its mobile nodes. + + The unique tuple sufficient for demultiplexing IP in IP packets + [IPIP] (protocol 4) is: + + - destination IP address of the encapsulated (internal) header + + This is mobile node MN's home address (Mc in the above + example). At first glance, it seems like this is unique among + all mobile nodes, but as mentioned above, with private + addresses another mobile may have an address Md numerically + equivalent to Mc. + + - source IP address of the external header + + This, the remote end of the tunnel, is Hb in the above example. + + - destination IP address of the external header + + This, the local end of the tunnel, is Fb in the above example. + + The three values above are learned from a successful registration and + are the mobile node's home address, the home agent's address and the + care-of address. Thus, it is possible to identify the right binding. + Once FA identifies the ultimate destination of the packet, Mc, it + delivers the internal packet using link layer mechanisms. + + GRE packets [10] (protocol 47) are only handled if their Protocol + Type field has a value of 0x800 (other values are outside the scope + of this document), and are demultiplexed based on the same tuple as + IP in IP packets. In GRE terminology, the tuple is: + + - destination IP address of the payload (internal) packet + + - source IP address of the delivery (external) packet + + - destination IP address of the delivery (external) packet + + Notice that the Routing, Sequence Number, Strict Source Route and Key + fields have been deprecated from GRE [10]. However, a separate + document specifies their use [13]. + + + + + + +Montenegro Standards Track [Page 25] + +RFC 3024 Reverse Tunneling for Mobile IP, revised January 2001 + + + The above tuples work for IP-in-IP or GRE encapsulation, and assume + that the inner packet is in the clear. Encapsulations which encrypt + the inner packet header are outside the scope of this document. + +A.3. Initiating Reverse Tunnels at the Foreign Agent + + In figure A3, suppose mobile node M1 sends a packet to a + correspondent node in its home address space, C, and mobile node M2 + sends a packet to a correspondent node in its home address space, D. + + At FA, the source addresses for both packets will be seen as M, thus + this is not sufficient information. The unique tuple required to + identify the proper binding is: + + - link-layer information related to the MN + + This may be in the form of a MAC address, a PPP session (or + incoming interface) or channel coding for a digital cellular + service. Device ID's can also be used in this context. + + - source IP address of the IP header. + + As was pointed out, this by itself is not guaranteed to be + unique. + + This information must be established and recorded at registration + time. The above items are sufficient for the foreign agent to select + the proper binding to use. This, in turn, produces the address of + the home agent, and the reverse tunneling options negotiated during + the registration process. The foreign agent can now proceed with + reverse tunneling. + +A.4. Limited Private Address Scenario + + The Limited Private Address Scenario (LPAS) has received much + attention from the cellular wireless industry, so it is useful to + define it and to clarify what its requirements are. + + LPAS is a subset of the disparate address space scenario discussed in + this appendix. This section explains how LPAS could be deployed + given the current state of the Mobile IP specifications. + + + + + + + + + + +Montenegro Standards Track [Page 26] + +RFC 3024 Reverse Tunneling for Mobile IP, revised January 2001 + + + Figure A4: EXAMPLE PRIVATE ADDRESS SCENARIO + + 10.10.1.2 + +----+ IF1=COA1+-------+ HAA2 +-----+ + | MN1|------------------------| FA |---------| HA2 | + +----+ +------------| | +-----+ + | IF2=COA2+-------+ + +---+ | + | | + +-----+ | + | MN2 | | + +-----+ | + 10.10.1.2 | + | HAA1 + +------+ + | HA1 | + +------+ + + The above figure presents a very simple scenario in which private + addresses are used. Here, "private addresses" are strictly those + defined in RFC 1918 [12]. In this deployment scenario, the only + entities that have private addresses are the mobile nodes. Foreign + agent and home agent addresses are publicly routable on the general + Internet. More specifically, the care-of addresses advertised by the + foreign agents (COA1 and COA2 in Figure A4) and the home agent + addresses used by mobile nodes in registration requests (HAA1 and + HAA2 in Figure A4) are publicly routable on the general Internet. As + a consequence, any Mobile IP tunnels can be established between any + home agent home address and any foreign agent care-of address. + + Also, note that two different mobile nodes (MN1 and MN2) with the + same private address (10.10.1.2) are visiting the same foreign agent + FA. This is supported as long as MN1 and MN2 are serviced by + different home agents. Hence, from any given home agent's + perspective, each mobile node has a unique IP address, even if it + happens to be a private address as per RFC 1918. + + Operation in the presence of route optimization [4] is outside the + scope of this document. + + Requirements for the above private address scenario: + + Mobile node requirements: + + Mobile nodes intending to use private addresses with Mobile IP + MUST set the 'T' bit and employ reverse tunneling. Mobile + node's private addresses within a given address space MUST be + unique. Thus two mobile nodes belonging to a single home agent + + + +Montenegro Standards Track [Page 27] + +RFC 3024 Reverse Tunneling for Mobile IP, revised January 2001 + + + cannot have the same private addresses. Thus, when receiving + or sending tunneled traffic for a mobile node, the tunnel + endpoints are used to disambiguate amongst conflicting mobile + node addresses. + + If the mobile node happens to register with multiple home + agents simultaneously through the same foreign agent, there + must be some link-layer information that is distinct for each + mobile node. If no such distinct link-layer information is + available, the mobile nodes MUST use unique address. + + Foreign agent requirements: + + All advertising interfaces of the foreign agent MUST have + publicly routable care-of address. Thus, a mobile node with a + private address visits the foreign agent only in its publicly + routable network. + + Foreign agents MUST support reverse tunneling in order to + support private addressed mobile nodes. If a foreign agent + receives a registration request from a mobile node with a + private address, and the mobile node has not set the 'T' bit, + the foreign agent SHOULD reject it. + + When delivering packets to or receiving packets from mobile + nodes, foreign agents MUST disambiguate among mobile node with + conflicting private addresses by using link-layer information + as mentioned previously (Appendix section A.2 and A.3). A + foreign agent in absence of route optimization, should make + sure that two mobile nodes visiting the same foreign agent + corresponds with each other through their respective home + agents. + + If a foreign agent supports reverse tunneling, then it MUST + support the simple scenario of private address support + described in this section. + + Home agent requirements: + + Any home agent address used by mobile nodes in registration + request MUST be a publicly routable address. Home agents will + not support overlapping private home addresses, thus each + private home address of a mobile node registered with a home + agent is unique. When the 'T' bit is set in the registration + request from the mobile node, the home agent MUST recognize and + accept registration request from mobile nodes with private + + + + + +Montenegro Standards Track [Page 28] + +RFC 3024 Reverse Tunneling for Mobile IP, revised January 2001 + + + addresses. Also, the home agent SHOULD be able to assign + private addresses out of its address pool to mobile nodes for + use as home addresses. This does not contravene home agent + processing in section 3.8 of [1]. + +Appendix B: Changes from RFC2344 + + This section lists the changes with respect to the previous version + of this document (RFC2344). + + - Added Appendix A on support for Disparate Addresses spaces and + private addresses. + + - Added the corresponding section (6.3) under 'Security + Considerations'. + + - Made Encapsulating Delivery Support optional by demoting from + a MUST to a should. This also required defining a new error + code 79 (assigned by IANA). + + - Mentioned the possibility of an admissible authentication + extension which may be different from the Mobile-Home + authentication extension. + + - An IANA considerations section was added. + + + + + + + + + + + + + + + + + + + + + + + + + + +Montenegro Standards Track [Page 29] + +RFC 3024 Reverse Tunneling for Mobile IP, revised January 2001 + + +Full Copyright Statement + + Copyright (C) The Internet Society (2001). All Rights Reserved. + + This document and translations of it may be copied and furnished to + others, and derivative works that comment on or otherwise explain it + or assist in its implementation may be prepared, copied, published + and distributed, in whole or in part, without restriction of any + kind, provided that the above copyright notice and this paragraph are + included on all such copies and derivative works. However, this + document itself may not be modified in any way, such as by removing + the copyright notice or references to the Internet Society or other + Internet organizations, except as needed for the purpose of + developing Internet standards in which case the procedures for + copyrights defined in the Internet Standards process must be + followed, or as required to translate it into languages other than + English. + + The limited permissions granted above are perpetual and will not be + revoked by the Internet Society or its successors or assigns. + + This document and the information contained herein is provided on an + "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING + TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING + BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION + HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF + MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. + +Acknowledgement + + Funding for the RFC Editor function is currently provided by the + Internet Society. + + + + + + + + + + + + + + + + + + + +Montenegro Standards Track [Page 30] + |