Re: [MEXT] FW: DISCUSS and COMMENT: draft-ietf-mext-nemo-v4traversal

Hesham Soliman <hesham@elevatemobile.com> Mon, 23 February 2009 11:17 UTC

Return-Path: <hesham@elevatemobile.com>
X-Original-To: mext@core3.amsl.com
Delivered-To: mext@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id AB4133A69CB for <mext@core3.amsl.com>; Mon, 23 Feb 2009 03:17:00 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bOSq1qRtlzi7 for <mext@core3.amsl.com>; Mon, 23 Feb 2009 03:16:59 -0800 (PST)
Received: from smtp-1.servers.netregistry.net (smtp.netregistry.net [202.124.241.204]) by core3.amsl.com (Postfix) with ESMTP id 571693A6ADE for <mext@ietf.org>; Mon, 23 Feb 2009 03:16:58 -0800 (PST)
Received: from [60.224.64.52] (helo=[192.168.0.187]) by smtp-1.servers.netregistry.net protocol: esmtpa (Exim 4.63 #1 (Debian)) id 1LbYo8-0000X0-Qr; Mon, 23 Feb 2009 22:17:09 +1100
User-Agent: Microsoft-Entourage/12.15.0.081119
Date: Mon, 23 Feb 2009 22:17:00 +1100
From: Hesham Soliman <hesham@elevatemobile.com>
To: Christian.Kaas-Petersen@tieto.com, Basavaraj.Patil@nokia.com, mext@ietf.org
Message-ID: <C5C8D0DC.BA8A%hesham@elevatemobile.com>
Thread-Topic: [MEXT] FW: DISCUSS and COMMENT: draft-ietf-mext-nemo-v4traversal
Thread-Index: AcmRYrn9Oi5m4+57iEyWrCYRX2CktwA36z8rAFfqHiUAgAC04AABiywq
In-Reply-To: <D3CFEF84287B46408A7F0405EE7C545701C81EC3@corvette.eu.tieto.com>
Mime-version: 1.0
Content-type: text/plain; charset="US-ASCII"
Content-transfer-encoding: 7bit
Subject: Re: [MEXT] FW: DISCUSS and COMMENT: draft-ietf-mext-nemo-v4traversal
X-BeenThere: mext@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Mobile IPv6 EXTensions WG <mext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/mext>, <mailto:mext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/mext>
List-Post: <mailto:mext@ietf.org>
List-Help: <mailto:mext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mext>, <mailto:mext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 23 Feb 2009 11:17:00 -0000

On 23/02/09 9:35 PM, "Christian.Kaas-Petersen@tieto.com"
<Christian.Kaas-Petersen@tieto.com> wrote:

> It is not clear to me, that RFC 3775 allows the exchange
> of Mobile Prefix Solicitations and Mobile Prefix Advertisements
> during bootstrapping.

=> It doesn't. It only allows it after the MN gets a HoA.

If a mobile node is booting in a foreign network,
> and has no home address, it has not yet made any registration with
> a home agent, then certainly the home agent has no way to send
> unsolicited MPA to a mobile node (RFC 3775 sec 6.8).  Should the
> mobile node attempt to send a MPS to the home agent, it is a
> requirement the Home Address destination option is included in an
> ESP protected packet (RFC 3775 sec 6.7), which means it must have
> a home address.  That's why I fail to understand how MPS/MPA can
> be used for bootstrapping, because the home address is required.
> 
> In my view, this does not change with DSMIP, except that the home
> address is no longer stored in a destination option but in the
> (inner) IPv6 source address.  Because the mobile node already knows
> its IPv6 home address, I should think it a valid functionality
> to ask the home agent of any updates in the IPv6 home prefixes.

=> DSMIP will not change the use of the HAO for MPS and MPA. The HAO will
still be used.

Hesham

> 
> Christian
>  
> 
>> -----Original Message-----
>> From: mext-bounces@ietf.org [mailto:mext-bounces@ietf.org] On
>> Behalf Of Basavaraj.Patil@nokia.com
>> Sent: 20. februar 2009 22:28
>> To: hesham@elevatemobile.com; mext@ietf.org
>> Subject: Re: [MEXT] FW: DISCUSS and COMMENT:
>> draft-ietf-mext-nemo-v4traversal
>> 
>> 
>> Hi Hesham,
>> 
>> After looking at your proposed text, I must say that I am not
>> totally convinced.
>> 
>> Stepping back from the specific issue raised by Pasi for a moment,
>> - Do we really need to have the capability to obtain the
>> prefix from the HA when the MN does not have IPv6
>> connectivity to the HA? While I recognize the fact that this
>> mechanism is specified in RFC3775 as a means by which the MN
>> can obtain the prefix from the HA to bootstrap, I don't
>> believe it has much value.
>> Since other bootstrapping mechanisms have been developed, I
>> do not see the need for obtaining the prefix from the HA by
>> an MN using the prefix solicitation mechanism, especially in
>> the case where the MN is attached via
>> IPv4 only. Hence I would suggest removing this feature
>> entirely from the
>> DSMIP6 I-D. I do not see any harm in not having the
>> capability to do prefix solicitation when attached via an
>> IPv4 only network.
>> 
>> -Raj
>> 
>> 
>> On 2/18/09 9:30 PM, "ext Hesham Soliman"
>> <hesham@elevatemobile.com> wrote:
>> 
>>> Folks,
>>> 
>>> Please take a look the Pasi's comment below and my response
>> and let me 
>>> know if anyone has comments on this before I submit the draft. This
>>> should be the final comment on the doc. Does the text in
>> section 3.2 
>>> make sense? If not, does the explanation below make sense?
>> If not please suggest text.
>>> 
>>> 
>>>> Section 3.2:
>>>>>   Securing these messages requires the mobile node to have a
>>>>>   security association with the home agent, using IPsec
>> (AH or ESP)
>>>>>   and based on the mobile node's IPv4 care-of address as described
>>>>>   in [RFC3775].  Since the mobile node needs to
>> encapsulate all IPv6
>>>>>   traffic sent to the home agent into IPv4 while located in an
>>>>>   IPv4-only visited network, this SA would match all
>> packets if the
>>>>>   selectors were based on the information in the outer header.
>>>> 
>>>> This looks strange (when using tunnel mode IPsec, the selectors
>>>> select the packets to be protected before the outer header
>> is added 
>>>> -- so the last sentence is weird) -- what are the IPsec
>> SPD entries, 
>>>> and what does the resulting packet look like?
>>>> 
>>> 
>>> => I was confused by the snippet above and then went back
>> to see why I 
>>> added this a long time ago. Basically the scenario here is
>> that a MN 
>>> can send the prefix solicitation and receive advertisement from its
>>> HA, while located in a foreign link. These messages may be
>> sent before 
>>> a home address is allocated. So, if a MN is located in an IPv4
>>> network, it would have to negotiate the SA using IPv4 and
>> it's IPv4 address is one of the selectors.
>>> The inner IPv6 packet would probably contain a link local
>> in the src 
>>> address since there is no global IPv6 address available to
>> the MN. In 
>>> 3775/6, the (un-encapsulated message) is protected by a
>> transport mode 
>>> SA. In DSMIP, if we do a transport mode SA on the outer
>> header, then 
>>> this SA would apply to all traffic since everything is
>> tunnelled back 
>>> to the HA. And the outer header is identical for all packets.
>>> 
>>> Does this make sense to you? If so, I can clarify the text
>> according 
>>> to this logic. If not, please let me know what I missed.
>>> 
>>> Hesham
>>> 
>>> 
>>> _______________________________________________
>>> MEXT mailing list
>>> MEXT@ietf.org
>>> https://www.ietf.org/mailman/listinfo/mext
>> 
>> _______________________________________________
>> MEXT mailing list
>> MEXT@ietf.org
>> https://www.ietf.org/mailman/listinfo/mext
>>