[Search] [txt|pdfized|bibtex] [Tracker] [Email] [Nits]
Versions: 00                                                            
Network Working Group                                       R. Soltwisch
Internet-Draft                                                     X. Fu
Expires: April 17, 2004                                       D. Hogrefe
                                                        Univ. Goettingen
                                                            S. Narayanan
                                                           Panasonic USA
                                                        October 18, 2003


          A Framework for Interoperation between NSIS and CTP
                draft-soltwisch-nsis-ctp-interop-00.txt

Status of this Memo

   This document is an Internet-Draft and is in full conformance with
   all provisions of Section 10 of RFC2026.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups. Note that other
   groups may also distribute working documents as Internet-Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time. It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at http://
   www.ietf.org/ietf/1id-abstracts.txt.

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

   This Internet-Draft will expire on April 17, 2004.

Copyright Notice

   Copyright (C) The Internet Society (2003). All Rights Reserved.

Abstract

   This document presents a framework for interoperation between the
   Context Transfer Protocol (CTP) and the Next Steps in Signaling
   (NSIS) protocols. The main goals we are trying to achieve are: to
   provide a seamless handover, to establish QoS and other states
   required by NSIS, to have this process appropriately secured, and to
   tradeoff between security, complexity and performance.






Soltwisch, et al.        Expires April 17, 2004                 [Page 1]


Internet-Draft              NSIS CTP Interop                October 2003


Table of Contents

   1.    Introduction . . . . . . . . . . . . . . . . . . . . . . . .  3
   2.    Terminology  . . . . . . . . . . . . . . . . . . . . . . . .  4
   3.    Reference Scenario . . . . . . . . . . . . . . . . . . . . .  5
   4.    Overview . . . . . . . . . . . . . . . . . . . . . . . . . .  6
   4.1   Extensions to NSIS and CTP . . . . . . . . . . . . . . . . .  6
   4.2   Operational Overview . . . . . . . . . . . . . . . . . . . .  6
   5.    Detailed Discussions . . . . . . . . . . . . . . . . . . . .  8
   5.1   Predictive vs. Non-Predictive Mode . . . . . . . . . . . . .  8
   5.1.1 Predictive Scenario  . . . . . . . . . . . . . . . . . . . .  8
   5.1.2 Non-Predictive Scenario  . . . . . . . . . . . . . . . . . .  9
   5.2   NSIS-CTP Session Key . . . . . . . . . . . . . . . . . . . . 11
   5.2.1 Secure Channel between pAR and nAR . . . . . . . . . . . . . 11
   5.2.2 Security Provided by CTP . . . . . . . . . . . . . . . . . . 11
   5.2.3 NSIS-CTP Session Key . . . . . . . . . . . . . . . . . . . . 11
   5.3   Triggers and Operational States  . . . . . . . . . . . . . . 12
   5.4   NSIS State Refreshment . . . . . . . . . . . . . . . . . . . 13
   5.5   Error Handling . . . . . . . . . . . . . . . . . . . . . . . 13
   6.    Open Issues  . . . . . . . . . . . . . . . . . . . . . . . . 15
   7.    Security Considerations  . . . . . . . . . . . . . . . . . . 16
   7.1   Assumptions  . . . . . . . . . . . . . . . . . . . . . . . . 16
   7.2   Attacks  . . . . . . . . . . . . . . . . . . . . . . . . . . 16
   8.    Acknowledgment . . . . . . . . . . . . . . . . . . . . . . . 17
         References . . . . . . . . . . . . . . . . . . . . . . . . . 18
         Authors' Addresses . . . . . . . . . . . . . . . . . . . . . 19
         Intellectual Property and Copyright Statements . . . . . . . 20
























Soltwisch, et al.        Expires April 17, 2004                 [Page 2]


Internet-Draft              NSIS CTP Interop                October 2003


1. Introduction

   The IETF Next Steps in Signaling (NSIS) working group is currently
   developing a two-layer framework [I-D.ietf-nsis-fw] and protocols for
   generic signaling transport and service-specific signaling such as
   QoS signaling [I-D.ietf-nsis-qos-nslp]. However, how NSIS can support
   seamless handover is still an open issue. Firstly, while a mobile
   node (MN) changes from one access router (AR) to another (i.e., a
   handover takes place), QoS state (and other states) in the network
   nodes for ongoing sessions needs to be released (in the previous
   path) or re-established (in the new path). Secondly, the latency for
   QoS state re-establishment should be as low as possible. Thirdly, it
   is necessary to secure the state manipulations and possibly provide
   data integrity and confidentiality.

   On the other hand, the Context Transfer Protocol (CTP)
   [I-D.ietf-seamoby-ctp] is being developed by the IETF SEAMOBY working
   group to improve the handover performance by transferring context
   from the previous access router (pAR) to the new access router (nAR).
   In addition, CTP provides a mechanism to authenticate the MN to the
   ARs. Some previous study (for example,
   [I-D.westphal-seamoby-qos-relocate][I-D.westphal-nsis-qos-mobileip])
   addressed the relationship between CTP and QoS signaling, but they
   either considered new protocol design instead of reusing available
   mechanisms, or security issues have not been sufficiently addressed.

   The purpose of this document is to provide a framework how CTP can be
   used for secured NSIS state (including QoS state) establishment for
   the new access router after a handover. It illustrates how CTP can
   interoperate with NSIS entities and save signaling overhead on the
   low bandwidth wireless link.




















Soltwisch, et al.        Expires April 17, 2004                 [Page 3]


Internet-Draft              NSIS CTP Interop                October 2003


2. Terminology

   This document uses the following terms or abbreviations:

      Mobile Node (MN), Correspondent Node (CN)

      Home Agent (HA)

      Care of Address (CoA), previous CoA (pCoA), and new CoA (nCoA)

      Access Router (AR), previous AR (pAR), and new AR (nAR)

      Context Transfer (CT), Context Transfer Protocol (CTP)

      Context Transfer Request (CTR)

      Context Transfer Data (CTD)

      Context Transfer Activate Request (CTAR)

      Context Transfer Activate Acknowledge (CTAA)

      Feature Profile Type (FPT)

      Security Association (SA)

      Denial of Service (DoS)

      Authentication Token

      Internet Key Exchange Protocol (IKE)

      Handover (HO)

      Next Steps in Signaling (NSIS)

      Quality of Service (QoS)

      NSIS Transport-Layer Protocol (NTLP), NSIS Signaling-Layer
      Protocol (NSLP)











Soltwisch, et al.        Expires April 17, 2004                 [Page 4]


Internet-Draft              NSIS CTP Interop                October 2003


3. Reference Scenario

   The reference scenario that will be used in this document is
   illustrated in Figure 1.  A mobile node (MN) in movement can attach
   to the new Access Router (nAR) and possibly loose the connectivity to
   the previous Access Router (pAR). Here two potential problems need to
   be resolved. Firstly, an AR should authenticate the MN and authorize
   the MN's credential to prove that it has the right to use certain
   services. A new Security Association (SA), which is related to the
   MN's new Care of Address (nCoA), needs to be established with the
   nAR, typically being a shared secret. Secondly, in order for the MN
   to obtain some services (e.g., QoS and header compression) on the new
   subnet, the MN must explicitly re-establish the service by performing
   the necessary signaling from scratch and thus, install some
   service-related information (state) in the new path via the nAR. This
   can be done by applying the NSIS mechanisms, which consist of two
   layers, namely the NSIS Transport Layer protocol (NTLP) and the NSIS
   Signaling Layer Protocols (NSLPs), in the new path. Directly applying
   NSIS can be considerable expensive due to two main reasons:

   1.  The bandwidth in typical wireless environments can be low, and

   2.  the SA between MN and nAR is difficult to obtain because of
       lacking of trust relationship.

   An alternative is to transfer existing NSIS state ("context"), to the
   new subnet, by the Context Transfer Protocol (CTP).


                      +------------+
      +--+            | previous   |        <
      |MN| ---------- | Access     | ------ > ----\
      +--+            | Router(pAR)|        <      \
        |             +------------+          +-------------+
        | moving            ^            IP   |Correspondent|
        |                   |NSIS-CTP   Core  |Node (CN)    |
        V                   |         Network +-------------+
                            v                        /
                      +------------+                /
      +--+            | new        | NSIS   <      /
      |MN| ---------- | Access     | ------ > ----/
      +--+            | Router(nAR)|        <
                      +------------+

   Figure 1 - Reference Scenario

                                Figure 1




Soltwisch, et al.        Expires April 17, 2004                 [Page 5]


Internet-Draft              NSIS CTP Interop                October 2003


4. Overview

   Before an overview of NSIS-CTP interoperation is given, some
   necessary extensions to NSIS and CTP are suggested.

4.1 Extensions to NSIS and CTP

   According to [I-D.ietf-seamoby-ctp], a CTP message contains one or
   several context blocks of different Feature Profile Types (FPTs).
   Here, we suggest seven new FPTs, namely "NSIS transfer request",
   "NSIS transfer response", "NSIS generic/NTLP context (downlink)",
   "NSIS generic/NTLP context (uplink)", "QoS NSLP context (downlink)"
   and "QoS NSLP context (uplink)", for the interoperation between NSIS
   and CTP. The detailed data fields for each message type are to be
   defined in a later version of this document.

   NSIS should be extended to be aware of NSIS-CTP, by introducing a set
   of new operation states in the MN and ARs ("Predictive HO Waiting",
   "Non-Predictive CTD Waiting", "waiting for release", "NSIS active",
   in addition to normal NSIS state - here so-called "NSIS idle", see
   discussions in Section 5.1), an NSIS-CTP session key (NCSK) (see
   discussions in Section 5.2), and new interfaces in the MN and the ARs
   (see discussions in Section 5.3).

   QoS profile introduced in [I-D.westphal-seamoby-qos-relocate] can be
   the content of QoS-NSLP context.

4.2 Operational Overview

   CT can work in two different modes. When CT is performed prior to
   handover it is called predictive mode. Otherwise it is called
   non-predictive mode. Subsequently, this document distinguishes the
   NSIS-CTP operation modes into two modes (predictive and
   non-predictive modes) by different orders of performing the following
   two actions:

   o  Handover, i.e., the MN changes its connectivity from the pAR to
      the nAR.

   o  (QoS/NSIS) Context transfer, i.e., transfer NSIS context from the
      pAR to the nAR.

   The modes describe in which order the two main steps are performed.
   Each mode of NSIS-CTP consist of several steps. Some steps slightly
   differ between predictive and non-predictive modes, which will be
   explained in Section 5.1.

   Some steps act as a trigger for the NSIS protocol, i.e., to process



Soltwisch, et al.        Expires April 17, 2004                 [Page 6]


Internet-Draft              NSIS CTP Interop                October 2003


   the QoS profile types or to install new states. Some other steps are
   for security reasons, e.g., to authenticate the CT transaction and
   NSIS state changes. The basic steps for a typical NSIS-CTP operation
   can be as follows:

   1.  The MN sends a Context Transfer Activity Request (CTAR) message
       including the authentication token and NSIS-related FPTs to the
       nAR;

   2.  The nAR forwards the CTAR to the pAR. If possible the MN sends
       the CTAR directly to the pAR, in order to perform a predictive
       CT;

   3.  The pAR-CTP entity (the CTP entity at the pAR) computes the
       authentication token and checks if they are equal;

   4.  The pAR-CTP entity requests a QoS profile and NTLP context from
       NSIS entity;

   5.  The pAR-NSIS entity generates the NSIS-CTP Session Key (NCSK),
       then creates the QoS profile;

   6.  The pAR sends the CTD message to the nAR;

   7.  The CTD arrival triggers the local NSIS state establishment at
       nAR according to the transferred context;

   8.  The nAR's NSLP-QoS entity performs QoS installation along the
       path.






















Soltwisch, et al.        Expires April 17, 2004                 [Page 7]


Internet-Draft              NSIS CTP Interop                October 2003


5. Detailed Discussions

   This section discusses some of the related issues in more detail. The
   difference between predictive and non-predictive modes and how this
   framework deals with them is discussed in this section. It will be
   explained why the NSIS-CTP Session Key (NCSK) is introduced for this
   interoperation and what are the advantages. Afterwards it is
   explained how the nAR can initiate refreshments in charge of the
   mobile node.

5.1 Predictive vs. Non-Predictive Mode

   The CTP provides two different modes, namely the predictive and
   non-predictive modes. Predictive means to transfer context prior to a
   handover where the normal (non-predictive) mode performs context
   transfer after the handover.

   The CTP always sends a CTAR message to both the pAR and the nAR. That
   is because it is not clear weather the MN looses connectivity to the
   pAR or not. In the following the two scenarios (predictive and
   non-predicitive) are discussed in detail. Figure 2 illustrates the
   message flow.

5.1.1 Predictive Scenario

   The CTAR message arrives at the pAR. CT to the nAR is initiated. In
   this predictive mode all keying information, including the shared
   secret and the algorithm is also transferred to the nAR. Once the MN
   attaches to the nAR it will send a CTAR message to activate the
   transferred context.

   The NSIS context includes a "predictive" flag. This flag must be set
   by the pAR-NSIS entity in order to indicate the predictive context
   transfer. The nAR-NSIS entity sends a "waiting" state according to
   the predictive flag. In predictive case NTLP and NSLP-QoS states will
   be installed, then NSIS activities such as next-peer discovery can be
   performed along the new path. However, the nAR-NSIS entity is aware
   that the mode is still inactive since the MN will arrive.

   In the case that the mobile node never reaches the nAR the states
   should be released. Therefore a timer is recommended that releases
   the states after timeout.

   When the mobile node attaches to the nAR and thus sends a CTAR, the
   CTP should trigger NSIS to change the operational state from
   "Predictive HO waiting" to "NSIS active".





Soltwisch, et al.        Expires April 17, 2004                 [Page 8]


Internet-Draft              NSIS CTP Interop                October 2003


5.1.2 Non-Predictive Scenario

   In the non-predictive scenario the mobile node sends a CTAR just to
   the nAR. The nAR forwards the message to the pAR in order to initiate
   the context transfer, and changes its state to "Non-predictive CTD
   waiting". Accordingly the pAR sends the context to the nAR.

   In this case the mobile node is assumed to be already connected to
   the nAR. Therefore the pAR-NSIS entity should release the state right
   after creating the profile type for CTP.

   The predictive flag is not set, thus the nAR-NSIS entity should
   install the state as "NSIS active".


   Predictive Mode

   MN            nAR    NSIS                 pAR    NSIS
   |              |       |                   |       |[QoS]
   |---CTAR---------------------------------->|       |
   |              |       |                   |------>|
   |              |       |                   |<------|
   |              |<------- CTD --------------|       |
   |              |------>|[QoS predictive]   |       |
   |              |       |                   |       |
   |---CTAR------>|       |                   |       |
   |              |------>|[QoS]              |       |
   |              |       |                   |       |
   |              |       |                   |       |

   Non-Predictive Mode

   MN            nAR    NSIS                 pAR    NSIS
   |              |       |                   |       |[QoS]
   |              |       |                   |       |
   |---CTAR------>|       |[waiting]          |       |
   |              |---- CT Request ---------->|       |
   |              |       |                   |------>|
   |              |       |                   |<------|[QoS relea.]
   |              |<-------- CTD -------------|       |
   |              |------>|[QoS]              |       |
   |              |       |                   |       |

   Figure 2 - Predictive Mode v.s. Non-Predictive Mode

                                Figure 2

   The state machine of the access routers are illustrated in Figure 3.



Soltwisch, et al.        Expires April 17, 2004                 [Page 9]


Internet-Draft              NSIS CTP Interop                October 2003



                             START
                               |
   ............................|......................................
    nAR                        |
                               V
                      +-----------------+ <-----------------------+
                      |      NSIS       | <--------------------+  |
            +---------|      idle       |----------+           |  |
       CTAR |         |                 |      CTD |           |  |
       from |         +-----------------+     from |           |  |
         MN |                                  pAR |           |  |
            V                                      V           |  |
    +-----------------+                 +-----------------+    |  |
    | non-predictive  |                 | predicitve      |    |  |
    | CTD waiting     |                 | HO waiting      |    |  |
    |                 |                 |                 |    |  |
    +-----------------+                 +-----------------+    |  |
            |                                      |           |  |
        CTP |                                 CTAR |           |  |
       from |                                 from |           |  |
        pAR |                                   MN |           |  |
   .........|......................................|...........|..|...
    pAR     |                                      |           |  |
            |         +-----------------+          |        CT |  |
            |         |      NSIS       |          | (non-per.)|  |
            +-------> |      active     | <--------+           |  |
                      |                 |----------------------+  |
                      +-----------------+  CT req. from nAR       |
                         ^           |     (non-predicitve mode   |
                         |           |     only)                  |
                         |           |                            |
                timer OR |           | CT Req. from nAR           |
                CT error |           | (predic. mode only)        |
                         |           V                         CT |
                      +-----------------+               (perdic.) |
                      |     waiting     |                         |
                      |       for       |-------------------------+
                      |     release     |
                      +-----------------+

   Figure 3 - State Machine for Access Routers

                                Figure 3







Soltwisch, et al.        Expires April 17, 2004                [Page 10]


Internet-Draft              NSIS CTP Interop                October 2003


5.2 NSIS-CTP Session Key

   This section discusses the usage of the NSIS-CTP Session Key (NCSK).

5.2.1 Secure Channel between pAR and nAR

   The CTP assumes a secure channel between the pAR and nAR. This
   channel is usually an IPSec tunnel. The shared secret can be
   exchanged by the Internet Key Exchange protocol (IKE). To provide a
   sufficient secure channel, the encryption should be as least as
   strong as normally required by the suggested NSIS security
   [I-D.ietf-nsis-threats].

5.2.2 Security Provided by CTP

   The CTP provides an authentication token. Usually the algorithm for
   the token computation is HMAC-SHA1. The input data consists of the
   MN, previous IP address, the FPT, and the "Replay" field. The
   authorisation token is obtained by truncating the result of the
   HMAC-SHA1 computation to retain only the leading 32 bits. The replay
   field prevents from relay attacks so that the message can be used
   only once. The authorisation token is based on the shared key between
   the pAR and the MN.

   When CTP is performed, either the pAR or the nAR proves the token. In
   the non-predictive mode the pAR computes the token and compares the
   results. In case of predictive mode the pAR forwards all keying
   material to the nAR. Once the MN connects to the nAR the token
   comparison will be performed locally at the nAR.

5.2.3 NSIS-CTP Session Key

   Each NSIS context must contain an NSIS-CTP Session Key (NCSK). It is
   recommended to uses at least a 128-bit key. This key can be either an
   NSIS session that is known along the path or a shared secret just
   between the pAR and the nAR. In the latter case it might be even a
   pseudo-random number + timestamp.

   In case the key is shared along the NSIS path it is known by the CN
   or even the MN.

   The NCSK may be used by the nAR to release the NSIS state at the pAR.
   Authentication can be achieved even when the message is sent over an
   insecure channel by using NCSK for authentication or encryption.

   This document does not directly rely on the CTP authentication token
   for security reason. The NCSK should never be sent over the wireless
   link and should only be transferred over secured channels.



Soltwisch, et al.        Expires April 17, 2004                [Page 11]


Internet-Draft              NSIS CTP Interop                October 2003


   The NCSK can be used to authenticate the pAR-NSIS entity, where the
   pAR should distribute the NCSK along the path. In this case the NCSK
   may be used to establish the NSIS state in the path from the nAR to
   the CN without requesting some authentication token or key from the
   MN. That makes the process potentially faster since no authentication
   information, token or key has to be sent from the MN to the nAR for
   NSIS peer discovery.

   This framework improves security because of the usage of two keys.
   The 32-bit CTP authentication token initiates the NSIS state
   installation, while the recommended NCSK is used for NSIS security.

   In case of the predictive mode, additional advantage can be gained.
   The nAR can establish the NSIS states and is authorized to perform
   NSIS states installation along the path. In this case the NSIS state
   may be established prior to the MN arrival at the nAR. Thus it is
   unnecessary to perform NSIS signaling (including QoS reservation)
   from scratch after the MN attaches to the nAR. Especially for voice
   or multimedia application this advantage can be extremely important.

5.3 Triggers and Operational States

   There are several triggers and operational states necessary for the
   framework, which are closely related to each other. NSIS needs 3 more
   states in addition to its normal operational states. The CTP entity
   should trigger the NSIS entity and thus switches the state from one
   to another.

   States in the AR: There should be a state which we call "NSIS Idle",
      where the NTLP and NSLP-QoS states are not yet established but
      NSIS is running. In addition to this state, the following other
      states are necessary in the ARs (also see state machine shown in
      Figure 3). We do not distinguish between pAR and nAR, since the
      current nAR can be the pAR of a future handover.

      NSIS Active: The state in which the AR is usually working. That
         means the MN is attached and NTLP and NSLP-QoS states are
         established.

      Predictive HO Waiting: In the predictive mode, context is
         transferred to nAR before the MN attaches. The arrival of the
         CTD message at the nAR triggers the state to change to
         "Predictive HO Waiting". Once the MN attaches to the nAR and
         sends a CTAR to the nAR it triggers a state change to "NSIS
         Active".






Soltwisch, et al.        Expires April 17, 2004                [Page 12]


Internet-Draft              NSIS CTP Interop                October 2003


      Non-predictive CTD Waiting: In the non-predictive mode, the MN
         attaches before the context is available. The MN sends a CTAR
         message. This message triggers the nAR to change its state to
         "Non-Predictive CTP Waiting" In this case the AR changes to
         this state and is waiting for the context. Once the context
         arrives the state will be changed to "NSIS Active".

      Waiting for release: Whenever the pAR receives a CT request, it
         changes its state from "NSIS Active" to "Waiting for release".
         When it experiences the timer expiration or receives a CT error
         message, it changes its state from "Waiting for release" to
         "NSIS Active". If the pAR receives a CT acknoweldgement
         message, it changes its state from "Waiting for release" to
         "NSIS Idle", and release its NSIS state.

   States in the MN: In the MN there should be an operational state
      indicates that a CTAR has been send out and the MN is now waiting
      for the CTP to send a relay. If the NSIS-CTP fails, the MN should
      be able to initialize NSIS signaling from scratch and switch its
      state accordingly (see discussions in Section 5.5).


5.4 NSIS State Refreshment

   With the soft state principle, NSIS state will be valid for a limited
   period of time. After this period they need to be refreshed. Usually
   for a data path between the MN and the CN the refresh is initiated by
   the Mobile Node and forwarded along the path. In case that no refresh
   will occur in a node, NSIS will release all states for this specific
   path. A timer is triggering these events and it is set back to its
   maximum whenever a refresh occurs.

   This document suggests to let the nAR initiate the state
   establishments and the state refreshes. Thus the nAR should send a
   refresh the states along the path from the nAR to the CN. These
   refreshes can occur more frequently than the signaling to the MN.
   This reduces the signaling overhead over the wireless link.

5.5 Error Handling

   This section describes how the mechanism deals with errors. NSIS-CTP
   expedites the NSIS state installation, however, the fallback to
   normal NSIS signaling for state installation is always possible.

   When the MN attaches to the nAR, it can happen there will be no NSLP
   QoS states made available by NSIS-CTP.

   o  It is possible that the first possibility is that the nAR is not



Soltwisch, et al.        Expires April 17, 2004                [Page 13]


Internet-Draft              NSIS CTP Interop                October 2003


      NSIS aware or does not provide NSLP-QoS. In the first case the MN
      may be notified and should perform the NSIS state installation
      along the path on its own. In the second case the nAR provides at
      least NTLP but no NSLP-QoS. In this case the MN may get a
      notification that the next hop is NSIS-aware but does not provide
      NSLP-QoS, then the NTLP context can be used.

   o  The timer expired and the state have been released before the MN
      attaches. In this case the MN acts as if no CTP would be
      available. The MN would perform usual NSIS state installation.









































Soltwisch, et al.        Expires April 17, 2004                [Page 14]


Internet-Draft              NSIS CTP Interop                October 2003


6. Open Issues

   The following open issues should be considered in future:

   o  Support for fast handovers. The mechanism should even work in
      cases that fast handover [I-D.ietf-mobileip-fast-mipv6] is used.
      In this case the nAR-NTLP/NSLP should be inserted in the chain.

   o  Inter-domain interoperability. CTP has not yet resolved the
      problem of interoperating between domains, because it assumes to
      have an SA between pAR and nAR. Therefore, the interoperation of
      CTP and NSIS heavily depends on the CTP solution in inter-domain
      cases.

   o  How to integrate other key exchange mechanisms that authenticate
      users rather than hosts. This means that AAA mechanisms such as
      Radius or Diameter have to be used.

   o  Multiple usage of one channel for several mobile nodes. This
      assumption considers a SA for each Mobile node or at least the
      channel used by CTP. Since multiple MNs can be attached and they
      all move to the same nAR the channel can be reused. That would
      reduce the amount of traffic which brings a gain.




























Soltwisch, et al.        Expires April 17, 2004                [Page 15]


Internet-Draft              NSIS CTP Interop                October 2003


7. Security Considerations

   This section shows how security can be archieved. This needs to be
   handled with care since NSIS and CTP are interoperating and NSIS
   partly needs to rely on CTP. On one hand the CTP authentication token
   triggers the NSIS state installation. On the other hand the NSIS key
   is transferred over the secure channel of the CTP.

   It is important not to introduce new security holes. That is why this
   interoperation framework tries to make a minimum of assumptions and
   rely on NSIS and CTP's own mechanisms. This is a trade-off between
   security, complexity, and performance.

7.1 Assumptions

   To actually improve the performance the following assumptions about
   security are made. In case these assumptions are invalid the whole
   environment is considered to be insecure.

   o  nAR and pAR share a strong trust relationship. Usually pAR and nAR
      are located in the same administrative domain and thus should have
      a strong trust relationship.

   o  nAR and pAR share a secret. Usually exchanged by the IKE

   o  A secure channel exists between nAR and pAR. IPSec must be
      provided. ESP or AH header support with non-null encryption must
      be used. The chosen mechanism must be appropriate according to the
      requirement to transport the NCSK.


7.2 Attacks

   The conditions changed when NSIS uses CTP for QoS state and Session
   Key forwarding. Therefore possible attacks are considered.

   Eavesdropping: The NCSK will never be sent over the wireless link.
      The NCSK will be transmitted only in between the pAR and nAR. Here
      an IPSec tunnel secures the messages. Therefore this method
      prevents from eavesdropping the NCSK;

   DoS: Denial of Service (DoS) attacks can be caused by forged or
      more-than-necessary CTP requests sent by malicious or uncautious
      MNs. Therefore the nAR-NSIS entity should restrict the maximum of
      NSIS CT requests per node. It can be assumed that one mobile node
      has knowledge of only one CTP authentication token.





Soltwisch, et al.        Expires April 17, 2004                [Page 16]


Internet-Draft              NSIS CTP Interop                October 2003


8. Acknowledgment

   We would like to acknowledge Michael Ebner for his comments.
















































Soltwisch, et al.        Expires April 17, 2004                [Page 17]


Internet-Draft              NSIS CTP Interop                October 2003


References

   [I-D.ietf-mobileip-fast-mipv6]
              Koodli, R., "Fast Handovers for Mobile IPv6",
              draft-ietf-mobileip-fast-mipv6-08 (work in progress),
              October 2003.

   [I-D.ietf-nsis-fw]
              Hancock, R. and et al., "Next Steps in Signaling:
              Framework", draft-ietf-nsis-fw-04 (work in progress),
              September 2003.

   [I-D.ietf-nsis-qos-nslp]
              Van den Bosch, S. and et al., "NSLP for Quality-of-Service
              signaling", draft-ietf-nsis-qos-nslp-00 (work in
              progress), September 2003.

   [I-D.ietf-nsis-threats]
              Tschofenig, H. and D. Kroeselberg, "Security Threats for
              NSIS", draft-ietf-nsis-threats-02 (work in progress), July
              2003.

   [I-D.ietf-seamoby-ctp]
              Loughney, J. and et al., "Context Transfer Protocol",
              draft-ietf-seamoby-ctp-04 (work in progress), October
              2003.

   [I-D.westphal-nsis-qos-mobileip]
              Westphal, C. and H. Chaskar, "QoS Signaling Framework for
              Mobile IP", draft-westphal-nsis-qos-mobileip-00 (work in
              progress), June 2002.

   [I-D.westphal-seamoby-qos-relocate]
              Westphal, C. and H. Chaskar, "Context Relocation of QoS
              Parameters in IP Networks",
              draft-westphal-seamoby-qos-relocate-00 (work in progress),
              July 2001.

   [RFC3374]  Kempf, J., "Problem Description: Reasons For Performing
              Context Transfers Between Nodes in an IP Access Network",
              RFC 3374, September 2002.

   [RFC3583]  Chaskar, H., "Requirements of a Quality of Service (QoS)
              Solution for Mobile IP", RFC 3583, September 2003.







Soltwisch, et al.        Expires April 17, 2004                [Page 18]


Internet-Draft              NSIS CTP Interop                October 2003


Authors' Addresses

   Rene Soltwisch
   University of Goettingen
   Telematics Group
   Lotzestr. 16-18
   Goettingen  37083
   Germany

   EMail: soltwisch@cs.uni-goettingen.de


   Xiaoming Fu
   University of Goettingen
   Telematics Group
   Lotzestr. 16-18
   Goettingen  37083
   Germany

   EMail: fu@cs.uni-goettingen.de


   Dieter Hogrefe
   University of Goettingen
   Telematics Group
   Lotzestr. 16-18
   Goettingen  37083
   Germany

   EMail: hogrefe@cs.uni-goettingen.de


   Sathya Narayanan
   Panasonic Information and Networking Technology Lab
   Two Research Way
   Princeton,  NJ 8540
   USA

   EMail: sathya@research.panasonic.com












Soltwisch, et al.        Expires April 17, 2004                [Page 19]


Internet-Draft              NSIS CTP Interop                October 2003


Intellectual Property Statement

   The IETF takes no position regarding the validity or scope of any
   intellectual property or other rights that might be claimed to
   pertain to the implementation or use of the technology described in
   this document or the extent to which any license under such rights
   might or might not be available; neither does it represent that it
   has made any effort to identify any such rights. Information on the
   IETF's procedures with respect to rights in standards-track and
   standards-related documentation can be found in BCP-11. Copies of
   claims of rights made available for publication and any assurances of
   licenses to be made available, or the result of an attempt made to
   obtain a general license or permission for the use of such
   proprietary rights by implementors or users of this specification can
   be obtained from the IETF Secretariat.

   The IETF invites any interested party to bring to its attention any
   copyrights, patents or patent applications, or other proprietary
   rights which may cover technology that may be required to practice
   this standard. Please address the information to the IETF Executive
   Director.


Full Copyright Statement

   Copyright (C) The Internet Society (2003). All Rights Reserved.

   This document and translations of it may be copied and furnished to
   others, and derivative works that comment on or otherwise explain it
   or assist in its implementation may be prepared, copied, published
   and distributed, in whole or in part, without restriction of any
   kind, provided that the above copyright notice and this paragraph are
   included on all such copies and derivative works. However, this
   document itself may not be modified in any way, such as by removing
   the copyright notice or references to the Internet Society or other
   Internet organizations, except as needed for the purpose of
   developing Internet standards in which case the procedures for
   copyrights defined in the Internet Standards process must be
   followed, or as required to translate it into languages other than
   English.

   The limited permissions granted above are perpetual and will not be
   revoked by the Internet Society or its successors or assignees.

   This document and the information contained herein is provided on an
   "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
   TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
   BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION



Soltwisch, et al.        Expires April 17, 2004                [Page 20]


Internet-Draft              NSIS CTP Interop                October 2003


   HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
   MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.


Acknowledgment

   Funding for the RFC Editor function is currently provided by the
   Internet Society.











































Soltwisch, et al.        Expires April 17, 2004                [Page 21]