Traversing Middleboxes with the Host Identity Protocol
نویسندگان
چکیده
The limited flexibility of the Internet to support mobility has motivated many researchers to look for alternative architectures. One such effort that combines security and multihoming together is the Host Identity Protocol (HIP). HIP is a signaling protocol that adds a new protocol layer to the Internet stack between the transport and the network layer. HIP establishes IPsec associations to protect subsequent data traffic. Though the security associations are established solely between the communicating end hosts, HIP also aims to interwork with middleboxes such as NATs and firewalls. This paper investigates this interworking aspect and proposes a solution for secure middlebox traversal.
منابع مشابه
Network Working Group Nat and Firewall Traversal Issues of Host Identity Protocol (hip) Communication Status of This Memo
The Host Identity Protocol (HIP) changes the way in which two Internet hosts communicate. One key advantage over other schemes is that HIP does not require modifications to the traditional networklayer functionality of the Internet, i.e., its routers. In the current Internet, however, many devices other than routers modify the traditional network-layer behavior of the Internet. These "middlebox...
متن کاملMiddlebox Traversal of HIP Communication
The Host Identity Protocol (HIP) fundamentally changes the way two hosts in the Internet communicate. One key advantage over other schemes is that HIP does not require any modifications to the traditional network-layer functionality of the Internet, i.e., its routers. HIP deployment should therefore be transparent. In the current Internet, however, many devices other than routers may affect the...
متن کاملAn Overlay Internetworking Architecture for Ambient Networks
Several different internetworking architectures are being discussed within the Ambient Networks (AN) project. This paper describes the Overlay architecture. Its name is derived from the use of an overlay control plane that allows for internetworking between different network technologies, as well as for control of functionality that is today found in different and sometimes proprietary middlebo...
متن کاملRfc 3234
This document is intended as part of an IETF discussion about "middleboxes" defined as any intermediary box performing functions apart from normal, standard functions of an IP router on the data path between a source host and destination host. This document establishes a catalogue or taxonomy of middleboxes, cites previous and current IETF work concerning middleboxes, and attempts to identify s...
متن کاملDetecting Cellular Middleboxes Using Passive Measurement Techniques
The Transmission Control Protocol (TCP) follows the endto-end principle – when a client establishes a connection with a server, the connection is only shared by two physical machines, the client and the server. In current cellular networks, a myriad of middleboxes disregard the end-to-end principle to enable network operators to deploy services such as content caching, compression, and protocol...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005