SLIDE 1 Mobile IPv6 Security
Arnaud Ebalard - EADS Corporate Research Center France Guillaume Valadon - The University of Tokyo / Laboratoire d’Informatique de Paris 6
SLIDE 2 Summary
- IPv6
- Mobile IPv6
- Security and Mobile IPv6
- Protections by default
2.IPsec
SLIDE 3
IPv6
SLIDE 4 Differences With IPv4
Functional changes:
- End-to-End communications
- ARP replacement uses ICMPv6
Structural changes:
- Fixed length header
- Fragmentation at the source; no checksum
6.Extensions/options through header
chaining
SLIDE 5
The IPv6 Header
SLIDE 6
Extensions
SLIDE 7
Routing Header
SLIDE 8 IPv6 Addresses
phical
- 64 bits prefix
- Interface ID
dynamically generated
SLIDE 9 Auto-configuration
- Mechanism based on ICMPv6
- Steps:
- Retrieval of the IPv6 prefix advertised by the access
router (RS/RA: Router Solicitation/Advertisement)
- Generation of an unique interface ID
- Generation of the global address: concatenation of the
prefix and the unique interface ID
SLIDE 10
Mobile IPv6
RFC 3775
SLIDE 11 Why ?
- Use the same IPv6 address wherever you
are located
- Make changes of mediums transparent for
transport layers
- Keep connections alive while moving
➡use a laptop/PDA the same way that you
do with your cell-phone today
SLIDE 12 Challenges
- The routing is geographical, and the IP
address have a double functionality:
✓ Identifier: identify the machine ✓ Locator: geographical position in the network
- Architectural constraints:
- Compatible with actual end nodes
- Not modifying the actual routing system
➡
MIPv6 is only implemented in end points
SLIDE 13 How ?
- The protocol is integrated into the IPv6 stack
- Separate identifier and locator functions
using two IPv6 addresses:
- HoA (Home Address)
- CoA (Care of Address)
- Three new entities:
- Mobile Node, reachable at its HoA, not matter its
CoA
- Home Agent, binds the HoA and current CoA
- Correspondent Node
SLIDE 14
Behavior
HoA: permanent address of the MN (identifier) CoA: address of the MN in the visiting network (locator)
?
SLIDE 15
In Details
SLIDE 16 New Extensions
- Allow packets to pass ingress filtering. IPv6 header
always contains CoA, never HoA.
- Maintain topological correctness
- T
ype 2 Routing Header
- limited version of previously introduced T
ype-0 Routing Header (but carries only a single address)
- provides real destination address (HoA) of packets to MN
- Home Address Option
- provides real source address (HoA) of packets from MN
SLIDE 17
SLIDE 18
T ype-2 Routing Header
SLIDE 19
Home Address Option
SLIDE 20
Triangular routing
Provide an optimal routing
SLIDE 21 Challenging Issues
- Optimize MN/CN communications in a
secure way
- Ensure the relation between identifier and
locator using the routing plane
✓ verify the MN is reachable at its HoA and CoA
➡generate a key to sign the Binding Update
sent to the CN
SLIDE 22 Return Routability Procedure
HoT: Home of Test CoT: Care of Test
SLIDE 23 RRP in a nutshell
- Goal: avoid triangular routing
- Hypothesis: no trust relationship between
MN/CN
integrity/confidentiality ➡ Efficiency/Security tradeoff
SLIDE 24
Security & Mobile IPv6
SLIDE 25 Possible T argets
- Protecting network infrastructure
➡
Stateless behavior, Careful design
- Protecting communications between MN/HA (signaling and data)
➡
IPsec
- Protecting direct communications between MN/CN (signaling and
data)
➡
Return Routability Procedure
1.Tunnel MN<->
2.Trafic de données MN <-> CN ➡
Return Routability Procedure
SLIDE 26
Protecting the infrastructure
SLIDE 27 Challenges and solutions
- Advice: “Do no harm to the existing
Internet”
- Prevent spoofing
- proof of HoA ownership
- specific extensions: HAO and T
ype-2 Routing Header
- Prevent DoS
- against infrastructure: “One message received,
- ne sent”
4.against CN: stateless exchanges
SLIDE 28
MN/CN Communications
SLIDE 29 Return Routability Procedure
- HoT/HoTI, CoT/CoTI and BU/BACK exchanges
- CN : verify that the MN is able to receive/emit
traffic with both its HoA and its CoA
- MN : generate a key to sign BU emitted
towards the CN
- Possible problems (MiTM, eavesdropping)
- attacker on the home network;
- attacker on the foreign network;
5.attacker on both networks
SLIDE 30
MN/HA Communications
SLIDE 31 IPsec
- Rationale for IPsec
- Mandatory in IPv6 stacks
- End-to-End communications
- What must be protected
- Signaling messages (i.e. BU et BACK)
- Data traffic (i.e. MN/HA tunnel)
- Return Routability Procedure (i.e. HoTI/HoT)
➡Problems related to MIPv6/IPsec/IKE
interactions
SLIDE 32
Signaling traffic
SLIDE 33 Basics
SA2 SA1 BU BACK SA1: BU from HoA to HA@ => ESP in transport mode SA2: BACK from HA@ to HoA=> ESP in transport mode
SLIDE 34 IPsec/MIPv6 Coordination
- Binding Update:
- Emission: IPsec protection, switch of CoA
and HoA thanks to the HAO option
- Reception : addresses switch before IPsec
processing
- Binding Acknowledgment: same kind of
processing applied to T ype-2 Routing Header
SLIDE 35
SLIDE 36 Bootstrapping
- Setup of SA must be performed before sending
BU/BACK
- In Static Keying, no problem
- In dynamic Keying, someone must direct IKE
daemon to use CoA for negotiation of SA associated to the HoA. HoA is not already usable.
- PF_KEY SADB_X_EXT_PACKET extension:
- includes BU packet that triggered the
negotiation
- provides the CoA to IKE daemon
SLIDE 37
Data traffic
SLIDE 38 T unnel Mode SA Migration
- Initially, SP/SA in tunnel mode use the MN’s HoA
(CoA is not known at setup time).
- An automatic update of SA tunnel’s endpoints is
performed on MN/HA
- MIPv6 stack emits a PF_KEY MIGRATE
message when MN sends the BU, and when HA receives it
- Message reception triggers:
- SP/SA update by kernel
- [ IKE daemon internal structures update ]
SLIDE 39
SLIDE 40 Mobile Mobile IPv6 IPv6 IKE IKE Daemon Daemon SPD SPD SAD SAD
PF_KEY Socket
Userland Kernel
- 1. PF_KEY MIGRATE
- 4. SPD & SAD Update
- 3. SAD Update
- 2. SPD Update
SLIDE 41
Conclusion
SLIDE 42
- Separation between identifier and
locator is compatible with today’s Internet
- End of “perimetric security” ?
- Built-in security mechanisms: IPsec
and RRP
Conclusion
SLIDE 43
Possible deployments
Classic RRP Future ?! ?
SLIDE 44 Future work
- Leveraging IPsec protection to
MN/MN traffic
- New prerequisites: trust relationship
between MN/MN (ex: PKI environment)
3.IKEv2 integration
SLIDE 45
Demonstration
SLIDE 46 MN CN 1 2 3 5 4
Stream to HoA Stream to HoA
Soekris
2001:db8:0:1::/64 2001:db8:0:ccc::/64
SLIDE 47 CN 1 2 3 5 4
Stream to HoA Stream to HoA
MN 2001:db8:0:1::/64 2001:db8:0:ccc0::/64 IPsec
Soekris
SLIDE 48 CN 1 2 3 5 4 MN 2001:db8:0:1::/64 2001:db8:0:ccc1::/64
Stream to HoA
IPsec
Soekris
Stream to HoA
SLIDE 49
Questions ? Coffee ?
SLIDE 50
NEMO
A whole network moves. Mobile Router