Skip to main content

Negotiation of security protocol for Mobile IPv6 operation
draft-patil-mext-sec-negotiate-03

Document Type Expired Internet-Draft (individual)
Expired & archived
Authors Bruno Faria , Basavaraj Patil , Gabor Bajko
Last updated 2012-05-03 (Latest revision 2011-10-31)
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

Mobile IPv6 has relied on IPsec and IKEv2 for securing the signaling and user traffic. A single security mechanism for Mobile IPv6 does not adequately address various deployment scenarios. The one-size- fits-all security approach is ill suited for Mobile IPv6, as different deployments have different security requirements. Multiple alternatives to securing signaling and user traffic have been proposed and are being considered for standardization. When multiple security protocols coexist for providing security for mobile IPv6 nodes, there is a need to negotiate the choice of security protocol between a mobile node and home agent a priori. This document proposes a method for negotiating the security protocol to be used between mobile IPv6 nodes.

Authors

Bruno Faria
Basavaraj Patil
Gabor Bajko

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)