Negotiation of security protocol for Mobile IPv6 operation

Document Type Expired Internet-Draft (individual)
Last updated 2012-05-03 (latest revision 2011-10-31)
Stream (None)
Intended RFC status (None)
Expired & archived
pdf htmlized bibtex
Stream Stream state (No stream defined)
Consensus Boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at


Mobile IPv6 has relied on IPsec and IKEv2 for securing the signaling and user traffic. A single security mechanism for Mobile IPv6 does not adequately address various deployment scenarios. The one-size- fits-all security approach is ill suited for Mobile IPv6, as different deployments have different security requirements. Multiple alternatives to securing signaling and user traffic have been proposed and are being considered for standardization. When multiple security protocols coexist for providing security for mobile IPv6 nodes, there is a need to negotiate the choice of security protocol between a mobile node and home agent a priori. This document proposes a method for negotiating the security protocol to be used between mobile IPv6 nodes.


Bruno Faria (
Basavaraj Patil (
Gabor Bajko (

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)