MOBILE IP: SECURITY & APPLICATION Gloria Tuquerres, Marcos Rogério Salvador and Ron Sprenkels s: {tuquerre, salvador,

Similar documents
Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

Protocol Security Where?

21.4 Network Address Translation (NAT) NAT concept

CSCI 454/554 Computer and Network Security. Topic 8.1 IPsec

Introduction to Security and PIX Firewall

MPLS VPN in Cellular Mobile IPv6 Architectures(04##017)

IPsec Details 1 / 43. IPsec Details

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

Security issues with Mobile IP

Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

Chapter 9. IP Secure

Securing IP Networks with Implementation of IPv6

Security vulnerabilities in the Internet and possible solutions

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

Network Security Part II: Standards

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

IPv6 Security: How is the Client Secured?

Chapter 10. Network Security

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

IP Security. Ola Flygt Växjö University, Sweden

Network Security. Lecture 3

VPN. Date: 4/15/2004 By: Heena Patel

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Ethernet. Ethernet. Network Devices

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

IP SECURITY (IPSEC) PROTOCOLS

Chapter 7 Transport-Level Security

Security Engineering Part III Network Security. Security Protocols (II): IPsec

Mobile IP Part I: IPv4

Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku

Firewalls, Tunnels, and Network Intrusion Detection

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Securing VoIP Networks using graded Protection Levels

Internet Protocol Security IPSec

Lecture 17 - Network Security

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Tomás P. de Miguel DIT-UPM. dit UPM

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT

Network Access Security. Lesson 10

Secure Sockets Layer

SecureCom Mobile s mission is to help people keep their private communication private.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Mobile Routing. When a host moves, its point of attachment in the network changes. This is called a handoff.

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts

Chapter 32 Internet Security

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

I. What is VPN? II. Types of VPN connection. There are two types of VPN connection:

Using IPSec in Windows 2000 and XP, Part 2

Lecture 10: Communications Security

Mobile IP and Wireless Application Protocol

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

Branch Office VPN Tunnels and Mobile VPN

CCNA Security 1.1 Instructional Resource

Site to Site Virtual Private Networks (VPNs):

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

SSL A discussion of the Secure Socket Layer

Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999

Computer Networks - CS132/EECS148 - Spring

Cornerstones of Security

Computer Networks. Secure Systems

3GPP TSG SA WG3 Security S Meeting S3#16 Sophia Antipolis, November, Abstract

Overview. Protocols. VPN and Firewalls

CS 4803 Computer and Network Security

Threats and Security Analysis for Enhanced Secure Neighbor Discovery Protocol (SEND) of IPv6 NDP Security

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Examining Proxies to Mitigate Pervasive Surveillance

Securing an IP SAN. Application Brief

Network Security. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT)

Topics in Network Security

Client Server Registration Protocol

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols ETSF10 Internet Protocols 2011

VPN. VPN For BIPAC 741/743GE

Best Practices for SIP Security

(Refer Slide Time: 01:38 01:37)

Internet Security Architecture

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Laboratory Exercises V: IP Security Protocol (IPSec)

Networking Test 4 Study Guide

Wireless Networks: Network Protocols/Mobile IP

Case Study for Layer 3 Authentication and Encryption

Implementing and Managing Security for Network Communications

Multimedia Communication in the Internet. SIP: Advanced Topics. Dorgham Sisalem, Sven Ehlert Mobile Integrated Services FhG FOKUS

The BANDIT Products in Virtual Private Networks

Bit Chat: A Peer-to-Peer Instant Messenger

Mobility on IPv6 Networks

Network Security. by David G. Messerschmitt. Secure and Insecure Authentication. Security Flaws in Public Servers. Firewalls and Packet Filtering

IP and Mobility. Requirements to a Mobile IP. Terminology in Mobile IP

Measurement of the Usage of Several Secure Internet Protocols from Internet Traces

Transport Layer Security Protocols

ETHERNET WAN ENCRYPTION SOLUTIONS COMPARED

Virtual Private Network VPN IPSec Testing: Functionality Interoperability and Performance

SSL VPN Technology White Paper

Transcription:

MOBILE IP: SECURITY & APPLICATION Gloria Tuquerres, Marcos Rogério Salvador and Ron Sprenkels e-mails: {tuquerre, salvador, sprenkel}@cs.utwente.nl Telematics Systems and Services - Centre for Telematics and Information Technology University of Twente - P.O. Box 217-7500 AE Enschede, The Netherlands December 1 st, 1999 Abstract: As required in the TGS Mobile IP Advanced Module, this paper presents a survey of common security threats which mobile IP networks are exposed to as well as some proposed solutions to deal with such threats. 1 Introduction Whilst offering great flexibility and potential, mobility exposes mobile nodes and consequently entire networks to security threats that are not trivially solved. On the contrary, combat against such threats requires appropriate services and protocols. In this paper we present a survey of common security threats which nodes in mobile IP campus intranets and in the Internet are exposed to as well as the technologies, services and protocols that have been used to combat these threats. The next section describes how security is dealt with general IP networks, providing the fundamentals for the following discussions. Mobile IP campus Intranets are discussed in section 3. Section 4 extends the discussions to internet-wide mobile IP deployment. Finally, section 5 presents some final remarks. It is worth mentioning that most of the information contained in this document is based on [1], which dates from 1998, and, hence, is a little outdated. For more update and precise information the readers are referred to http://www.ietf.org/html.charters/ipsec-charter.html and http://www.ietf.org/html.charters/mobileipcharter.html. 2 IP Security Aiming at providing users with secure communications over the Internet, the Internet Engineering Task Force (IETF), under the IP Security Protocol Working Group, has defined the Security Architecture for the Internet Protocol [4]. Known as IPSec, this architecture defines a suite of protocols that describes security mechanisms and services for both IPv4 and IPv6 and upper layers 1. IPSec is organized as shown in Figure 1. Three primary protocols are defined: the Encapsulating Security Payload (ESP) [2], the Authentication (AH) [3] and the Internet Key Exchange (IKE) [6]. IP Security Architecture ESP Protocol AH Protocol Encryption Algorithms Authentication Algorithms DOI (Domain of Interpretation) Key Mgmt Protocol Figure 1 - IPSec [5] AH is used to provide integrity and authentication for IP datagrams and protection against replays. Integrity ensures that the datagram was not altered in an unexpected or malicious manner. Authentication verifies the 1 For the sake of space all the following sections of this paper focus on IPv4 only.

source's claimed identity. And replay-protection prevents users from receiving packets intentionally delayed by nodes with malicious intentions. The AH protocol is designed to work with many different authentication algorithms, whereas the most used is the mandatory Message Digest (MD) 5 [7]. MD5 is a one-way mathematical function that produces a 128-bit unique representation of the data to be authenticated. Every IP datagram to be sent is assigned a MD that is generated out of the datagram plus an appropriate (either secret or public) key 2. At the receiver a new MD is calculated out of the datagram plus the appropriate key as known by the receiver. If the two calculated MDs are equal, it means the datagram was unaltered during transit and that only the senders that know the key could have sent it. The IP AH Format is depicted in Figure 2. The Next is an 8-bit field that identifies the type of the next payload after the Authentication. The Payload Length is an 8-bit field that specifies the length of AH in 32-bit words. The Reserved field is a 16-bit field reserved for future use. The Security Parameter Index (SPI) is an arbitrary 32-bit value that uniquely identifies the Security Association (SA) for this datagram. Sequence Number is an unsigned 32-bit field that contains a counter value that is defined for replay-protection purposes. Authentication Data is a variable-length field that contains the Integrity Check Value (ICV) for the packet. Next Payload Length RESERVED Security Parameters Index (SPI) Sequence Number Field Authentication Data (variable) Figure 2 - IP Authentication Format The location of AH in IP datagrams depends on the version of IP and whether or not tunneled mode is used. For the sake of secure mobile IP understanding, Figure 3 illustrates how an authenticated, tunneled IPv4 packet looks like (new) IP Authent. (orig.) IP TCP/UDP User Data authenticated Figure 3 Authenticated Tunneled IPv4 Packet Note that AH does not support any form of encryption and, hence, it cannot protect the confidentiality of the data sent over the Internet. To this end ESP must be used. In addition to confidentiality, ESP also provides all the services provided by AH. In fact, ESP may be used in conjunction with AH. Like the AH protocol, ESP is also designed to work with different encryption and authentication algorithms, whereas the DES-CBC transform [8] is required (not mandatory!) to be used in all ESP implementations. DES-CBC stands for Data Encryption Standard-Cipher Block Chaining. Like authentication algorithms, encryption algorithms also rely on the use of keys to provide confidentiality. Once an IP datagram is encrypted, only authorized users can decrypt it, no matter which algorithm and keying mode were used. The ESP is depicted in Figure 4. The SPI and Sequence Number fields provide the same functionality as described before. Payload is a variable-length field containing data described by the Next field. Padding is an optional field defined to ensure that the Authentication Data field (if present) is aligned on a 4-byte boundary. The Pad Length field indicates the number of pad bytes immediately preceding it. The Next is an 8-bit field that identifies the type of data contained in the Payload Data field, e.g., an extension header in IPv6 or an upper layer protocol identifier. The Authentication Data is an optional, variable-length field containing an Integrity Check Value (ICV) computed over the ESP packet minus the Authentication Data. 2 Note that although only (authorized) receivers that know the key can generate the same MD, the usefulness of this technique is based upon the assumption that only the true sender (and not an imposter) has knowledge of the key.

Security Parameters Index (SPI) Sequence Number Field Payload (variable) Padding Pad Length Next Authentication Data (variable, optional) Authent. coverage Confident. coverage Figure 4 - IP Encapsulating Security Payload The ESP header is inserted after the IP header and before the upper layer protocol header (transport mode) or before an encapsulated IP header (tunnel mode). For the sake of secure mobile IP understanding, Figure 5 depicts how an ESP-encrypted, tunneled IPv4 packet looks like. (new) IP ESP (orig.) IP TCP/UDP User Data ESP Trailer ESP Auth. encrypted authenticated Figure 5 Encrypted Tunneled IPv4 Packet Fundamental to the proper functioning of the AH and ESP protocols is the concept of key sharing among communicating parties. The Internet Key Exchange (IKE) protocol has been defined such that two parties can negotiate security parameters and establish session keys thus enabling the setup of a SA. A SA is a unidirectional agreement between two communicating parties that specify a set of policies and keys to protect future communications between them. Table 1 illustrates a table of SAs identified by their SPI. Security Parameter Index Table 1 Security Associations Authent. algorithm Authent. key Replay protection Encryption algorithm Encryption key 01234567 e.g., Keyed (a secret timestamp MD$ key) 89ABCDEF e.g., RSA (public/ private key) SAs can be established between end users, security gateways, end users and security gateways. Security gateways, also known as firewalls, are of fundamental importance towards secure communications over the Internet. A firewall is a device or set of devices located in the border between two administrative domains and configured in such a way that only packets with certain characteristics (e.g., IP source address, TCP ports) are allowed to enter the private domain. Different kinds of firewalls exist. The most sophisticated and important for mobile IP is the so-called secure tunneler (see Figure 6) [1], a firewall which is implemented using the AH and ESP protocols. In such an architecture packets coming from the public network are processed as follow: If the packet is tunneled to the firewall and has valid authentication and/or encryption then it is detunneled and routed transparently to the destination node within the private network; Otherwise, the packet is submitted to the application-layer relay, a host configured to perform application-based packet filtering. Logical view To/from public, information sources To/from remote, authenticated users Application- Layer Relay Cryptographic Tunneler/Router Private Figure 6 Secure Tunneler

3 Mobile IP in Campus Intranets This section discusses the application and security aspects of Mobile IP in campus intranets. Throughout this section we will use the network shown in Figure 7 below. It is a network with no connections to the Internet, no firewalls, and has secured physical access. Furthermore, mobile node software is installed on all mobile nodes in the network, and foreign and home agent software is installed on the routers. Home addresses and home links are assigned, and shared secret encryption keys are installed. In any networked environment precautions should be taken to prevent what are called insider attacks. These are attacks come from supposedly trustworthy own employees of the company, and involve unauthorized access to sensitive information for malicious purposes. Since this is not specific to mobile IP as such, we will not further discuss them here. For this network we will examine denial of service attacks (section 3.1), passive eavesdropping (section 3.2), session stealing (section 3.3) and other active attacks (section 3.4). Then we will briefly conclude on Mobile IP in Campus Intranets security aspects (section 3.5). Figure 7 - model for Mobile IP in Campus Intranets 3.1 Denial of Service A popular phrased definition of a denial of service attack is A bad guy preventing a good guy from getting useful work done. For computer networks in general, a denial of service attack can have two forms: a bad guy floods a host with packets (thus preventing that host from processing useful packets) or the bad guy somehow interferes with the flow of useful packets to a node. In the case of a mobile IP network a denial of service attack occurs when a bad guy manages to do a bogus registration of a new care-of address for a particular mobile node. Such a bogus registration gives rise to two problems: The good guy s mobile node is no longer connected; The bad guy gets to see all traffic directed to the original mobile node. Denial of service by means of a bogus registration is illustrated in the Figure 8. Home Agent Good Guy Bad Guy Redirect tunnel to me (Registration) Figure 8 Denial of Service attack to a Mobile IP network The Mobile IP specification prevents bad guys from being able to do bogus registrations by requiring strong authentication on all registration messages that are exchanged during the registration process. Under the assumption that the shared secret key is not exposed, this renders this type of attack impossible. A related form of denial of service is the so-called replay attack. A replay attack occurs when the attacker records the (encrypted) registration message that a mobile node sends to the foreign agent upon visiting a network and replays that message later. Without any countermeasures this would be a feasible way of doing

a denial of service attack by means of a bogus registration. Mobile IP has two ways of protection against replay attacks; the ID field of the messages is filled with either a timestamp or a nonce value. When timestamps are used the receiver of a message can determine its timeliness and thus detect and discard a replayed message. When nonces are used both parties involved agree upon what special value to use for each next message; even if the attacker knew what that next value should be, it is still impossible to insert it into an authenticated message, thereby rendering a replay attack impossible. 3.2 Passive Eavesdropping Passive eavesdropping is a passive form of information theft. A passive eavesdropping attack occurs when a bad guy manages to listen in on traffic exchanged between a mobile node and its home agent. For this to happen an attacker needs access to the traffic; this can occur in the following ways. An attacker could get physical access to a network socket and connect a host to the network. In case of a shared Ethernet, all traffic on the segment is exposed to the eavesdropper. It is also possible that the attacker is close enough to a wireless network to be able to receive packets that are transmitted via radio signals. Reception of such radio signals is very hard to prevent. To prevent passive eavesdropping with mobile IP it is required to encrypt the transmitted information while it is in transit. An example where this is of great importance is in wireless network environments. Encrypting traffic while it is in transit can be done in various ways, as we will discuss next. As a minimum, traffic should be encrypted on the foreign link. If the traffic is encrypted on the foreign link (and under the assumption that the attacker doesn t know the cryptographic keys used for that) eavesdropping can no longer occur there. If however encryption is used only on the foreign link, the traffic is still exposed to eavesdropping on the remainder of the end to end connection. The best solution therefore is to use end to end encryption of all traffic. This renders eavesdropping attacks impossible on the complete connection. In the special case where the mobile node and the foreign agent are co-located (and therefore the foreign agent can be thrusted), encryption could be applied from the mobile node all the way to the home agent. In that case the mobile node traffic is just as secure against eavesdropping as if the mobile node was at its home location, while at the same time requiring no changes to any of the legacy applications or system the mobile node communicates with. 3.3 Session Stealing Session stealing is an active form of information theft. It involves a bad guy to perform the following steps: The bad guy waits for a mobile node to register with its home agent; The bad guy eavesdrops to see when something interesting comes along; Then the bad guy floods the mobile node with (bogus) packets, thus putting it out of action; The bad guy steals the session by originating packets that seem to have come from the mobile node, and at the same time intercepting packets destined for the mobile node. Such a session stealing attack could occur either at the foreign link or at some other point between the mobile node and the home agent. The protection against session stealing attacks is again cryptography. By encrypting the traffic on as much of the end to end connection as possible (preferably everywhere on the connection), even if a session could be stolen the attacker can not get to the actual data. 3.4 Other Active Attacks Active attacks can be performed that do not require any existing mobile IP session to be going on. This type of attack involves getting access to the network and once that has succeeded to try and actively break into hosts on the network. Once the attacker has gained physical access to the network (either via an unattended network socket or via an air interface) the procedure for this type of attack is as follows. The attacker figures out a network prefix to use. This can be done by listening for mobile IP agent advertisements, by examining IP addresses in packets flowing around on the network segment, or even by just doing a DHCP configuration request. Next the bad guy guesses an available host number to use. This can be done by listening for a while and just picking one that does not appear to be used, by doing ARP request for the resulting IP address and see if they go unanswered, or by again a DHCP request.

Once the previous steps succeeded the attacker can start gaining access to IP hosts. For a unix system the attacker could start guessing username password combinations that work. History tells that this guessing game can in fact be successful. The relevance for mobile IP is that mobile IP is likely to be used in publicly accessible places. To prevent active attacks like just described, the following two measures need to be taken. First all publicly accessible sockets should connect to a foreign agent that enforces the R bit. This means that all visiting mobile nodes are strictly required to register with the foreign agent. The foreign agent will not route any packets on behalf of nodes that have not registered with the agent. Second link layer encryption must be mandatory for all mobile nodes that wish to connect to the foreign agent. 4 Mobile IP Worldwide In the previous section Mobile IP Deployment for an Intranet, security implications of this deployment as well as the protections against these threats have been described. In this section security threats of the intranet being extended with attack to the mobile node outside of the intranet, a protection for this mobile node as well as how this mobile node can securely access to the intranet are presented. The scenario for mobile IP worldwide however is first introduced. 4.1 Internet-wide Mobility Deployment Mobile IP can allow a user to move anywhere through the entire Internet without exposing his Intranet to additional security threats over the attacks that face any network connected to the Internet. Figure 9 represents an Internet-wide mobile IP deployment scenario. In the figure, we visualize the part of the Intranet with confidential data connected to the global Internet through a firewall to ensure connectivity of authorized mobile nodes. The figure also shows a public area of this Intranet that provides access for mobile nodes. Public Area Home/Foreign Agents Visitor/Intranet MN Public Foreign Agent Internet Authorized MN Intranet Firewall Figure 9 - Mobile IP deployment Scenario The mobility on Internet scenario is characterized by a topological placement of home agents and foreign agents with respect to the firewall and the mobile nodes. Although the home agents are protected by the firewall, all foreign agents can not be under the firewall. The public foreign agent that is non-protected has to provide service to the public area s mobile nodes. Therefore this agent can support passive or active eavesdroppings. This scenario is used in the rest of this section to show how a mobile node can reach his home agent securely. 4.2 Mobile Node Protection Although the deployment adds no security risks over and above those faced by any network that connects to the Internet, the vulnerability of the intranet with internet access introduce security threats over the network s mobile nodes that are on the Internet with no firewall to protect them against attacks. The protection against these threats can be a method based upon Virtual Private s (VPNs) technology. Figure 10 shows VPNs for protection of Intranets. A VPN consists of two or more physical private networks that are separated by a public network and behaves as a single private network. The VPNs are

built from authenticated and encrypted tunnels between secure tunneling firewalls at the border of each physical network. The firewall protects its network by admitting only those packets that have been authenticated and encrypted by one of the other firewalls. The application of VPNs technology for a mobile node protection is also shown in this figure. In the figure the mobile node is presented as a single-node private network protected by the integrated firewall. This solution protects a mobile node through a secure tunneler. Therefore the secure tunneler is a firewall of the application-layer relay type (see figure 6) that provides a cryptographically-protected path Single-node Private Authenticated and Encrypted Integrated Firewall Host Private Public Authenticated and Encrypted Host Private Secure Tunneling Firewall Secure Tunneling Firewall for authorized users to access a private network across a public network. The solution must provide a way by which the mobile node is able to communicate with all hosts and routers within the rest of the VPN (any of the physical, private networks) without compromising the security of those networks. Simple Key- Management protocol (SKIP) [9] is an implementation of the method to traverse the firewall securely. How this protocol protects the mobile node is shortly introduced in the following section. Figure 10 - Virtual Private ensuring secure firewall traversal 4.3 Secure Firewall Traversal For Mobile IP The SKIP-based firewall traversal requires a registration request securely tunneled to firewall. The implementation of the registration request consists of an IP Authentication, an Encapsulating Security Payload, and a protocol for key management to fulfill the encryption and authentication functions for tunneling. Therefore the secure traversal firewall implementation for mobile IP demands configuration of mobile node and firewall for obtaining public keys; configuration of mobile node and home agent with a range of IP addresses of the intranet; and provisioning to mobile node and firewall with at least one common secret-key authentication algorithm and one common secret-key encryption algorithm. After the encryption and authentication functions have been completed, the mobile node connected to the foreign link must perform its normal mobile IP Functions: determining its current location, acquiring a care-of address, and registering that care-of address with its home agent using its integrated firewall. That means that the registration of the mobile node to its home agent is done in the same way as packets are conveyed on the VPN and that the registration of the care-of address with its home agent must securely tunnel to the firewall. The SKIP header as a component of the registration request informs the firewall of the identity of the mobile node and allows the firewall to determine the encryption and authentication algorithms that have been used by the mobile node. Beside the SKIP header other components of the registration message are an outer IP packet header (accomplishing the tunnel to the firewall), an authentication header, an encapsulating Security header and the encrypted registration request message. The security functions of these components are introduced in section 2. Further details of the registration process can be found in [1] and [9]. Once this registration process completes, the home agent begins attracting packets destined to the mobile node s home address and tunneling them to the care-of address as always.

Due to its simplicity for implementation, the SKIP solution requires processing power that can be satisfied by any mobile node. Another advantage is that the mobile node and the firewall need not negotiate security parameters or perform key management exchanges before data (or registration) may be sent. A disadvantage of this solution is the presence of the SKIP header in every securely tunneled packet between the mobile node and the firewall. Furthermore the SKIP header contains an explicit identification of the encryption and authentication algorithms whereas it is undesirable to reveal the identity of these algorithms to a potential individual who might try to steal information. While the technology presented is relatively mature and in use [10], the firewall traversal is an active work item within the Mobile IP working group of the IETF (Internet Engineering Task Force). ISAKMP/Oakley is the Internet-standard key management protocol [1] for Firewall Traversal. This protocol requires more exchanges between the mobile node and its firewall, but subsequent securely tunneled data exchanges would contain fewer bytes of overhead. The outline of differences of ISAKMP/Oakley with respect to SKIP solution concludes this section: The mobile node and firewall use each other s public keys in conjunction with some public-key encryption algorithm to protect security parameter negotiation and session-key derivation. Round of negotiation between the mobile node and firewall before data traverse the firewall. This negotiation would likely create two security associations, one used for authentication and one used for encryption. Alternatively, a single security association that integrates both authentication and encryption could be created instead. The Mobile node should negotiate wildcard Source Address as part of these security associations, which would allow the mobile node to change its care-of-address without renegotiating the associations. Otherwise, the mobile node would have to renegotiate these parameters every time it changed location. 5 Final Remarks We addressed the mobile IP security issues in campus Intranet and in the Internet. We firstly examined the ESP, the AH and the IKE protocols defined in the IETF's IPSec architecture. Based on these protocols, protection against denial of service, passive eavesdropping, session stealing and other active attacks in campus intranets were discussed. These discussions were further extended to the Internet-wide context, where the use of the secure tunneler as a main protection mechanism was examined. The recurring pattern in the counter measures against all of these attacks is that security mechanisms and services concern authentication and encryption techniques to prevent security attacks. Security mechanisms, services and protocols to provide communications throughout the Internet with confidentiality, authentication and integrity are under elaboration within the IETF. The works cover both IPv4 and IPv6 and ranges from the link layer up to the application layer. References [1] J. D. Solomon. Mobile IP - The Internet Unplugged. Prentice-Hall, 1997. [2] S. Kent and R. Atkinson. IP Encapsulating Security Payload (ESP). RFC 2406, November 1998. [3] S. Kent and R. Atkinson. IP Authentication. RFC 2402, November 1998. [4] S. Kent and R. Atkinson. Security Architecture for the Internet Protocol. RFC 2401, November 1998. [5] R. Thayer et all. IP Security Document Roadmap. RFC 2411, November 1998. [6] D. Harkins and D. Carrel. The Internet Key Exchange (IKE). RFC 2409, November 1998. [7] C. Madson and R. Glenn. The Use of HMAC-MD5-96 within ESP and AH. RFC 2403, November 1998. [8] C. Madson and N. Doraswamy. The ESP DES-CBC Cipher Algorithm With Explicit IV. RFC 2405, November 1998. [9] G. Montenegro and V. Gupta. Sun's SKIP Firewall Traversal for Mobile IP. RFC 2356, June 1998. [10] http://www.sun.com/security/skip/