Re: [MEXT] New Version Notification fordraft-perkins-mext-hatunaddr-01.txt

Behcet Sarikaya <sarikaya2012@gmail.com> Tue, 01 November 2011 18:55 UTC

Return-Path: <sarikaya2012@gmail.com>
X-Original-To: mext@ietfa.amsl.com
Delivered-To: mext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C425A11E811F for <mext@ietfa.amsl.com>; Tue, 1 Nov 2011 11:55:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.399
X-Spam-Level:
X-Spam-Status: No, score=-3.399 tagged_above=-999 required=5 tests=[AWL=0.199, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PZDnfkTxIXi8 for <mext@ietfa.amsl.com>; Tue, 1 Nov 2011 11:55:24 -0700 (PDT)
Received: from mail-yw0-f44.google.com (mail-yw0-f44.google.com [209.85.213.44]) by ietfa.amsl.com (Postfix) with ESMTP id 80BC111E814E for <mext@ietf.org>; Tue, 1 Nov 2011 11:55:24 -0700 (PDT)
Received: by ywt2 with SMTP id 2so8755673ywt.31 for <mext@ietf.org>; Tue, 01 Nov 2011 11:52:04 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=mime-version:reply-to:in-reply-to:references:date:message-id :subject:from:to:cc:content-type; bh=TEBE8r148ubK3WgYoWUEUtxl47rQhmmou7oYSoFnwv8=; b=nRV5Cj0teXt0e6M4H07ye6RMAkMKkxXR5/RQZI19rHSbTIXDq+iFlRRUVJFs8Rq0d0 ORBY+FnswOXqE7GobZjKXAbOPBFw7xPnfDblhfE+/U/yNmsPAwl074bLm5zx6K0Uk32R y45F2T5sbsoDA9V/tVfUoUWUZUQrmGQ6Npfbo=
MIME-Version: 1.0
Received: by 10.236.115.129 with SMTP id e1mr1337125yhh.77.1320173524813; Tue, 01 Nov 2011 11:52:04 -0700 (PDT)
Received: by 10.236.108.135 with HTTP; Tue, 1 Nov 2011 11:52:04 -0700 (PDT)
In-Reply-To: <7793C4DA-B675-4730-8079-AE4FE08A3501@us.toyota-itc.com>
References: <20110803185832.21283.61262.idtracker@ietfa.amsl.com> <4E399F6E.8090508@computer.org> <75B8624B-6C94-4B7F-9487-DCF0E06B5256@us.toyota-itc.com> <4EAB1A93.8050605@computer.org> <4EAF1E39.3020209@earthlink.net> <7793C4DA-B675-4730-8079-AE4FE08A3501@us.toyota-itc.com>
Date: Tue, 1 Nov 2011 13:52:04 -0500
Message-ID: <CAC8QAcdM0g=1qrvn6dDh1xV7t4OL9ZBZiE=SPHc4U=YHurvKZg@mail.gmail.com>
From: Behcet Sarikaya <sarikaya2012@gmail.com>
To: Romain KUNTZ <rkuntz@us.toyota-itc.com>
Content-Type: multipart/alternative; boundary=20cf303a2bb5fd05ec04b0b0d973
Cc: charliep@computer.org, mext <mext@ietf.org>
Subject: Re: [MEXT] New Version Notification fordraft-perkins-mext-hatunaddr-01.txt
X-BeenThere: mext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: sarikaya@ieee.org
List-Id: Mobile IPv6 EXTensions WG <mext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mext>, <mailto:mext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/mext>
List-Post: <mailto:mext@ietf.org>
List-Help: <mailto:mext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mext>, <mailto:mext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 01 Nov 2011 18:55:25 -0000

Hi Romain, Charlie,
  I added a new section in

draft-sarikaya-mext-multicastdmm-04.txt

on this. I don't think we need new types, more extensions.

Please check.

Regards,

Behcet
On Tue, Nov 1, 2011 at 1:19 PM, Romain KUNTZ <rkuntz@us.toyota-itc.com>wrote;wrote:

> Hello Charlie,
>
> That's right, I believe the signaling still goes to the primary HA and
> thus can be secured as usual, and as mandated by the MIPv6 spec.
> Beside, the mobile node can choose to send the IPsec'd traffic through its
> primary HA if needed.
>
> Thank you,
> Romain
>
> On Oct 31, 2011, at 15:16, Charles E. Perkins wrote:
>
> > Hello again Romain,
> >
> > I didn't have time to do the specification for any
> > new extension for the suggested options revised from
> > RFC 3957.  I'll try to do it later this week, but the
> > result can't be officially submitted until I get to
> > the IETF.
> >
> > Anyway, traffic to/from the mobile node <--> home agent
> > doesn't always have to be protected, especially looking
> > at the relative proportion of data traffic today that
> > is sent via IPsec.  It seems to me that the problem is
> > important, and must be solved, but not a showstopper.
> >
> > Regards,
> > Charlie P.
> >
> >
> >
> > On 10/28/2011 2:11 PM, Charles E. Perkins wrote:
> >> Hello Romain,
> >>
> >> Thank you for reminding me about this point. It had been
> >> raised previously during some related discussions for DMM
> >> late last year, and I plainly forgot to fill in any details
> >> about the problem.
> >>
> >> After looking over RFC 3957, I think the most efficient way
> >> towards solution will be to define a new extension similar
> >> to the Generalized MN-HA Key Generation Nonce Request and
> >> Generalized MN-HA Key Generation Nonce Reply extensions.
> >> It's not a perfect fit, but it's pretty close. If there is
> >> any interest for an IPv4-based solution, I could easily
> >> write up a new subtype for the RFC 3957 (IPv4) extensions.
> >>
> >> The formula for calculating the key in Section 5 needs to be
> >> updated, perhaps to the following:
> >> key = HMAC-SHA1 (HA-key,
> >> {Key Generation Nonce ||
> >> mobile node identifier ||
> >> HA-D IPv6_address})
> >>
> >> A similar formula would apply for any specification
> >> in which the key nonce was generated by AAA instead of
> >> the [control-plane] Home Agent [HA-C].
> >>
> >> The manner in which the HA-D get the corresponding
> >> configuration information doesn't have to be specified
> >> in the ...mext-hatunaddr... draft.
> >>
> >> I'll try to get an updated draft out before the draft
> >> deadline on Monday. Thanks for your comment. While
> >> mostly straightforward, the update will take a pretty
> >> good bit of carefully written text.
> >>
> >> Regards,
> >> Charlie P.
> >>
> >>
> >> On 8/4/2011 11:39 AM, Romain KUNTZ wrote:
> >>> Hello Charlie,
> >>>
> >>> If the MN has to tunnel data to a different HA than the one to which
> >>> it sends the BU, then it also needs an IPsec SA with that HA. How
> >>> would the MN create such SA as it does not know in advance what HA it
> >>> may use for tunneling? My guess is that the MN is supposed to trust
> >>> the address received in the option and create the SA upon reception of
> >>> the option. Similarly, all of the HA tunneling box would also need to
> >>> be configured with the corresponding SA. Some considerations about
> >>> that may be needed in the draft.
> >>>
> >>> Regards,
> >>> romain
> >>>
> >>>
> >>> On Aug 3, 2011, at 12:20, Charles E. Perkins wrote:
> >>>
> >>>>
> >>>> Hello folks,
> >>>>
> >>>> My draft has now made it through the submission process.
> >>>> Please excuse the repeat notification...
> >>>>
> >>>> Comments will be appreciated.
> >>>>
> >>>> Regards,
> >>>> Charlie P.
> >>>>
> >>>>
> >>>> -------- Original Message --------
> >>>> Subject: New Version Notification for
> >>>> draft-perkins-mext-hatunaddr-01.txt
> >>>> Date: Wed, 03 Aug 2011 11:58:32 -0700
> >>>> From:<internet-drafts@ietf.org>
> >>>> To:<charliep@computer.org>
> >>>> CC:<charliep@computer.org>
> >>>>
> >>>> A new version of I-D, draft-perkins-mext-hatunaddr-01.txt has been
> >>>> successfully submitted by Charles Perkins and posted to the IETF
> >>>> repository.
> >>>>
> >>>> Filename: draft-perkins-mext-hatunaddr
> >>>> Revision: 01
> >>>> Title: Alternate Tunnel Source Address for Home Agent
> >>>> Creation date: 2011-08-03
> >>>> WG ID: Individual Submission
> >>>> Number of pages: 10
> >>>>
> >>>> Abstract:
> >>>> Widely deployed mobility management systems for wireless
> >>>> communications have isolated the path for forwarding data from the
> >>>> control plane signaling for mobility management. To realize this
> >>>> requirement with Mobile IP requires that the control functions of the
> >>>> home agent be addressable at a different IP address than the source
> >>>> IP address of the tunnel between the home agent and mobile node.
> >>>> Similar considerations hold for mobility anchors implementing
> >>>> Hierarchical Mobile IP or PMIP.
> >>>>
> >>>>
> >>>>
> >>>>
> >>>> The IETF Secretariat
> >>>>
> >>>> _______________________________________________
> >>>> MEXT mailing list
> >>>> MEXT@ietf.org
> >>>> https://www.ietf.org/mailman/listinfo/mext
> >>>
> >>>
> >>
> >> _______________________________________________
> >> MEXT mailing list
> >> MEXT@ietf.org
> >> https://www.ietf.org/mailman/listinfo/mext
> >>
> >
>
> _______________________________________________
> MEXT mailing list
> MEXT@ietf.org
> https://www.ietf.org/mailman/listinfo/mext
>