Re: [MEXT] New Version Notification fordraft-perkins-mext-hatunaddr-01.txt
Behcet Sarikaya <sarikaya2012@gmail.com> Tue, 01 November 2011 18:55 UTC
Return-Path: <sarikaya2012@gmail.com>
X-Original-To: mext@ietfa.amsl.com
Delivered-To: mext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix)
with ESMTP id C425A11E811F for <mext@ietfa.amsl.com>;
Tue, 1 Nov 2011 11:55:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.399
X-Spam-Level:
X-Spam-Status: No, score=-3.399 tagged_above=-999 required=5 tests=[AWL=0.199,
BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com
[127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PZDnfkTxIXi8 for
<mext@ietfa.amsl.com>; Tue, 1 Nov 2011 11:55:24 -0700 (PDT)
Received: from mail-yw0-f44.google.com (mail-yw0-f44.google.com
[209.85.213.44]) by ietfa.amsl.com (Postfix) with ESMTP id 80BC111E814E for
<mext@ietf.org>; Tue, 1 Nov 2011 11:55:24 -0700 (PDT)
Received: by ywt2 with SMTP id 2so8755673ywt.31 for <mext@ietf.org>;
Tue, 01 Nov 2011 11:52:04 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma;
h=mime-version:reply-to:in-reply-to:references:date:message-id
:subject:from:to:cc:content-type;
bh=TEBE8r148ubK3WgYoWUEUtxl47rQhmmou7oYSoFnwv8=;
b=nRV5Cj0teXt0e6M4H07ye6RMAkMKkxXR5/RQZI19rHSbTIXDq+iFlRRUVJFs8Rq0d0
ORBY+FnswOXqE7GobZjKXAbOPBFw7xPnfDblhfE+/U/yNmsPAwl074bLm5zx6K0Uk32R
y45F2T5sbsoDA9V/tVfUoUWUZUQrmGQ6Npfbo=
MIME-Version: 1.0
Received: by 10.236.115.129 with SMTP id e1mr1337125yhh.77.1320173524813;
Tue, 01 Nov 2011 11:52:04 -0700 (PDT)
Received: by 10.236.108.135 with HTTP; Tue, 1 Nov 2011 11:52:04 -0700 (PDT)
In-Reply-To: <7793C4DA-B675-4730-8079-AE4FE08A3501@us.toyota-itc.com>
References: <20110803185832.21283.61262.idtracker@ietfa.amsl.com>
<4E399F6E.8090508@computer.org>
<75B8624B-6C94-4B7F-9487-DCF0E06B5256@us.toyota-itc.com>
<4EAB1A93.8050605@computer.org> <4EAF1E39.3020209@earthlink.net>
<7793C4DA-B675-4730-8079-AE4FE08A3501@us.toyota-itc.com>
Date: Tue, 1 Nov 2011 13:52:04 -0500
Message-ID: <CAC8QAcdM0g=1qrvn6dDh1xV7t4OL9ZBZiE=SPHc4U=YHurvKZg@mail.gmail.com>
From: Behcet Sarikaya <sarikaya2012@gmail.com>
To: Romain KUNTZ <rkuntz@us.toyota-itc.com>
Content-Type: multipart/alternative; boundary=20cf303a2bb5fd05ec04b0b0d973
Cc: charliep@computer.org, mext <mext@ietf.org>
Subject: Re: [MEXT] New Version Notification
fordraft-perkins-mext-hatunaddr-01.txt
X-BeenThere: mext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: sarikaya@ieee.org
List-Id: Mobile IPv6 EXTensions WG <mext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mext>,
<mailto:mext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/mext>
List-Post: <mailto:mext@ietf.org>
List-Help: <mailto:mext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mext>,
<mailto:mext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 01 Nov 2011 18:55:25 -0000
Hi Romain, Charlie, I added a new section in draft-sarikaya-mext-multicastdmm-04.txt on this. I don't think we need new types, more extensions. Please check. Regards, Behcet On Tue, Nov 1, 2011 at 1:19 PM, Romain KUNTZ <rkuntz@us.toyota-itc.com>wrote;wrote: > Hello Charlie, > > That's right, I believe the signaling still goes to the primary HA and > thus can be secured as usual, and as mandated by the MIPv6 spec. > Beside, the mobile node can choose to send the IPsec'd traffic through its > primary HA if needed. > > Thank you, > Romain > > On Oct 31, 2011, at 15:16, Charles E. Perkins wrote: > > > Hello again Romain, > > > > I didn't have time to do the specification for any > > new extension for the suggested options revised from > > RFC 3957. I'll try to do it later this week, but the > > result can't be officially submitted until I get to > > the IETF. > > > > Anyway, traffic to/from the mobile node <--> home agent > > doesn't always have to be protected, especially looking > > at the relative proportion of data traffic today that > > is sent via IPsec. It seems to me that the problem is > > important, and must be solved, but not a showstopper. > > > > Regards, > > Charlie P. > > > > > > > > On 10/28/2011 2:11 PM, Charles E. Perkins wrote: > >> Hello Romain, > >> > >> Thank you for reminding me about this point. It had been > >> raised previously during some related discussions for DMM > >> late last year, and I plainly forgot to fill in any details > >> about the problem. > >> > >> After looking over RFC 3957, I think the most efficient way > >> towards solution will be to define a new extension similar > >> to the Generalized MN-HA Key Generation Nonce Request and > >> Generalized MN-HA Key Generation Nonce Reply extensions. > >> It's not a perfect fit, but it's pretty close. If there is > >> any interest for an IPv4-based solution, I could easily > >> write up a new subtype for the RFC 3957 (IPv4) extensions. > >> > >> The formula for calculating the key in Section 5 needs to be > >> updated, perhaps to the following: > >> key = HMAC-SHA1 (HA-key, > >> {Key Generation Nonce || > >> mobile node identifier || > >> HA-D IPv6_address}) > >> > >> A similar formula would apply for any specification > >> in which the key nonce was generated by AAA instead of > >> the [control-plane] Home Agent [HA-C]. > >> > >> The manner in which the HA-D get the corresponding > >> configuration information doesn't have to be specified > >> in the ...mext-hatunaddr... draft. > >> > >> I'll try to get an updated draft out before the draft > >> deadline on Monday. Thanks for your comment. While > >> mostly straightforward, the update will take a pretty > >> good bit of carefully written text. > >> > >> Regards, > >> Charlie P. > >> > >> > >> On 8/4/2011 11:39 AM, Romain KUNTZ wrote: > >>> Hello Charlie, > >>> > >>> If the MN has to tunnel data to a different HA than the one to which > >>> it sends the BU, then it also needs an IPsec SA with that HA. How > >>> would the MN create such SA as it does not know in advance what HA it > >>> may use for tunneling? My guess is that the MN is supposed to trust > >>> the address received in the option and create the SA upon reception of > >>> the option. Similarly, all of the HA tunneling box would also need to > >>> be configured with the corresponding SA. Some considerations about > >>> that may be needed in the draft. > >>> > >>> Regards, > >>> romain > >>> > >>> > >>> On Aug 3, 2011, at 12:20, Charles E. Perkins wrote: > >>> > >>>> > >>>> Hello folks, > >>>> > >>>> My draft has now made it through the submission process. > >>>> Please excuse the repeat notification... > >>>> > >>>> Comments will be appreciated. > >>>> > >>>> Regards, > >>>> Charlie P. > >>>> > >>>> > >>>> -------- Original Message -------- > >>>> Subject: New Version Notification for > >>>> draft-perkins-mext-hatunaddr-01.txt > >>>> Date: Wed, 03 Aug 2011 11:58:32 -0700 > >>>> From:<internet-drafts@ietf.org> > >>>> To:<charliep@computer.org> > >>>> CC:<charliep@computer.org> > >>>> > >>>> A new version of I-D, draft-perkins-mext-hatunaddr-01.txt has been > >>>> successfully submitted by Charles Perkins and posted to the IETF > >>>> repository. > >>>> > >>>> Filename: draft-perkins-mext-hatunaddr > >>>> Revision: 01 > >>>> Title: Alternate Tunnel Source Address for Home Agent > >>>> Creation date: 2011-08-03 > >>>> WG ID: Individual Submission > >>>> Number of pages: 10 > >>>> > >>>> Abstract: > >>>> Widely deployed mobility management systems for wireless > >>>> communications have isolated the path for forwarding data from the > >>>> control plane signaling for mobility management. To realize this > >>>> requirement with Mobile IP requires that the control functions of the > >>>> home agent be addressable at a different IP address than the source > >>>> IP address of the tunnel between the home agent and mobile node. > >>>> Similar considerations hold for mobility anchors implementing > >>>> Hierarchical Mobile IP or PMIP. > >>>> > >>>> > >>>> > >>>> > >>>> The IETF Secretariat > >>>> > >>>> _______________________________________________ > >>>> MEXT mailing list > >>>> MEXT@ietf.org > >>>> https://www.ietf.org/mailman/listinfo/mext > >>> > >>> > >> > >> _______________________________________________ > >> MEXT mailing list > >> MEXT@ietf.org > >> https://www.ietf.org/mailman/listinfo/mext > >> > > > > _______________________________________________ > MEXT mailing list > MEXT@ietf.org > https://www.ietf.org/mailman/listinfo/mext >
- [MEXT] Fwd: New Version Notification for draft-pe… Charles E. Perkins
- Re: [MEXT] New Version Notification for draft-per… Romain KUNTZ
- Re: [MEXT] New Version Notification for draft-per… Charles E. Perkins
- Re: [MEXT] New Version Notification fordraft-perk… Charles E. Perkins
- Re: [MEXT] New Version Notification fordraft-perk… Romain KUNTZ
- Re: [MEXT] New Version Notification fordraft-perk… Behcet Sarikaya
- Re: [MEXT] New Version Notification fordraft-perk… Behcet Sarikaya
- Re: [MEXT] New Version Notification fordraft-perk… Charles E. Perkins