A Framework of Media-Independent Pre-Authentication (MPA) for Inter-Domain Handover Optimization
RFC 6252
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2018-12-20 |
09 | (System) | Received changes through RFC Editor sync (changed abstract to 'This document describes Media-independent Pre-Authentication (MPA), a new handover optimization mechanism that addresses the issues on … Received changes through RFC Editor sync (changed abstract to 'This document describes Media-independent Pre-Authentication (MPA), a new handover optimization mechanism that addresses the issues on existing mobility management protocols and mobility optimization mechanisms to support inter-domain handover. MPA is a mobile- assisted, secure handover optimization scheme that works over any link layer and with any mobility management protocol, and is most applicable to supporting optimization during inter-domain handover. MPA's pre-authentication, pre-configuration, and proactive handover techniques allow many of the handoff-related operations to take place before the mobile node has moved to the new network. We describe the details of all the associated techniques and their applicability for different scenarios involving various mobility protocols during inter-domain handover. We have implemented the MPA mechanism for various network-layer and application-layer mobility protocols, and we report a summary of experimental performance results in this document. This document is a product of the IP Mobility Optimizations (MOBOPTS) Research Group. This document is not an Internet Standards Track specification; it is published for informational purposes.') |
2015-10-14 |
09 | (System) | Notify list changed from vf0213@gmail.com, hgs@cs.columbia.edu, kenichi.taniuchi@toshiba.co.jp, yoshihiro.ohba@toshiba.co.jp, ashutosh.dutta@ieee.org, draft-irtf-mobopts-mpa-framework@ietf.org, rkoodli@cisco.com to (None) |
2012-08-22 |
09 | (System) | post-migration administrative database adjustment to the No Objection position for Ralph Droms |
2011-06-16 |
09 | Cindy Morgan | State changed to RFC Published from RFC Ed Queue. |
2011-06-13 |
09 | (System) | RFC published |
2011-03-24 |
09 | Cindy Morgan | State changed to RFC Ed Queue from Approved-announcement sent. |
2011-03-21 |
09 | (System) | IANA Action state changed to No IC |
2011-02-21 |
09 | (System) | New version available: draft-irtf-mobopts-mpa-framework-09.txt |
2011-01-10 |
09 | Cindy Morgan | IESG state changed to Approved-announcement sent |
2011-01-10 |
09 | Cindy Morgan | IESG has approved the document |
2011-01-10 |
09 | Cindy Morgan | Closed "Approve" ballot |
2011-01-10 |
09 | Cindy Morgan | Approval announcement text changed |
2011-01-07 |
09 | (System) | Removed from agenda for telechat - 2011-01-06 |
2011-01-06 |
09 | Cindy Morgan | State changed to Approved-announcement to be sent from IESG Evaluation. |
2011-01-06 |
09 | Robert Sparks | [Ballot Position Update] New position, No Objection, has been recorded |
2011-01-06 |
09 | Ron Bonica | [Ballot Position Update] New position, No Objection, has been recorded |
2011-01-06 |
09 | Stewart Bryant | [Ballot Position Update] New position, No Objection, has been recorded |
2011-01-06 |
09 | Ralph Droms | [Ballot comment] I strongly suggest that the following comments are addressed before publication: In section 7.3.1, a DHCP relay agent does not have the capability … [Ballot comment] I strongly suggest that the following comments are addressed before publication: In section 7.3.1, a DHCP relay agent does not have the capability to operate independently and perform a DHCP message exchange with a DHCP server in anticipation of an eventual DHCP message exchange initiated by a client. The mecahnism described in this section would require the definition of a new DHCP proxy function. In the case of IPv6, it's probably required to forward the RA to the mobile node regardless of the address assignment model, to pre-configure the mobile node with all the requisite information about prefixes, etc. In section 7.3.3, there is a conflict with the DHCPv6 specification, which requires that a DHCPv6 client send any messages to the DHCPv6 servers/relays multicast address, rather than unicast to a server. There may also be a problem with all of these methods using DHCP: how does the CTN DHCP server know what address to assign to the client? Other comments: Perhaps a nit, but I was somewhat mislead by the title, " A Framework of Media-Independent Pre-Authentication (MPA) for Inter-domain Handover Optimization" to believe that I was going to read about a protocol that focused on authentication and secure communication. In my opinion, this document describes a complete framework for media-independent inter-domain handover optimization that goes beyond authentication and security. In Appendix A, wouldn't DAD be performed by the NAR rather than the PAR? From the Intro: In this document we discuss a framework to support terminal mobility that provides seamless handovers with low latency and low loss. Are there other components to terminal mobility aside from MPA? Section 1.2: A trade-off between one-way-delay and packet loss is desired based on the type of application. Unclear to me - a trade-off should be available through tuning or one-way-delay should be improved relative to packet loss? Section 3: Define "inter-subnet handover"? Section 6.1: MPA provides three basic procedures to provide this functionality. The first procedure is referred to as "pre-authentication", the second procedure is referred to as "pre-configuration", the combination of the third and fourth procedures are referred to as "secure proactive handover". "three basic procedures" and "third and fourth procedures" is confusing; where did that fourth procedure come from? Section 6.1: Especially, the third procedure described above (i.e., binding update procedure) Change "third procedure described above" to "step (iii) in the previous paragraph" to avoid confusion with the use of "procedures in the earlier paragraph in section 6.1. Section 6.2: The authentication protocol MUST be able to derive a key between the mobile node and the authentication agent and SHOULD be able to provide mutual authentication. Is "derive a key between ..." a term of art or can the requirement be described more accurately as "establish a shared key between..."? The authentication protocol SHOULD be able to interact with a AAA protocol such as RADIUS and Diameter to carry authentication credentials to an appropriate authentication server in the AAA infrastructure. Does the authentication protocol interact directly with the AAA protocol, or does the interaction happen through the AA? |
2011-01-06 |
09 | Ralph Droms | [Ballot Position Update] Position for Ralph Droms has been changed to No Objection from Discuss |
2011-01-05 |
09 | Russ Housley | [Ballot Position Update] New position, No Objection, has been recorded |
2011-01-05 |
09 | Ralph Droms | [Ballot comment] From the Intro: In this document we discuss a framework to support terminal mobility that provides seamless handovers with low … [Ballot comment] From the Intro: In this document we discuss a framework to support terminal mobility that provides seamless handovers with low latency and low loss. Are there other components to terminal mobility aside from MPA? Section 1.2: A trade-off between one-way-delay and packet loss is desired based on the type of application. Unclear to me - a trade-off should be available through tuning or one-way-delay should be improved relative to packet loss? Section 3: Define "inter-subnet handover"? Section 6.1: MPA provides three basic procedures to provide this functionality. The first procedure is referred to as "pre-authentication", the second procedure is referred to as "pre-configuration", the combination of the third and fourth procedures are referred to as "secure proactive handover". "three basic procedures" and "third and fourth procedures" is confusing; where did that fourth procedure come from? Section 6.1: Especially, the third procedure described above (i.e., binding update procedure) Change "third procedure described above" to "step (iii) in the previous paragraph" to avoid confusion with the use of "procedures in the earlier paragraph in section 6.1. Section 6.2: The authentication protocol MUST be able to derive a key between the mobile node and the authentication agent and SHOULD be able to provide mutual authentication. Is "derive a key between ..." a term of art or can the requirement be described more accurately as "establish a shared key between..."? The authentication protocol SHOULD be able to interact with a AAA protocol such as RADIUS and Diameter to carry authentication credentials to an appropriate authentication server in the AAA infrastructure. Does the authentication protocol interact directly with the AAA protocol, or does the interaction happen through the AA? |
2011-01-05 |
09 | Ralph Droms | [Ballot discuss] Perhaps a nit, but I was somewhat mislead by the title, " A Framework of Media-Independent Pre-Authentication (MPA) for Inter-domain Handover Optimization" to … [Ballot discuss] Perhaps a nit, but I was somewhat mislead by the title, " A Framework of Media-Independent Pre-Authentication (MPA) for Inter-domain Handover Optimization" to believe that I was going to read about a protocol that focused on authentication and secure communication. In my opinion, this document describes a complete framework for media-independent inter-domain handover optimization that goes beyond authentication and security. In section 7.3.1, a DHCP relay agent does not have the capability to operate independently and perform a DHCP message exchange with a DHCP server in anticipation of an eventual DHCP message exchange initiated by a client. The mecahnism described in this section would require the definition of a new DHCP proxy function. In the case of IPv6, it's probably required to forward the RA to the mobile node regardless of the address assignment model, to pre-configure the mobile node with all the requisite information about prefixes, etc. In section 7.3.3, there is a conflict with the DHCPv6 specification, which requires that a DHCPv6 client send any messages to the DHCPv6 servers/relays multicast address, rather than unicast to a server. There may also be a problem with all of these methods using DHCP: how does the CTN DHCP server know what address to assign to the client? In Appendix A, wouldn't DAD be performed by the NAR rather than the PAR? |
2011-01-05 |
09 | Ralph Droms | [Ballot Position Update] New position, Discuss, has been recorded |
2011-01-05 |
09 | Adrian Farrel | [Ballot Position Update] New position, No Objection, has been recorded |
2010-12-23 |
09 | Amanda Baber | We understand that this document does not require any IANA actions. |
2010-12-22 |
09 | Jari Arkko | I have performed the review that RFC 5742 specifies for this document. My recommendation is that the IESG concludes the following: 1. The IESG … I have performed the review that RFC 5742 specifies for this document. My recommendation is that the IESG concludes the following: 1. The IESG has concluded that there is no conflict between this document and IETF work. The document will be formally handled in the next IESG telechat. I have also attached some personal comments below. None of them requires any action and addressing them is not necessary for your document to advance. Jari Personal comments: In general, I found the document very interesting and useful IRTF publication. It is mostly very well written, accurate, and to the point. There were only a few observations, noted below: > There are several ongoing activities in the IETF > to define mobility management protocols at layers higher than network > layer. HIP (the Host Identity Protocol) [RFC5201] defines a new > protocol layer between network layer and transport layer to provide > terminal mobility in a way that is transparent to both network layer > and transport layer. Also, SIP-based mobility is an extension to SIP > to maintain the mobility binding of a SIP user agent [SIPMM]. This creates an impression that SIPMM is an active IETF effort. I don't think that's the case. > MPA is more applicable where an accurate prediction of movement can > be easily made. For other environments, special care must be taken > to deal with issues such as pre-authentication to multiple CTNs > (Candidate Target Networks) and failed switching and switching back > as described in [mpa-wireless]. However, addressing those issues in > actual deployments may not be easier. Somehow, parsing this text was hard for me. Shouldn't you say "... is most applicable ..." and "... addressing those issues in actual deployments may be hard."? The "more applicable" phrase appears elsewhere in the document, too. > The mobile node finds a CTN > through some discovery process such as IEEE 802.21 A reference would be nice. > iv) obtaining an IP address from a DHCP or PPP server, DHCP server or PPP peer Also, I hope you take into account IPv6 SLAAC as well. There we do not "obtain an IP address", we get some information from the router which helps us configure an address by ourselves. (And I see that you talk about it later. Good.) > IEEE 802.11u is > considering issues such as discovering neighborhood using information > contained in link layer. A reference would be nice. > In some wide area networking environment, the mobile uses PPP environments > Upon receiving a PANA message from the mobile node, the > DHCP relay agent performs normal DHCP message exchanges to obtain the > IP address from the DHCP server in the CTN. This address is piggy- > backed in a PANA message and is delivered to the client. Perhaps you are just being sloppy with words here, but relay agents do not normally create any DHCP messages. I think it would be useful to either clarify that the messaging is actually coming from the client (if it is), or that a new DHCP role for a "proxy DHCP" would be needed here. > In case of > MIPv6 with stateless autoconfiguration, the router advertisement from > the new target network is passed to the client as part of PANA > message. The mobile uses this prefix and its MAC address to > I'm not sure why you are bundling MIPv6 and stateless autoconfiguration. Presumably stateless autoconfiguration could be used even in other cases, e.g., with a MOBIKE client could get its local address from SLAAC. In general, the document doesn't talk about DHCPv6 at all. A standard in this space would obviously have to cover DHCPv4, DHCPv6, and SLAAC. It may be fine for a research document, though. > 7.3.2. IKEv2-assisted proactive IP address acquisition This section only talks about DHCP and IKEv2. A full-blown solution would probably have to address IPv6 and various different forms of address requests within IKEv2. > In order to prevent malicious nodes from obtaining an IP address from > the DHCP server, DHCP authentication should be used Which, of course, is pretty unrealistic. DHCP authentication has not been deployed at all AFAIK, and deploying a current form of DHCP authentication would be a very unscalable exercise. > In addition to previous techniques, the MN may also want to ensure > reachability of the new point of attachment before switching from the > old one. This can be done by exchanging link-layer management frames > with the new point of attachment. This reachability check should be > performed as quickly as possible. In order to prevent packet loss > during this reachability check, transmission of packets over the link > between the MN and old point of attachment should be suspended by > buffering the packets at both ends of the link during the > reachability check. How to perform this buffering is out of scope of > this document. Some of the results using this buffering scheme are > explained in the accompanying implementation document. In practice, it would also be important to test for Internet reachability, to avoid getting behind a web-login WLAN, for instance. > During the process of pre-configuration, the MAC address resolution > mappings needed by the mobile node to communicate with nodes in the > target network after attaching to the target network can also be > known, where the communicating nodes maybe the access router, > authentication agent, configuration agent and correspondent node. > There are several possible ways of performing such proactive MAC > address resolution. > > o Use an information service mechanism [802.21] to resolve the MAC > addresses of the nodes. This might require each node in the > target network to be involved in the information service so that > the server of the information service can construct the database > for proactive MAC address resolution. > > ... > > o One can also make use of DNS to map the MAC address of the > specific interface associated with a specific IP address of the > network element in the target network. One may define a new DNS > resource record (RR) to proactively resolve the MAC addresses of > the nodes in the target network. But this approach may have its > own limitations since a MAC address is a resource that is bound to > an IP address, not directly to a domain name. These two approaches strike to me as bad ideas. I'm mostly reacting to the apparent layer violations, but I'm also wondering why a new request-response tool (like the DNS) would be useful when we already have an existing request-response tool (ARP). It would seem that a change would only be useful if you were to able change the communications approach so that the mobile node doesn't need to wait at all. |
2010-12-22 |
09 | Jari Arkko | Placed on agenda for telechat - 2011-01-06 by Jari Arkko |
2010-12-22 |
09 | Jari Arkko | State Changes to IESG Evaluation from AD Evaluation by Jari Arkko |
2010-12-22 |
09 | Jari Arkko | [Ballot Position Update] New position, Yes, has been recorded for Jari Arkko |
2010-12-22 |
09 | Jari Arkko | Ballot has been issued by Jari Arkko |
2010-12-22 |
09 | Jari Arkko | Created "Approve" ballot |
2010-12-22 |
09 | (System) | Ballot writeup text was added |
2010-12-22 |
09 | (System) | Last call text was added |
2010-12-22 |
09 | (System) | Ballot approval text was added |
2010-12-21 |
09 | Jari Arkko | State Changes to AD Evaluation from Publication Requested by Jari Arkko |
2010-10-28 |
09 | Jari Arkko | Responsible AD has been changed to Jari Arkko from Russ Housley by Jari Arkko |
2010-10-21 |
09 | Cindy Morgan | [Note]: 'Rajeev Koodli (rkoodli@cisco.com) is the document shepherd.' added by Cindy Morgan |
2010-10-21 |
09 | Cindy Morgan | This is a request for the IESG to perform a RFC5742 review of draft-irtf-mobopts-mpa-framework-08.txt [1] to be published an an Informational IRTF RFC. The document … This is a request for the IESG to perform a RFC5742 review of draft-irtf-mobopts-mpa-framework-08.txt [1] to be published an an Informational IRTF RFC. The document has been approved for publication by the IRSG. See [2] for details on prior reviews. Please copy all correspondence to the document shepherd, Rajeev Koodli <rkoodli@cisco.com>. --aaron IRTF Chair [1] http://www.ietf.org/id/draft-irtf-mobopts-mpa-framework-08.txt [2] http://trac.tools.ietf.org/group/irtf/trac/ticket/27 |
2010-10-21 |
09 | Cindy Morgan | Draft Added by Cindy Morgan in state Publication Requested |
2010-09-06 |
08 | (System) | New version available: draft-irtf-mobopts-mpa-framework-08.txt |
2010-04-17 |
07 | (System) | New version available: draft-irtf-mobopts-mpa-framework-07.txt |
2009-10-26 |
06 | (System) | New version available: draft-irtf-mobopts-mpa-framework-06.txt |
2009-08-18 |
09 | (System) | Document has expired |
2009-02-14 |
05 | (System) | New version available: draft-irtf-mobopts-mpa-framework-05.txt |
2008-11-02 |
04 | (System) | New version available: draft-irtf-mobopts-mpa-framework-04.txt |
2008-07-14 |
03 | (System) | New version available: draft-irtf-mobopts-mpa-framework-03.txt |
2008-02-25 |
02 | (System) | New version available: draft-irtf-mobopts-mpa-framework-02.txt |
2007-11-19 |
01 | (System) | New version available: draft-irtf-mobopts-mpa-framework-01.txt |
2007-08-24 |
00 | (System) | New version available: draft-irtf-mobopts-mpa-framework-00.txt |