HOME

TheInfoList



OR:

The Host Identity Protocol (HIP) is a host identification technology for use on
Internet Protocol The Internet Protocol (IP) is the network layer communications protocol in the Internet protocol suite for relaying datagrams across network boundaries. Its routing function enables internetworking, and essentially establishes the Internet. IP h ...
(IP) networks, such as the
Internet The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a '' network of networks'' that consists of private, pub ...
. The Internet has two main name spaces,
IP address An Internet Protocol address (IP address) is a numerical label such as that is connected to a computer network that uses the Internet Protocol for communication.. Updated by . An IP address serves two main functions: network interface ident ...
es and the
Domain Name System The Domain Name System (DNS) is a hierarchical and distributed naming system for computers, services, and other resources in the Internet or other Internet Protocol (IP) networks. It associates various information with domain names assigned to ...
. HIP separates the end-point identifier and locator roles of
IP address An Internet Protocol address (IP address) is a numerical label such as that is connected to a computer network that uses the Internet Protocol for communication.. Updated by . An IP address serves two main functions: network interface ident ...
es. It introduces a Host Identity (HI) name space, based on a
public key Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic alg ...
security infrastructure. The Host Identity Protocol provides secure methods for IP
multihoming Multihoming is the practice of connecting a host or a computer network to more than one network. This can be done in order to increase reliability or performance. A typical host or end-user network is connected to just one network. Connecting ...
and
mobile computing Mobile computing is human–computer interaction in which a computer is expected to be transported during normal usage, which allows for the transmission of data, voice, and video. Mobile computing involves mobile communication, mobile hardware ...
. In networks that implement the Host Identity Protocol, all occurrences of IP addresses in applications are eliminated and replaced with cryptographic host identifiers. The cryptographic keys are typically, but not necessarily, self-generated. The effect of eliminating IP addresses in application and transport layers is a decoupling of the transport layer from the internetworking layer (
Internet Layer The internet layer is a group of internetworking methods, protocols, and specifications in the Internet protocol suite that are used to transport network packets from the originating host across network boundaries; if necessary, to the destinat ...
) in
TCP/IP The Internet protocol suite, commonly known as TCP/IP, is a framework for organizing the set of communication protocols used in the Internet and similar computer networks according to functional criteria. The foundational protocols in the suit ...
.RFC 4423, ''Host Identity Protocol (HIP) Architecture'', Section 4.1 HIP was specified in the
IETF The Internet Engineering Task Force (IETF) is a standards organization for the Internet and is responsible for the technical standards that make up the Internet protocol suite (TCP/IP). It has no formal membership roster or requirements and a ...
HIP
working group A working group, or working party, is a group of experts working together to achieve specified goals. The groups are domain-specific and focus on discussion or activity around a specific subject area. The term can sometimes refer to an interdis ...
. An
Internet Research Task Force The Internet Research Task Force (IRTF) is an organization, overseen by the Internet Architecture Board, that focuses on longer-term research issues related to the Internet. A parallel organization, the Internet Engineering Task Force (IETF), fo ...
(IRTF) HIP research group looks at the broader impacts of HIP. The working group is chartered to produce
Requests for Comments A Request for Comments (RFC) is a publication in a series from the principal technical development and standards-setting bodies for the Internet, most prominently the Internet Engineering Task Force (IETF). An RFC is authored by individuals or g ...
on the "Experimental" track, but it is understood that their quality and security properties should match the standards track requirements. The main purpose for producing Experimental documents instead of standards track ones are the unknown effects that the mechanisms may have on applications and on the Internet in the large.


RFC references

* - Host Identity Protocol (HIP) Architecture (early "informational" snapshot) * - Host Identity Protocol base (Obsoleted by RFC 7401) * - Using the Encapsulating Security Payload (ESP) Transport Format with the Host Identity Protocol (HIP) (Obsoleted by RFC 7402) * - Host Identity Protocol (HIP) Registration Extension (obsoleted by RFC 8003) * - Host Identity Protocol (HIP) Rendezvous Extension (obsoleted by RFC 8004) * - Host Identity Protocol (HIP) Domain Name System (DNS) Extension (obsoleted by RFC 8005) * - End-Host Mobility and Multihoming with the Host Identity Protocol * - NAT and Firewall Traversal Issues of Host Identity Protocol (HIP) Communication * - Basic Requirements for IPv6 Customer Edge Routers * - Host identity protocol version 2 (HIPv2) (updated by RFC 8002) * - Using the Encapsulating Security Payload (ESP) transport format with the Host Identity Protocol (HIP) * - Host Identity Protocol Certificates * - Host Identity Protocol (HIP) Registration Extension * - Host Identity Protocol (HIP) Rendezvous Extension * - Host Identity Protocol (HIP) Domain Name System (DNS) Extension * - Host Mobility with the Host Identity Protocol * - Host Multihoming with the Host Identity Protocol * - Native NAT Traversal Mode for the Host Identity Protocol


See also

* Identifier/Locator Network Protocol (ILNP) *
IPsec In computing, Internet Protocol Security (IPsec) is a secure network protocol suite that authenticates and encrypts packets of data to provide secure encrypted communication between two computers over an Internet Protocol network. It is used in ...
* Locator/Identifier Separation Protocol (LISP) * Mobile IP (MIP) * Proxy Mobile IPv6 (PMIPv6)


References


External links


IETF HIP working group

IRTF HIP research group

OpenHIP Wiki

How HIP works
- from InfraHIP site - Moved t
How HIP works

HIP simulation framework for OMNeT++

Tempered Networks HIP-based Airwall family
Internet protocols Multihoming Cryptographic protocols Computer network security IPsec {{compu-network-stub