draft-ietf-hip-rfc4423-bis-13.txt | draft-ietf-hip-rfc4423-bis-14.txt | |||
---|---|---|---|---|
Network Working Group R. Moskowitz, Ed. | Network Working Group R. Moskowitz, Ed. | |||
Internet-Draft HTT Consulting | Internet-Draft HTT Consulting | |||
Obsoletes: 4423 (if approved) M. Komu | Obsoletes: 4423 (if approved) M. Komu | |||
Intended status: Informational Ericsson | Intended status: Informational Ericsson | |||
Expires: June 16, 2016 December 14, 2015 | Expires: December 9, 2016 June 7, 2016 | |||
Host Identity Protocol Architecture | Host Identity Protocol Architecture | |||
draft-ietf-hip-rfc4423-bis-13 | draft-ietf-hip-rfc4423-bis-14 | |||
Abstract | Abstract | |||
This memo describes a new namespace, the Host Identity namespace, and | This memo describes a new namespace, the Host Identity namespace, and | |||
a new protocol layer, the Host Identity Protocol, between the | a new protocol layer, the Host Identity Protocol, between the | |||
internetworking and transport layers. Herein are presented the | internetworking and transport layers. Herein are presented the | |||
basics of the current namespaces, their strengths and weaknesses, and | basics of the current namespaces, their strengths and weaknesses, and | |||
how a new namespace will add completeness to them. The roles of this | how a new namespace will add completeness to them. The roles of this | |||
new namespace in the protocols are defined. | new namespace in the protocols are defined. | |||
skipping to change at page 1, line 41 ¶ | skipping to change at page 1, line 41 ¶ | |||
Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
Drafts is at http://datatracker.ietf.org/drafts/current/. | Drafts is at http://datatracker.ietf.org/drafts/current/. | |||
Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
This Internet-Draft will expire on June 16, 2016. | This Internet-Draft will expire on December 9, 2016. | |||
Copyright Notice | Copyright Notice | |||
Copyright (c) 2015 IETF Trust and the persons identified as the | Copyright (c) 2016 IETF Trust and the persons identified as the | |||
document authors. All rights reserved. | document authors. All rights reserved. | |||
This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
(http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
publication of this document. Please review these documents | publication of this document. Please review these documents | |||
carefully, as they describe your rights and restrictions with respect | carefully, as they describe your rights and restrictions with respect | |||
to this document. Code Components extracted from this document must | to this document. Code Components extracted from this document must | |||
include Simplified BSD License text as described in Section 4.e of | include Simplified BSD License text as described in Section 4.e of | |||
the Trust Legal Provisions and are provided without warranty as | the Trust Legal Provisions and are provided without warranty as | |||
skipping to change at page 32, line 30 ¶ | skipping to change at page 32, line 30 ¶ | |||
802.15.4 and MAC security, deployment considerations and description | 802.15.4 and MAC security, deployment considerations and description | |||
of the base exchange. | of the base exchange. | |||
16. References | 16. References | |||
16.1. Normative References | 16.1. Normative References | |||
[I-D.ietf-hip-multihoming] | [I-D.ietf-hip-multihoming] | |||
Henderson, T., Vogt, C., and J. Arkko, "Host Multihoming | Henderson, T., Vogt, C., and J. Arkko, "Host Multihoming | |||
with the Host Identity Protocol", draft-ietf-hip- | with the Host Identity Protocol", draft-ietf-hip- | |||
multihoming-05 (work in progress), January 2015. | multihoming-09 (work in progress), May 2016. | |||
[I-D.ietf-hip-native-nat-traversal] | [I-D.ietf-hip-native-nat-traversal] | |||
Keranen, A. and J. Melen, "Native NAT Traversal Mode for | Keranen, A. and J. Melen, "Native NAT Traversal Mode for | |||
the Host Identity Protocol", draft-ietf-hip-native-nat- | the Host Identity Protocol", draft-ietf-hip-native-nat- | |||
traversal-08 (work in progress), January 2015. | traversal-10 (work in progress), January 2016. | |||
[I-D.ietf-hip-rfc5203-bis] | [I-D.ietf-hip-rfc5203-bis] | |||
Laganier, J. and L. Eggert, "Host Identity Protocol (HIP) | Laganier, J. and L. Eggert, "Host Identity Protocol (HIP) | |||
Registration Extension", draft-ietf-hip-rfc5203-bis-06 | Registration Extension", draft-ietf-hip-rfc5203-bis-10 | |||
(work in progress), September 2014. | (work in progress), January 2016. | |||
[I-D.ietf-hip-rfc5204-bis] | [I-D.ietf-hip-rfc5204-bis] | |||
Laganier, J. and L. Eggert, "Host Identity Protocol (HIP) | Laganier, J. and L. Eggert, "Host Identity Protocol (HIP) | |||
Rendezvous Extension", draft-ietf-hip-rfc5204-bis-04 (work | Rendezvous Extension", draft-ietf-hip-rfc5204-bis-07 (work | |||
in progress), June 2014. | in progress), December 2015. | |||
[I-D.ietf-hip-rfc5205-bis] | [I-D.ietf-hip-rfc5205-bis] | |||
Laganier, J., "Host Identity Protocol (HIP) Domain Name | Laganier, J., "Host Identity Protocol (HIP) Domain Name | |||
System (DNS) Extension", draft-ietf-hip-rfc5205-bis-05 | System (DNS) Extension", draft-ietf-hip-rfc5205-bis-09 | |||
(work in progress), July 2014. | (work in progress), January 2016. | |||
[I-D.ietf-hip-rfc5206-bis] | [I-D.ietf-hip-rfc5206-bis] | |||
Henderson, T., Vogt, C., and J. Arkko, "Host Mobility with | Henderson, T., Vogt, C., and J. Arkko, "Host Mobility with | |||
the Host Identity Protocol", draft-ietf-hip-rfc5206-bis-06 | the Host Identity Protocol", draft-ietf-hip-rfc5206-bis-12 | |||
(work in progress), July 2013. | (work in progress), May 2016. | |||
[I-D.ietf-hip-rfc6253-bis] | [I-D.ietf-hip-rfc6253-bis] | |||
Heer, T. and S. Varjonen, "Host Identity Protocol | Heer, T. and S. Varjonen, "Host Identity Protocol | |||
Certificates", draft-ietf-hip-rfc6253-bis-01 (work in | Certificates", draft-ietf-hip-rfc6253-bis-08 (work in | |||
progress), October 2013. | progress), April 2016. | |||
[RFC5482] Eggert, L. and F. Gont, "TCP User Timeout Option", RFC | [RFC5482] Eggert, L. and F. Gont, "TCP User Timeout Option", RFC | |||
5482, March 2009. | 5482, DOI 10.17487/RFC5482, March 2009, | |||
<http://www.rfc-editor.org/info/rfc5482>. | ||||
[RFC7343] Laganier, J. and F. Dupont, "An IPv6 Prefix for Overlay | [RFC7343] Laganier, J. and F. Dupont, "An IPv6 Prefix for Overlay | |||
Routable Cryptographic Hash Identifiers Version 2 | Routable Cryptographic Hash Identifiers Version 2 | |||
(ORCHIDv2)", RFC 7343, September 2014. | (ORCHIDv2)", RFC 7343, DOI 10.17487/RFC7343, September | |||
2014, <http://www.rfc-editor.org/info/rfc7343>. | ||||
[RFC7401] Moskowitz, R., Heer, T., Jokela, P., and T. Henderson, | [RFC7401] Moskowitz, R., Ed., Heer, T., Jokela, P., and T. | |||
"Host Identity Protocol Version 2 (HIPv2)", RFC 7401, | Henderson, "Host Identity Protocol Version 2 (HIPv2)", RFC | |||
April 2015. | 7401, DOI 10.17487/RFC7401, April 2015, | |||
<http://www.rfc-editor.org/info/rfc7401>. | ||||
[RFC7402] Jokela, P., Moskowitz, R., and J. Melen, "Using the | [RFC7402] Jokela, P., Moskowitz, R., and J. Melen, "Using the | |||
Encapsulating Security Payload (ESP) Transport Format with | Encapsulating Security Payload (ESP) Transport Format with | |||
the Host Identity Protocol (HIP)", RFC 7402, April 2015. | the Host Identity Protocol (HIP)", RFC 7402, DOI 10.17487/ | |||
RFC7402, April 2015, | ||||
<http://www.rfc-editor.org/info/rfc7402>. | ||||
16.2. Informative references | 16.2. Informative references | |||
[IEEE.802-15-4.2011] | [IEEE.802-15-4.2011] | |||
, "Information technology - Telecommunications and | , "Information technology - Telecommunications and | |||
information exchange between systems - Local and | information exchange between systems - Local and | |||
metropolitan area networks - Specific requirements - Part | metropolitan area networks - Specific requirements - Part | |||
15.4: Wireless Medium Access Control (MAC) and Physical | 15.4: Wireless Medium Access Control (MAC) and Physical | |||
Layer (PHY) Specifications for Low-Rate Wireless Personal | Layer (PHY) Specifications for Low-Rate Wireless Personal | |||
Area Networks (WPANs)", IEEE Standard 802.15.4, September | Area Networks (WPANs)", IEEE Standard 802.15.4, September | |||
2011, <http://standards.ieee.org/getieee802/download/ | 2011, <http://standards.ieee.org/getieee802/download/ | |||
802.15.4-2011.pdf>. | 802.15.4-2011.pdf>. | |||
[Nik2001] Nikander, P., "Denial-of-Service, Address Ownership, and | [Nik2001] Nikander, P., "Denial-of-Service, Address Ownership, and | |||
Early Authentication in the IPv6 World", in Proceesings of | Early Authentication in the IPv6 World", in Proceesings of | |||
Security Protocols, 9th International Workshop, Cambridge, | Security Protocols, 9th International Workshop, Cambridge, | |||
UK, April 25-27 2001, LNCS 2467, pp. 12-26, Springer, | UK, April 25-27 2001, LNCS 2467, pp. 12-26, Springer, | |||
2002. | 2002. | |||
[RFC2136] Vixie, P., Thomson, S., Rekhter, Y., and J. Bound, | [RFC2136] Vixie, P., Ed., Thomson, S., Rekhter, Y., and J. Bound, | |||
"Dynamic Updates in the Domain Name System (DNS UPDATE)", | "Dynamic Updates in the Domain Name System (DNS UPDATE)", | |||
RFC 2136, April 1997. | RFC 2136, DOI 10.17487/RFC2136, April 1997, | |||
<http://www.rfc-editor.org/info/rfc2136>. | ||||
[RFC2535] Eastlake, D., "Domain Name System Security Extensions", | [RFC2535] Eastlake 3rd, D., "Domain Name System Security | |||
RFC 2535, March 1999. | Extensions", RFC 2535, DOI 10.17487/RFC2535, March 1999, | |||
<http://www.rfc-editor.org/info/rfc2535>. | ||||
[RFC2766] Tsirtsis, G. and P. Srisuresh, "Network Address | [RFC2766] Tsirtsis, G. and P. Srisuresh, "Network Address | |||
Translation - Protocol Translation (NAT-PT)", RFC 2766, | Translation - Protocol Translation (NAT-PT)", RFC 2766, | |||
February 2000. | DOI 10.17487/RFC2766, February 2000, | |||
<http://www.rfc-editor.org/info/rfc2766>. | ||||
[RFC3022] Srisuresh, P. and K. Egevang, "Traditional IP Network | [RFC3022] Srisuresh, P. and K. Egevang, "Traditional IP Network | |||
Address Translator (Traditional NAT)", RFC 3022, January | Address Translator (Traditional NAT)", RFC 3022, DOI | |||
2001. | 10.17487/RFC3022, January 2001, | |||
<http://www.rfc-editor.org/info/rfc3022>. | ||||
[RFC3102] Borella, M., Lo, J., Grabelsky, D., and G. Montenegro, | [RFC3102] Borella, M., Lo, J., Grabelsky, D., and G. Montenegro, | |||
"Realm Specific IP: Framework", RFC 3102, October 2001. | "Realm Specific IP: Framework", RFC 3102, DOI 10.17487/ | |||
RFC3102, October 2001, | ||||
<http://www.rfc-editor.org/info/rfc3102>. | ||||
[RFC3748] Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., and H. | [RFC3748] Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., and H. | |||
Levkowetz, "Extensible Authentication Protocol (EAP)", RFC | Levkowetz, Ed., "Extensible Authentication Protocol | |||
3748, June 2004. | (EAP)", RFC 3748, DOI 10.17487/RFC3748, June 2004, | |||
<http://www.rfc-editor.org/info/rfc3748>. | ||||
[RFC4225] Nikander, P., Arkko, J., Aura, T., Montenegro, G., and E. | [RFC4225] Nikander, P., Arkko, J., Aura, T., Montenegro, G., and E. | |||
Nordmark, "Mobile IP Version 6 Route Optimization Security | Nordmark, "Mobile IP Version 6 Route Optimization Security | |||
Design Background", RFC 4225, December 2005. | Design Background", RFC 4225, DOI 10.17487/RFC4225, | |||
December 2005, <http://www.rfc-editor.org/info/rfc4225>. | ||||
[RFC4306] Kaufman, C., "Internet Key Exchange (IKEv2) Protocol", RFC | [RFC4306] Kaufman, C., Ed., "Internet Key Exchange (IKEv2) | |||
4306, December 2005. | Protocol", RFC 4306, DOI 10.17487/RFC4306, December 2005, | |||
<http://www.rfc-editor.org/info/rfc4306>. | ||||
[RFC4423] Moskowitz, R. and P. Nikander, "Host Identity Protocol | [RFC4423] Moskowitz, R. and P. Nikander, "Host Identity Protocol | |||
(HIP) Architecture", RFC 4423, May 2006. | (HIP) Architecture", RFC 4423, DOI 10.17487/RFC4423, May | |||
2006, <http://www.rfc-editor.org/info/rfc4423>. | ||||
[RFC5218] Thaler, D. and B. Aboba, "What Makes For a Successful | [RFC5218] Thaler, D. and B. Aboba, "What Makes For a Successful | |||
Protocol?", RFC 5218, July 2008. | Protocol?", RFC 5218, DOI 10.17487/RFC5218, July 2008, | |||
<http://www.rfc-editor.org/info/rfc5218>. | ||||
[RFC5338] Henderson, T., Nikander, P., and M. Komu, "Using the Host | [RFC5338] Henderson, T., Nikander, P., and M. Komu, "Using the Host | |||
Identity Protocol with Legacy Applications", RFC 5338, | Identity Protocol with Legacy Applications", RFC 5338, DOI | |||
September 2008. | 10.17487/RFC5338, September 2008, | |||
<http://www.rfc-editor.org/info/rfc5338>. | ||||
[RFC5887] Carpenter, B., Atkinson, R., and H. Flinck, "Renumbering | [RFC5887] Carpenter, B., Atkinson, R., and H. Flinck, "Renumbering | |||
Still Needs Work", RFC 5887, May 2010. | Still Needs Work", RFC 5887, DOI 10.17487/RFC5887, May | |||
2010, <http://www.rfc-editor.org/info/rfc5887>. | ||||
[RFC6078] Camarillo, G. and J. Melen, "Host Identity Protocol (HIP) | [RFC6078] Camarillo, G. and J. Melen, "Host Identity Protocol (HIP) | |||
Immediate Carriage and Conveyance of Upper-Layer Protocol | Immediate Carriage and Conveyance of Upper-Layer Protocol | |||
Signaling (HICCUPS)", RFC 6078, January 2011. | Signaling (HICCUPS)", RFC 6078, DOI 10.17487/RFC6078, | |||
January 2011, <http://www.rfc-editor.org/info/rfc6078>. | ||||
[RFC6250] Thaler, D., "Evolution of the IP Model", RFC 6250, May | [RFC6250] Thaler, D., "Evolution of the IP Model", RFC 6250, DOI | |||
2011. | 10.17487/RFC6250, May 2011, | |||
<http://www.rfc-editor.org/info/rfc6250>. | ||||
[RFC6281] Cheshire, S., Zhu, Z., Wakikawa, R., and L. Zhang, | [RFC6281] Cheshire, S., Zhu, Z., Wakikawa, R., and L. Zhang, | |||
"Understanding Apple's Back to My Mac (BTMM) Service", RFC | "Understanding Apple's Back to My Mac (BTMM) Service", RFC | |||
6281, June 2011. | 6281, DOI 10.17487/RFC6281, June 2011, | |||
<http://www.rfc-editor.org/info/rfc6281>. | ||||
[RFC6317] Komu, M. and T. Henderson, "Basic Socket Interface | [RFC6317] Komu, M. and T. Henderson, "Basic Socket Interface | |||
Extensions for the Host Identity Protocol (HIP)", RFC | Extensions for the Host Identity Protocol (HIP)", RFC | |||
6317, July 2011. | 6317, DOI 10.17487/RFC6317, July 2011, | |||
<http://www.rfc-editor.org/info/rfc6317>. | ||||
[RFC6537] Ahrenholz, J., "Host Identity Protocol Distributed Hash | [RFC6537] Ahrenholz, J., "Host Identity Protocol Distributed Hash | |||
Table Interface", RFC 6537, February 2012. | Table Interface", RFC 6537, DOI 10.17487/RFC6537, February | |||
2012, <http://www.rfc-editor.org/info/rfc6537>. | ||||
[RFC6538] Henderson, T. and A. Gurtov, "The Host Identity Protocol | [RFC6538] Henderson, T. and A. Gurtov, "The Host Identity Protocol | |||
(HIP) Experiment Report", RFC 6538, March 2012. | (HIP) Experiment Report", RFC 6538, DOI 10.17487/RFC6538, | |||
March 2012, <http://www.rfc-editor.org/info/rfc6538>. | ||||
[amir-hip] | [amir-hip] | |||
Amir, K., Forsgren, H., Grahn, K., Karvi, T., and G. | Amir, K., Forsgren, H., Grahn, K., Karvi, T., and G. | |||
Pulkkis, "Security and Trust of Public Key Cryptography | Pulkkis, "Security and Trust of Public Key Cryptography | |||
for HIP and HIP Multicast", International Journal of | for HIP and HIP Multicast", International Journal of | |||
Dependable and Trustworthy Information Systems (IJDTIS), | Dependable and Trustworthy Information Systems (IJDTIS), | |||
2(3), 17-35, DOI: 10.4018/jdtis.2011070102, 2013. | 2(3), 17-35, DOI: 10.4018/jdtis.2011070102, 2013. | |||
[aura-dos] | [aura-dos] | |||
Aura, T., Nikander, P., and J. Leiwo, "DOS-resistant | Aura, T., Nikander, P., and J. Leiwo, "DOS-resistant | |||
End of changes. 34 change blocks. | ||||
47 lines changed or deleted | 71 lines changed or added | |||
This html diff was produced by rfcdiff 1.45. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ |