Network Working Group J. Navali Internet-Draft K. Chowdhury Intended status: Standards Track Starent Networks Expires: April 23, 2007 D. Premec D. Damic Siemens Mobile October 20, 2006 IPv6 over Network based Mobile IPv4 draft-navali-ip6-over-netmip4-01.txt Status of this Memo By submitting this Internet-Draft, each author represents that any applicable patent or other IPR claims of which he or she is aware have been or will be disclosed, and any of which he or she becomes aware will be disclosed, in accordance with Section 6 of BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet- Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt. The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html. This Internet-Draft will expire on April 23, 2007. Copyright Notice Copyright (C) The Internet Society (2006). Abstract There is a growing demand for routable IP addresses to support large wireless user base today. Wireless operators are looking for ways to leverage the IPv6 address space to meet the ever increasing number of wireless data users. The operators who have network based IPv4 mobility solutions can leverage the same scheme to provide mobility Navali, et al. Expires April 23, 2007 [Page 1] Internet-Draft October 2006 access service with larger address pool using IPv6 addressing. The proposed approach solves both, by allowing the provision of the mobility service, and the IPv6 address acquisition for the MN, either by the Access Router, or by the virtual link-layer through the Access Node. Table of Contents 1. Introduction and Scope . . . . . . . . . . . . . . . . . . . . 4 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 4 3. Solution Overview . . . . . . . . . . . . . . . . . . . . . . 5 3.1. NetMIP4 functionality at the Access Router . . . . . . . . 5 3.1.1. IPv6 addressing via IPv6CP . . . . . . . . . . . . . . 5 3.1.2. IPv6 addressing via DHCPv6 . . . . . . . . . . . . . . 11 3.2. NetMIP4 functionality at the Access Node . . . . . . . . . 13 3.2.1. Overview . . . . . . . . . . . . . . . . . . . . . . . 13 3.2.2. Inital network entry . . . . . . . . . . . . . . . . . 14 3.2.3. Movement to a new AN . . . . . . . . . . . . . . . . . 18 3.2.4. DAD process failure . . . . . . . . . . . . . . . . . 19 3.2.5. Address lifetime . . . . . . . . . . . . . . . . . . . 20 4. MIPv4 Message Enhancements . . . . . . . . . . . . . . . . . . 20 4.1. IPv6 Home Address Request Extension . . . . . . . . . . . 20 4.2. IPv6 Home Address Extension . . . . . . . . . . . . . . . 21 4.3. MIPv4 Registration Request and Reply . . . . . . . . . . . 22 4.4. MIPv4 Registration Revocation Procedures . . . . . . . . . 23 5. Node Requirements . . . . . . . . . . . . . . . . . . . . . . 23 5.1. Mobile Node Requirements . . . . . . . . . . . . . . . . . 23 5.2. Access Node/NetMIP4 Client Requirement . . . . . . . . . . 23 5.2.1. NetMIP4 and MIP4 registration functions . . . . . . . 23 5.2.2. IPv6 Data processing . . . . . . . . . . . . . . . . . 24 5.3. Foreign Agent Requirements . . . . . . . . . . . . . . . . 24 5.4. Access Router/NAS/NetMIP4 Client/DHCP-proxy Requirements . . . . . . . . . . . . . . . . . . . . . . . 24 5.4.1. IPv6 Addressing . . . . . . . . . . . . . . . . . . . 25 5.4.2. Authentication at the AR . . . . . . . . . . . . . . . 25 5.4.3. IPv6 Data processing . . . . . . . . . . . . . . . . . 25 5.5. Home Agent Requirements . . . . . . . . . . . . . . . . . 25 5.5.1. IPv6 Addressing . . . . . . . . . . . . . . . . . . . 25 5.5.2. Authentication at the HA . . . . . . . . . . . . . . . 26 5.5.3. IPv6 Data processing with 6to4 tunneling . . . . . . . 26 5.5.4. HA as the default IPv6 router . . . . . . . . . . . . 26 6. Security Considerations . . . . . . . . . . . . . . . . . . . 27 7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 27 8. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 28 9. References . . . . . . . . . . . . . . . . . . . . . . . . . . 28 9.1. Normative References . . . . . . . . . . . . . . . . . . . 28 9.2. Informative References . . . . . . . . . . . . . . . . . . 29 Navali, et al. Expires April 23, 2007 [Page 2] Internet-Draft October 2006 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 29 Intellectual Property and Copyright Statements . . . . . . . . . . 31 Navali, et al. Expires April 23, 2007 [Page 3] Internet-Draft October 2006 1. Introduction and Scope The document deals with IPv6 hosts in the IPv4 network having a twofold motivation: Mobile operators are running out of routable subscriber IPv4 address space and are exploring ways to deploy IPv6 to leverage the expanded 128-bit address space. In the absence of native IPv6 support on the IPv4 packet core network, a transition mechanism is needed to use the IPv6 address space over existing IP core networks. With the minimal extensions to the access network, provision of the mobility service for the unmodified IPv6 nodes can also be achieved. The first approach in this document describes ways to utilize network based IPv4 mobility solution to support tunneling of IPv6 traffic from an access router to an IPv6 correspondent node via a dual stack home agent. The scheme employs MIPv4 messages to obtain an IPv6 Home address (HoA) or Home Link (HL) prefix from the home agent so that the access router can assign an IPv6 address to an IPv6 mobile node. The access router and the home agent establish an IPv6-over-IPv4 tunnel to carry the IPv6 user traffic. The tunnel is extended to a default 6to4 gateway configured for the IPv6 address pool on the home agent. This facilitates seamless IPv6 handset mobility across access routers while keeping the same IPv6 address. On handoff, the new access router will register the same IPv6 HoA with the home agent each time with a different IPv4 care-of-address. The second approach assumes that the function preforming the registration and providing the mobility service for the IPv6 hosts, is located in the Access Node, away from the Access Router. By introducing the minimal IPv6 support in the form of new MIP4 extensions, applied to establish IPv6-over-IPv4 tunneling, such a network node can virtually extend the link-layer all the way to the HA, and the actual home link. Access network itself does not have to to extend support for IPv6, while the MN doesn't need IPv4 nor MIPv6 implementations. MN will appear to be attached to its home link, and may freely change its point of attachment. Mobility management is based on Mobile IPv4 signalling, and is completely provided by the network side. The IPv6 service for the hosts is provided exclusively by the home network. 2. Terminology The keywords "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119]. NetMIPv4 Navali, et al. Expires April 23, 2007 [Page 4] Internet-Draft October 2006 The term NetMIPv4 used in this document refers to a Mobile IPv4 client that is implemented in a network node. This entity can perform Mobile IPv4 registration on behalf of the Mobile Node. Access Node (AN) The Access Node is an access network element, such as the Base Station or the Access Point, terminating the link layer connectivity for the Mobile Node. AN does not implement any distinctive IPv6 support. 3. Solution Overview The document describes in details the two related approaches, both to provide IPv6 service for mobility unaware hosts, while operating in the network-based MIPv4 environment. The same common idea is utilized; the network-mobility controlling entity NetMIP4 performs Mobile registration on behalf of the MN, triggers the IPv6 address assignment process, and establishes the v6overv4 tunnel to relay the IPv6 user traffic to the home domain. The NetMIP4 function may be located either at the Access Router, in which case the AR takes part in addressing procedures, or at the Access Node, where the HA is expected to act as the first hop default router. Depending on the deployment preference or the implemenation choice, any of the two approaches may be chosen, adding this new functionality to the prefered part of the network. 3.1. NetMIP4 functionality at the Access Router 3.1.1. IPv6 addressing via IPv6CP For networks that use PPP as the link layer between the mobile Node (MN) and the Access Router (AR), the interface ID (IID) negotiation is performed via IPv6CP [RFC2023]. Following successful IPv6CP negotiation and establishment of the unique link-local address, the AR initiates Router Advertisement (RA) messages using its link-local address as the source address, as per [RFC2461]. The RA messages contain a prefix used by the MS to configure global IPv6 addresses. The AR supports Interface Identifier option negotiation. The AR generates local Interface Identifier (for the local side of the PPP link) and Remote Interface Identifier (for the Mobile side of the PPP link). The remote Interface Identifier is assigned to the Mobile Node during IPv6CP negotiation. The AR makes sure that the Interface Identifier is unique over the PPP link. The Interface Identifier is used along with the IPv6 HL prefix to construct the 128-bit IPv6 address for the Navali, et al. Expires April 23, 2007 [Page 5] Internet-Draft October 2006 Mobile Node. The ARs conformant to this specification shall behaves as follows: Upon receiving an IPv6CP configure request with IID set to 0, the AR shall initiate a MIPv4 registration request to the home agent using a IPv4 FA-COA and request an IPv6 HoA or HL prefix from the home agent. The HA shall assign unique IPv6 HoA or HL prefix to a mobile node after successfully processing the registering request. The HoA or HL prefix range may be configured as IPv6 pool with in HA. After receiving the MIPv4 RRP from the home agent with a valid IPv6 HoA or HL prefix, the AR sends a Router Advertisement message which contains the HL prefix received from the home agent. This is done assuming that at this time the IPv6CP negotiation with the MN is over and the PPP link has reached the NCP open state. The AR and the home agent establish an IPv6-in-IPv4 tunnel using the FA-COA IPv4 address, the home agent's IPv4 address and the IPv6 HoA tuple. The IPv6 traffic from the mobile node is carried in this IPv6-in-IPv4 tunnel to the home agent. The 6to4 tunneling or other form of tunneling may be used to forward IPv6 data packets from the mobile node to another IPv6 Router/Host over the intermediate IPv4 networks. 3.1.1.1. IPv6 Addressing with unique HL prefix In this section we show a scenario where an IPv6 address is assigned to the MN using an unique HL prefix: Navali, et al. Expires April 23, 2007 [Page 6] Internet-Draft October 2006 +----+ +-------+ +-------+ +-----+ | | |NAS/ | | | | | | MN/| |NetMIP4| | Home | |6to4 | |User| |Client/| | Agent | |Relay| | | | FA | | | | | +----+ +-------+ +-------+ +-----+ | | | | | LCP | | | 1) |<----------------------->| | | | | | | | IPv6CP Cfg-Req[IID=any] | | | 2) +-------------------------> | | | | RRQ [HoAReqExt(IID)] | | 3) | +----------------------> | | IPv6CP Cfg-Req[IID] | | | 4) <-------------------------+ | | | | RRP [HoAExt(HoA)] *** proxy | 5) | <----------------------+ DAD | | IPv6CP Cfg-NAK[IID] | | | 6) <-------------------------+ | | | | | | | IPv6CP Cfg-ACK | | | 7) +-------------------------> | | | | | | | IPv6CP Cfg-Req[IID] | | | 8) +-------------------------> | | | | | | | IPv6CP Cfg-ACK | | | 9) <-------------------------+ | | | | | | | RS | | | 10) +-------------------------> | | | | | | | RA [home prefix] | | | 11) <-------------------------+ | | | | | | 12)*** Auto Config | | | | IPv6 address | | | | | 6over4 tunnel | | 13) |<----------------------->|<====================>|<========>| Figure 1. IPv6 Addressing with unique HL prefix Description of the steps: 1. MN and the NAS performs LCP phase. During this phase, the MN may run CHAP or PAP. The NAS may authenticate the MN via an AAA infrastructure (not shown here). At this step the AR (NAS) may Navali, et al. Expires April 23, 2007 [Page 7] Internet-Draft October 2006 receive a home agent address that should be used as the home agent to acquire an HoA/HL prefix for the MN. 2. The MN sends an IPv6CP config request with IID set to any number. 3. The AR (NetMIP4 Client) assigns an IID for the MN. It sends a MIP4 RRQ to the home agent (either configured in the AR or received from the AAA server at step 1). The RRQ includes the assigned IID for the MN in a HoA request extension. The RRQ has the CoA field set to the FA-CoA of the AR. 4. The AR/NAS sends an IPv6CP config request to configure the IID that it wants to use for the IPv6 Link Local address. 5. The home agent registers the MN's session and assigns an HoA. The home agent constructs the HoA based on the received IID (lower 64 bits) with an unique prefix (upper 64-bits). The home agent may perform proxy DAD on the newly formed HoA. Assuming proxy DAD produces no response, the home agent returns the HoA in the RRP. 6. The AR/NAS responds back to the MN with an IPv6CP config-NAK to suggest the IID that it wants the MN to use for link local address. This happens in response to step 2. 7. The MN sends back an IPv6CP config-ACK to acknowledge the IID that the AR/NAS proposed in step 4 that it would use. 8. The MN sends an IPv6CP config request to the AR/NAS with the IID that was assigned by the AR/NAS in step 6. 9. The AR/NAS sends back an IPv6CP config-ACK to the MN in response to step 8. 10. At this stage the MN and the AR/NAS PPP state machine should be in NCP open state. The MN sends an Router Solicitation to the AR. 11. The AR responds with an Router Advertisement that contains a prefix set to the home link prefix of the HoA that was received at step 5. 12. The MN autoconfigures the IPv6 address with the IID and the prefix from step 9 and step 11. 13. The MN's IPv6 traffic is tunneled by the AR to the HA via an v6overv4 tunnel and the HA tunnels the packets via another tunnel (6to4 in this illustration) to the v6 node/domain. Navali, et al. Expires April 23, 2007 [Page 8] Internet-Draft October 2006 3.1.1.2. IPv6 Addressing with shared HL prefix In this section we show a scenario where an IPv6 address is assigned to the MN using a shared HL prefix: +----+ +-------+ +-------+ +-----+ | | |NAS/ | | | | | | MN/| |NetMIP4| | Home | |6to4 | |User| |Client/| | Agent | |Relay| | | | FA | | | | | +----+ +-------+ +-------+ +-----+ | | | | | LCP | | | 1) |<----------------------->| | | | | | | | IPv6CP Cfg-Req[IID=any] | | | 2) +-------------------------> | | | | RRQ [HoAReqExt(IID=0)] | | 3) | +------------------------> | | IPv6CP Cfg-Req[IID] | | | 4) <-------------------------+ | | | | RRP [HoAExt(HoA)] | | 5) | <------------------------+ | | IPv6CP Cfg-NAK[IID] | | | 6) <-------------------------+ | | | | | | | IPv6CP Cfg-ACK | | | 7) +-------------------------> | | | | | | | IPv6CP Cfg-Req[IID] | | | 8) +-------------------------> | | | | | | | IPv6CP Cfg-ACK | | | 9) <-------------------------+ | | | | | | | RS | | | 10) +-------------------------> | | | | | | | RA [home prefix] | | | 11) <-------------------------+ | | | | | | 12)*** Auto Config | | | | IPv6 address | | | | | 6over4 tunnel | | 13) |<----------------------->|<======================>|<========>| Figure 2. IPv6 Addressing with shared HL prefix Navali, et al. Expires April 23, 2007 [Page 9] Internet-Draft October 2006 Description of the steps: 1. MN and the NAS performs LCP phase. During this phase, the MN may run CHAP or PAP. The NAS may authenticate the MN via an AAA infrastructure (not shown here). At this step the AR (NAS) may receive a home agent address that should be used as the home agent to acquire an HoA/HL prefix for the MN. 2. The MN sends an IPv6CP config request with IID set to any number. 3. in this case, the AR (NetMIP4 Client) does not assigns an IID for the MN. It sends a MIP4 RRQ to the home agent (either configured in the AR or received from the AAA server at step 1). The RRQ includes IID=0 in a HoA request extension. The RRQ has the CoA field set to the FA-CoA of the AR. 4. The AR/NAS sends an IPv6CP config request to configure the IID that it wants to use for the IPv6 Link Local address. 5. The home agent registers the MN's session and assigns an HoA. The home agent assigns an HoA for the MN from its pool. Since the home agent is the custodian of the HoA (128-bits) it can use a HL prefix that is shared among number of registered MNs, there may not be a need to run proxy DAD for the assigned HoA in this case. The home agent returns the HoA in the RRP. 6. The AR/NAS extracts the IID and the HL prefix from the received IPv6 HoA extension in the RRP (step 5). The AR/NAS responds back to the MN with an IPv6CP config-NAK to suggest this IID. This happens in response to step 2. 7. The MN sends back an IPv6CP config-ACK to acknowledge the IID that the AR/NAS proposed in step 4 that it would use. 8. The MN sends an IPv6CP config request to the AR/NAS with the IID that was assigned by the AR/NAS in step 6. 9. The AR/NAS sends back an IPv6CP config-ACK to the MN in response to step 8. 10. At this stage the MN and the AR/NAS PPP state machine should be in NCP open state. The MN sends an Router Solicitation to the AR. 11. The AR responds with an Router Advertisement that contains a prefix set to the home link prefix of the HoA (extracted at step 6) that was received at step 5. 12. The MN autoconfigures the IPv6 address with the IID and the Navali, et al. Expires April 23, 2007 [Page 10] Internet-Draft October 2006 prefix from step 9 and step 11. 13. The MN's IPv6 traffic is tunneled by the AR to the HA via an v6overv4 tunnel and the HA tunnels the packets via another tunnel (6to4 in this illustration) to the v6 node/domain. 3.1.2. IPv6 addressing via DHCPv6 For networks that use DHCPv6 for IPv6 address configuration, the MN and the AR exchanges DHCPv6 messages for this purpose. In this section we describe the method via which the AR/NetMIPv4 Client acquires an HoA for the MN. It is assumed in this solution that the AR/NAS/FA, NetMIPv4 Client and the DHCP server (sort of a DHCP proxy) are collocated. The ARs conformant to this specification shall behave as follows: Upon receiving an DHCP REQUEST from the MN (DHCP Client), the AR shall initiate a MIPv4 registration request to the home agent using a IPv4 FA-COA and request an IPv6 HoA or HL prefix from the home agent. The HA shall assign unique IPv6 HoA or HL prefix to a mobile node after successfully processing the registering request. The HoA or HL prefix range may be configured as IPv6 pool with in HA. After receiving the MIPv4 RRP from the home agent with a valid IPv6 HoA or HL prefix, the AR sends a DHCP REPLY message which contains the HoA received from the home agent. The AR and the home agent establish an IPv6-in-IPv4 tunnel using the FA-COA IPv4 address, the home agent's IPv4 address and the IPv6 HoA tuple. The IPv6 traffic from the mobile node is carried in this IPv6-in-IPv4 tunnel to the home agent. The 6to4 tunneling or other form of tunneling may be used to forward IPv6 data packets from the mobile node to another IPv6 Router/Host over the intermediate IPv4 networks. The following call flow illustrates the IPv6 addressing with DHCPv6: Navali, et al. Expires April 23, 2007 [Page 11] Internet-Draft October 2006 +----+ +-------+ +-------+ +-----+ | | |NAS/ | | | | | | MN/| |NetMIP4| | Home | |6to4 | |User| |Client/| | Agent | |Relay| | | | FA | | | | | | | |DHCP- | | | | | | | | proxy | | | | | +----+ +-------+ +-------+ +-----+ | | | | | Network Access (EAP) | | | 1) |<-------------------->| | | | | | | | DHCPv6 REQ | | | 2) +----------------------> | | | | RRQ [HoAReqExt(IID=0)] | | 3) | +------------------------> | | | | | | | RRP [HoAExt(HoA)] | | 4) | <------------------------+ | | DHCPv6 REP [HoA] | | | 5) <----------------------+ | | | | 6over4 tunnel | | 6) |<-------------------->|<======================>|<========>| | | | | Figure 3. Message flow for DHCPv6 based IPv6 addressing w/ NetMIP4 Description of the steps: 1. MN and the NAS performs access authentication and authorization e.g. EAP. The NAS acting as the EAP authenticator authenticates the MN via an AAA infrastructure (not shown here). At this step the AR (NAS) may receive a home agent address that should be used as the home agent to acquire an HoA prefix for the MN. 2. The MN sends an DHCP REQUEST message to the AR/DHCP-proxy. It is assumed that the MN has discovered the DHCP-proxy address either via a SOLICIT message or an ADVERTISE message from the DHCP-proxy. These messages are not shown in this call flow. 3. The AR (NetMIP4 Client) sends a MIP4 RRQ to the home agent (either configured in the AR or received from the AAA server at step 1). The RRQ includes IID=0 in a HoA request extension. 4. The home agent registers the MN's session and assigns an HoA. The home agent assigns an HoA for the MN from its pool. Since the home agent is the custodian of the HoA (128-bits) it can use a HL Navali, et al. Expires April 23, 2007 [Page 12] Internet-Draft October 2006 prefix that is shared among number of registered MNs, there may not be a need to run proxy DAD for the assigned HoA in this case. The home agent returns the HoA in the RRP. 5. The AR/NAS responds back to the MN with an DHCP REPLY message containing the assigned HoA to the MN. 6. The MN's IPv6 traffic is tunneled by the AR to the HA via an v6overv4 tunnel and the HA tunnels the packets via another tunnel (6to4 in this illustration) to the v6 node/domain. 3.2. NetMIP4 functionality at the Access Node This section analyzes an alternative to the previous case, by putting the NetMIP4 function at the Access Node, deep into the access network. Dislocating the NetMIP4 Client from the AR, and actually supressing the IPv6 service from the access network, the link-layer can be virtually extended all the way to the designated HA. The motive behind is to reduce the IPv6-bound requirements for the access network, and therefore simplify possible deployment and implementation scenarios. 3.2.1. Overview We assume a mobile IPv4-based access network, connected to the router on the MN's home network which acts as a MIPv4 HA. The NetMIP4 Client resides at the Access Node (AN), on the traffic path to the MN, and executes all Mobile IPv4 procedures on behalf of the MN. The HA is a dual stack node, and it is acting as a default router on its IPv6 link. We assume a point-to-point MN-AN link, but will not explicitly consider running the IPv6 over PPP in this case. When the access network detects an attachment of a new IPv6 device, the NetMIP4 Client will initiate the registration of the device with the HA using an IPv4 care-of address. The IPv6 traffic of the MN is directly tunneled between the NetMIP4 and the HA as the endpoints of the v6over4 tunnel. +----+ +----+ IPv6 +----+ +--------+ | MN |---IPv6---| AN |----over----| HA |----|IPv6 net| +----+ +----+ IPv4 +----+ +--------+ Figure4. NetMIP4 deployment at the Access Node The AN is not processing IPv6 packets in any way besides tunneling them between the HA and the MN. Thus, from the perspective of the Navali, et al. Expires April 23, 2007 [Page 13] Internet-Draft October 2006 MN, the complete access network looks like a bridge, i.e. it appears to be a single link layer connecting the MN with its HA. The MN can not tell that it is not attached to its home link - in other words, it believes to be attached directly to the HA. Furtherly, the approach consideres the means for optimizing the use of CoA and HoA IPv4 address space, to accomplish that all IPv6 session may be served through a single IPv4 CoA address and also to allow the distribution of overlapping IPv4 HoA addresses. The use of the FA will utilize a more efficient mechanism for IPv4 address usage, allowing the use of a FA-CoA as a single globally routable address serving the multiple ANs and MNs, respectively. +----+ +----+ IPv6 +----+ MIP4 +----+ +--------+ | MN |---IPv6----| AN |---over---| FA |===tunnel===| HA |---|IPv6 net| +----+ +----+ IPv4 +----+ +----+ +--------+ Figure 5. NetMIP4 deployment at AN with the FA The NetMIP4 Client (located at the AN) will act on behalf of the MN, by sending the registration request to the FA. For this purpose the AN SHOULD use its own address as the MN's CoA address, and request a dynamic HoA assignment by the HA. In this case the HA MAY assign an overlapping address from a private IPv4 address pool. The FA completes the registration at the HA useing its own FA-CoA to establish the FA-HA tunnel. In this case on account of address space optimization, a second IPv4 encapsulation layer must be introduced. Entities performing the MIP4 registration MAY establish a mutual GRE tunnel [RFC2784] to engage another mechanism leveraging the use of the CoA address space. If wishing to set up the GRE, NetMIP4 Client MAY initiate the procedure by setting the 'G' bit in the Registration Request sent on behalf of the MN. If the FA is involved, then the AN, the FA and the HA SHOULD all support the GRE functionality. Using the GRE registration extensions described in [I-D.yegani-gre-key-extension] it is possible to use GRE keys negotiated between AN and the HA to distinguish between different data streams exchanged in between. This way, all IPv6 session can be served by a single IPv4 CoA address assigned to the AN. 3.2.2. Inital network entry The AN is assumed to have direct link layer connectivity (from the perspective of the IP layer) with the MN. When the MN attaches to the network, in the course of link establishment it will be Navali, et al. Expires April 23, 2007 [Page 14] Internet-Draft October 2006 authenticated. During the authentication process, the access network will learn the NAI of the MN, and the NAI must be made available to the AN. All these actions happen at the link layer, before any IP layer connectivity. After the authentication and after the link layer connectivity is successfully established, the MN, being an IPv6 host, will send a Neighbor solicitation message on a newly established link to configure its link local address. The following figure illustrates the procedure in more details. +----+ +-------+ +-------+ +-----+ | | | | | | | | | MN/| | AN/ | | Home | |Home | |User| |NetMIP4| | Agent | |Link | | | |Client/| | | | | +----+ +-------+ +-------+ +-----+ | link up | | | 1) <----------------> | | | | | | | NS(LLA) | | | 2) DAD --------------> | | timer | | | 3) | *** acq. CoA | | | | | | | | RRQ[NAI, HoAReqExt] | | 4) | +-----------------------> | | | | | | | RegResp[HoAExt] | | 5) | <-----------------------+ | | | | | | | IP4[RA(home prefix)] | | 6) | <=======================+ | | RA(home prefix)| | | 7) <----------------+ | | | RS(LLA) | | | 8) |----------------> | | | | IP4[NS(LLA), RS(LLA)] | | 9) | +=======================> | | | | proxy | 10) | | *** DAD | | | IP4[RA(home prefix)] | | 11) | <=======================+ | | RA(home prefix)| | | 12) <----------------+ | | Figure 6. NetMIP4 at AN: initial network entry Navali, et al. Expires April 23, 2007 [Page 15] Internet-Draft October 2006 1. In this step the link is established and the MN is authenticated. (e.g. using EAP). The AN SHALL learn the NAI of the MN in this step. 2. The MN sends the Neighbor solicitation to configure its link local address and to trigger the DAD for the link-local address. The MN expects to receive the notification of link-local address status before the DAD RetransTimer will expire. Prior to Neighbor Solicitation, the MN may choose to send the Router Solicitation message in order to decrease the period until the next Router Advertisement. 3. When the AN receives the first IPv6 packet from a newly attached MN, it MAY detect this host as an IPv6-only and initiate the mobility procedure on its behalf. The Router Solicitation, or the Neighbor solicitation whichever received first, AN SHALL interpret as a trigger to register with the HA. First, the AN MUST acquire the IPv4 address which it will use as a care-of address for the MN. How exactly the AN acquires the IPv4 care-of address is not defined in this specification, but typically the AN may request the address from the DHCPv4 server, or it can maintain its own address pool. 4. Triggered by the IPv6 packet received in step 3, the AN SHALL generate the MIPv4 RRQ using the CoA obtained in step 3 and NAI learned during the authentication. Further, the RRQ SHALL contain an empty HoA Request Extension (length set to 1), requesting from the HA the establishment of v6overv4 tunneling mode. In this case the AN does not append the IID data, it simply uses the HoA request extension as a capability exchange mechanism, to learn if the HA supports such a function. 5. When the HA receives the RRQ with an empty HoA request extension is SHALL create a binding entry between the MN (identified by its NAI) and the CoA received in the RRQ. The HA will not assign the HoA in this case. If the HA supports v6overv4 tunneling it SHALL send the MIP4 RRP with an empty HoA extension (length set to 1) in response. If the HA doesn't support tunneling it SHOULD send RRP without the HoA extension. The AN receiving the RRP with an emtpy HoA extension interprets this as a confirmation of the v6overv4 tunnel establishment, and creates a binding between the L2 link associated to the MN, and the tunnel. 6. Successful processing of the RRQ which included the emtpy HoA request extension, is the trigger that prompts the HA to distribute the home address prefix. Immediately after sending the RRP, the HA SHOULD send the Router advertisement over the newly established MIP4 v6overv4 tunnel. The RA, containing the home link prefix in the prefix information option, is encapsulated and sent to the AN. The inner header destination address is set to all-nodes-on-the-link Navali, et al. Expires April 23, 2007 [Page 16] Internet-Draft October 2006 address. The RA also specifies which kind of address configuration the MN may use: stateless or stateful. 7. The AN SHALL decapsulate and deliver any packets it receives via the MIPv4 tunnel directly to the MN. In this step we see the delivery of the Router Advertisement sent by the HA. The MN SHOULD use the home prefix received in the RA to configure its HoA. The MN is not required to initiate DAD for the newly configured global address, as per [RFC2462]. 8. The MN has successfully processed the Router Advertisement and autoconfigured its home addresss in step 7. To make sure the unsolicited RA received is complete, the MN MUST send the Router Solicitation if one was not sent until now [RFC2462]. 9. After the MIPv4 v6overv4 tunnel is established, the AN SHALL start delivering the uplink traffic to the HA. Here the Neighbor solicitation from step 2, which was delayed until the v6overv4 tunnel was set up, is tunneled to the HA. If sent by the MN, the Router Solicitation message will also be tunneled to the HA at this point. 10. The arrival of a Neighbor Solicitation message verifying the tentative address SHALL trigger the HA to perform proxy DAD on behalf of the MN [RFC3775]. If the DAD is successful, the HA SHALL add newly configured IPv6 HoA to the binding cache entry for the MN, and SHALL start delivering all traffic on the home link destined to this address via the MIPv4 tunnel to the current location of the MN. Every time the MN configures an additional IPv6 address, the HA SHALL perform proxy DAD for this additional address and bind it to the MIPv4 tunnel associated with the MN. 11. Receipt of the Router Solicitation prompts the HA to update the mobility bindings for the MN, if this is needed. The HA SHOULD respond by sending the solicited RA, either immediately, or delaying it for a previously scheduled occurrence. 12. Initial entry sequence is completed when the MN receives the solicited Router Advertisement containing all the required options within. If the AN is aware that the MN is an IPv6-only host, then the AN MAY initiate the setup of the MIPv4 tunnel immediately after the link layer connection is successfully established. In other words, the step 1 in the figure above may be followed by the step 3. This has the advantage that the MIPv4 tunnel is setup in advance, before any IPv6 traffic arrives at the AN. The benefit is that the delay caused by the tunnel setup is minimized. This is especially important because the tunnel setup delay may influence the DAD process. Navali, et al. Expires April 23, 2007 [Page 17] Internet-Draft October 2006 It is apparent from the discussion above that the in this deployment case the IPv6 traffic is entirely tunneled between the AN and the HA. Thus the whole access network appears to the MN as a single link connected directly to its HA. The MN is effectively deceived into believing that it is attached to its home link. The MN MAY use either stateful or stateless methods to configure its home address. This scenario doesn't mandate or prefer one method over another and is compatible with both methods. Important point is that whenever the MN configures an additional address, the HA SHALL perform the proxy DAD for it and add the HoA to its binding cache. 3.2.3. Movement to a new AN The following figure describes the sequence of events when the MN moves to a new link which is associated with the new AN. +----+ +-----+ +-----+ +-----+ +-----+ | | | | | | | | | | | MN/| | nAN | | oAN | | HA | |Home | |User| | | | | | | |Link | +----+ +-----+ +-----+ +-----+ +-----+ | | | | | | link up | context tx. | | | 1) <-------->|<-------------->| | | | | | | | | | | | | 2) | *** acq. CoA | | | | | | | | | | RRQ[HoAReqExt] | | | 3) | +----------------------------> | | | | | | | | RRP[HoAExt] | | | 4) | <----------------------------| | | | | | | | | | RRev | | 5) | | <-----------+ | | | | | | | | | RRevAck | | 6) | | +-----------> | | | | | | Figure 7. MN moves to another AN 1. In this step the MN changed its point of attachment to the network. The new link layer connection with the new AN (nAN) is established. It is assumed that during the link layer handover the old AN (oAN) transfers the MN related context to the new AN. The Navali, et al. Expires April 23, 2007 [Page 18] Internet-Draft October 2006 context SHALL include at least the NAI and the current sequence number used in MIPv4 Registration request messages. It MAY also include any packets still buffered/arriving at the oAN. The protocol for exchanging context between ANs is out of scope of this document. 2. - 4. These steps are the same as steps 3-5 in the Section 3.2.2. 5. When the HA receives a RRQ for a MN for which it already has a binding cache entry, the HA SHOULD send the MIP4 Registration Revocation message [RFC3543] to the previous mobility agent, i.e. to the oAN. This will expedite the release of resources at the oAN. The oAN can safely remove all its resource associated with the MN since it now knows that it will not receive any further traffic from the HA for this MN. The HA will perform steps 4. and 5. simultaneously. 6. The oAN acknowledges to the HA the release of the MN related resources. From the message flow above, it is obvious that the MN itself is not involved in the handover at all. In fact, from the perspective of the MN nothing changed, the illusion that it is connected to its home link is still maintained by the network despite the fact that the MN actually changed its point of attachment. 3.2.4. DAD process failure The entry procedure may end in failure as a consequence of an unsuccessful DAD process at the late stage (all steps in this section refer to initial MN entry procedure over the AN, as described in Section 3.2.2). After sending the first Neighbor solicitation by which it tries to verify the uniqueness of the tentative link-local address, the MN must wait to insure the link-local address is not already in use (Step 2). If no Neighbor Advertisements notifying a duplicate address are received in the RetransTimer period, the MN will assign and start using this address. Subsequently, the MN MAY configure its home address at Step 7. The initially sent Neighbor solicitation is delivered to the HA (Step 8) only after the AN-HA IPv6 tunnel has been established (Step 5). In case that HA performs an unsuccessful proxy DAD and detects a duplicate address (at Step 10), it MUST send the Neighbor Advertisement to the MN signaling the address is already in use. The HA is not aware of the configuration process duration at the MN, so to make sure the entry process is completely stopped it MUST send a Registration Revocation message to the AN signaling to detach the MN Navali, et al. Expires April 23, 2007 [Page 19] Internet-Draft October 2006 from the link. 3.2.5. Address lifetime Lifetime of the IPv6 address assigned to the MN and the binding lifetime held in the HA's MIPv4 context are not directly related to each other. The AN SHALL refresh the mobility binding before it expires. If the mobility binding ever expires, for whatever reason, both AN and the HA SHALL release all resources related to that mobility binding. The MN is expected to take care of the lifetime of its IPv6 address. The HA SHALL be aware of the lifetimes of the IPv6 addresses assigned to the MN. If the MN is allowed to autoconfigure [RFC2462] its IPv6 address, then the MIPv4 binding lifetime SHALL be limited by the HA to be no more than the (remaining) lifetime of the prefix used for IPv6 address autoconfiguration. The HA MAY act as the DHCPv6 relay agent in order to learn the lifetimes of IPv6 addresses assigned by means of DHCPv6. If the IPv6 address of the MN ever expires, the HA SHALL stop defending it on the home link and SHALL remove it from its binding cache entry. 4. MIPv4 Message Enhancements The following extensions are defined to exchange the Interface-ID and IPv6 HoA information between the HA, and the NetMIP4 entity, either AR or the AN. In case the AN is acting as the NetMIP4 Client, the extensions only serve the purpose to establish the v6overv4 tunneling with the HA. Note that any known and previously authenticated username (e.g the username that was authenticated during EAP or LCP) can be used as the NAI for the MIPv4 session and sent in the MN-NAI extension. If PPP/EAP username is not available, then another identifier will be needed to identify the session. In some wireless networks It is possible to use the MSID of a subscriber or the hardware ID (e.g. MAC address) of the MN to identify the session, carried in the MN-NAI extension. 4.1. IPv6 Home Address Request Extension The IPv6 Home Address Request Extension conforms to the Short Extension format specified for Mobile IPv4 [RFC3344]. The IPv6 Home Address Request Extension is not a skippable extension. The format of the extension is as follows: Navali, et al. Expires April 23, 2007 [Page 20] Internet-Draft October 2006 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type | Length | Sub-Type | IID .... +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Figure 8. IPv6 Home Address Request Extension Type A 8-bit field indicating the type of the extension. To be assigned by IANA. Length A 8-bit field indicating the length of the option. Field value is set to 9 if message contains the Interface-ID, or to 1 if an empty extension is sent. Sub-Type A 8-bit field not used in this extension. It is set to 0. IID A 64-bit field set to the Interface ID allocated by the AR for the MN. Note that the IPv6 Home Address Request Extension is included by the AR / AN only in the initial RRQ messages sent to HA. When the AR has locally assigned an Interface-ID to the MN, it includes the non-zero Interface-ID (64-bits) in this extension to request HA to assign a unique Home Link Prefix. If the AR expects the HA to assign a Home Address (including Interface-ID), then the AR sets the Interface-ID in this extension to zero. The AN always sends the extension without the Interface-ID data. 4.2. IPv6 Home Address Extension The IPv6 Home Address Extension may be included in the RRQ from the AR or in the RRP from the HA to identify a MIP registration. Note that this may also be included in MIPv4 Revocation and Acknowledgment messages [RFC3543] for the same purpose. The format of the extension is as follows: Navali, et al. Expires April 23, 2007 [Page 21] Internet-Draft October 2006 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type | Length |U| Reserved | IPv6 HoA .... +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Figure 9. IPv6 Home Address Extenstion Type A 8-bit field indicating the type of the extension. To be assigned by IANA. Length A 8-bit field indicating the length of the option. Field value is set to 17 if the message contains the Home Address, or to 1 if an empty extension is sent. U When set this indicates the uniqueness of the HL prefix used to construct the HoA. Reserved Set to 0s. IPv6 HoA A 128-bit field set to the IPv6 address (HoA) allocated by the HA for the MN. 4.3. MIPv4 Registration Request and Reply For any MN that was assigned an IPv6 Home Address via NetMIPv4, the MIPv4 Registration Request from the AR may include one of the following extensions depending upon the type of request. The IPv6 Home Address Request Extension is included in initial registration request from the AR / AN to the HA for session setup. The IPv6 Home Address Extension is included in renewal and de- registration requests from the AR to the HA. It is also included in all Registration Reply messages from the HA. An empty Home Address Extension is included in inital registration response from HA to AN. Navali, et al. Expires April 23, 2007 [Page 22] Internet-Draft October 2006 The IPv6 Home Address Request Extension and the IPv6 Home Address Extension must be included before the FA-HA Authentication Extension. 4.4. MIPv4 Registration Revocation Procedures For any MN that was assigned an IPv6 Home Address via NetMIPv4, the MIPv4 Registration Revocation and Revocation Acknowledgment messages [RFC3543] from the AR or the HA should include the IPv6 Home Address Extension to identify the MIP registration correctly. The IPv6 Home Address Extension must be included before the FA-HA Authentication Extension. Note that the AR sends a deregistration Request (lifetime = 0) to terminate a binding at the HA and not a Revocation message and the HA responds with a Deregistration Reply. The HA sends a Revocation message to terminate a binding at the AR and the AR responds with an Acknowledgment message. 5. Node Requirements This section describes the requirements for each of the nodes involved in this method. 5.1. Mobile Node Requirements Mobile node behavior shall conform to the IPv6 specification defined in [RFC2472], [RFC2460], [RFC2461], [RFC2462], [RFC3315]. The Interface-Identifier is assigned by the AR to the Mobile during IPv6CP negotiation in case the MN uses IPv6 over PPP. The HL prefix is assigned to the mobile in the Router Advertisement message. 5.2. Access Node/NetMIP4 Client Requirement In case the NetMIP4 Client resides at the Access Node following requirements have to be met in order to provide mobility service to the IPv6 MN. 5.2.1. NetMIP4 and MIP4 registration functions When the AN detects an IPv6-only MN on the link (i.e. by the NS or the RS), the AN SHALL register the MN with the HA by sending the MIPv4 RRQ message. The RRQ SHALL contain the NAI, and the IPv6 HoA Request Extension. If there is no IPv6 HoA Extension in the MIP4 RRP message or the AN SHALL not provide the MN with mobility service. The AN SHALL protect all MIPv4 signaling messages with the MN-HA authentication extension. Navali, et al. Expires April 23, 2007 [Page 23] Internet-Draft October 2006 5.2.2. IPv6 Data processing For the MN traffic, the AN is acting as a link layer bridge. The AN SHOULD not provide the IPv6 services for the MN, only the v6overv4 tunneling to the HA. In particular, the AN SHALL never decrease the hop limit field in the IPv6 header nor will it change any other field in the IPv6 header. AN SHALL not process the IPv6 HoA Extension received from HA, except as a signal to establish the v6overv4 tunnel. The AN SHALL intercept Router Advertisements sent by the HA and inspect them before relaying them to the MN. If the Router advertisement contains the source link layer address option, the AN SHALL use the advertised link layer address as the source address when constructing the link layer header, provided that the underlying link layer technology makes use of such an address. The intercepted source LLA MAY be transferred during the handover to the new AN as part of the MN context, and the new AN SHOULD use the transferred link layer address when constructing the link layer header. The AN SHALL encapsulate the IPv6 PDUs received from the MN, and send them to the HA via the v6overv4 tunnel. The AN will decapsulate the packets received from the HA and deliver the inner IPv6 PDU to the MN. The AN SHALL generate the appropriate link layer header and prepend it to the IPv6 packets delivered to the MN. 5.3. Foreign Agent Requirements Scenario with the AN as the NetMIP4 Client supports the use of unmodified foreign agents [RFC3344]. The AN will appear as regular mobile node to the FA. Advantage of using the non-collocated CoA mode is that the number of publicly routable IPv4 addresses is minimized, only one is needed for FA. However, FA will add another layer of encapsulation when tunneling back to the HA. This adds additional processing overhead and diminishes the MTU size. If the AN chooses to register with the FA, the AN will provide its IPv4 address as a care-of address and SHALL request the dynamic assignment of its HoA by setting the HoA field in RRQ to all zeros. The HoA will be assigned by the HA in the RRP message. The HoA may be allocated from private address space, and the FA may also implement the support for overlapping address space. 5.4. Access Router/NAS/NetMIP4 Client/DHCP-proxy Requirements Navali, et al. Expires April 23, 2007 [Page 24] Internet-Draft October 2006 5.4.1. IPv6 Addressing If the MN needs to be assigned a unique HL Prefix, the AR assigns an Interface-ID locally, and initiates NetMIP4 procedures to the HA. The AR sends a RRQ to HA including the IPv6 Home Address Request Extension with the Interface-ID set to the assigned Interface-ID. If the MN does not need a unique HL prefix, the AR initiates NetMIP4 procedures to the HA when IPv6CP Conf-Req is received from the MN. The AR sends a RRQ to HA including the IPv6 Home Address Request Extension with the Interface-ID set to zero. When a RRP (Accepted) with IPv6 Home Address Extension is received with a valid home address, the AR extracts the HL prefix from the HoA. The AR indicates the HL Prefix to the MN via a Router Advertisement message and puts the MN in connected state. 5.4.2. Authentication at the AR The PPP CHAP or PAP or EAP authentication shall be performed for IPv6 network access. For NetMIP4 procedures, the MN-HA, MN-FA, FA-HA authentication keys can be made available at the NetMIP4 Client via a key distribution scheme that is implemented at the AR. All RRQ/RRP messages must be protected by the FA-HA Authentication Extension. The key distribution method is outside the scope of this document. 5.4.3. IPv6 Data processing When the AR receives an IPv6 PDU from the MN, the AR encapsulates the packet in a IPv4 packet and forwards it to the HA. If the AR receives an IPv4 encapsulated IPv6 PDU from the HA, it removes the outer IPv4 header and forwards the IPv6 PDU to the MN. 5.5. Home Agent Requirements 5.5.1. IPv6 Addressing The HA needs to be configured with either IPv6 prefix pools or IPv6 address pools. If Interface-ID is assigned at the AR, the HA cannot assign shared HL prefix; it has to be a unique HL prefix per MN. When a RRQ is received with IPv6 Home Address Request Extension that has a non-zero Interface-ID in it, the HA assigns a HL prefix to the MN, forms the global IPv6 address for the MN using the received Interface-ID and sends a Reply with IPv6 Home Address Extension. When a RRQ is received with IPv6 Home Address Request Extension with Interface-ID set to zero, the HA assigns a IPv6 Home address to the Navali, et al. Expires April 23, 2007 [Page 25] Internet-Draft October 2006 MN, and sends a Reply with IPv6 Home Address Extension. When a RRQ is received with an empty IPv6 Home Address Request Extension (length set to one), the HA does not assign a IPv6 Home address to the MN, but sends a Reply with empty IPv6 Home Address Extension to confirm the v6overv4 tunneling mode. If the Interface-ID is assigned at the HA, the HA can choose to assign a shared or unique HL prefix per MN. Optionally the HA can assign a unique HL prefix to the MN also. The HA sets the Unique HL prefix bit "U" in the Home Address Extension to indicate this. 5.5.2. Authentication at the HA For NetMIP4 procedures, the MN-HA, FA-HA authentication keys can be made available at the Home Agent via a key distribution scheme that is implemented at the HA. All RRQ/RRP messages exchange with the AR must be protected by the FA-HA, and those exchanged with the AN with the MN-HA Authentication Extension. The key distribution method is outside the scope of this document. 5.5.3. IPv6 Data processing with 6to4 tunneling When the HA receives a IPv6 PDU over a 6to4 tunnel from the default 6to4router, it removes the IPv4 header and looks at the inner IPv6 address. If an tunnel has been established for this MN and there is a binding cache entry for the same, the HA encapsulates the packet in an IPv4 packet and forwards it to the AR. If the HA receives an IPv4 encapsulated IPv6 PDU from the AR, it removes the outer IPv4 header and forwards the IPv6 PDU over the 6to4 tunnel to the default 6to4 router. 5.5.4. HA as the default IPv6 router If the HA is acting as a first hop router for the MN then it requires a dual stack support, for both IPv4 and IPv6. The HA MUST provide the Mobile IPv4 service [RFC3344] on at least one interface which is connected to the IPv4 network. HA MUST support the HoA-, and the HoA Request extensions, as a mechanism to establish v6overv4 tunneling with the AN representing the MN. The HA MUST be configured with at least one 64-bit prefix which will serve as the home link prefix. On the interface(s) advertising the home link prefix, the HA provides the services of a default IPv6 router on the link. It also acts as IPv6 home agent, it MUST defend home address of the MN while it is away, it intercepts its traffic and forwards to the current MN location over the v6overv4 tunnel. If the MN is allowed to autoconfigure its home address, the HA SHALL Navali, et al. Expires April 23, 2007 [Page 26] Internet-Draft October 2006 perform the proxy DAD for the MN's HoA. The receipt of RRQ with empty IPv6 HoA request extension, the HA SHOULD interpret as a trigger to distribute the IPv6 address prefix. The HA responds with RRP containing the empty HoA extension if it supports tunneling mode, or omits the extension if it doesn't. At this stage the HA SHOULD create the initial MBE for the specific MN, containg the NAI and the CoA received in the RRQ. When the MN configures an additional IPv6 address, in order to verify its uniqueness HA starts DAD process by sending NS message to the solicited node multicast group. When the HA receives such a packet via the MIPv4 tunnel, it MUST not deliver it to the home link. Instead, the HA MUST perform proxy DAD on the home link for the address being verified. If the DAD is successful, the HA SHALL add the verified address to the binding cache entry for the MN and SHALL treat the newly configured IPv6 address as an additional HoA of the MN. If the DAD process fails, the HA SHALL relay the received NA to the MN via the MIPv4 tunnel. The HA SHALL be aware of the address lifetime of the IPv6 HoA assigned to the MN. If the address lifetime expires, the HA SHALL remove the expired address from its binding cache entry. The HA SHALL in parallel take care of the related IPv4 CoA binding lifetime, in case the lifetime does expire, the HA will remove this binding and may send the Registration Revocation to the AN in order to speedup the binding removal process. 6. Security Considerations The proposed method of acquiring IPv6 address via network based Mobile IPv4 (NetMIP4) requires secure key generation and key distribution for securing the RRQs and RRPs. Although this key generation and distribution details are not part of this document, it is necessary to put in place a solution for this to prevent rouge network nodes to launch attacks on user's sessions. There are several work going on in IETF which are based on EAP keying framework. Also several SDOs are developing key distribution schemes that can be leveraged for a solution. 7. IANA Considerations The following Extension Types MUST be assigned by IANA: IPv6 Home Address Request Extension Type: TBD-1. Navali, et al. Expires April 23, 2007 [Page 27] Internet-Draft October 2006 IPv6 Home Address Extension Type: TBD-2. 8. Acknowledgements TBD. 9. References 9.1. Normative References [RFC2023] Haskin, D. and E. Allen, "IP Version 6 over PPP", RFC 2023, October 1996. [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997. [RFC2460] Deering, S. and R. Hinden, "Internet Protocol, Version 6 (IPv6) Specification", RFC 2460, December 1998. [RFC2461] Narten, T., Nordmark, E., and W. Simpson, "Neighbor Discovery for IP Version 6 (IPv6)", RFC 2461, December 1998. [RFC2462] Thomson, S. and T. Narten, "IPv6 Stateless Address Autoconfiguration", RFC 2462, December 1998. [RFC2472] Haskin, D. and E. Allen, "IP Version 6 over PPP", RFC 2472, December 1998. [RFC2784] Farinacci, D., Li, T., Hanks, S., Meyer, D., and P. Traina, "Generic Routing Encapsulation (GRE)", RFC 2784, March 2000. [RFC3315] Droms, R., Bound, J., Volz, B., Lemon, T., Perkins, C., and M. Carney, "Dynamic Host Configuration Protocol for IPv6 (DHCPv6)", RFC 3315, July 2003. [RFC3344] Perkins, C., "IP Mobility Support for IPv4", RFC 3344, August 2002. [RFC3543] Glass, S. and M. Chandra, "Registration Revocation in Mobile IPv4", RFC 3543, August 2003. [RFC3775] Johnson, D., Perkins, C., and J. Arkko, "Mobility Support in IPv6", RFC 3775, June 2004. Navali, et al. Expires April 23, 2007 [Page 28] Internet-Draft October 2006 9.2. Informative References [I-D.yegani-gre-key-extension] Yegani, P., "GRE Key Extension for Mobile IPv4", draft-yegani-gre-key-extension-01 (work in progress), March 2006. Authors' Addresses Jay Navali Starent Networks 30 International Place Tewksbury, MA 01876 US Phone: +1 978-851-1141 Email: jnavali@starentnetworks.com Kuntal Chowdhury Starent Networks 30 International Place Tewksbury, MA 01876 US Phone: +1 214-550-1416 Email: kchowdhury@starentnetworks.com Domagoj Premec Siemens Mobile Zagrebacka 145a Zagreb 10000 Croatia Phone: +385 1-6105-923 Email: domagoj.premec@siemens.com Navali, et al. Expires April 23, 2007 [Page 29] Internet-Draft October 2006 Damjan Damic Siemens Mobile Zagrebacka 145a Zagreb 10000 Croatia Phone: +385 1-6331-337 Email: damjan.damic@siemens.com Navali, et al. Expires April 23, 2007 [Page 30] Internet-Draft October 2006 Full Copyright Statement Copyright (C) The Internet Society (2006). This document is subject to the rights, licenses and restrictions contained in BCP 78, and except as set forth therein, the authors retain all their rights. This document and the information contained herein are provided on an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Intellectual Property The IETF takes no position regarding the validity or scope of any Intellectual Property Rights or other rights that might be claimed to pertain to the implementation or use of the technology described in this document or the extent to which any license under such rights might or might not be available; nor does it represent that it has made any independent effort to identify any such rights. Information on the procedures with respect to rights in RFC documents can be found in BCP 78 and BCP 79. Copies of IPR disclosures made to the IETF Secretariat and any assurances of licenses to be made available, or the result of an attempt made to obtain a general license or permission for the use of such proprietary rights by implementers or users of this specification can be obtained from the IETF on-line IPR repository at http://www.ietf.org/ipr. The IETF invites any interested party to bring to its attention any copyrights, patents or patent applications, or other proprietary rights that may cover technology that may be required to implement this standard. Please address the information to the IETF at ietf-ipr@ietf.org. Acknowledgment Funding for the RFC Editor function is provided by the IETF Administrative Support Activity (IASA). Navali, et al. Expires April 23, 2007 [Page 31]