1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
|
Network Working Group P. Srisuresh
Request for Comments: 2709 Lucent Technologies
Category: Informational October 1999
Security Model with Tunnel-mode IPsec for NAT Domains
Status of this Memo
This memo provides information for the Internet community. It does
not specify an Internet standard of any kind. Distribution of this
memo is unlimited.
Copyright Notice
Copyright (C) The Internet Society (1999). All Rights Reserved.
Abstract
There are a variety of NAT flavors, as described in [Ref 1]. Of the
domains supported by NATs, only Realm-Specific IP clients are able to
pursue end-to-end IPsec secure sessions. However, all flavors of NAT
are capable of offering tunnel-mode IPsec security to private domain
hosts peering with nodes in external realm. This document describes a
security model by which tunnel-mode IPsec security can be architected
on NAT devices. A section is devoted to describing how security
policies may be transparently communicated to IKE (for automated KEY
exchange) during Quick Mode. Also outlined are applications that can
benefit from the Security Model described.
1. Introduction and Overview
NAT devices provide transparent routing to end hosts trying to
communicate from disparate address realms, by modifying IP and
transport headers en-route. This solution works best when the end
user identifier (such as host name) is different from the address
used to locate end user.
End-to-end application level payload security can be provided for
applications that do not embed realm-specific information in payloads
that is meaningless to one of the end-users. Applications that do
embed realm-specific information in payload will require an
application level gateway (ALG) to make the payload meaningful in
both realms. However, applications that require assistance of an ALG
en-route cannot pursue end-to-end application level security.
Srisuresh Informational [Page 1]
^L
RFC 2709 Security for NAT Domains October 1999
All applications traversing a NAT device, irrespective of whether
they require assistance of an ALG or not, can benefit from IPsec
tunnel-mode security, when NAT device acts as the IPsec tunnel end
point.
Section 2 below defines terms specific to this document.
Section 3 describes how tunnel mode IPsec security can be recognized
on NAT devices. IPsec Security architecture, format and operation of
various types of security mechanisms may be found in [Ref 2], [Ref 3]
and [Ref 4]. This section does not address how session keys and
policies are exchanged between a NAT device acting as IPsec gateway
and external peering nodes. The exchange could have taken place
manually or using any of known automatic exchange techniques.
Section 4 assumes that Public Key based IKE protocol [Ref 5] may be
used to automate exchange of security policies, session keys and
other Security Association (SA) attributes. This section describes a
method by which security policies administered for a private domain
may be translated for communicating with external nodes. Detailed
description of IKE protocol operation may be found in [Ref 5] and
[Ref 6].
Section 5 describes applications of the security model described in
the document. Applications listed include secure external realm
connectivity for private domain hosts and secure remote access to
enterprise mobile hosts.
2. Terminology
Definitions for majority of terms used in this document may be found
in one of (a) NAT Terminology and Considerations document [Ref 1],
(b) IP security Architecture document [Ref 2], or (c) Internet Key
Enchange (IKE) document [Ref 5]. Below are terms defined specifically
for this document.
2.1. Normal-NAT
The term "Normal-NAT" is introduced to distinguish normal NAT
processing from the NAT processing used for secure packets embedded
within an IPsec secure tunnel. "Normal-NAT" is the normal NAT
processing as described in [Ref 1].
2.2. IPsec Policy Controlled NAT (IPC-NAT)
The term "IPsec Policy Controlled NAT" (IPC-NAT, for short) is
defined to describe the NAT transformation applied as an extension of
IPsec transformation to packets embedded within an IP-IP tunnel, for
Srisuresh Informational [Page 2]
^L
RFC 2709 Security for NAT Domains October 1999
which the NAT node is a tunnel end point. IPC-NAT function is
essentially an adaptation of NAT extensions to embedded packets of
tunnel-mode IPsec. Packets subject to IPC-NAT processing are
beneficiaries of IPsec security between the NAT device and an
external peer entity, be it a host or a gateway node.
IPsec policies place restrictions on what NAT mappings are used. For
example, IPsec access control security policies to a peer gateway
will likely restrict communication to only certain addresses and/or
port numbers. Thus, when NAT performs translations, it must insure
that the translations it performs are consist with the security
policies.
Just as with Normal-NAT, IPC-NAT function can assume any of NAT
flavors, including Traditional-NAT, Bi-directional-NAT and Twice-NAT.
An IPC-NAT device would support both IPC-NAT and normal-NAT
functions.
3. Security model of IPC-NAT
The IP security architecture document [Ref 2] describes how IP
network level security may be accomplished within a globally unique
address realm. Transport and tunnel mode security are discussed. For
purposes of this document, we will assume IPsec security to mean
tunnel mode IPsec security, unless specified otherwise. Elements
fundamental to this security architecture are (a) Security Policies,
that determine which packets are permitted to be subject to Security
processing, and (b) Security Association Attributes that identify the
parameters for security processing, including IPsec protocols,
algorithms and session keys to be applied.
Operation of tunnel mode IPsec security on a device that does not
support Network Address Translation may be described as below in
figures 1 and 2.
+---------------+ No +---------------------------+
| | +--->|Forward packet in the Clear|
Outgoing |Does the packet| | |Or Drop, as appropriate. |
-------->|match Outbound |-| +---------------------------+
Packet |Security | | +-------------+
|Policies? | |Yes |Perform | Forward
| | +--->|Outbound |--------->
+---------------+ |Security | IPsec Pkt
|(Tunnel Mode)|
+-------------+
Figure 1. Operation of Tunnel-Mode IPsec on outgoing packets.
Srisuresh Informational [Page 3]
^L
RFC 2709 Security for NAT Domains October 1999
IPsec packet +----------+ +----------+
destined to |Perform | Embedded |Does the | No(Drop)
------------>|Inbound |--------->|Pkt match |-------->
the device |Security | Packet |Inbound SA| Yes(Forward)
|(Detunnel)| |Policies? |
+----------+ +----------+
Figure 2. Operation of Tunnel-Mode IPsec on Incoming packets
A NAT device that provides tunnel-mode IPsec security would be
required to administer security policies based on private realm
addressing. Further, the security policies determine the IPsec tunnel
end-point peer. As a result, a packet may be required to undergo
different type of NAT translation depending upon the tunnel end-point
the IPsec node peers with. In other words, IPC-NAT will need a unique
set of NAT maps for each security policy configured. IPC-NAT will
perform address translation in conjunction with IPsec processing
differently with each peer, based on security policies. The
following diagrams (figure 3 and figure 4) illustrate the operation
of IPsec tunneling in conjunction with NAT. Operation of an IPC-NAT
device may be distinguished from that of an IPsec gateway that does
not support NAT as follows.
(1) IPC-NAT device has security policies administered using
private realm addressing. A traditional IPsec gateway will
have its security policies administered using a single realm
(say, external realm) addressing.
(2) Elements fundamental to the security model of an IPC-NAT
device includes IPC-NAT address mapping (and other NAT
parameter definitions) in conjunction with Security policies
and SA attributes. Fundamental elements of a traditional
IPsec gateway are limited only to Security policies and SA
attributes.
+---------------+ +-------------------------+
| | No | Apply Normal-NAT or Drop|
Outgoing |Does the packet| +--->| as appropriate |
-------->|match Outbound |-| +-------------------------+
Packet |Security | | +---------+ +-------------+
(Private |Policies? | |Yes |Perform | |Perform |Forward
Domain) | | +--->|Outbound |->|Outbound |-------->
+---------------+ |NAT | |Security |IPsec Pkt
|(IPC-NAT)| |(Tunnel mode)|
+---------+ +-------------+
Figure 3. Tunnel-Mode IPsec on an IPC-NAT device for outgoing pkts
Srisuresh Informational [Page 4]
^L
RFC 2709 Security for NAT Domains October 1999
IPsec Pkt +----------+ +---------+ +----------+
destined |Perform | Embedded |Perform | |Does the |No(Drop)
--------->|Inbound |--------->|Inbound |->|Pkt match |-------->
to device |Security | Packet |NAT | |Inbound SA|Yes(Forward)
(External |(Detunnel)| |(IPC-NAT)| |Policies? |
Domain) +----------+ +---------+ +----------+
Figure 4. Tunnel-Mode IPsec on an IPC-NAT device for Incoming pkts
Traditional NAT is session oriented, allowing outbound-only sessions
to be translated. All other flavors of NAT are Bi-directional. Any
and all flavors of NAT mapping may be used in conjunction with the
security policies and secure processing on an IPC-NAT device. For
illustration purposes in this document, we will assume tunnel mode
IPsec on a Bi-directional NAT device.
Notice however that a NAT device capable of providing security across
IPsec tunnels can continue to support Normal-NAT for packets that do
not require IPC-NAT. Address mapping and other NAT parameter
definitions for Normal-NAT and IPC-NAT are distinct. Figure 3
identifies how a NAT device distinguishes between outgoing packets
that need to be processed through Normal-NAT vs. IPC-NAT. As for
packets incoming from external realm, figure 4 outlines packets that
may be subject to IPC-NAT. All other packets are subject to Normal-
NAT processing only.
4. Operation of IKE protocol on IPC-NAT device.
IPC-NAT operation described in the previous section can be
accomplished based on manual session key exchange or using an
automated key Exchange protocol between peering entities. In this
section, we will consider adapting IETF recommended Internet Key
Exchange (IKE) protocol on a IPC-NAT device for automatic exchange of
security policies and SA parameters. In other words, we will focus on
the operation of IKE in conjunction with tunnel mode IPsec on NAT
devices. For the reminder of this section, we will refer NAT device
to mean IPC-NAT device, unless specified otherwise.
IKE is based on UDP protocol and uses public-key encryption to
exchange session keys and other attributes securely across an address
realm. The detailed protocol and operation of IKE in the context of
IP may be found in [Ref 3] and [Ref 4]. Essentially, IKE has 2
phases.
In the first phase, IKE peers operate in main or aggressive mode to
authenticate each other and set up a secure channel between
themselves. A NAT device has an interface to the external realm and
is no different from any other node in the realm to negotiate phase I
Srisuresh Informational [Page 5]
^L
RFC 2709 Security for NAT Domains October 1999
with peer external nodes. The NAT device may assume any of the valid
Identity types and authentication methodologies necessary to
communicate and authenticate with peers in the realm. The NAT device
may also interface with a Certification Authority (CA) in the realm
to retrieve certificates and perform signature validation.
In the second phase, IKE peers operate in Quick Mode to exchange
policies and IPsec security proposals to negotiate and agree upon
security transformation algorithms, policies, keys, lifetime and
other security attributes. During this phase, IKE process must
communicate with IPsec Engine to (a) collect secure session
attributes and other parameters to negotiate with peer IKE nodes,
and to (b) notify security parameters agreed upon (with peer) during
the negotiation.
An IPC-NAT device, operating as IPsec gateway, has the security
policies administered based on private realm addressing. An ALG will
be required to translate policies from private realm addressing into
external addressing, as the IKE process needs to communicate these
policies to peers in external realm. Note, IKE datagrams are not
subject to any NAT processing. IKE-ALG simply translates select
portions of IKE payload as per the NAT map defined for the policy
match. The following diagram illustrates how an IKE-ALG process
interfaces with IPC-NAT to take the security policies and IPC-NAT
maps and generates security policies that IKE could communicate
during quick mode to peers in the external realm.
Policies in quick mode are exchanged with a peer as a combination of
IDci and IDcr payloads. The combination of IDs (policies) exchanged
by each peer must match in order for the SA parameters on either end
to be applied uniformly. If the IDs are not exchanged, the assumption
would be that the Quick mode negotiated SA parameters are applicable
between the IP addresses assumed by the main mode.
Depending on the nature of security policies in place(ex: end-to-end
sessions between a pair of nodes vs. sessions with an address range),
IKE-ALG may need to request NAT to set up address bindings and/or
transport bindings for the lifetime (in seconds or Kilo-Bytes) the
sessions are negotiated. In the case the ALG is unable to setup the
necessary address bindings or transport bindings, IKE-ALG will not be
able to translate security policies and that will result in IKE not
pursuing phase II negotiation for the effected policies.
When the Negotiation is complete and successful, IKE will communicate
the negotiated security parameters directly to the IPC-NAT gateway
engine as described in the following diagram.
Srisuresh Informational [Page 6]
^L
RFC 2709 Security for NAT Domains October 1999
+---------+
| |
Negotiated Security Parameters | IKE |
+--------------------------------| Process |
|(including session Keys) | |
| +---------+
| ^ ^
| Translated| |
| Secure| |Security
| Policies| |Proposals
v | |
+---------+ Security Policies, based +---------+
| |------------------------->| |
| | on Pvt. realm addressing | |
| IPC-NAT | | |
| (IPsec | IPC-NAT MAPs | IKE-ALG |
| Gateway)|------------------------->| |
| | | |
| | Security Proposals | |
| |------------------------->| |
| | | |
| | NAT Control exchange | |
| |<------------------------>| |
+---------+ +---------+
Figure 5. IKE-ALG translates Security policies, using NAT Maps.
5. Applications of IPC-NAT security model
IPC-NAT operational model described thus far illustrates how a NAT
device can be used as an IPsec tunnel end point to provide secure
transfer of data in external realm. This section will attempt to
illustrate two applications of such a model.
5.1. Secure Extranet Connectivity
IPC-NAT Model has a direct application of being able to provide clear
as well as secure connectivity with external realm using a NAT
device. In particular, IPC-NAT device at the border of a private
realm can peer with an IPsec gateway of an external domain to secure
the Extranet connection. Extranet refers to the portion of the path
that crosses the Internet between peering gateway nodes.
Srisuresh Informational [Page 7]
^L
RFC 2709 Security for NAT Domains October 1999
5.2. Secure Remote Access to Mobile Users of an Enterprise
Say, a node from an enterprise moves out of the enterprise, and
attempts to connect to the enterprise from remote site, using a
temporary service provider assigned address (Care-of-Address). In
such a case, the mobile user could setup an IPsec tunnel session with
the corporate IPC-NAT device using a user-ID and authentication
mechanism that is agreed upon. Further, the user may be configured
with enterprise DNS server, as an extension of authentication
following IKE Phase I. This would allow the user to access enterprise
resources by name.
However, many enterprise servers and applications rely on source IP
address for authentication and deny access for packets that do not
originate from the enterprise address space. In these scenarios,
IPC-NAT has the ability (unlike a traditional IPsec gateway) to
perform Network Address Translation (NAT) for remote access users, so
their temporary address in external realm is translated into a
enterprise domain address, while the packets are within private
realm. The flavor of IPC-NAT performed would be traditional NAT
(i.e., assuming mobile-user address space to be private realm and
Enterprise address space to be external realm), which can either be
Basic NAT (using a block of enterprise addresses for translation) or
NAPT(using a single enterprise address for translation).
The secure remote access application described is pertinent to all
enterprises, irrespective of whether an enterprise uses IANA
registered addresses or not.
The secure remote access application described is different from
Mobile-IP in that, the mobile node (described in this application)
does not retain the Home-Network address and simply uses the Care-
Of-address for communication purposes. It is conceivable for the
IPC-NAT Gateway to transparently provide Mobile-IP type connectivity
to the Mobile node by binding the mobile node's Care-of-Address with
its Home Address. Provision of such an address mapping to IPC-NAT
gateway, however, is not within the scope of this document.
6. Security Considerations
If NATs and ALGs are not in a trusted boundary, that is a major
security problem, as ALGs snoop end user traffic payload.
Application level payload could be encrypted end-to-end, so long as
the payload does not contain IP addresses and/or transport
identifiers that are valid in only one of the realms. With the
exception of Realm-Specific IP, end-to-end IP network level security
assured by current IPsec techniques is not attainable with NATs in
between. The IPC-NAT model described in this document outlines an
Srisuresh Informational [Page 8]
^L
RFC 2709 Security for NAT Domains October 1999
approach by which network level security may be obtained within
external realm.
NATs, when combined with ALGs, can ensure that the datagrams injected
into Internet have no private addresses in headers or payload.
Applications that do not meet these requirements may be dropped using
firewall filters. For this reason, it is not uncommon to find that
IPC-NATs, ALGs and firewalls co-exist to provide security at the
border of a private network.
REFERENCES
[1] Srisuresh, P. and M. Holdrege, "IP Network Address Translator
(NAT) Terminology and Considerations", RFC 2663, August 1999.
[2] Kent, S. and R. Atkinson, "Security Architecture for the
Internet Protocol", RFC 2401, November 1998
[3] Kent, S. and R. Atkinson, "IP Encapsulating Security Payload
(ESP)", RFC 2406, November 1998
[4] Kent, S. and R. Atkinson, "IP Authentication Header", RFC 2402,
November 1998.
[5] Harkins, D. and D. Carrel, "The Internet Key Exchange (IKE)",
RFC 2409, November 1998.
[6] Piper, D., "The Internet IP Security Domain of Interpretation
for ISAKMP", RFC 2407, November 1998.
[7] Carpenter, B., Crowcroft, J. and Y. Rekhter, "IPv4 Address
Behavior Today", RFC 2101, February 1997.
[8] Rekhter, Y., Moskowitz, B., Karrenberg, D., de Groot G. and E.
Lear, "Address Allocation for Private Internets", BCP 5, RFC
1918, February 1996.
Srisuresh Informational [Page 9]
^L
RFC 2709 Security for NAT Domains October 1999
Author's Address
Pyda Srisuresh
Lucent technologies
4464 Willow Road
Pleasanton, CA 94588-8519
U.S.A.
Phone: (925) 737-2153
Fax: (925) 737-2110
EMail: srisuresh@lucent.com
Srisuresh Informational [Page 10]
^L
RFC 2709 Security for NAT Domains October 1999
Full Copyright Statement
Copyright (C) The Internet Society (1999). All Rights Reserved.
This document and translations of it may be copied and furnished to
others, and derivative works that comment on or otherwise explain it
or assist in its implementation may be prepared, copied, published
and distributed, in whole or in part, without restriction of any
kind, provided that the above copyright notice and this paragraph are
included on all such copies and derivative works. However, this
document itself may not be modified in any way, such as by removing
the copyright notice or references to the Internet Society or other
Internet organizations, except as needed for the purpose of
developing Internet standards in which case the procedures for
copyrights defined in the Internet Standards process must be
followed, or as required to translate it into languages other than
English.
The limited permissions granted above are perpetual and will not be
revoked by the Internet Society or its successors or assigns.
This document and the information contained herein is provided on an
"AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Acknowledgement
Funding for the RFC Editor function is currently provided by the
Internet Society.
Srisuresh Informational [Page 11]
^L
|