[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: NAT traversal and its relation to IPv6 [RE: Comments on draft -tsirtsis-dsmip-problem-01.txt]
to add to this conversation, tunnel broker with tsp does manage v*-in-v*
with security (aaa). if the outer v* address change (i.e. v4 address change
for v6 over v4 tunnels), then the tunnel is automatically re-established
with the broker: "mobility feature". the ipsec need can be handled on the
appropriate IP version.
Marc.
-- lundi, septembre 08, 2003 17:45:05 +0200 Francis Dupont
<Francis.Dupont@enst-bretagne.fr> wrote/a ecrit:
> In your previous mail you wrote:
>
>
> > No, I want Mobile IPv6 to not require its MN-HA tunnel to
> > be v6-in-v6
> > but to require it to be either v6-in-v6 or v6-in-v4.
> >
> > => you can't do that with Mobile IPv6 itself but it is still
> possible > to use an alternative, i.e., something which looks like
> Mobile IPv6 > but works for both IP versions. If you wouldn't like to
> get routing > optimization (something a bit hard in this case :-), I
> suggest the > "road warrior" IPsec VPN. But, even if RFC 2401 is
> clearly for any > combination of IP versions, I am afraid that the
> v6-in-v4 is rarely > supported...
>
> => Francis,
>
> The IPsec VPN "road warrior" scenario is only applicable
> to just those "road warriors".
>
> => I disagree, the only missing pieces are the v6-in-v4 support and
> a more friendly processing of handoffs.
>
> You can certainly extend MIPv6
> to _allow_ v6 in v4 tunnels, which is what Alex was asking.
>
> => no, this is not easy at all because MIPv6 doesn't use only tunnels.
> You have to introduce IPv4 Care-of addresses and this is a major change.
>
> I don't see why someone who wants seamless roaming and already
> has MIP is required to have another IPsec anchor
>
> => not another one, just rename the Home Agent into the Security Gateway.
> Note you already have some IPsec between the Mobile Node and its Home
> Agent.
>
> somewhere
> on the Internet. It's not what IPsec is used for and it doesn't
> need to be.
>
> => extra security should not be a problem. The IPsec protection of
> all packets through the MN-HA tunnel is already an option, and IMHO
> this will be a commonly used option because the initial/last wireless
> segment of the path is not known for its security.
>
> Regards
>
> Francis.Dupont@enst-bretagne.fr
>
> PS: note that I suggest IPsec as an example of alternatives. There are
> many other ways to manage v6-in-v* tunnels, IPsec is just the standard
> one when someone'd like extra security.
>
------------------------------------------
Marc Blanchet
Hexago
tel: +1-418-266-5533x225
------------------------------------------
http://www.freenet6.net: IPv6 connectivity
------------------------------------------