Verification of Care-of Addresses in Multiple Bindings Registration
draft-lim-mext-multiple-coa-verify-02

Document Type Expired Internet-Draft (individual)
Last updated 2008-07-10
Stream (None)
Intended RFC status (None)
Formats
Expired & archived
plain text pdf html bibtex
Stream Stream state (No stream defined)
Consensus Boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-lim-mext-multiple-coa-verify-02.txt

Abstract

Using multiple care-of address registration, there is a possibility that a malicious mobile node could create multiple care-of address bindings that does not belong to the mobile node at its home agent. The home agent would accept these bindings without verifying them due to the trust relationship it has with the mobile node. With these bindings, the mobile node can launch attacks by asking the home agent to flood the victims of these care-of addresses with useless packets. To mitigate such a problem, this memo introduces a few possible verification mechanisms that the home agent would use in order to verify the care-of addresses for the mobile node before using them for packet routing.

Authors

Benjamin Lim (benjamin.limck@sg.panasonic.com)
Chan-Wah Ng (chanwah.ng@sg.panasonic.com)
Keigo Aso (asou.keigo@jp.panasonic.com)
Suresh Krishnan (suresh.krishnan@ericsson.com)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)