Skip to main content

Traversing Middleboxes with the Host Identity Protocol

  • Conference paper
Information Security and Privacy (ACISP 2005)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3574))

Included in the following conference series:

Abstract

The limited flexibility of the Internet to support mobility has motivated many researchers to look for alternative architectures. One such effort that combines security and multihoming together is the Host Identity Protocol (HIP). HIP is a signaling protocol that adds a new protocol layer to the Internet stack between the transport and the network layer. HIP establishes IPsec associations to protect subsequent data traffic. Though the security associations are established solely between the communicating end hosts, HIP also aims to interwork with middleboxes such as NATs and firewalls. This paper investigates this interworking aspect and proposes a solution for secure middlebox traversal.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Moskowitz, R., Nikander, P., Jokela, P., Henderson, T.: Host Identity Protocol draft-ietf-hip-base-01.txt (work in progress) (October 2004)

    Google Scholar 

  2. Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylnen, T.: SPKI Certificate Theory. RFC 2693 (September 1999)

    Google Scholar 

  3. Maler, E., Philpott, R., Mishra, P.: Assertions and Protocol for the OASIS Security Assertion Markup Language (SAML) V1.1 (September 2003)

    Google Scholar 

  4. Kivinen, T., Swander, B., Huttunen, A., Volpe, V.: Negotiation of NATTraversal in the IKE, RFC 3947 (January 2005)

    Google Scholar 

  5. Huttunen, A., Swander, B., Volpe, V., DiBurro, L., Stenberg, M.: UDP Encapsulation of IPsec ESP Packets. RFC 3948 (January 2005)

    Google Scholar 

  6. Kaufman, C.: Internet Key Exchange (IKEv2) Protocol. draft-ietf-ipsec-ikev2- 17.txt (work in progress) (September 2004)

    Google Scholar 

  7. Ylitalo, J., Melen, J., Nikander, P., Torvinen, V.: Re-thinking Security in IP based Micro-Mobility. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol. 3225, pp. 318–329. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  8. Automated Validation of Internet Security Protocols and Applications (AVISPA) IST-2001-39252, Deliverable v1.0 (November 2003)

    Google Scholar 

  9. Moore, K.: Things that NATs break Unpublished (October 2003), http://www.cs.utk.edu/moore/what-nats-break.html

  10. Aboba, B., Dixon, W.: IPsec-Network Address Translation (NAT) Compatibility Requirements RFC 3715 (March 2004)

    Google Scholar 

  11. Ylitalo, J., Jokela, P., Wall, J., Nikander, P.: End-point Identifiers in Secure Multi- Homed Mobility. In: Proc. of the 6th International Conference On Principles Of DIstributed Systems (OPODIS 2002), France, December 2002, pp. 17–28 (2002)

    Google Scholar 

  12. Giving, K., Francis, P.: Network Address Translator RFC 1631 (May 1994)

    Google Scholar 

  13. Next Steps in Signaling (nsis) Working Group Charter (February 2005), http://www.ietf.org/html.charters/nsis-charter.html

  14. Kent, S., Atkinson, R.: IP Encapsulating Security Payload, RFC2406 (November 1998)

    Google Scholar 

  15. Automated Validation of Internet Security Protocols and Applications Webpage (February 2005), http://www.avispa-project.org/

  16. Kent, S., Seo, K.: Security Architecture for the Internet Protocol, draft-ietfipsec- rfc2401bis-05.txt (work in progress) (December 2004)

    Google Scholar 

  17. Host Identity Protocol (HIP) IRTF Research Group (February 2005), http://www.irtf.org/charters/hip.html

  18. Jokela, P., Moskowitz, R., Nikander, P.: Using ESP format with HIP draft-jokela-hipesp- 00.txt (work in progress) (Febrauary 2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tschofenig, H., Gurtov, A., Ylitalo, J., Nagarajan, A., Shanmugam, M. (2005). Traversing Middleboxes with the Host Identity Protocol. In: Boyd, C., González Nieto, J.M. (eds) Information Security and Privacy. ACISP 2005. Lecture Notes in Computer Science, vol 3574. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11506157_2

Download citation

  • DOI: https://doi.org/10.1007/11506157_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-26547-4

  • Online ISBN: 978-3-540-31684-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics