Network Working Group                                           B. Patil
Internet-Draft                                                     Nokia
Intended status: Informational                                C. Perkins
Expires: April 30, 2009                                         WiChorus
                                                           H. Tschofenig
                                                  Nokia Siemens Networks
                                                        October 27, 2008


 Issues related to the design choice of IPsec for Mobile IPv6 security
              draft-patil-mext-mip6issueswithipsec-00.txt

Status of this Memo

   By submitting this Internet-Draft, each author represents that any
   applicable patent or other IPR claims of which he or she is aware
   have been or will be disclosed, and any of which he or she becomes
   aware will be disclosed, in accordance with Section 6 of BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt.

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

   This Internet-Draft will expire on April 30, 2009.















Patil, et al.            Expires April 30, 2009                 [Page 1]


Internet-Draft        IPsec issues with Mobile IPv6         October 2008


Abstract

   Mobile IPv6 as specified in RFC3775 relies on IPsec for security.  An
   IPsec SA between the mobile node and the home agent provides security
   for the mobility signaling.  Use of IPsec for securing the data
   traffic between the mobile node and home agent is optional.  This
   document analyses the implications of the design decision to mandate
   IPsec as the default security protocol for Mobile IPv6 and recommends
   revisiting this decision in view of the experience gained from
   implementation and adoption in other standards bodies.


Table of Contents

   1.  Requirements notation  . . . . . . . . . . . . . . . . . . . .  3
   2.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  4
   3.  Terminology  . . . . . . . . . . . . . . . . . . . . . . . . .  5
   4.  Background . . . . . . . . . . . . . . . . . . . . . . . . . .  6
   5.  Problem Statement  . . . . . . . . . . . . . . . . . . . . . .  7
   6.  Issues with the use of IPsec . . . . . . . . . . . . . . . . .  8
   7.  MIP6 evolution . . . . . . . . . . . . . . . . . . . . . . . . 10
   8.  Security Considerations  . . . . . . . . . . . . . . . . . . . 11
   9.  IANA Considerations  . . . . . . . . . . . . . . . . . . . . . 12
   10. References . . . . . . . . . . . . . . . . . . . . . . . . . . 13
     10.1.  Normative References  . . . . . . . . . . . . . . . . . . 13
     10.2.  Informative References  . . . . . . . . . . . . . . . . . 13
   Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 14
   Intellectual Property and Copyright Statements . . . . . . . . . . 15























Patil, et al.            Expires April 30, 2009                 [Page 2]


Internet-Draft        IPsec issues with Mobile IPv6         October 2008


1.  Requirements notation

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in [RFC2119].














































Patil, et al.            Expires April 30, 2009                 [Page 3]


Internet-Draft        IPsec issues with Mobile IPv6         October 2008


2.  Introduction

   Mobile IPv6 as specified in RFC3775 [RFC3775] requires an IPsec
   security association between the mobile node (MN) and home agent
   (HA).  The IPsec SA protects the mobility signaling messages between
   the MN and HA.  The user data may be optionally protected by the
   IPsec SA but is not required.

   The use of IPsec and IKE (v1 and v2) with Mobile IPv6 are specified
   in RFCs 3776 [RFC3776] and 4877 [RFC4877].  The Mobile IP and MIP6
   working groups in the IETF chose to mandate IPsec as the default
   security protocol for Mobile IPv6 based on various criteria and
   discussions between the years 2000 and 2004.  Implementation
   experience with Mobile IPv6 and the security variants with which it
   has been specified in some SDOs indicates a need to revisit the
   design choice for MIP6 signaling security.

   This document discusses the issues and concerns with the use of IPsec
   for MIP6 security and proposes revisiting the security design for
   MIP6 protocol.































Patil, et al.            Expires April 30, 2009                 [Page 4]


Internet-Draft        IPsec issues with Mobile IPv6         October 2008


3.  Terminology

   This document refers to [RFC3775][RFC4877] for terminology.
















































Patil, et al.            Expires April 30, 2009                 [Page 5]


Internet-Draft        IPsec issues with Mobile IPv6         October 2008


4.  Background

   IP mobility support in IPv6 was considered to be an integral feature
   of the IPv6 stack based on the experience gained from developing
   mobility support for IPv4.  The design of Mobile IPv6 was worked on
   by the Mobile IP WG in the late 90s and by the MIP6 WG until its
   publication as [RFC3775] in 2004.

   IPsec was also intended to be a default component of the IPv6 stack
   and was the preferred protocol choice for use by any other IPv6
   protocols that needed security.  Rather than design security into
   every protocol feature the intent was to reuse a well-defined
   security protocol to meet security needs.  Hence Mobile IPv6 has been
   designed with a direct dependency on IPsec.

   The Mobile IPv6 specification [RFC3775] was published along with the
   companion specification "Using IPsec to Protect Mobile IPv6 Signaling
   Between Mobile Nodes and Home Agents", [RFC3776].  The establishment
   of the IPsec SA between the MN and HA as per RFC 3776 is based on the
   use of IKE.  The use of IKE in the context of Mobile IPv6 for IPsec
   SA establishment did not gain traction because of factors such as
   complexity of IKE and the IETF transitioning to IKEv2.  The MIP6 WG
   completed the specification, Mobile IPv6 Operation with IKEv2 and the
   Revised IPsec Architecture [RFC4877] in April 2007.  This [RFC4877]
   is considered as the default security protocol solution for MIP6 and
   updates [RFC3776].

























Patil, et al.            Expires April 30, 2009                 [Page 6]


Internet-Draft        IPsec issues with Mobile IPv6         October 2008


5.  Problem Statement

   Mobile IPv6 is encumbered by its reliance on IPsec from an
   implementation and deployment perspective.  As a protocol solution
   for host based mobility, MIP6 can be simpler without the IPsec
   baggage.  The issues with IPsec are even more exacerbated in the case
   of dual-stack MIP6 [DSMIP6].

   IPsec SAs between the MN and HA are established either manually or by
   the use of IKEv2.  Manual SA configuration is not a scalable solution
   and hence MIP6 hosts and Home agents rely on IKEv2 for establishing
   dynamically IPsec SAs.  As a result MIP6 depends on the existence of
   IPsec and IKEv2 for successful operation.

   The problem in summary for MIP6 is the dependence on IPsec and IKEv2
   for operation.



































Patil, et al.            Expires April 30, 2009                 [Page 7]


Internet-Draft        IPsec issues with Mobile IPv6         October 2008


6.  Issues with the use of IPsec

   This section captures several issues with the use of IPsec by MIP6.

   (1)  The design of Mobile IPv6 emphasized on the reuse of IPv6
        features such as IPsec.  IPsec for IPv4 was a bolt-on solution.
        With the increasing need for security, IPv6 designers chose to
        incorporate IPsec as a default feature.  There existed an
        assumption in the MIP6 working group that every IPv6 host would
        have IPsec capability as a standard feature.  While this is true
        in many host implementations today, the existence of IPsec in
        every IPv6 stack is not a given.  Hence a host which needs to
        implement Mobile IPv6 must ensure that IPsec and IKEv2 are also
        available.  As a result of this dependence, MIP6 is no longer a
        standalone host-based mobility protocol.  A good example of a
        host based mobility protocol that works as a self-sufficient
        module is Mobile IPv4.  The security associated with MIP4
        signaling is integrated into the protocol itself.  MIP4 has been
        successfully deployed on large scale in several networks.

   (2)  IPsec use in most hosts is generally for the purpose of VPN
        connectivity to enterprises.  It has not evolved into a generic
        security protocol that can be used by Mobile IPv6 easily.  While
        RFC4877 does specify the details which enable only the MIP6
        signaling to be encapsulated with IPsec, the general method of
        IPsec usage has been such that all traffic between a host and
        the IPsec gateway is carried via the tunnel.  Selective
        application of IPsec to protocols is not the norm.  Use of IPsec
        with Mobile IPv6 requires configuration which in many cases is
        not easily done because of reasons such as enterprise
        environments preventing changing to IPsec policies or other.

   (3)  A MIP6 home agent is one end of the IPsec SA in a many-to-one
        relationship.  A MIP6 HA may support a very large of mobile
        nodes which could number in the hundreds of thousands to
        millions.  The ability to terminate a large number of IPsec SAs
        (millions) requires signifiant hardware and platform capability.
        The cost issues of such an HA are detrimental and hence act as a
        barrier to deployment.

   (4)  The implementation complexity of Mobile IPv6 is greatly
        increased because of the interaction with IPsec and IKEv2.  A
        standalone MIP6 protocol is easier to implement and deploy (such
        as MIP4 [RFC3344]).  The complexity of the protocol
        implementation is even more so in the case of [DSMIP6].






Patil, et al.            Expires April 30, 2009                 [Page 8]


Internet-Draft        IPsec issues with Mobile IPv6         October 2008


   (5)  IPsec and IKEv2 is not implemented in every IPv6 or dual stack
        host.  Mobile IPv6 support on such devices is not an option.
        Many low-end cellular hosts have IP stacks.  The need for IPsec
        and IKEv2 in these devices is not important whereas mobility
        support is needed in many cases.  MIP6 without any dependencies
        on protocols for security is easier to implement and has wider
        applicability.

   (6)  [RFC4877] which specifies the use of IKEv2 and IPsec with Mobile
        IPv6 essentially results in a variant of IPsec which is specific
        to Mobile IP.  Hence this results in added complexity to
        implementations.

   (7)  Mobile IPv6 needs to be capable of being deployed in situations
        where alternative security mechanisms are already well-
        understood by the network administration.  It should be possible
        to enable Mobile IPv6 to work in situations where alternative
        security mechanisms already supply the necessary authentication
        and privacy.

   (8)  IPsec has been successfully applied to VPN and other
        infrastructure operations, but less so for general end-to-end
        applications.  Thus, the granularity for selectors was
        originally not at all sufficient for Mobile IPv6.

   (9)  The way that the IPsec code sits in the usual kernel, and the
        access mechanisms for the SA database, are not very convenient
        for use by straightforward implementations of Mobile IPv6.
        Unusual calling sequences and parameter passing seems to be
        required on many platforms.

   (10) In certain environments the use of IPsec and IKEv2 for
        establishing the SA is considered as an overhead.  Bandwidth
        constrained links such as cellular networks and air interfaces
        which are in the licensed spectrum tend to be optimized for user
        traffic.  MIP6 signaling with the IPsec overhead and the IKEv2
        messages are viewed negatively.  It is more acceptable to have
        signaling without IPsec encapsulation.

   The issues listed above have been a cause for MIP6 not being
   implemented widely or adopted by other SDOs which are considering IP
   mobility solutions.









Patil, et al.            Expires April 30, 2009                 [Page 9]


Internet-Draft        IPsec issues with Mobile IPv6         October 2008


7.  MIP6 evolution

   In order to make the Mobile Ipv6 protocol a solution that is easy to
   implement and available in even low-end devices, it is necessary to
   simplify the protocol.  The design or the security architecture for
   MIP6 needs to be revisited and a solution that does not rely on other
   components developed.












































Patil, et al.            Expires April 30, 2009                [Page 10]


Internet-Draft        IPsec issues with Mobile IPv6         October 2008


8.  Security Considerations

   This I-D discusses the security architecture of Mobile IPv6 which is
   based on IPsec.  The dependency on IPsec for security of MIP6
   signaling is a detriment to the protocol implementation and
   deployment.  Hence the security architecture needs to be revisited.

   The experience gained over the last few years indicates that IPsec
   cannot necessarily be used as a generic solution for security.  The
   design choice made for MIP6 in the initial stages no longer are valid
   and is hampering the implementation and use.








































Patil, et al.            Expires April 30, 2009                [Page 11]


Internet-Draft        IPsec issues with Mobile IPv6         October 2008


9.  IANA Considerations

   This document does not have any information which requires IANA
   review.















































Patil, et al.            Expires April 30, 2009                [Page 12]


Internet-Draft        IPsec issues with Mobile IPv6         October 2008


10.  References

10.1.  Normative References

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119, March 1997.

   [RFC3775]  Johnson, D., "Mobility Support in IPv6", RFC 3775,
              June 2004.

   [RFC3776]  Arkko, J., "Using IPsec to Protect Mobile IPv6 Signaling
              Between Mobile Nodes and Home Agents", RFC 3776,
              June 2004.

   [RFC4877]  Devarapalli, V., "Mobile IPv6 Operation with IKEv2 and the
              Revised IPsec Architecture", RFC 4877, April 2007.

   [DSMIP6]   Soliman, H., Ed., "Mobile IPv6 Support for Dual Stack
              Hosts and Routers",
               draft-ietf-mext-nemo-v4traversal-05.txt, July 2008.

10.2.  Informative References

   [RFC3344]  Perkins, C., "IP Mobility Support for IPv4", RFC 3344,
              August 2002.


























Patil, et al.            Expires April 30, 2009                [Page 13]


Internet-Draft        IPsec issues with Mobile IPv6         October 2008


Authors' Addresses

   Basavaraj Patil
   Nokia
   6021 Connection Drive
   Irving, TX  75039
   USA

   Email: basavaraj.patil@nokia.com


   Charles Perkins
   WiChorus
   3590 N. 1st Street, Suite 300
   San Jose, CA  95134
   USA

   Email: charliep@wichorus.com


   Hannes Tschofenig
   Nokia Siemens Networks
   Linnoitustie 6
   Espoo  02600
   Finland

   Phone: +358 (50) 4871445
   Email: Hannes.Tschofenig@gmx.net
   URI:   http://www.tschofenig.priv.at






















Patil, et al.            Expires April 30, 2009                [Page 14]


Internet-Draft        IPsec issues with Mobile IPv6         October 2008


Full Copyright Statement

   Copyright (C) The IETF Trust (2008).

   This document is subject to the rights, licenses and restrictions
   contained in BCP 78, and except as set forth therein, the authors
   retain all their rights.

   This document and the information contained herein are provided on an
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
   THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
   OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
   THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.


Intellectual Property

   The IETF takes no position regarding the validity or scope of any
   Intellectual Property Rights or other rights that might be claimed to
   pertain to the implementation or use of the technology described in
   this document or the extent to which any license under such rights
   might or might not be available; nor does it represent that it has
   made any independent effort to identify any such rights.  Information
   on the procedures with respect to rights in RFC documents can be
   found in BCP 78 and BCP 79.

   Copies of IPR disclosures made to the IETF Secretariat and any
   assurances of licenses to be made available, or the result of an
   attempt made to obtain a general license or permission for the use of
   such proprietary rights by implementers or users of this
   specification can be obtained from the IETF on-line IPR repository at
   http://www.ietf.org/ipr.

   The IETF invites any interested party to bring to its attention any
   copyrights, patents or patent applications, or other proprietary
   rights that may cover technology that may be required to implement
   this standard.  Please address the information to the IETF at
   ietf-ipr@ietf.org.











Patil, et al.            Expires April 30, 2009                [Page 15]