Re: [nbs] NBS and TCP connection identification

Christian Vogt <christian.vogt@ericsson.com> Mon, 27 September 2010 22:19 UTC

Return-Path: <christian.vogt@ericsson.com>
X-Original-To: nbs@core3.amsl.com
Delivered-To: nbs@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 609403A6A40 for <nbs@core3.amsl.com>; Mon, 27 Sep 2010 15:19:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -103.099
X-Spam-Level:
X-Spam-Status: No, score=-103.099 tagged_above=-999 required=5 tests=[AWL=-0.501, BAYES_00=-2.599, NORMAL_HTTP_TO_IP=0.001, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XlqqmIs5Hjxf for <nbs@core3.amsl.com>; Mon, 27 Sep 2010 15:18:54 -0700 (PDT)
Received: from imr3.ericy.com (imr3.ericy.com [198.24.6.13]) by core3.amsl.com (Postfix) with ESMTP id A1E203A6DC3 for <nbs@ietf.org>; Mon, 27 Sep 2010 15:17:42 -0700 (PDT)
Received: from eusaamw0711.eamcs.ericsson.se ([147.117.20.178]) by imr3.ericy.com (8.13.8/8.13.8) with ESMTP id o8RMGtjn025257 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Mon, 27 Sep 2010 17:18:10 -0500
Received: from EUSAACMS0701.eamcs.ericsson.se ([169.254.1.214]) by eusaamw0711.eamcs.ericsson.se ([147.117.20.178]) with mapi; Mon, 27 Sep 2010 18:17:57 -0400
From: Christian Vogt <christian.vogt@ericsson.com>
To: Erik Nordmark <erik.nordmark@oracle.com>
Date: Mon, 27 Sep 2010 18:17:55 -0400
Thread-Topic: [nbs] NBS and TCP connection identification
Thread-Index: ActekdZY3BYomLGGQsikn322PT3xpg==
Message-ID: <40E06DF4-69A5-40F5-9C1C-D348D0265048@ericsson.com>
References: <4C97D9A8.2050001@oracle.com> <ACE9611A-9107-46EC-ADD2-56E553DC1C3A@ericsson.com> <4C9826D0.2060703@oracle.com> <1285067950.2068.59.camel@bit> <4C98D525.1030808@oracle.com> <1285148838.2211.60.camel@bit>
In-Reply-To: <1285148838.2211.60.camel@bit>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: Name-Based Sockets List <nbs@ietf.org>
Subject: Re: [nbs] NBS and TCP connection identification
X-BeenThere: nbs@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Name based sockets discussion list <nbs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/nbs>, <mailto:nbs-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/nbs>
List-Post: <mailto:nbs@ietf.org>
List-Help: <mailto:nbs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nbs>, <mailto:nbs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 27 Sep 2010 22:19:23 -0000

Javier Ubillos wrote:

>> How do you secure the movement in that case?
>> Suppose the client has IP address 129.146.228.81, thus the server would 
>> see the client as having name 81.228.146.129.in-addr.arpa.
>> Then the client switches to being on IP address 36.1.2.3. How can you 
>> know that it is indeed the same client so that it is secure for the 
>> server to start sending the packets to 36.1.2.3?
>> You can't rely on DNS validation (unless you assume that the client can 
>> update the DNS records for 81.228.146.129.in-addr.arpa, which is very 
>> unlikely.)
>> Thus how do you secure this?
> 
> Movement is, in the name-based sockets + shim6, handled by shim6.
> The shim6 handshake is performed out-of-band. Before that is done, no
> mobility/multi-homing is available. Shim6 deals with validation. We do
> add locators to be tested found in DNS, but AFAIKT shim6 deals with this
> nicely, and yes, we cannot trust DNS to that extent.


Erik,

let me add that the selection of Shim6 for mobility management was an implementation decision, not a conceptual decision:  We had an existing Shim6 implementation and people familiar with this implementation, so it seemed naturally to build upon it.  Conceptually, one could devise name-based sockets to work without Shim6.

Specifically, we are re-using Shim6's mechanisms for movement detection and address updating.  We do not re-use Shim6's mechanisms for binding IP addresses together, since with name-based sockets, IP addresses are bound to DNS names rather than to each other.

- Christian