[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

draft-massar-v6ops-ayiya-00



Hi,

I am resending this on request also to the multi6 wg after it was
brought to my attention that this protocol could also be used for
solving parts of the multihoming riddle. The below part which was sent to
the v6ops group still mentions that it is primarly meant for targetting
Tunnel Brokers who want to provide tunnels even behind NAT's but as the
protocol is quite generic it can also be used in the scenario where one
tunnels a 'established' communication pair. The issue which this draft
does not handle is the negotiation of the identity type, content and
the hashing method used. But that is up to another draft ;)

-----

For the folks that don't follow the i-d-announce@ietf list, below is the
announcement and I like to receive comments, especially about:

 - should the header allow for multiple signature/identity types
     (and thus lengths) like the current proposal.
 - or should these be fixed.
 - formatting/language use (send those to me directly though)
     a number of them have already been pointed out to me by Christian Strauff.

I was already pointed out by some quick folks that the use of 'identity'
wasn't entirely clear. The identity field 'identifies' the host that is
sending the packets to the server side of the tunnel. This allows one
to distinguish between multiple hosts behind the same NAT and also
allows to be able to not know what the source of the packets would be.

The 'password' mentioned in some parts is actually a 'shared secret'.
It was  pointed out to me that passwords usually are crypted on the
remote host so can't be used for MD5-HMAC, thus  read 'shared secret'
there.

Apparently it wasn't clear why to send a hash of the complete packet
also from the draft: main reason is to be able to verify that the
identity sending this packet really is sending it and that it is
unaltered, if people want crypted packets do that in the payload or use
a different 'Next Header' which could include an additional small header
for specifying a crypto method, but that is out of scope for this
protocol.

To avoid the "AYIYA vs $name" discussions: it is a additional protocol
for Tunnel Broker setups to allow those to tunnel to endusers behind
NAT's.

Greets,
 Jeroen

-----Forwarded Message-----
From: Internet-Drafts@ietf.org
To: i-d-announce@ietf.org
Subject: I-D ACTION:draft-massar-v6ops-ayiya-00.txt
Date: Thu, 27 May 2004 15:40:05 -0400

A New Internet-Draft is available from the on-line Internet-Drafts directories.


	Title		: AYIYA: Anything In Anything
	Author(s)	: J. Massar
	Filename	: draft-massar-v6ops-ayiya-00.txt
	Pages		: 10
	Date		: 2004-5-27
	
This document defines a tunneling protocol that can be encapsulated
   in any other protocol. Using authentication tokens multiple tunnels
   can be created from behind the same NAT. The tokens allow one to
   identify the sender of the packet thus making it possible to
   automatically switch over the endpoint. This protocol is intended as
   an alternative to the proto-41 protocol in use for tunneling IPv6
   over IPv4 packets over the internet. Due to the authentication this
   protocol is especially useful for dynamic non-24/7 endnodes which are
   located	behind NATs and want to use for instance a IPv6 Tunnel
   Broker. The protocol can carry any payload and thus is not limited to
   only IPv6 over IPv4 but can also be used for IPv4 over IPv6 and many
   other combinations of protocols.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-massar-v6ops-ayiya-00.txt

Attachment: signature.asc
Description: This is a digitally signed message part