System and method for network address translation...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S152000

Reexamination Certificate

active

06832322

ABSTRACT:

BACKGROUND OF THE INVENTION
U.S. patent applications Ser. No. 09/239,693, filed Jan. 29, 1999, entitled System and Method for Managing Security Objects; Ser. No. 09/240,718, filed Jan. 29, 1999, entitled “System and Method for Dynamic Macro Placement of IP Connection Filters”; S/N 09/239,694, filed Jan. 29, 1999, entitled “System and Method for Dynamic Micro Placement of IP Connection Filters”; S/N 09/240,483, filed Jan. 29, 1999, entitled “System and Method for Central Management of Connections in a Virtual Private Network, and S/N 09/578215, filed May 23, 2000, entitled “System and Method for Network Address Translation Integration with IP Security”, assignee docket END9 1999 0129 US1 are assigned to the same assignee hereof and contain subject matter related, in certain respects, to the subject matter of the present application. The above-identified patent applications are incorporated herein by reference.
Technical Field of the Invention
This invention pertains to security over virtual private network (VPN) connections. More particularly, it relates to VPN NAT, or concurrent use of network address translation (NAT) and Internet Protocol (IP) Security (IPSec) protocols.
Background Art
Virtual Private Networks (VPNs) are an active area of technical development throughout the Internet and computing industry. This is because they are a fundamental enabler for most forms of e-business. VPNs use protocol tunneling and encryption and decryption technology (IP Security protocols) to allow clients and servers, branch offices, or independent organizations to exploit the Internet for their TCP/IP traffic at much lower costs than buying dedicated lines, without losing a key benefit of dedicated lines: privacy.
The tunneling that VPN employs has a side effect, which creates a problem: two subnets or companies, or other users, which didn't initially communicate directly, now do, and this greatly increases the likelihood of IP address conflicts.
Network Address Translation (NAT) is widely deployed in Internet and in companies connecting to the Internet to overcome address conflicts. These conflicts commonly occur between designated ‘private’ address spaces (e.g. 10.*.*.*).
However, NAT and IP Security (IP Sec) are architecturally conflicting. In fact, NAT breaks IP Sec. That is, NAT “is the feature which finally breaks the semantic overload of the IP address as both a locator and the end-point identifier” (see, “Architectural Implications of NAT”, draft-iab-nat-implications-00, txt, March 1998. IPSec is described in Kent, S., and Atkinson, “Security Architecture for the Internet Protocol”, RFC2401, November 1998; Kent, S., and Atkinson, “IP Authentication Protocol”, RFC 2402, November 1998; and Kent, S., and Atkinson, “IP Encapsulation Security Payload”, RFC 2406, November 1998.) As a result, two hosts cannot establish an IP Sec connection if there is a NAT system in between. There are two reasons why: the IP traffic that flows between the two hosts (for the IP Sec connection) will have authentication protocol (AH) or encapsulation security payload (ESP) applied. (See RFC's 2402 and 2406, supra.)
First, with respect to ESP in tunnel mode, the IP address that needs to be translated is inside the ESP tunnel and is encrypted. It is, therefore, unavailable to NAT. With respect to authentication protocol (AH) in transport or tunnel mode, the IP address that needs to be translated is visible in NAT, but the AH authentication includes it. Therefore, changing the IP address will break the authentication at the remote end of the IP Sec connection. With respect to ESP in transport mode, even if ESP is used with authentication, the IP address is available to NAT. But, if the IP address is changed, the IP Sec connection breaks due to the breaking of authentication at the remote end of the IP Sec connection.
Second, even if the IP traffic for the IP Sec connection could be translated, it would fail because the IP Sec connection is based on Security Associations which contain the two host IP addresses. These are fundamental to the Security Association architecture (see RFC 2401, supra), in that the inbound IP Sec, on the host where decrypting (or authentication) is to occur, must be uniquely determined by the triple:
{destination IP addr, SPI, IP Sec protocol}.
where SPI is the security protocol index (see, RFC 2401, supra).
For example, given hosts A & W, assume NAT is applied to an IP datagram (a generic term for bytes that go on the wire) with ESP in transport mode that is going from A to W. Hence the IP source address is changed. Upon arrival at W, the packet will probably be decrypted successfully since that doesn't depend on IP source address (which was in plaintext—not tunneled). If strictly implemented however, the inbound SPD checking which should follow decrypting will fail, due to the changed IP source address (because it was not the address used to negotiate the security association). So, even the transport mode ESP case fails.
Simply making NAT and IP Sec mutually exclusive is not the solution sought by the art. NAT is being deployed widely because it solves many problems, such as: masks global address changes, lowers address utilization, lowers Internet service provider (ISP) support burden, and allows load sharing as virtual hosts.
Yet, NAT is viewed as the greatest single threat to security integration being deployed in the Internet today. This “NAT problem”, as it is invariably termed, is architecturally fundamental. Also, legacy applications and services (for example, those developed for IP version 4) will continue to a long co-existence as applications and services develop for IP version 6. Consequently, there is a great need in the art for providing NAT and IP Sec coexistence, at least in selected situations, and to do so without introducing serious configuration problems. (IP version 4 is described in “Internet Protocol”, RFC791, September 1981. IP version 6 is described in Deering, S., Hinden, R., “Internet Protocol, Version 6 (IPv6) Specification”, RFC2460, December 1998.)
A VPN connection between two address domains can have the effect of directly connecting two domains which most likely will not have been planned to be connected. Hence increased use of VPNs is likely to increase address conflicts. It is also understood that VPNs redefine network visibility and increase the likelihood of address collision when traversing NATs. Address management in the hidden space behind NATs will become a significant burden. There is, therefore, a need in the art to ameliorate that burden.
In U.S. patent application Ser. No. 09/240,720, a solution to the general problem of integrating IP Sec and NAT is presented. IP security is provided in a virtual private network using network address translation (NAT) by performing one or a combination of the four types of VPN NAT. (The description of three types of VPN NAT from assignee docket END9 1999 0129 US1 is included hereafter, and the fourth is the subject of this application.) This involves dynamically generating NAT rules and associating them with the manual or dynamically generated Internet key exchange (IKE) Security Associations, before beginning IP security that uses the Security Associations. (See, Harkins, D., Carrel, D., “The Internet Key Exchange (IKE)”, RFC2409, November 1998. Security Associations is a term defined in RFC201, supra.) Then, as IP Sec is performed on outbound and inbound datagrams, the NAT function is also performed. By “perform IP Sec”, is meant to execute the steps that comprise IP Sec outbound or inbound processing, as defined by the three IP Sec RFCs (and others) above. By “perform NAT”, is meant to execute the steps that comprise the VPN NAT processing hereafter described in this application.
In U.S. patent application Ser. No. 09/240,720, the customer must configure each separate VPN NAT rule as a separate VPN connection. This is time consuming and prone to error, and VPN connections are really meant to protect the traffic and should be independent of specific VPN NAT rules. That is, the r

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for network address translation... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for network address translation..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for network address translation... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3278226

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.