RFC 2005 (rfc2005) - Page 3 of 5
Applicability Statement for IP Mobility Support
Alternative Format: Original Text Document
RFC 2005 Mobile IP Applicability Statement October 1996
3. Security
Mobile IP mandates the use of cryptographically strong authentication
for all registration messages exchanged between a mobile node and its
home agent. Optionally, strong authentication can be used between
foreign agents and mobile nodes or home agents. Replay protection is
realized via one of two possible mechanisms -- timestamps or nonces.
Due to the unavailability of an Internet key management protocol,
agent discovery messages are not required to be authenticated.
All Mobile IP implementations are required to support, at a minimum,
keyed MD5 authentication with manual key distribution. Other
authentication and key distribution algorithms may be supported.
Mobile IP defines security mechanisms only for the registration
protocol. Implementations requiring privacy and/or authentication of
data packets sent to and from a mobile node should use the IP
security protocols described in RFCs 1827 and 1826 for this purpose.
4. MIB
At the time of publication of this Applicability Statement, a
Management Information Base (MIB) for Mobile IP has been written and
documented in RFC 2006.
5. Implementations
Several implementations of Mobile IP are known to exist. The
following list gives the origin and a contact for several such
implementations:
Organization: Contact:
CMU Dave Johnson [email protected]>
FTP Software Frank Kastenholz [email protected]>
IBM Charlie Perkins [email protected]>
Motorola Jim Solomon [email protected]>
Nokia Gunyho Gabor [email protected]>
SUN Gabriel Montenegro [email protected]>
Telxon Frank Ciotti [email protected]>
6. Implementation Experience
FTP Software hosted an interim meeting, October 23-27, 1995 in which
interoperability of several implementations was demonstrated. The
following major features of the Mobile IP protocol were tested:
Solomon Standards Track