can use any of these identities among the criteria for the correspondent registration
decision.
Bob’s IP address must always be available to Alice to make communication
possible in the first place. It is not reliable information since address spoofing is
possible in the Internet. IP address based privacy policy is not flexible since Bob can
get the address dynamically from DHCP. Mobile Bob will allocate a transient care-of
address, which Alice definitely cannot use as an identity in the policy database.
Understandability of IPv6 addresses in the policy database is poor. The addresses are
expressed as hexadecimal number separated by colons, e.g.
ab16:32:48:64:80:96:112:128 [3]. Network administrators can work with these
addresses, but the common end-user configuring his personal preferences cannot.
Bob’s DNS name is often, but not always, available to Alice. If Bob typically uses
his terminal as a client only, e.g. for browsing web pages, there is no need for him to
have a DNS name. If he has DNS name and allocates IP address dynamically from
DHCP, the DNS address data must be updated accordingly. Attacks against the DNS
servers and caches are possible in the Internet. Consequently, the data cannot be
considered reliable. Flexible policies would be possible if the DNS updates became
common, frequent and reliable enough. Understandable policies are the benefit of
DNS names when compared with plain IPv6 addresses.
Bob’s E-mail or SIP username is the most compelling alternative. The username
can be made available to Alice with certificates in the IKEv2 initial exchanges. E-
mail address is a standard subject name in [8]. The names are reliable since the
trusted Certification Authority (CA) has signed them. Flexible and understandable
policies are also supported. The username identifies a person and organization
instead of a network interface, which is the scope of an IP address. After all, we want
to authorize or deny the location information to humans and organizations, not to
communication endpoints in the connectivity domain.
The example below shows a policy database Alice might have. The order of the
rules is significant – the first matching name triggers the action:
1. Allow BU to <bob@isp.com> (trust Bob, send BU),
2. Deny BU to <eve@mywork.net> (don’t reveal location to Bob’s ex-wife, no BU),
3. Query BU to <*@mywork.com> (conditionally trust everyone in the company)
4. Deny BU to <*> (default rule, do not trust strangers)
Rule 3, in the above example, may trigger a prompt for end-user decision. Since
the authenticated identity is in user-friendly format, the end user shall be capable of
making a decision. Based on the end-user’s decisions, the policy database may be
dynamically updated with new entries.
The IP address, DNS name and username analysis above shows the strength of
using symbolic names in defining the BU policy rather than plain IP addresses.
However, DNS as a technology is not applicable due availability and reliability
reasons. It would also bundle the otherwise independent Mobile IPv6 architecture to
DNS in an undesirable way.
Both IP address and DNS name based identities rely on the consistent data and
configuration in the network. In our proposal an actual IKEv2 challenge – response
authentication protocol is run between the endpoints. This is in line with the Internet
end-to-end model where the network is not trusted.
39