1 Design of the MOBIKE Protocol Editors: T. Kivinen H. Tschofenig.

Slides:



Advertisements
Similar presentations
Security Issues In Mobile IP
Advertisements

© 2004 SafeNet, Inc. All rights reserved. Mobike Protocol Design draft-ietf-mobike-design-00.txt Tero Kivinen
1 Introduction to Mobile IPv6 IIS5711: Mobile Computing Mobile Computing and Broadband Networking Laboratory CIS, NCTU.
Project by: Palak Baid (pb2358) Gaurav Pandey (gip2103) Guided by: Jong Yul Kim.
1 Address Selection, Failure Detection and Recovery in MULTI6 draft-arkko-multi6dt-failure-detection-00.txt Multi6 Design Team -- Jari Arkko, Marcelo Bagnulo,
Guide to Network Defense and Countermeasures Second Edition
IUT– Network Security Course 1 Network Security Firewalls.
IPv6 Multihoming Support in the Mobile Internet Presented by Paul Swenson CMSC 681, Fall 2007 Article by M. Bagnulo et. al. and published in the October.
IKEv2 extension: MOBIKE Faisal Memon Erik Weathers CS 259.
© 2004 SafeNet, Inc. All rights reserved. Mobike Protocol Design draft-kivinen-mobike-design-00.txt Tero Kivinen
How do Networks work – Really The purposes of set of slides is to show networks really work. Most people (including technical people) don’t know Many people.
1 © 2005 Nokia mobike-transport.ppt/ MOBIKE Transport mode usage and issues Mohan Parthasarathy.
MOBILITY SUPPORT IN IPv6
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Chapter 23: ARP, ICMP, DHCP IS333 Spring 2015.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Mobile IP Traversal Of NAT Devices By, Vivek Nemarugommula.
1 Chapter06 Mobile IP. 2 Outline What is the problem at the routing layer when Internet hosts move?! Can the problem be solved? What is the standard solution?
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
Using Windows Firewall and Windows Defender
9/11/2015Home Networking1 Bob.test Have Road Runner Unhappy about reports of constant probes of machines Policy decision –I want to prevent unauthorized.
March 7, 2005MOBIKE WG, IETF 621 Mobility Protocol Options for IKEv2 (MOPO-IKE) Pasi Eronen.
Firewalls. Evil Hackers FirewallYour network Firewalls mitigate risk Block many threats They have vulnerabilities.
Objectives Configure routing in Windows Server 2008 Configure Network Address Translation 1.
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
1 /160 © NOKIA 2001 MobileIPv6_Workshop2001.PPT / / Tutorial Mobile IPv6 Kan Zhigang Nokia Research Center Beijing, P.R.China
National Institute Of Science & Technology Mobile IP Jiten Mishra (EC ) [1] MOBILE IP Under the guidance of Mr. N. Srinivasu By Jiten Mishra EC
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Windows 7 Firewall.
Automatic VPN Client Recovery from IPsec Pass-through Failures Dr. José Brustoloni Dept. Computer Science, University of Pittsburgh 210 S. Bouquet St.
CS332, Ch. 26: TCP Victor Norman Calvin College 1.
Karlstad University IP security Ge Zhang
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
IPSec ● IP Security ● Layer 3 security architecture ● Enables VPN ● Delivers authentication, integrity and secrecy ● Implemented in Linux, Cisco, Windows.
Engineering Workshops Purposes of Neighbor Solicitation.
Problems in using HIP for P2PSIP Philip Matthews Avaya
Security, NATs and Firewalls Ingate Systems. Basics of SIP Security.
1 Mobility Support in IPv6 (MIPv6) Chun-Chuan Yang Dept. Computer Science & Info. Eng. National Chi Nan University.
© 2004 SafeNet, Inc. All rights reserved. Mobike Protocol draft-kivinen-mobike-protocol-00.txt Tero Kivinen
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
Identify the traffic that should go across the VPN. Check the ACL configuration Try to ping across the tunnel using a ping that matches the ACL We should.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
Making SIP NAT Friendly Jonathan Rosenberg dynamicsoft.
ICMPv6 Error Message Types Informational Message Types.
Attacking on IPv6 W.lilakiatsakun Ref: ipv6-attack-defense-33904http://
Mobile IPv6 and Firewalls: Problem Statement Speaker: Jong-Ru Lin
Mobile IPv6 with IKEv2 and revised IPsec architecture IETF 61
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Site Multihoming for IPv6 Brian Carpenter IBM TERENA Networking Conference, Poznan, 2005.
1 IPSec: An Overview Dr. Rocky K. C. Chang 4 February, 2002.
K. Salah1 Security Protocols in the Internet IPSec.
Chapter 5. An IP address is simply a series of binary bits (ones and zeros). How many binary bits are used? 32.
Securing Access to Data Using IPsec Josh Jones Cosc352.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Practice Test Questions QUESTION 1 Which two actions must you perform to enable and use window scaling on a router? (Choose two.) A. Execute the.
HIP-Based NAT Traversal in P2P-Environments
IPsec Problems and Solutions
Instructor Materials Chapter 9: Transport Layer
Scaling the Network: The Internet Protocol
SECURING NETWORK TRAFFIC WITH IPSEC
IKEv2 Mobility and Multihoming WG
IKEv2 Mobility and Multihoming Protocol (MOBIKE)
* Essential Network Security Book Slides.
I. Basic Network Concepts
Scaling the Network: The Internet Protocol
Computer Networks Protocols
Presentation transcript:

1 Design of the MOBIKE Protocol Editors: T. Kivinen H. Tschofenig

2 Acknowledgements This slide set was prepared by –Jari Arkko –Pasi Eronen –Paul Hoffman –Tero Kivinen –Hannes Tschofenig based on the discussions on the mailing list and the issues captured in the issue list. The MOBIKE issue list can be found at:

3 Agenda Terminology Simple example (some NAT enhanced) Some individual issues (#18, #6, #15, #11, #19, #20)

4 Terminology (1/2) Peer Address Set: A peer address set is a subset of locally operational addresses of a peer. A policy available at peer A indicates which addresses to include in the peer address set. Such a policy might be impacted by manual configuration or by interaction with other protocols that indicate new available addresses. Preferred Address: An address on which a peer prefers to receive MOBIKE messages and IPsec protected data traffic. A given peer has only one active preferred address at a given point in time (ignoring the small time period where it needs to switch from the old preferred address to a new preferred address).

5 Terminology (2/2) Primary Path: The primary path is the destination and source address that will be put into a packet outbound to the peer by default. Path: The route taken by the MOBIKE and/or IPsec packets sent via the IP address of one peer to a specific destination address of the other peer. These two terms have to be seen as the path taken by packets through the network by the choice of a certain address pair.

6 Reminder: Scope of the MOBIKE work B A Mobility control Policy SEND NUD MOBIKEIKEv2 R1 GPRS phone SGSN BSS GGSN R2 BTIrDA AP1 AP2 PPP IPv4 IPv6 TCP ESP DNA MOBIKE playground

7 Example Initialize Node A Node A and Node B have two interfaces. Local configuration at the MOBIKE daemon indicates that both addresses may be used (=peer address set) Node B

8 Example Starting the exchange Node A Node B Node A discovers node B somehow. Initial message exchange with IKEv2 already performs connectivity test. Node B returns message where it came from! Initiator Responder IKEv2 Exchange

9 Example Exchanging Peer Address Set (and Preferred Address) Node A Node B The preferred address will in this initial exchange be equal to the currently used address. Preferred address of Node A and Node B is already in use with the IKEv2 messages. Initiator Responder Peer Address Set (A) Peer Address Set (B) Preferred Address (A1) Preferred Address (B1)

10 Example: Node A switches interface (1/2) Node A Node B MOBIKE messages should use A2 instead of A1 as preferred address. Node A needs to tell Node B that the preferred address has changed. Initiator Responder Peer Address Set (A) Preferred Address (A2)

11 Example: Node A switches interface (2/2) Peer address set is still the same. Communicated information might be diff-list or full list. Actions: –Authorize new address (if not done already) –Connectivity check (if not done already)

12 Example Interface goes down (A2) Node A detects it Node A Node B MOBIKE messages should use A1 instead of A2 as preferred address. Break-before-make scenario See previous slide Initiator Responder Peer Address Set (A) Preferred Address (A1) B1 A1

13 Example Interface goes down (B1) Node B detects it Node A Node B Node A should address MOBIKE messages to B2 instead of B1. How to recover: a) Should Node B send a message to Node A? b) Should Node A determine the problem? Initiator Responder Change my preferred address to B2 Peer Address Set (B) B2 A1 B1

14 Individual issues… Starting with Issue #20

15 Selecting addresses for IPsec SAs: inputs My addresses Peer’s addresses My preferences Some limited information about the peer’s preferences Connectivity information –“combining IPv4/IPv6 does not work” –“DPD seems to be failing with ”

16 “Option 1: Independent decisions” We send our addresses to the peer (and vice versa) –Limited amount of preferences implied by the order of the list Both parties can have connectivity information Both parties make the decision independently

17 Option 1 pros and cons Works (+) Handling partial connectivity and failures in the “middle” is clear (+) –Address lists don’t change, both parties determine connectivity on their own and move traffic Both parties are equally complex (-) No guarantee that “upstream” and “downstream” traffic uses same addresses (-) –The only way Host A can move all traffic to some interface is to delete all other addresses

18 “Option 3: Initiator decides” The responder sends its addresses to the initiator –Again, preferences implied by the order Initiator handles partial connectivity and failures in the “middle” Initiator selects which addresses are used and tells the responder –Responder simply reverses src/dst

19 Option 3 pros and cons Making decisions in the client sensible for mobility cases (+) Simple for VPN gateway (+) If the initiator wants, same address pair used in both directions: this makes it possible to work with stateful filters and NATs (+) Less elegant perhaps (-)

20 Other options… Other options seem to –Have most of the cons from #1 –Or have big difficulties in taking connectivity information into account (“option 2”) –Or both (“option 4”) Both options 2 and 4 have big missing pieces that need to be defined

21 Issue # 20 - Conclusion Proposal: –“Initiator decides” approach seems simple enough

22 Return Routability Tests (#6, #15, #18) Goal: protect against 3rd party bombing attacks –Outsiders cause our IPsec stream to be directed towards a victim –Unreliable peer (virus etc) directs the stream –Note: Bad nodes can always send packets to victims, the only question is how much amplification we give to them Primary defense is probing (testing) an address –Also known as “return routability test” –The main issue is when and how

23 Issues # 18 & # 6 & # The Dimensions Do any tests at all? (18)-- open When to do tests? (6)-- open What kind of tests? (15)-- decided (cookie based)

24 Issue # Do any tests at all? Alternatives: –Never –Mandatory –Configuration and/or situation Proposal -- party that is being tested –MUST always respond Proposal -- party that is doing the test –IF new address is in certificate, no test needed –OTHERWISE do it if configuration tells you to. Default is on. (Could also be done if attack is suspected, but hard to define this)

25 Issue # 6 -- When to do tests? Alternatives: –Before starting to use the new addresses –After starting to use the new addresses Tradeoffs relate to level of protection about redirection attacks vs. latency –Does not affect latency if old address is still operational –Research schemes exist to decrease latency Proposal: Test before starting to use the address –Can be done if suspect a problem, as in DPD

26 Issue # What kind of tests? A regular DPD-like exchange –Legitimate, but compromised peer can predict request and respond even if not at that address DPD-like exchange + cookie –Does not have the above problem Authentication of addresses –Can detected an en-route modification of an address (= NAT or attacker) Already decided: Use cookies (and NAT-T payloads to detect NATs)

27 Issue # 11: Window Size Problem IKEv2 has a window size of 1 = before starting a new exchange you need to finish an exchange in progress. Example: –Performing multiple DPD exchanges for multiple address pairs would Should MOBIKE support a window size > 1? We cannot live with window size 1: –Enhance window size –Use a new message exchange (that allows a larger window to be used)

28 Issue #19: Same or different addresses for IPsec SA pairs Should the IPsec traffic in both directions should use the same pair of addresses? Discussion: –With the ‘initiator decides approach’ the initiator can decide to use different pairs of addresses. –In most cases the same address pair will be used. –Problems with NATs and stateful packet filter firewalls Proposal: –Always the same pair of addresses –Future extension can change it.

29 Backup Slides (on additional NAT handling issues)

30 Example (NAT enhanced) Exchanging Peer Address Set (and Preferred Address) Node A Node B Communicating a peer address set is meaningless with a NAT. Each address needs to be communicated independently and packet header information will be used. Initiator Responder NAT

31 Example Connectivity Tests Node A Node B Purpose of connectivity test: –Determine whether a given address pair offers bi-directional connectivity IKEv2 provides support via the Dead Peer Detection (DPD) mechanism Initiator Responder Continued connectivity test Still ok! NAT

32 Example Interface goes down (B1) Node B detects it Node A Node B Node B would use a new source address (B2) for the packet sent to Node A at A1 [or A2]. Packet will be blocked at the NAT (for certain NAT types and for stateful packet filtering firewalls) Initiator Responder Src IP: B2 Dst IP: A1 Src Port: X Dst Port: Y B2 A1 B1 NAT Binding: Map To NAT

33 Example Interface goes down (B1) Node B detects it It is not possible for a responder that moves (and is behind a restrictive NAT) Conditions to make it work: –Node A performs connectivity tests on the other paths (e.g., ) –Binding will exist in order to allow packets from Node B at other addresses to reach Node A

34 Example Node A detects a problem in the network Path broken Node A Node B What should Node A do? a) Wait for routers or peer to recover? b) Perform connectivity test on,, ? c) Switch to another address pair Previous resolution: ad a+b) policy issues ad c) Initiator Responder R A1 B1 A2 B2 DPD failure

35 Example Node A detects a problem in the network Path broken Node A Node B Recovery attempt: –Node A tries connectivity test with. –Node B replies. –Node A [and Node B] might test connectivity of other paths as well. –Node A decides that switching the preferred address to A2 is useful. Initiator Responder R A1 B1 A2 B2 Connectivity Test Peer Address Set (A) Preferred Address (A2) DPD failure

36 NAT Issues (1/2) NAT support is needed for MOBIKE - Details are missing Should we have a NAT-prevention feature? –Suggestion: Yes. Enabling UDP encapsulation should be policy Enabling NAT-T depends on interface, the scenario, situation and some other policy decisions Support for NAT detection over each address pair

37 NAT Issues (2/2) Send keepalives on every alternative path or just on the primary path (implications: if only on the current path, only the node that is behind a NAT can recover from problems) Should we support these scenarios: –Initiator movement from a not-NAT to a NAT and –Initiator movement from a NAT to a non-NAT Suggestion: Support them. Do we allow Responders to be behind NATs (not NAPT)? –Suggestion: Follow approach of IKEv2 an allow Responder to be behind a NAT.