Internet DRAFT - draft-xia-mip6-coa-privacy-consideration

draft-xia-mip6-coa-privacy-consideration



Mobile IPv6 Working Group                                 Zhongqi Xia 
Internet Draft                            Huawei Technologies Co., Ltd 
Expires: 21 February 2007                              August 21, 2006 
                                   
 
                                      
            Consideration about Location Privacy of CoA in MIP6 
              draft-xia-mip6-coa-privacy-consideration-01.txt 


Status of this Memo 

   By submitting this Internet-Draft, each author represents that       
   any applicable patent or other IPR claims of which he or she is       
   aware have been or will be disclosed, and any of which he or she       
   becomes aware will be disclosed, in accordance with Section 6 of       
   BCP 79. 

   Internet-Drafts are working documents of the Internet Engineering 
   Task Force (IETF), its areas, and its working groups.  Note that 
   other groups may also distribute working documents as Internet-Drafts. 

   Internet-Drafts are draft documents valid for a maximum of six months 
   and may be updated, replaced, or obsoleted by other documents at any 
   time.  It is inappropriate to use Internet-Drafts as reference 
   material or to cite them other than as "work in progress." 

   The list of current Internet-Drafts can be accessed at 
        http://www.ietf.org/ietf/1id-abstracts.txt 

   The list of Internet-Draft Shadow Directories can be accessed at 
        http://www.ietf.org/shadow.html 

   This Internet-Draft will expire on August 21, 2006. 

Abstract 

   In this document, we discuss the problem about location privacy of 
   CoA in Mobile IPv6. And some possible policies and solutions are 
   discussed in order to protect location privacy of CoA in route 
   optimization mode.  

Conventions used in this document 

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", 
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this 
   document are to be interpreted as described in RFC-2119 [1]. 

 
 
 
Xia                  Expires February 21, 2007               [Page 1] 

Internet-Draft Consideration About CoA Location Privacy     August 2006 
    

Table of Contents 

   1. Introduction................................................2 
   2. Policies and solutions.......................................3 
      2.1. Consideration for Route Optimization Agent (ROA).........3 
      2.2. Security Consideration..................................4 
         2.2.1. Consideration for authenticating ROA/CN............4 
         2.2.2. Consideration for relations between ROA and CN......4 
         2.2.3. Other security consideration.......................5 
   3. Miscellaneous...............................................5 
   4. IANA consideration..........................................5 
   5. Acknowledgments.............................................5 
   6. References..................................................6 
      6.1. Normative References....................................6 
      6.2. Informative References..................................6 
   Author's Addresses.............................................6 
   Intellectual Property Statement.................................6 
   Disclaimer of Validity.........................................7 
   Copyright Statement............................................7 
   Acknowledgment.................................................7 
    

1. Introduction 

   In communication systems, especially in IP environment, privacy is an 
   important issue and more and more attention is being paid to it. 
   Location privacy is a subset of the overall privacy issue [1]. For 
   traditional IP communication, there is no location privacy between 
   communication peers (devices or users) since the IP address in the IP 
   packet reveals the location of communication peers. Similarly, this 
   location privacy deficiency is applicable to Mobile IPv6 as well and 
   it is more serious for Mobile IPv6 users than for traditional IP 
   users.  
    
   When away from home network, mobile node uses a new IPv6 address 
   called Care of Address (CoA). The CoA is an indication representing 
   the new location of the mobile node. In the tunnel mode, CoA is 
   encapsulated in the outer layer IPv6 packet header. The eavesdroppers 
   on the path between new location and home network can intercept the 
   tunneled packets and get to know CoA of mobile node. But for 
   correspondence node, it does not receive the tunneled packets and 
   does not know the new CoA of mobile node. The correspondence node 
   always assumes that it communicates with mobile node in its home 
   network.  
    
   If mobile node wants to improve the communication efficiency and to 
   adopt route-optimization mode, it has to execute Return Routability 
 
 
Xia                    Expires April 24, 2006                 [Page 2] 

Internet-Draft Consideration About CoA Location Privacy     August 2006 
    

   Procedure (RRP) firstly. Then mobile user can registers its CoA with 
   its correspondent and finally the correspondent will know the mobile 
   user's current CoA and mapped location. 
    
2. Policies and solutions 

2.1. Consideration for Route Optimization Agent (ROA) 

   Because correspondent node (CN) has the binding cache between HoA and 
   CoA of mobile node (MN), it can determine the location information of 
   mobile node. So it is necessary to separate the binding cache from 
   the correspondent node. One solution is to place the binding cache on 
   another physical entity or device called Route Optimization Agent 
   (ROA) here. The following figure is the basic network model when ROA 
   is involved. 
    
                  |-----------------| 
    |-----|       |                 |     |-----|     |-----| 
    | MN  |-------|     NETWORK     |-----| ROA |-----| CN  | 
    |-----|       |                 |     |-----|     |-----| 
                  |-----------------| 
                       Fig1 ROA network model 
    
   In Fig1, the correspondent node accesses Internet through the route 
   optimization agent. When MN starts the RRP and registers itself with 
   CN, ROA intercepts signaling messages from MN to CN and processes 
   them on behalf of correspondent node. The final processing results, 
   including the binding relation information between HoA and CoA of MN, 
   will be maintained on ROA. Therefore, it is not necessary for 
   correspondent node to have the capability to process the route 
   optimization procedure. This makes the implementation and 
   administration of the correspondent node more simple and safe. 
    
   After finishing the route optimization procedure, mobile node will 
   communicate with correspondent node directly, using its CoA as 
   packets' source address. Meanwhile, Home Address Option is used 
   within packets. When ROA intercepts traffic packets which are from MN 
   to CN, it will change the content of these packets, e.g. CoA will be 
   substituted with HoA of MN, and Home Address Option will be removed. 
   Likewise, when ROA intercepts traffic packets from CN to MN, MN's HoA 
   will be substituted with its CoA and the Destination Route Option 
   will be added to the traffic packets. 
    




 
 
Xia                    Expires April 24, 2006                 [Page 3] 

Internet-Draft Consideration About CoA Location Privacy     August 2006 
    

2.2. Security Consideration 

   If the network model of ROA is used, many other security and 
   authentication related factors must be considered carefully. 

2.2.1. Consideration for authenticating ROA/CN 

   The mobile node has to authenticate ROA before it can start Care of 
   Test procedure and register its CoA with the correspondent node 
   (actually with ROA, but the mobile node is not aware of this; in the 
   following text, we will only refer to ROA and will not mention 
   correspondent node). If the authentication result is ok, mobile node 
   continues to register its CoA with ROA. Otherwise, route optimization 
   should be terminated immediately.  
    
   There are many kinds of authentication methods, such as user 
   ID/password, CA, and secret key etc. These methods should be 
   supported when mobile node authenticates ROA. Nonetheless, no 
   authentication should be supported so as to be incompatible with the 
   current mechanism of Mobile IPv6.  
    
   In fact it is difficult for mobile node to decide when and where to 
   authenticate ROA or correspondent node. Authentication has to be 
   carried out before mobile node's CoA is revealed to ROA i.e. 
   authentication should be finished before mobile node starts Care of 
   Test, because the test message tells ROA mobile node's CoA implicitly. 
   Therefore, there are three left possibilities to finish 
   authentication procedure. One is that in the tunnel mode 
   authentication goes with traffic packets; another is that 
   authentication goes with Home of Test packets; and the last is to 
   define new message type to finish the authentication procedure.  
    
   It is not reasonable that mobile node authenticates ROA alone. Mobile 
   node needs help from its home network, such as the participation of 
   Home Agent. Because the contract of keeping privacy is provided by 
   network operators, there are AAA databases in mobile node's home 
   network. Therefore, the network element (i.e. Home Agent) has the 
   ability to authenticate ROA. It's very important for home network to 
   assist mobile node with finishing authentication procedure. If mobile 
   node's home network has no ability to authenticate the ROA, mobile 
   node has to decide the authentication method and result alone. 

2.2.2. Consideration for relations between ROA and CN 

   Because mobile node registers its CoA with ROA, it's very important 
   that ROA is secure enough to protect its privacy data from evil 
   node's attack and eavesdropping. Since ROA serves correspondent node 
 
 
Xia                    Expires April 24, 2006                 [Page 4] 

Internet-Draft Consideration About CoA Location Privacy     August 2006 
    

   as a route optimization agent for CN, the ROA should have the 
   capability to authenticate the CN and the CN should have the 
   capability to authorize the ROA in order to accomplish the route 
   optimization. 

2.2.3. Other security consideration 

   Even though mobile node's CoA is shielded from the correspondent node 
   when ROA is used, the CoA is still in the clear on the path from 
   mobile node to ROA. However, this issue is not derived from the 
   introduction of Mobile IPv6 and route optimization but a legacy 
   problem raised from traditional IP communication. If Home Address 
   Option is encrypted [2], the impacts will be mitigated significantly. 

3. Miscellaneous 

   If ROA network model is used, ROA might become the bottleneck of the 
   access network. The traffic burden will be very heavy for ROA because 
   all traffic packets must go through ROA and ROA must perform a great 
   deal of translation processing. For large scale access network, 
   efficiency and performance should be considered carefully when 
   deploying. 

   If Home Agent is used to assist mobile node for authentication, the 
   authentication burden will be very heavy for Home Agent when many 
   mobile nodes request Home Agent's help for authentication at the same 
   time. It is necessary to consider the deployment issues of home 
   network carefully. 

   When deployment, ROA should be the access router. If CN's access 
   network does not contain an ROA, no privacy for the MN will be in 
   effect. And if CN and MN are attached to the same link, the traffic 
   packets have to go through ROA. Otherwise, MN's privacy is revealed 
   to CN. 

4. IANA consideration 

   There is no IANA consideration introduced by this draft. 

5. Acknowledgments 

   Thanks Robert P Jaksa, Carl Williams, Hongfei Chen, Jian Zhang, 
   Xianfeng Dai, Wei Cao, Hui Liu and Lianshu Zheng for reviewing the 
   earlier version of this draft. 



 
 
Xia                    Expires April 24, 2006                 [Page 5] 

Internet-Draft Consideration About CoA Location Privacy     August 2006 
    

6. References 

6.1. Normative References 

   [1]  Bradner, S., "Key words for use in RFCs to Indicate Requirement 
         Levels", BCP 14, RFC 2119, March 1997. 

   [2]  Crocker, D. and Overell, P.(Editors), "Augmented BNF for Syntax 
         Specifications: ABNF", RFC 2234, Internet Mail Consortium and 
         Demon Internet Ltd., November 1997. 

6.2. Informative References 

   [3]  Rajeev Koodli; IP Address Location Privacy and Mobile IPv6:  
         Problem Statement; Internet Draft, Internet Engineering Task 
         Force, October 2005. 

   [4]  Rajeev Koodli, Vijay Devarapalli, Hannu Flinck, Charlie Perkins; 
         Solutions for IP Address Location Privacy in the presence of IP 
         Mobility; Internet Draft, Internet Engineering Task Force, Feb 
         2005. 

Author's Addresses 

   Zhongqi Xia 
   Huawei Technologies Co., Ltd. 
   Huawei Building, No. 3 Xinxi Road, 
   Shand-Di Information Industry Base, 
   Hai-Dian District, 
   Beijing P.R.China,100085 
   Phone: 86-10-82836050 
   Email: xiazhongqi@huawei.com 
    

Intellectual Property Statement 

   The IETF takes no position regarding the validity or scope of any 
   Intellectual Property Rights or other rights that might be claimed to 
   pertain to the implementation or use of the technology described in 
   this document or the extent to which any license under such rights 
   might or might not be available; nor does it represent that it has 
   made any independent effort to identify any such rights.  Information 
   on the procedures with respect to rights in RFC documents can be 
   found in BCP 78 and BCP 79. 

   Copies of IPR disclosures made to the IETF Secretariat and any 
   assurances of licenses to be made available, or the result of an 
 
 
Xia                    Expires April 24, 2006                 [Page 6] 

Internet-Draft Consideration About CoA Location Privacy     August 2006 
    

   attempt made to obtain a general license or permission for the use of 
   such proprietary rights by implementers or users of this 
   specification can be obtained from the IETF on-line IPR repository at 
   http://www.ietf.org/ipr. 

   The IETF invites any interested party to bring to its attention any 
   copyrights, patents or patent applications, or other proprietary 
   rights that may cover technology that may be required to implement 
   this standard.  Please address the information to the IETF at 
   ietf-ipr@ietf.org. 

Disclaimer of Validity 

   This document and the information contained herein are provided on an 
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS 
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET 
   ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, 
   INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE 
   INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED 
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. 

Copyright Statement 

   Copyright (C) The Internet Society (2006). 

   This document is subject to the rights, licenses and restrictions 
   contained in BCP 78, and except as set forth therein, the authors 
   retain all their rights. 

Acknowledgment 

   Funding for the RFC Editor function is currently provided by the 
   Internet Society. 

    











 
 
Xia                    Expires April 24, 2006                 [Page 7]