rand-task02.txt A. Azcorra UC3M January 29, 2002 Random generation of interface identifiers draft-soto-mobileip-random-iids-00.txt Status of this Memo

Similar documents
Network Working Group. Obsoletes: draft-ietf-dhc-new-opt-msg-00.txt June 2000 Expires December 2000

Network Working Group Request for Comments: Category: Experimental J. Postel ISI December 1998

Updates: 2710 September 2003 Category: Standards Track. Source Address Selection for the Multicast Listener Discovery (MLD) Protocol

Expires: February 25, 2004 August 27, Using the NETCONF Configuration Protocol over Secure Shell (SSH) draft-wasserman-netconf-over-ssh-00.

See Also: 1201 January 1999 Category: Standards Track

Using SRP for TLS Authentication

Request for Comments: 2464 Obsoletes: 1972 December 1998 Category: Standards Track. Transmission of IPv6 Packets over Ethernet Networks

Expiration Date: August 2003 February Access Control Prefix Router Advertisement Option for IPv6 draft-bellovin-ipv6-accessprefix-01.

Network Working Group Request for Comments: 2921 Category: Informational September 2000

Network Working Group. Category: Standards Track <draft-aboba-radius-iana-03.txt> 30 March 2003 Updates: RFC IANA Considerations for RADIUS

Request for Comments: 3306 Category: Standards Track Microsoft August 2002

Expires: October 9, 2005 April 7, 2005

Request for Comments: 3401 Updates: 2276 October 2002 Obsoletes: 2915, 2168 Category: Informational

E. Lewis ARIN September 23, KEY RR Secure Entry Point Flag draft-ietf-dnsext-keyrr-key-signing-flag-09. Status of this Memo

1. Introduction. Carpenter, Jung Expires June 1999 [Page 2] ^L. Internet Draft Transmission of IPv6 Packets over IPv4 Dec 1998

* Network Working Group. Expires: January 6, 2005 August A URN namespace for the Open Geospatial Consortium (OGC)

draft-ietf-sip-info-method-02.txt February 2000 The SIP INFO Method Status of this Memo

Network Working Group Request for Comments: IBM L. Masinter AT&T December 1999

Request for Comments: October Transmission of IPv6 Packets over IEEE 1394 Networks

Request for Comments: 2467 Obsoletes: 2019 December 1998 Category: Standards Track. Transmission of IPv6 Packets over FDDI Networks

Category: Standards Track Inria March Use of BGP-4 Multiprotocol Extensions for IPv6 Inter-Domain Routing

draft-ietf-magma-igmp-proxy-04.txt Brian Haberman, Caspian Networks Hal Sandick, Sheperd Middle School Expire: March, 2004 September, 2003

Request for Comments: 2711 Category: Standards Track BBN October 1999

This document is an Internet-Draft and is in full conformance with all provisions of Section 10 of RFC2026.

A QoS-Driven ISP Selection Mechanism for IPv6 Multi-Homed Sites

Network Working Group Request for Comments: Category: Best Current Practice January 2004

Category: Best Current Practice March 2000

IPv6 maintenance Working Group (6man) Updates: 3971, 4861 (if approved) January 12, 2012 Intended status: Standards Track Expires: July 15, 2012

Network Working Group Request for Comments: T. Yoshida Werk Mikro Systems July 2003

Obsoletes: RFC February LDAP: String Representation of Search Filters <draft-ietf-ldapbis-filter-02.txt> 1. Status of this Memo

Request for Comments: 2771 Category: Informational February An Abstract API for Multicast Address Allocation

Category: Informational November 2000

Network Working Group Internet-Draft January 25, 2006 Expires: July 29, Feed Rank draft-snell-atompub-feed-index-05.txt. Status of this Memo

INTERNET-DRAFT IP Version 6 over PPP February Table of Contents. 1. Introduction Specification of Requirements...

Expires: 20 May December 2000 Obsoletes: 1779, 2253

Network Working Group Request for Comments: Category: Standards Track A. B. Roach dynamicsoft June 2002

Network Working Group Request for Comments: Category: Standards Track April 2001

Obsoletes: RFC May The String Representation of LDAP Search Filters <draft-ietf-ldapbis-filter-01.txt> 1. Status of this Memo

Network Working Group Internet-Draft August 2005 Expires: February 2, Atom Link No Follow draft-snell-atompub-feed-nofollow-00.

Feb :33 draft-glenn-id-sensor-alert-mib-01.txt Page 1

IPv6 Changes in Mobile IPv6 from Connectathon

An Architecture for Network Layer Privacy

Network Working Group. November 1999

Handover Management for Mobile Nodes in IPv6 Networks

Network Working Group Request for Comments: 2236 Updates: 1112 November 1997 Category: Standards Track

Efficient Security for IPv6 Multihoming

draft-aoun-mgcp-nat-package-02.txt

Authentication, Authorization and Accounting Requirements for the Session Initiation Protocol

itself as a cost effective, reliable alternative. Using the current quasi-associated SS7 networks also decreases the number of hops between SP's and t

Network Working Group Request for Comments: DayDreamer March 1999

Internet Engineering Task Force (IETF) Category: Standards Track. J. Halpern Ericsson E. Levy-Abegnoli, Ed. Cisco February 2017

A MIPv6-based multi-homing solution

Mobile Networking. Universidad Carlos III, Departamento de Ingeniera Telematica Madrid, Spain

Category: Standards Track December 1998

Securing Route Optimisation in NEMO

Intended status: Informational. Intel Corporation P. Seite. France Telecom - Orange. February 14, 2013

Charles Perkins Nokia Research Center 2 July Mobility Support in IPv6 <draft-ietf-mobileip-ipv6-14.txt> Status of This Memo

Expires: 11 October April 2002

Network Working Group Request for Comments: 3446 Category: Informational H. Kilmer D. Farinacci Procket Networks January 2003

Expires in six months 24 October 2004 Obsoletes: RFC , , 3377, 3771

B. Carpenter. January Connection of IPv6 Domains via IPv4 Clouds without Explicit Tunnels. Copyright Notice

RFC 3173 IP Payload Compression Protocol September 2001

Network Working Group. Sun Microsystems October 2001

Network Working Group Internet-Draft August 2005 Expires: February 2, Atom Link No Follow draft-snell-atompub-feed-nofollow-03.

Network Working Group. Category: Standards Track September 2003

Request for Comments: 2536 Category: Standards Track March DSA KEYs and SIGs in the Domain Name System (DNS)

Network Working Group Request for Comments: December IPv6 Prefix Options for Dynamic Host Configuration Protocol (DHCP) version 6

Network Working Group. Expires: April 30, 2002 October 30, The Refer Method draft-ietf-sip-refer-02. Status of this Memo

Network Working Group Request for Comments: 3041 Category: Standards Track Microsoft Research January 2001

Intended Category: Standards Track Expires March 2006 September 2005

Network Working Group Request for Comments: October Ethernet Automatic Protection Switching (EAPS) Version 1

Network Working Group. Category: Standards Track. R. Hinden Nokia August 1999

Network Working Group. Category: Informational Tenet Technologies September 2002

Request for Comments: 2393 Category: Standards Track Hi/fn R. Pereira TimeStep M. Thomas AltaVista Internet December 1998

IPV6 MULTIHOMING SUPPORT IN THE MOBILE INTERNET

Network Working Group. Redback H. Smit. Procket Networks. October Domain-wide Prefix Distribution with Two-Level IS-IS

Network Working Group. Category: Informational January Unused Dynamic Host Configuration Protocol (DHCP) Option Codes

Request for Comments: 3172 BCP: 52 September 2001 Category: Best Current Practice

Network Working Group. Category: Standards Track ivmg V. Paxson ACIRI/ICSI E. Crabbe Exodus Communications June 2000

BGP-like TE Capabilities for SHIM6

Route Optimization based on ND-Proxy for Mobile Nodes in IPv6 Mobile Networks

Network Working Group Request for Comments: 2519 Category: Informational Juniper February A Framework for Inter-Domain Route Aggregation

Audio/Video Transport Working Group. Document: draft-miyazaki-avt-rtp-selret-01.txt. RTP Payload Format to Enable Multiple Selective Retransmissions

Request for Comments: Columbia U. November 2000

Network Working Group Request for Comments: 4242 Category: Standards Track University of Southampton B. Volz Cisco Systems, Inc.

Request for Comments: 3007 Updates: 2535, 2136 November 2000 Obsoletes: 2137 Category: Standards Track. Secure Domain Name System (DNS) Dynamic Update

Network Working Group. Category: Standards Track September Telnet Encryption: DES3 64 bit Cipher Feedback

End-site routing support for IPv6 multihoming1 *

Network Working Group Request for Comments: 3563 Category: Informational July 2003

XDI Requirements and Use Cases

Category: Informational 1 April 2001

Expires: August 2, 2003 February SIP Authenticated Identity Body (AIB) Format draft-ietf-sip-authid-body-01. Status of this Memo

Network Working Group Request for Comments: 3137 Category: Informational Cisco Systems A. Zinin Nexsi Systems D. McPherson Amber Networks June 2001

Transcoding Services Invocation in the Session Initiation Protocol

Request for Comments: 2537 Category: Standards Track March RSA/MD5 KEYs and SIGs in the Domain Name System (DNS)

Category: Standards Track Sun Microsystems Laboratories November 2000

IPv6 CONSORTIUM TEST SUITE Address Architecture Conformance Test Specification

Fast Location Opposite Update Scheme for Minimizing Handover Latency over Wireless/Mobile Networks

PMIPv6: A Network-Based Localized Mobility Management Solution

Distributed Mobility Management [dmm] Vasona Networks October 27, 2014

Transcription:

Network Working Group Internet-Draft Expires: July 30, 2002 M. Bagnulo I. Soto A. Garcia-Martinez A. Azcorra UC3M January 29, 2002 Status of this Memo Random generation of interface identifiers draft-soto-mobileip-random-iids-00.txt This document is an Internet-Draft and is in full conformance with all provisions of Section 10 of RFC2026. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet- Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http:// www.ietf.org/ietf/1id-abstracts.txt. The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html. This Internet-Draft will expire on July 30, 2002. Copyright Notice Copyright (C) The Internet Society (2002). All Rights Reserved. Abstract This document evaluates the use of random numbers to generate the interface identifier part of an IPv6 address on mobile environments, where Duplicate Address Detection (DAD) mechanisms are expensive. We have estimated the probability of having an address duplication using this mechanism and we conclude that the IPv6 addresses created in this way could be used without previously doing DAD to test the uniqueness of the address in a link. Bagnulo, et al. Expires July 30, 2002 [Page 1] 1. Introduction In the IPv6 aggregatable address format defined in [1], the last 64 bits are assigned to the interface identifier. According to [1], in many cases, a link-layer address is used to create the interface identifier part of the IPv6 address, although some other mechanisms are possible when there is no MAC address available. Because there are not guarantees of having a unique link local address, after configuring an interface with an IPv6 address, DAD mechanism must be Página 1

performed to ensure that the IPv6 address is unique in the link. RFC 2462 [2] states that "Duplicate Address Detection MUST take place on all unicast addresses, regardless of whether they are obtained through stateful, stateless or manual configuration". DAD is a time consuming process, that usually do not represent a problem for a desktop computer that is initialising. Mobility support in IPv6 networks will be provided by Mobile IPv6 [3]. Using this protocol, a Mobile Node (MN) that enters a subnet must configure an on-link address in that subnet (the Care-of Address, CoA) before being able to communicate. According to [2], before using the CoA, the MN must perform DAD for that address. But in this case, the time required for DAD is a critical matter because during this time the MN can not communicate and additionally, active communications of the MN are interrupted during this period. This is specially unsuitable for real-time communications. [3] recognizes this problem and states that a MN can decide not to perform DAD, being this is a trade-off between safety and the time needed for the DAD procedure. This document evaluates the use of random numbers to create the interface identifier of the IPv6 addresses, and assesses the risk of using these addresses without previously performing DAD. Using mechanisms such as fast handovers [4] it is possible to perform DAD in advance, before the MN arrives to the subnet. The Access Router (AR) in the subnet is instructed to perform DAD on behalf of the MN before it enters the subnet. But then, the MN has to wait for the time needed to perform DAD before it can accomplish the handover. This can be a problem in many situations in which the handover is required because the previous layer-2 connection is experimenting difficulties. So we will again benefit for avoiding the previous DAD procedure. Summarizing, for handover situations the importance of the time required for DAD can not be underestimated. In this document we study the possibility of using random generated interface identifiers to autoconfigure IPv6 addresses. We also reason that DAD can be performed after the node has joined the link because the probability that an address duplication happens is very low. Bagnulo, et al. Expires July 30, 2002 [Page 2] 2. Creation of interface identifiers. We will study the possibility that the interface identifiers are created randomly, meaning that the host will use a randomly generated 64 bit number as the interface identifier. Actually, only 62 bits of the interface identifier will be generated randomly since, as it is defined in [5], the u bit must be set to "local" and the g bit must be set to "individual". We will now evaluate the probability of collision of two or more randomly generated address identifiers. The problem: The Address identifiers I1, I2, I3,..., Ik are a sequence of 62 bit long random variables. Ii are randomly generated. We would like to obtain the probability that two or more Iis collide, i.e. Ii=Ij. This is a very well known mathematical problem that is called the "birthday problem". The solution is: I1,I2,...,Ik random variables, integer and with uniform distribution between 1 and n (k<=n) P(n,k)(at least one repeated)=1-(n!)/[(n-k)!.n^k] Página 2

(This result is explained in Appendix A) In our case n=2^62, so the calculation of n! may be more than what a simple calculator can handle. In order to overcome this, we will try to find an upper bound to P(n,k). P(n,k)= 1-(n!)/[(n-k)!.n^k] = 1-[(n).(n-1)...(n-k+1)/n^k] = 1-[(n/n).((n-1)/n)...((n-k+1)/n)] = 1-[ 1.(1-1/n)...(1-(k-1)/n)] It should be noted that: i/n =< (k-1)/n when i=1...k-1 then -i/n >= -(k-1)/n when i=1...k-1 then 1-i/n >= 1-(k-1)/n when i=1...k-1 then considering that k<n so that 1-i/n >0 when i=1...k-1 (1-1/n)(1-2/n)...(1-(k-1)/n)>=(1-(k-1)/n)^(k-1) then -(1-1/n)(1-2/n)...(1-(k-1)/n)=<-[(1-(k-1)/n)^(k-1)] Bagnulo, et al. Expires July 30, 2002 [Page 3] then 1-(1-1/n)(1-2/n)...(1-(k-1)/n)=<1-[(1-(k-1)/n)^(k-1)] then P(n,k)=< 1-[(1-(k-1)/n)^(k-1)] = 1-[(n-k+1)/n]^(k-1) then P(n,k)=< [n^(k-1)-(n-k+1)^(k-1)]/[n^(k-1)]=b n! is not present in this bound so B is easier to calculate. In order to quantify the result we will make a few calculations: Remembering that n is the number of possible addresses an k is the number of interfaces in the same link, we will evaluate the upper bound the following values of k P(2^62,20)=< 7.8 e-17 P(2^62,100)=< 2.1 e-15 P(2^62,500)=< 5.4 e-14 P(2^62,1000)=< 2.2 e-13 P(2^62,5000)=< 5.4 e-12 In order to fully understand the magnitude of the probabilities above, we could compare them with other probabilities. For instance, according to Table 1.1 of [6], the probability of being killed by a lightning (per day) is about 1.1 e-10. Then, a mobile phone user should be more worried about being killed by a lightning than to have an interface identifier repeated. We would also like to compare the probabilities above with some issues that affect communication in a similar fashion that address Página 3

collision such as the probability of failure of the network equipment. In case a network equipment fails, communication will be lost until it is replaced, having a similar effect to the one of having a repeated interface identifier. In order to quantify the probability of a network equipment failure, we will estimate it as: P(NE failure)=mttr/(mtbf+mttr) Being MTTR: Meat Time To Repair and MTBF: Mean Time Between Failures Network equipment can have an MTBF of 300,000 hours and let's suppose that some backup equipment is available and that MTTR is 0,1 hour (6 minutes). Bagnulo, et al. Expires July 30, 2002 [Page 4] So P(NE failure)= 3,3e-7. We can see that P(NE failure) is much more higher than P(n,k). Besides hardware malfunctioning, network connectivity can be affected by operation errors. Usually, this type of problems are much more frequent than hardware outages, but we do not have any hard data available. We think that it also interesting to estimate the probability of collision over a year of usage of the system. As we stated above, P(n,k) is the probability of a collision of two or more Interface identifiers when there are k interfaces in the same link. In order to quantify the probability of collision of a user during a year using the system, we will calculate the probability of one or more collision when a user joins m different networks. The probability of NOT having a collision is Pnot(n,k)=1-P(n,k) Then the probability of not having a collision after joining m different networks is Pnot(n,k,m)=[1-P(n,k)]^m. Then the probability of having a collision after joining m different networks is: P(n,k,m)=1-[[1-P(n,k)]^m] According to the bound found earlier: P(n,k)=<B Then -P(n,k)>=-B Then 1-P(n,k)>=1-B As P(n,k)and B are less than 1, (1-P(n,k))^m>=(1-B)^m Then 1-[(1-P(n,k))^m]=<1-[(1-B)^m] Then P(n,k,m)=<1-[(1-B)^m] If we consider m=50.000, this means about 140 handovers per day, P(2^62,500,50000)=< 2,7e-9 P(2^62,5000,50000)=< 2,7e-7 Página 4

Considering that each time there is a collision, there are two users affected (not considering collision of 3 or more for this estimation), this means that in the case users make 140 handovers per Bagnulo, et al. Expires July 30, 2002 [Page 5] day in networks containing 500 interfaces, there will be 6 users out of 1.000.000.000 that will have a problem with the communication during this year. In the case users make 140 handovers per day in networks containing 5000 interfaces, there will be 6 users out of 10.000.000 that will have a problem with the communication during this year. Bagnulo, et al. Expires July 30, 2002 [Page 6] 3. Random generation of Interface identifiers.. Página 5

Another relevant issue is how to generate a 62 bit long random number. In some cases, such as laptops, a random number generator can be available on the system, but in other cases, such as mobile phones, it may not. In such cases, it should be noted that because of the randomness of the identifier, it is not necessary to create the identifier in real time, i.e. when the node joins the network, but the identifier can be already created (such as the day of birth in the birthday problem). What is more, this random number can be pre-configured in the interface driver and the node can use always the same number without changing the probabilities calculations made above. This reduces the needed complexity in the nodes. Bagnulo, et al. Expires July 30, 2002 [Page 7] 4. Conclusions. In this draft, we have studied the possibility of using random generated numbers for the interface identifier part of the IPv6 addresses. We have also calculated the probability of address collision when interface identifiers are generated this way. After evaluating this probability in several different scenarios, we have found that collision probability with random generated Interface Identifiers is lower enough to consider this mechanism as a possible option. Considering that DAD mechanism is time consuming when time is critical i.e. mobile communications, we think random generation of Interface identifier part of IPv6 addresses is an attractive option because it can be used without previously doing DAD. Whether Página 6

DAD should be performed after or it can be avoided, needs further study. For now, we think that performing DAD after joining the link is needed. Bagnulo, et al. Expires July 30, 2002 [Page 8] 5. Security Considerations. This draft does no introduce new security risks. What's more, random generation of interface identifiers can enable improved anonymity features by allowing interface identifier generation each time a node joins a new link, what can prevents tracing. Página 7

Bagnulo, et al. Expires July 30, 2002 [Page 9] 6. Acknowledgments. This work has been done under IST projects LONG and Moby Dick Página 8

Bagnulo, et al. Expires July 30, 2002 [Page 10] 7. Appendix A: The Birthday Problem The problem: we want to calculate the probability that in a group of k people, al least two of them have the same birthday. We model the birthday as a integer random variable, with uniform distribution between 1 and 365 (we forget about the 29th of February, sorry about that :-( The solution: Let's find out the number N of ways that we can have k values with no duplicates. We can choose 365 values the first time, 364 the second time,... So, N=365*364*...*(365-k+1) If we remove the restriction that there are no duplicates, the number of possibilities is 365^k. So the probability of not having a collision is: Pnot= 365!/[(365-k)!*365^k Then the probability of having at least one duplicate is: P=1-Pnot=1-365!/[(365-k)!*365^k The general case it would be: P(n,k)= 1-n!/[(n-k)!*n^k with n>k Página 9

Bagnulo, et al. Expires July 30, 2002 [Page 11] References [1] Hinden, R., O Dell, M. and S. Deering, "An IPv6 Aggregatable Global Unicast Address Format", RFC 2374, July 1998. [2] Thomson, S. and T. Narten, "IPv6 Stateless Address Autoconfiguration", RFC 2462, December 1998. [3] Johnson, D. and C. Perkins, "Mobility Support in IPv6", Internet draft Work in progress, July 2001. [4] Dommety, G., "Fast Handovers for Mobile IPv6", Internet draft Work in progress, July 2001. [5] Hinden, R. and S. Deering, "IP Version 6 Addressing Architecture", RFC 1998, 1998. [6] Schneier, B., "Applied cryptography", Wiley ISBN 0-471-12845-7, 1996. Authors' Addresses Marcelo Bagnulo Universidad Carlos III de Madrid Av. Universidad 30 Leganes, Madrid 28911 SPAIN Phone: 34 91 6249500 EMail: marcelo@it.uc3m.es URI: http://www.it.uc3m.es Ignacio Soto Universidad Carlos III de Madrid Av. Universidad 30 Leganes, Madrid 28911 SPAIN Phone: 34 91 6249500 EMail: isoto@it.uc3m.es URI: http://www.it.uc3m.es Bagnulo, et al. Expires July 30, 2002 [Page 12] Alberto Garcia-Martinez Universidad Carlos III de Madrid Av. Universidad 30 Leganes, Madrid 28911 SPAIN Página 10

Phone: 34 91 6249500 EMail: alberto@it.uc3m.es URI: http://www.it.uc3m.es Arturo Azcorra Universidad Carlos III de Madrid Av. Universidad 30 Leganes, Madrid 28911 SPAIN Phone: 34 91 6249500 EMail: azcorra@it.uc3m.es URI: http://www.it.uc3m.es Bagnulo, et al. Expires July 30, 2002 [Page 13] Full Copyright Statement Copyright (C) The Internet Society (2002). All Rights Reserved. This document and translations of it may be copied and furnished to others, and derivative works that comment on or otherwise explain it or assist in its implementation may be prepared, copied, published and distributed, in whole or in part, without restriction of any kind, provided that the above copyright notice and this paragraph are included on all such copies and derivative works. However, this document itself may not be modified in any way, such as by removing the copyright notice or references to the Internet Society or other Internet organizations, except as needed for the purpose of developing Internet standards in which case the procedures for copyrights defined in the Internet Standards process must be followed, or as required to translate it into languages other than English. Página 11

The limited permissions granted above are perpetual and will not be revoked by the Internet Society or its successors or assigns. This document and the information contained herein is provided on an "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Acknowledgement Funding for the RFC Editor function is currently provided by the Internet Society. Bagnulo, et al. Expires July 30, 2002 [Page 14] Página 12