| About the Author |
|
xi | |
| Foreword |
|
xii | |
|
|
| Foreword |
|
xv | |
|
|
| Preface |
|
xvii | |
| Acknowledgments |
|
xxi | |
| Abbreviations |
|
xxiii | |
|
|
|
1 | (42) |
|
|
|
3 | (8) |
|
|
|
4 | (1) |
|
HIP in the Internet architecture |
|
|
5 | (2) |
|
|
|
7 | (2) |
|
|
|
9 | (2) |
|
Introduction to network security |
|
|
11 | (32) |
|
Goals of cryptographic protocols |
|
|
11 | (1) |
|
|
|
12 | (1) |
|
|
|
13 | (2) |
|
|
|
13 | (1) |
|
|
|
13 | (1) |
|
Man-In-The-Middle attacks |
|
|
13 | (1) |
|
|
|
14 | (1) |
|
Denial-of-Service attacks |
|
|
14 | (1) |
|
Exhaustive key space search |
|
|
15 | (1) |
|
|
|
15 | (1) |
|
|
|
15 | (12) |
|
|
|
15 | (4) |
|
|
|
19 | (4) |
|
One-way cryptographic hash functions |
|
|
23 | (2) |
|
|
|
25 | (1) |
|
|
|
26 | (1) |
|
|
|
26 | (1) |
|
|
|
27 | (1) |
|
|
|
27 | (12) |
|
Modular exponential Diffie-Hellman groups |
|
|
28 | (1) |
|
|
|
28 | (1) |
|
|
|
29 | (1) |
|
IP security architecture: IPsec |
|
|
30 | (1) |
|
|
|
31 | (2) |
|
|
|
33 | (1) |
|
|
|
34 | (3) |
|
Internet Key Exchange: IKE |
|
|
37 | (2) |
|
Weak authentication techniques |
|
|
39 | (1) |
|
|
|
40 | (3) |
|
Part II The Host Identity Protocol |
|
|
43 | (118) |
|
|
|
45 | (6) |
|
|
|
45 | (1) |
|
Methods of identifying a host |
|
|
46 | (1) |
|
Overlay Routable Cryptographic Hash Identifiers |
|
|
47 | (2) |
|
The purpose of an IPv6 prefix |
|
|
47 | (1) |
|
Generating and routing an ORCHID |
|
|
47 | (1) |
|
|
|
48 | (1) |
|
|
|
49 | (1) |
|
|
|
49 | (2) |
|
|
|
51 | (16) |
|
|
|
51 | (9) |
|
|
|
51 | (3) |
|
|
|
54 | (3) |
|
|
|
57 | (1) |
|
|
|
57 | (3) |
|
Other HIP control packets |
|
|
60 | (2) |
|
|
|
62 | (5) |
|
|
|
63 | (1) |
|
ESP Bound End-to-End Tunnel |
|
|
64 | (3) |
|
|
|
67 | (18) |
|
|
|
67 | (11) |
|
Mobility and multihoming architecture |
|
|
67 | (2) |
|
Multihoming as extension of mobility |
|
|
69 | (2) |
|
Effect of ESP anti-replay window |
|
|
71 | (3) |
|
|
|
74 | (1) |
|
|
|
75 | (1) |
|
Credit-based authentication |
|
|
76 | (1) |
|
Interaction with transport protocols |
|
|
76 | (2) |
|
|
|
78 | (1) |
|
Registering with a rendezvous server |
|
|
78 | (1) |
|
|
|
79 | (1) |
|
|
|
79 | (3) |
|
|
|
79 | (1) |
|
|
|
80 | (1) |
|
|
|
81 | (1) |
|
|
|
82 | (3) |
|
The process of registration |
|
|
82 | (1) |
|
|
|
82 | (3) |
|
|
|
85 | (20) |
|
|
|
85 | (1) |
|
Initiating opportunistic base exchange |
|
|
85 | (1) |
|
Implementation using a TCP option |
|
|
86 | (1) |
|
Piggybacking transport headers to base exchange |
|
|
86 | (1) |
|
|
|
86 | (1) |
|
|
|
87 | (1) |
|
|
|
87 | (4) |
|
Overview of Service Discovery |
|
|
87 | (1) |
|
On-the-path Service Discovery |
|
|
88 | (2) |
|
Passive Service Discovery |
|
|
90 | (1) |
|
Regional Service Discovery |
|
|
91 | (1) |
|
|
|
91 | (4) |
|
|
|
92 | (1) |
|
|
|
93 | (2) |
|
Disseminating HITs with a presence service |
|
|
95 | (1) |
|
HITs in the Presence Information Data Format |
|
|
95 | (1) |
|
|
|
96 | (1) |
|
|
|
96 | (9) |
|
Challenges for IP multicast |
|
|
98 | (1) |
|
Host Identity Specific multicast |
|
|
99 | (4) |
|
Authenticating multicast receivers |
|
|
103 | (2) |
|
|
|
105 | (12) |
|
HIP on Nokia Internet Tablet |
|
|
105 | (1) |
|
|
|
106 | (8) |
|
|
|
106 | (1) |
|
Basic HIP characteristics |
|
|
107 | (7) |
|
|
|
114 | (3) |
|
|
|
117 | (44) |
|
Security functionality of HIP |
|
|
117 | (4) |
|
Performance limitations of HIP |
|
|
118 | (1) |
|
|
|
118 | (1) |
|
|
|
119 | (1) |
|
|
|
120 | (1) |
|
|
|
121 | (5) |
|
|
|
122 | (2) |
|
|
|
124 | (2) |
|
|
|
126 | (28) |
|
Hash chains for HIP authentication |
|
|
126 | (1) |
|
|
|
127 | (1) |
|
Interactive signatures based on hash chains |
|
|
128 | (2) |
|
LHIP authentication layer |
|
|
130 | (7) |
|
|
|
137 | (2) |
|
|
|
139 | (8) |
|
|
|
147 | (3) |
|
Association upgrades: from LHIP to HIP |
|
|
150 | (4) |
|
|
|
154 | (3) |
|
|
|
154 | (1) |
|
|
|
155 | (2) |
|
|
|
157 | (4) |
|
|
|
157 | (1) |
|
|
|
158 | (1) |
|
|
|
158 | (1) |
|
|
|
158 | (3) |
|
Part III Infrastructure Support |
|
|
161 | (64) |
|
|
|
163 | (18) |
|
Requirements for traversing legacy middleboxes |
|
|
163 | (3) |
|
|
|
164 | (1) |
|
|
|
165 | (1) |
|
Strategies for legacy middlebox traversal |
|
|
165 | (1) |
|
|
|
166 | (9) |
|
|
|
166 | (1) |
|
|
|
167 | (1) |
|
|
|
168 | (2) |
|
|
|
170 | (2) |
|
Initiator and Responder behind a NAT |
|
|
172 | (2) |
|
Multihoming and mobility with NATs |
|
|
174 | (1) |
|
|
|
175 | (1) |
|
Requirements for HIP-aware middleboxes |
|
|
175 | (1) |
|
|
|
176 | (5) |
|
|
|
176 | (1) |
|
|
|
177 | (2) |
|
|
|
179 | (1) |
|
|
|
179 | (2) |
|
|
|
181 | (22) |
|
Problem statement of naming |
|
|
181 | (3) |
|
|
|
184 | (2) |
|
Overview of Distributed Hash Tables |
|
|
184 | (1) |
|
|
|
185 | (1) |
|
|
|
186 | (2) |
|
Overview of overlay networks |
|
|
188 | (2) |
|
Host Identity Indirection Infrastructure |
|
|
190 | (13) |
|
Separating control, data, and naming |
|
|
191 | (1) |
|
|
|
192 | (5) |
|
|
|
197 | (4) |
|
Discussion of the Hi3 design |
|
|
201 | (2) |
|
|
|
203 | (14) |
|
|
|
203 | (3) |
|
|
|
204 | (1) |
|
|
|
205 | (1) |
|
|
|
206 | (4) |
|
Hash chain authentication |
|
|
207 | (1) |
|
Secure network attachment |
|
|
208 | (1) |
|
|
|
209 | (1) |
|
|
|
210 | (7) |
|
|
|
210 | (1) |
|
|
|
211 | (2) |
|
|
|
213 | (4) |
|
|
|
217 | (8) |
|
|
|
217 | (1) |
|
|
|
218 | (4) |
|
Location and identity privacy |
|
|
218 | (1) |
|
|
|
219 | (2) |
|
Protecting location privacy |
|
|
221 | (1) |
|
|
|
222 | (3) |
|
Identifiers on protocol layers |
|
|
222 | (1) |
|
|
|
223 | (2) |
|
|
|
225 | (54) |
|
Possible HIP applications |
|
|
227 | (16) |
|
Virtual Private Networking |
|
|
227 | (2) |
|
P2P Internet Sharing Architecture |
|
|
229 | (1) |
|
Interoperating IPv4 and IPv6 |
|
|
230 | (2) |
|
Secure Mobile Architecture |
|
|
232 | (5) |
|
|
|
233 | (1) |
|
|
|
234 | (3) |
|
Live application migration |
|
|
237 | (3) |
|
Network operator viewpoint on HIP |
|
|
240 | (3) |
|
|
|
243 | (12) |
|
Using legacy applications with HIP |
|
|
243 | (2) |
|
|
|
244 | (1) |
|
|
|
244 | (1) |
|
|
|
245 | (1) |
|
API for native HIP applications |
|
|
245 | (10) |
|
|
|
245 | (1) |
|
|
|
246 | (4) |
|
|
|
250 | (5) |
|
Integrating HIP with other protocols |
|
|
255 | (24) |
|
|
|
255 | (4) |
|
Classification of proposals |
|
|
256 | (2) |
|
|
|
258 | (1) |
|
The use of Session Initiation Protocol |
|
|
259 | (6) |
|
SIP as a rendezvous service |
|
|
259 | (2) |
|
|
|
261 | (1) |
|
Securing SIP control traffic |
|
|
262 | (2) |
|
Session Description Protocol extensions |
|
|
264 | (1) |
|
Encapsulating HIP data using SRTP |
|
|
265 | (4) |
|
Replacing HIP base exchange with IKEv2 |
|
|
269 | (3) |
|
|
|
272 | (2) |
|
HIP proxy for legacy hosts |
|
|
274 | (5) |
|
|
|
274 | (2) |
|
Legacy correspondent hosts |
|
|
276 | (3) |
|
Appendix A Installing and using HIP |
|
|
279 | (6) |
|
A.1 Overview of HIP implementations |
|
|
279 | (2) |
|
|
|
281 | (4) |
| Bibliography |
|
285 | (6) |
| Index |
|
291 | |