mobile ipv6 security
play

Mobile IPv6 Security Arnaud Ebalard - EADS Corporate Research Center - PowerPoint PPT Presentation

Mobile IPv6 Security Arnaud Ebalard - EADS Corporate Research Center France Guillaume Valadon - The University of Tokyo / Laboratoire dInformatique de Paris 6 Summary IPv6 Mobile IPv6 Security and Mobile IPv6 Protections by


  1. Mobile IPv6 Security Arnaud Ebalard - EADS Corporate Research Center France Guillaume Valadon - The University of Tokyo / Laboratoire d’Informatique de Paris 6

  2. Summary • IPv6 • Mobile IPv6 • Security and Mobile IPv6 • Protections by default 2. IPsec

  3. IPv6

  4. Differences With IPv4 Functional changes: • End-to-End communications • ARP replacement uses ICMPv6 Structural changes: • Fixed length header • Fragmentation at the source; no checksum 6. Extensions/options through header chaining

  5. The IPv6 Header

  6. Extensions

  7. Routing Header

  8. IPv6 Addresses • Hierarchical/geogra phical • 64 bits prefix • Interface ID dynamically generated

  9. Auto-configuration • Mechanism based on ICMPv6 • Steps: • Retrieval of the IPv6 prefix advertised by the access router (RS/RA: Router Solicitation/Advertisement) • Generation of an unique interface ID • Generation of the global address: concatenation of the prefix and the unique interface ID

  10. Mobile IPv6 RFC 3775

  11. Why ? • Use the same IPv6 address wherever you are located • Make changes of mediums transparent for transport layers • Keep connections alive while moving ➡ use a laptop/PDA the same way that you do with your cell-phone today

  12. Challenges • The routing is geographical, and the IP address have a double functionality: ✓ Identifier : identify the machine ✓ Locator: geographical position in the network • Architectural constraints: • Compatible with actual end nodes • Not modifying the actual routing system ➡ MIPv6 is only implemented in end points

  13. How ? • The protocol is integrated into the IPv6 stack • Separate identifier and locator functions using two IPv6 addresses: • HoA (Home Address) • CoA (Care of Address) • Three new entities: • Mobile Node , reachable at its HoA, not matter its CoA • Home Agent , binds the HoA and current CoA • Correspondent Node

  14. Behavior ? HoA: permanent address of the MN (identifier ) CoA: address of the MN in the visiting network (locator )

  15. In Details

  16. New Extensions • Allow packets to pass ingress filtering. IPv6 header always contains CoA, never HoA. • Maintain topological correctness • T ype 2 Routing Header • limited version of previously introduced T ype-0 Routing Header (but carries only a single address) • provides real destination address (HoA) of packets to MN • Home Address Option • provides real source address (HoA) of packets from MN

  17. T ype-2 Routing Header

  18. Home Address Option

  19. Triangular routing Provide an optimal routing

  20. Challenging Issues • Optimize MN/CN communications in a secure way • Ensure the relation between identifier and locator using the routing plane ✓ verify the MN is reachable at its HoA and CoA ➡ generate a key to sign the Binding Update sent to the CN

  21. Return Routability Procedure HoT: Home of Test CoT: Care of Test

  22. RRP in a nutshell • Goal: avoid triangular routing • Hypothesis: no trust relationship between MN/CN • Lack: provides no data integrity/confidentiality ➡ Efficiency/Security tradeoff

  23. Security & Mobile IPv6

  24. Possible T argets Protecting network infrastructure • Stateless behavior, Careful design ➡ Protecting communications between MN/HA (signaling and data) • IPsec ➡ Protecting direct communications between MN/CN (signaling and • data) Return Routability Procedure ➡ Signalisation MN <-> HA • 1. Tunnel MN<-> Signalisation MN <-> CN • 2. Trafic de données MN <-> CN Return Routability Procedure ➡

  25. Protecting the infrastructure

  26. Challenges and solutions • Advice: “Do no harm to the existing Internet” • Prevent spoofing • proof of HoA ownership • specific extensions: HAO and T ype-2 Routing Header • Prevent DoS • against infrastructure: “One message received, one sent” 4. against CN: stateless exchanges

  27. MN/CN Communications

  28. Return Routability Procedure • HoT/HoTI, CoT/CoTI and BU/BACK exchanges • CN : verify that the MN is able to receive/emit traffic with both its HoA and its CoA • MN : generate a key to sign BU emitted towards the CN • Possible problems (MiTM, eavesdropping) • attacker on the home network; • attacker on the foreign network; 5. attacker on both networks

  29. MN/HA Communications

  30. IPsec • Rationale for IPsec • Mandatory in IPv6 stacks • End-to-End communications • What must be protected • Signaling messages (i.e. BU et BACK) • Data traffic (i.e. MN/HA tunnel) • Return Routability Procedure (i.e. HoTI/HoT) ➡ Problems related to MIPv6/IPsec/IKE interactions

  31. Signaling traffic

  32. Basics BU BACK SA1 SA2 SA1: BU from HoA to HA@ => ESP in transport mode SA2: BACK from HA@ to HoA=> ESP in transport mode

  33. IPsec/MIPv6 Coordination • Binding Update: • Emission: IPsec protection, switch of CoA and HoA thanks to the HAO option • Reception : addresses switch before IPsec processing • Binding Acknowledgment: same kind of processing applied to T ype-2 Routing Header

  34. Bootstrapping • Setup of SA must be performed before sending BU/BACK • In Static Keying, no problem • In dynamic Keying, someone must direct IKE daemon to use CoA for negotiation of SA associated to the HoA. HoA is not already usable. • PF_KEY SADB_X_EXT_PACKET extension: • includes BU packet that triggered the negotiation • provides the CoA to IKE daemon

  35. Data traffic

  36. T unnel Mode SA Migration • Initially, SP/SA in tunnel mode use the MN’s HoA (CoA is not known at setup time). • An automatic update of SA tunnel’s endpoints is performed on MN/HA • MIPv6 stack emits a PF_KEY MIGRATE message when MN sends the BU, and when HA receives it • Message reception triggers: • SP/SA update by kernel • [ IKE daemon internal structures update ]

  37. IKE IKE Daemon Daemon Mobile Mobile 1. PF_KEY MIGRATE 4. SPD & SAD Update IPv6 IPv6 Userland PF_KEY Socket Kernel 2. SPD Update 3. SAD Update SPD SAD SPD SAD

  38. Conclusion

  39. Conclusion • Separation between identifier and locator is compatible with today’s Internet • End of “ perimetric security” ? • Built-in security mechanisms: IPsec and RRP

  40. Possible deployments Classic RRP Future ?! ?

  41. Future work • Leveraging IPsec protection to MN/MN traffic • New prerequisites: trust relationship between MN/MN (ex: PKI environment) 3. IKEv2 integration

  42. Demonstration

  43. 2001:db8:0:1::/64 CN Stream to HoA Soekris 1 2 3 4 5 Stream to HoA MN 2001:db8:0:ccc::/64

  44. 2001:db8:0:1::/64 CN Stream to HoA Soekris 1 2 3 4 5 Stream to HoA MN 2001:db8:0:ccc0::/64 IPsec

  45. 2001:db8:0:1::/64 2001:db8:0:ccc1::/64 CN Stream MN to HoA Stream to HoA Soekris 1 2 3 4 5 IPsec

  46. Questions ? Coffee ?

  47. NEMO Mobile Router A whole network moves.

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend