One document matched: draft-giaretta-mip6-authorization-eap-04.txt
Differences from draft-giaretta-mip6-authorization-eap-03.txt
MIP6 Working Group G. Giaretta
Internet Draft I. Guardini
Expires: April 2007 E. Demaria
Telecom Italia
J. Bournelle
M. Laurent-Maknavicius
GET/INT
October 2006
MIPv6 Authorization and Configuration based on EAP
<draft-giaretta-mip6-authorization-eap-04.txt>
Status of this Memo
By submitting this Internet-Draft, each author represents that
any applicable patent or other IPR claims of which he or she is
aware have been or will be disclosed, and any of which he or she
becomes aware will be disclosed, in accordance with Section 6 of
BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six
months and may be updated, replaced, or obsoleted by other
documents at any time. It is inappropriate to use Internet-Drafts
as reference material or to cite them other than as "work in
progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html
This Internet-Draft will expire on April 27, 2007.
Copyright Notice
Copyright (C) The Internet Society (2006). All Rights
Reserved.
Abstract
This draft defines an architecture, and related protocols, for
performing dynamic Mobile IPv6 authorization and configuration
relying on a AAA infrastructure. The necessary interaction between
the AAA server of the home provider and the mobile node is
realized using EAP, exploiting the capability of some EAP methods
to convey generic information items together with authentication
data. This approach has the advantage that the access equipment
acts as a simple pass-through for EAP messages and therefore does
not play any active role in the Mobile IPv6 negotiation procedure,
which makes the solution easier to deploy and maintain.
Giaretta, et al. Expires - September 2006 [Page 1]
Internet-Draft MIPv6 Authorization based on EAP October 2006
Table of Contents
1. Introduction................................................3
2. Terminology.................................................4
3. Protocol Overview...........................................5
4. Requirements on EAP methods.................................9
5. Detailed description of the Protocol.......................11
5.1 Mobile node bootstrapping...............................11
5.2 Management of re-authentication events..................15
6. Home Agent considerations..................................16
6.1 Requirements on AAAH-HA communication...................16
6.2 Management of MIPv6 authorization state.................17
7. The MIPv6-Authorization container..........................18
7.1 PEAPv2..................................................18
7.2 EAP-FAST................................................19
7.3 EAP-SIM.................................................19
7.4 EAP-AKA.................................................19
7.5 EAP-TTLS................................................19
7.6 EAP-IKEv2...............................................20
8. New TLVs...................................................22
8.1 Service-Status-TLV......................................22
8.2 Service-Selection-TLV...................................22
8.3 Service-Options-TLV.....................................23
8.4 Home-Agent-Address-TLV..................................23
8.5 Home-Address-TLV........................................24
8.6 IKE-Authentication-Options-TLV..........................25
8.7 IKE-Bootstrap-Information-TLV...........................25
8.8 Negotiation-Result-TLV..................................26
8.9 Authorization-Lifetime-TLV..............................27
9. Security Considerations....................................28
10. References.................................................29
10.1 Normative References..................................29
10.2 Informative References................................29
Acknowledgments.................................................31
Authors’ Addresses..............................................31
Intellectual Property Statement.................................32
Giaretta, et al. Expires - April 2007 [Page 2]
Internet-Draft MIPv6 Authorization based on EAP October 2006
1. Introduction
Mobile IPv6 [RFC3775] requires that Mobile Nodes (MNs) and Home
Agents (HAs) share a set of configuration parameters: the MN must
know its Home Address, the Home Agent Address and the
cryptographic material needed to protect MIPv6 signaling (e.g.
shared keys or certificates to setup an IPsec security
association). MIPv6 base protocol does not specify any method to
automatically acquire this information; which means that network
administrators are normally required to manually set configuration
data on MNs and HAs.
Manual configuration of Home Agents and Mobile Nodes also works as
an implicit method for Mobile IPv6 authorization, because only the
users that have been administratively enabled on a specific Home
Agent are allowed to exploit Mobile IPv6 and its features.
However, in a large network (e.g. the network of a mobile
operator), which may include millions of users and many Home
Agents, the operational and administrative burden of this
procedure may easily become overwhelming. In addition, the
extensive use of manual and static configurations limits the
flexibility and reliability of the system, in that it is not
possible to dynamically assign the HA when the user enters the
network, which would help to optimize performance and resource
utilization (e.g. assignment of the HA closest to the MN’s point
of attachment).
This is generally referred to as the Mobile IPv6 bootstrapping
problem. As discussed in [RFC4640], several bootstrapping
scenarios can be identified depending on the relationship between
the network operator providing IP services to the MN (Access
Service Provider, ASP) and the service provider managing the HA
(Mobility Service Provider, MSP). This document describes a
solution to the bootstrapping problem that is applicable in a
scenario where the ASP and the MSP are the same provider
(Integrated ASP, IASP).
The proposed solution performs dynamic Mobile IPv6 authorization
and configuration together with MN authentication for network
access. MIPv6 negotiation and bootstrapping is controlled by the
AAA server of the home provider (IASP), that interacts with the
mobile node relying on AAA routing and EAP, exploiting the
capability of some EAP methods (e.g. PEAPv2 [PEAPv2], EAP-FAST
[EAP-FAST]) to convey generic information items together with
authentication data.
Giaretta, et al. Expires - April 2007 [Page 3]
Internet-Draft MIPv6 Authorization based on EAP October 2006
2. Terminology
General mobility terminology can be found in [RFC3753]. The
following additional terms are used here:
ASP Access Service Provider
IASP Integrated Access Service Provider
MSP Mobility Service Provider
AAA Authentication Authorization Accounting
AAAH AAA server of the Home domain
Giaretta, et al. Expires - April 2007 [Page 4]
Internet-Draft MIPv6 Authorization based on EAP October 2006
3. Protocol Overview
The basic idea behind the solution proposed herewith is to perform
Mobile IPv6 bootstrapping during the authentication procedure
undertaken by the Mobile Node to gain network access.
In particular, this draft defines a method to:
- explicitly authorize the use of Mobile IPv6 based on the service
profile of the user, its position within the network, etc.
- dynamically allocate a Home Agent to the Mobile Node;
- dynamically configure Mobile IPv6 start-up parameters (i.e.
MIPv6 bootstrapping) on the Mobile Node. These parameters
include the Home Address and the cryptographic material needed
to set-up the IPsec Security Association used to protect Mobile
IPv6 signaling (i.e. Binding Updates and Binding
Acknowledgements).
Figure 1 shows the overall architecture of the solution proposed
in this draft. The central element of the architecture is the AAA
server of the Home Domain (i.e. AAAH), which interacts with both
the MN and the selected HA to perform service authorization and
configuration.
AAA
Client
IEEE 802.1x +------+ RADIUS
or PANA | | or Diameter
+--------+ /--------------EAP Exchange-----------------\ +-------
-+
| Mobile |/ <------------Authentication---------------> \| AAAH
|
| Node |\ <--MIPv6 authorization and configuration--> /| Server
|
+--------+ \-------------------------------------------/ +-------
-+
| | /\
+------+ /||\
Router ||
or AP AAAH-HA ||
(pass through) Protocol ||
\||/
\/
+-------
-+
| Home
|
| Agent
|
+-------
-+
Figure 1 - Solution architecture
The solution is applicable to any access network relying on EAP
[RFC3748] for user authentication and works with all EAP methods
supporting the exchange of general purpose information elements,
in any form (e.g. TLVs or AVPs), between EAP peers. Exploiting
this capability, MN and AAAH can piggyback Mobile IPv6 negotiation
messages within the same EAP conversation used to carry out user
authentication.
Giaretta, et al. Expires - April 2007 [Page 5]
Internet-Draft MIPv6 Authorization based on EAP October 2006
This kind of operation is already supported by several tunneled
(e.g. PEAPv2 [PEAPv2]) and non tunneled (e.g. EAP-IKEv2 [EAP-
IKEv2]) EAP methods, that also include native support for
encryption, authentication and integrity protection of exchanged
configuration data (e.g. HA address).
Figure 2 shows an overview of the procedure defined to handle
MIPv6 bootstrap on the Mobile Node. For the sake of simplicity it
is assumed that the employed AAA protocol is Diameter, but
obviously RADIUS is suitable as well.
EAP over
IEEE 802.1x EAP over Diameter AAAH-HA
or PANA AAA (or RADIUS) AAAH Protocol
MN +---------+ Client +----------------+ Server +-------------+
HA
1) <--Req. Id.---
--Identity---> --Diameter EAP Req.-->
/-------------------------------------\
2) / Set-up of protected channel \
\ e.g. TLS Tunnel (optional) /
\-------------------------------------/
/-------------------------------------\
3) / Authentication \
\ Phase /
\-------------------------------------/
/-------------------------------------\ +-+ /--------------\
+-+
4) / Mobile IPv6 service \| |/ HoA selection \|
|
\ authorization and configuration /| |\ and HA config. /|
|
\-------------------------------------/ +-+ \--------------/
+-+
Home Agent
State
Selection
Set-up
5) <-----EAP----- <-----Diameter EAP----
Success/Failure Answer (Success/Failure
and authorization AVPs)
/----------------------------------------------------------\
6) / Set-up Security Association MN-HA and \
\ Mobile IPv6 registration (exchange of BU and BA) /
\----------------------------------------------------------/
Figure 2 - Overview of Mobile IPv6 bootstrap procedure
The whole procedure can be divided in six steps:
1. EAP identity exchange (i.e. exchange of EAP Request Identity and
EAP Response Identity messages);
2. set-up of a protected channel (e.g. TLS tunnel) for the delivery
of subsequent EAP signaling. This is an optional step that is
present only if the EAP method provides confidentiality support.
It is mandatory only if the MIPv6 negotiation procedure involves
the exchange of sensitive information;
3. authentication phase. The actual authentication procedure and
its security properties depend on the selected EAP method. In
Giaretta, et al. Expires - April 2007 [Page 6]
Internet-Draft MIPv6 Authorization based on EAP October 2006
tunneled EAP methods (e.g. PEAPv2) this step may involve one or
more complete EAP conversations occurring within a previously
negotiated TLS session. Each EAP conversation may accomplish
user authentication relying on any available EAP method (e.g.
EAP-MD5, EAP-SIM, EAP-AKA);
4. Mobile IPv6 service authorization and configuration. MN and AAAH
exchange a sequence of signaling messages to authorize and
configure Mobile IPv6. Those messages are encapsulated as
requested by the employed EAP method (e.g. TLVs or AVPs) and
delivered as part of the on-going EAP session. If the EAP method
provides confidentiality this protocol handshake is encrypted
using the previously negotiated ciphersuite. During this phase,
AAAH selects a suitable Home Agent for the MN and exchanges
authorization and configuration data with it using a AAAH-HA
protocol, whose specification is out of the scope of the present
document. Further analysis on the definition of such an
interface can be found in [AAAMIP6] and [AAAMIPFWK]. At the end
of this phase, the MN knows its own Home Address, the address of
the correspondent Home Agent, the peer authentication method
(i.e. certificates or pre-shared key) and the cryptographic
material (e.g. pre-shared key) needed to set-up an IPsec
security association with IKE [RFC2409]. The IKE pre-shared key
can be either constructed by AAAH and then delivered to MN in a
proper TLV (or AVP) or independently derived by MN and AAAH from
the EAP key hierarchy;
5. EAP session termination. Assuming the mobile node has been
successfully authenticated, the AAAH server sends a Diameter EAP
Answer message with Result-Code equal to SUCCESS. The AAA client
extracts the EAP Success message from the Diameter EAP Answer
and forwards it to the MN terminating the EAP session;
6. set-up of IPsec Security Association and MIPv6 registration. At
the end of the EAP communication, the MN gains network access
and acquires a valid Care-of Address within the visited subnet
(e.g. via stateless autoconfiguration); then it performs an IKE
exchange to establish the IPsec Security Association with the
HA, using the authentication method and the cryptographic
material negotiated during the MIPv6 service configuration phase
(step 4). Finally, the MN performs MIPv6 registration, sending a
Binding Update (protected with IPsec) to the HA.
This draft also defines the procedures to handle re-authentication
events and to manage the termination of the Mobile IPv6 session.
In summary, the proposed architecture has the following
advantages:
- allows the MSP to maintain a centralized management (on the AAA
server) of the user profiles and the authentication,
authorization and accounting procedures for any type of service,
including Mobile IPv6;
- improves the reliability and performance of the Mobile IPv6
protocol, in that the HA to be dynamically assigned to the MN
can be freely chosen among those that are closest to the user’s
point of attachment, thus optimizing network usage and reducing
the transfer delay for data traffic in bi-directional tunneling;
- can be deployed, or extended with new features, without having
to update the access equipment and the AAA protocols in use.
Only minor changes in the AAA servers, the Home Agents and the
mobile terminals are required, in that the AAA client does not
Giaretta, et al. Expires - April 2007 [Page 7]
Internet-Draft MIPv6 Authorization based on EAP October 2006
play any active role in MIPv6 negotiation (i.e. it is a pass-
through for EAP signaling). This reduces the deployment costs
and makes the solution easy to use even when a Mobile Node is
roaming with a provider different from its own;
- allows the usage of any AAA protocol supporting the transport of
EAP messages for the communication between the AAA client and
server (i.e. not just Diameter, but also RADIUS). This
significantly simplifies the deployment of MIPv6 in existing
communication networks, where support for Diameter protocol in
access equipment is not so extensive.
- allows the operator to dynamically choose the authentication
method for IKE bootstrapping and to automatically distribute the
pre-shared key eventually needed; in this way the pre-shared key
must not be pre-configured and can be frequently changed
increasing resistance to attacks. In the case of an EAP method
providing dynamic generation of keying material the pre-shared
key can be derived from EAP hierarchy avoiding the need to
explicitly send it to the MN [MIPv6AMSK].
As a whole, the solution adds a maximum of 2 RTTs (see the
detailed protocol description in section 5) to the EAP
conversation carried out by the mobile node to authenticate itself
and gain network access. The number of extra RTTs can be reduced
if the employed EAP method has the capability of transporting
MIPv6 negotiation TLVs (or AVPs) together with authentication
data. Nonetheless, it should be noted that the full negotiation
procedure can be undertaken by the MN only during its initial
bootstrapping, and therefore the performance requirements are not
so strict.
Giaretta, et al. Expires - April 2007 [Page 8]
Internet-Draft MIPv6 Authorization based on EAP October 2006
4. Requirements on EAP methods
In EAP methods, the EAP peer and EAP server exchange data in order
to authenticate the EAP peer and eventually the EAP server (mutual
authentication). This draft proposes the use of these exchanges to
transport MIPv6 parameters, as part of an handshake that requires
at maximum 2 RTTs. Thus, the main requirement for the
applicability of the solution is:
- the EAP method must provide a way to carry arbitrary parameters
during or after the authentication phase. This implies that the
EAP method must provide messages and mechanisms for this
purpose.
Then, for security reasons, the EAP method must provide the
following properties:
- mutual authentication: the EAP method must provide mutual
authentication. The access network must authenticate users
before granting them Mobile IPv6 service and the EAP peer should
authenticate the access network before delivering sensitive
data;
- integrity: the exchanged MIPv6 parameters must be protected
against any alteration and thus the EAP method must provide
integrity protection;
- replay protection: the EAP messages containing MIPv6 parameters
must be protected against Replay Attack, so that an attacker is
not able to get previous given data by replaying an old request;
- confidentiality: depending on which data the AAA server provides
to the mobile node (e.g. an IKE pre-shared key), it may be
necessary to protect the message exchange against eavesdropping.
The table below checks some existing EAP methods against the
requirements listed above.
M-A: Mutual Authentication
R-P: Replay Protection
+---+----------+---+---------------+-------------+
| | | | | Exchange |
|M-A| Integrity|R-P|Confidentiality| of arbitrary|
| | | | | Parameters |
+------------+---+----------+---+---------------+-------------+
| PEAPv2 | x | x | x | x | x |
+------------+---+----------+---+---------------+-------------+
| EAP-FAST | x | x | x | x | x |
+------------+---+----------+---+---------------+-------------+
| EAP-TTLS | x | x | x | x | x |
+------------+---+----------+---+---------------+-------------+
Giaretta, et al. Expires - April 2007 [Page 9]
Internet-Draft MIPv6 Authorization based on EAP October 2006
| EAP-IKEv2 | x | x | x | x | x |
+------------+---+----------+---+---------------+-------------+
| EAP-SIM | x | x | x | x | x |
+------------+---+----------+---+---------------+-------------+
| EAP-AKA | x | x | x | x | x |
+------------+---+----------+---+---------------+-------------+
| EAP-TLS | x | x | x | x | |
+------------+---+----------+---+---------------+-------------+
| EAP-MD5 | | | | | |
+------------+---|----------|---|---------------|-------------|
In summary, it is possible to note that the procedure described in
this draft can be successfully undertaken with several tunneled
(PEAPv2, EAP-FAST and EAP-TTLS) and non tunneled EAP methods (EAP-
IKEv2, EAP-SIM, EAP-AKA), that all support the transport of
arbitrary parameters.
Giaretta, et al. Expires - April 2007 [Page 10]
Internet-Draft MIPv6 Authorization based on EAP October 2006
5. Detailed description of the Protocol
This section details the procedures and message exchanges that can
be adopted by the network operator to explicitly authorize the
activation of Mobile IPv6 support for a specific user as well as
enable dynamic bootstrapping of MIPv6 protocol parameters (e.g.
Home Address, Home Agent Address).
5.1 Mobile node bootstrapping
If EAP is used for access control, when the MN enters the network
it is immediately polled for its identity, by means of an EAP
Request Identity message. This message is used to start the EAP
communication. The MN replies sending its identity, in the form of
a NAI (Network Access Identifier), within an EAP Response Identity
message, that is received by a AAA client (e.g. the Access Point
in the case of a Wireless LAN) and forwarded via AAA routing to
the AAAH server using the Diameter EAP Application (or the RADIUS
EAP extensions). Then the AAAH server selects an EAP method (e.g.
based on the user service profile) and proposes it to the MN in
subsequent EAP messages. In order to enable the Mobile IPv6
negotiation procedure defined in this document, the EAP method
chosen by the AAAH server must be an EAP method supporting the
transport of general purpose and variable length information
elements, in the form of TLVs (or AVPs), together with
authentication data (see section 4).
After this initial handshake, MN and AAAH undertake the actual
authentication phase, that may require the exchange of a variable
number of EAP Request/Response messages. In many EAP methods, like
PEAPv2 or EAP-IKEv2, the authentication phase is preceded by the
establishment of an encrypted channel between MN and AAAH that
provides protection capabilities (i.e. privacy, integrity
protection, etc.) for all the messages exchanged during the rest
of the EAP conversation.
As soon as the authentication phase is completed, the procedure
for MIPv6 bootstrapping may take place. For that purpose, the MN
and the AAAH server exploit the on-going EAP communication to
exchange a sequence of signaling messages transporting
configuration parameters.
All the messages used for MIPv6 bootstrapping are encoded in TLVs
carried by a generic MIPv6-Authorization container. This choice
simplifies a lot the deployment of the procedure with any EAP
method satisfying the requirements listed in section 4. In fact,
only the structure of the MIPv6-Authorization container needs to
be adapted to the actual message format of the employed EAP
method.
For the sake of simplicity, in this section it is assumed that the
EAP method used for network access authentication supports the
transport of arbitrary parameters in TLV format. In this case the
MIPv6-Authorization container becomes a MIPv6-Authorization-TLV.
Nonetheless, in section 7 the format of the container is defined
for all the EAP methods identified in section 4.
The whole bootstrapping procedure is depicted in Figure 3.
AAAH
MN +----------------------------+ Server +----------------+ HA
<---------------------
MIPv6-Authorization-TLV(
Giaretta, et al. Expires - April 2007 [Page 11]
Internet-Draft MIPv6 Authorization based on EAP October 2006
Service-Status,
[Service-Options])
----------------------->
MIPv6-Authorization-TLV(
Service-Selection, [Service-Options],
[Home-Agent-Address], [Home-Address],
[Interface-Identifier],
[IKE-Authentication-Options])
+-+ +-+
| |/----------------\| |
| |\----------------/| |
+-+ +-+
Home Agent HA
Selection
Conf.
<---------------------
MIPv6-Authorization-TLV(
Home-Address, Home-Agent-Address,
IKE-Bootstrap-Information,
Authorization-Lifetime)
----------------------->
MIPv6-Authorization-TLV(
Negotiation-Result)
Figure 3 - MIPv6 bootstrapping procedure
AAAH starts the MIPv6 negotiation phase sending to the MN a MIPv6-
Authorization-TLV including the following TLVs:
- Service-Status-TLV: used to communicate whether the home domain
is willing to provide Mobile IPv6 service to the MN. This might
depend on the user service profile or on other administrative
rules (e.g. service accountability);
- Service-Options-TLV (optional): used to specify other service
options the MN can ask for (e.g. allocation of a HA in the
visited domain).
MN replies to this first message confirming its intention to start
Mobile IPv6 and, optionally, providing a set of hints on the
desired service capabilities; this is achieved delivering a MIPv6-
Authorization-TLV including the following TLVs:
- Service-Selection-TLV: used by the MN to specify if it is
willing to activate Mobile IPv6 protocol operation;
- Service-Options-TLV (optional): used by the MN to communicate
which service options, among those previously advertised by
AAAH, it would like make use of;
- Home-Agent-Address-TLV (optional): used by the MN to suggest a
preferred Home Agent. This can be a HA with whom the MN has a
pre-configured Security Association or a HA acquired through
dynamic HA address discovery. The AAAH server treats this
indication just as a hint, which means that, for administrative
reasons, the MN may be assigned a Home Agent different from the
one previously requested;
- Home-Address-TLV (optional): used by the MN to suggest a
preferred Home Address (e.g. an address pre-configured on one of
Giaretta, et al. Expires - April 2007 [Page 12]
Internet-Draft MIPv6 Authorization based on EAP October 2006
its network interfaces); like the previous TLV, this indication
is considered only as a hint by the AAAH server;
- Interface-Identifier-TLV (optional): through this TLV, the MN
can suggest a preferred Interface Identifier (selected according
to [RFC3041] or following other criteria) to be used by the AAA
infrastructure to build the Home Address starting from the
selected home prefix. Also in this case, this information, if
present, is treated as a pure hint by the AAAH server.
- IKE-Authentication-Options-TLV (optional): through this TLV, the
MN communicates to the AAAH server in order of preference the
peer authentication methods it supports for IKE bootstrapping.
The lack of this TLV means that the MN supports only the default
method.
The solution described in this document supports the following
methods for peer authentication in IKE phase 1:
- use of a pre-shared key (PSK) derived by the AAAH server and
sent to the MN and the HA; in this case confidentiality must be
provided by both the AAAH-HA protocol and the EAP session
between the MN and the AAAH server. This is the default method.
- use of a pre-shared key independently derived by the MN and the
AAAH server from the keying material exported by the employed
EAP method. This key can be derived from an Application Master
Session Key (AMSK) specific to Mobile IPv6, which can be
constructed as explained in [MIPv6AMSK]. The PSK is then
delivered by the AAAH server to the HA by means of a AAAH-HA
protocol providing confidentiality;
- use of digital certificates. This solution involves the
employment of digital signatures and public key encryption as
stated in [RFC2409]. This method requires the availability of a
PKI.
If in the Service-Selection-TLV the MN has chosen not to make use
of Mobile IPv6, AAAH terminates the EAP communication sending an
EAP Success message, since the authentication procedure has been
accomplished successfully.
Otherwise, if the MN has confirmed its willingness to start MIPv6
service, AAAH selects a suitable Home Agent through a Home Agent
Selection Algorithm. Possible parameters to be taken into account
by this algorithm include: current load of available HAs (e.g.
number of active bindings), location of the MN and, eventually,
the preferences provided by the MN itself in the previous message
exchange (i.e. Service-Options-TLV, Home-Agent-Address-TLV, Home-
Address-TLV, IKE-Authentication-Options-TLV). For example, based
on the knowledge of the MN's current point of attachment (i.e. the
current AAA client), the AAAH server may select, among the HAs
available in the home domain, the one that is closest to the MN in
terms of IP routing hops. This approach is normally expected to
improve performance. However, the detailed definition of a Home
Agent Selection Algorithm is out of the scope of this document.
After a suitable HA has been identified, the AAAH server selects
the peer authentication method to be used in IKE phase 1. The peer
authentication methods supported by the MN are known from the IKE-
Authentication-Options-TLV received during the previous exchange.
If possible, the AAAH server should choose the method on top of
the list provided by the MN (i.e. the one with the highest
preference).
Giaretta, et al. Expires - April 2007 [Page 13]
Internet-Draft MIPv6 Authorization based on EAP October 2006
As soon as the peer authentication method has been identified, the
AAAH server interacts with the HA to dynamically configure the
state needed to enable subsequent MIPv6 protocol operations,
including the authorization lifetime of the MIPv6 service granted
to the MN and the necessary security parameters (e.g. pre-shared
key). Possible protocols that can be used for this purpose include
Diameter (through a new Diameter Application), SNMPv3 or COPS-PR.
Further details about this communication are provided in section
6. Anyway, the detailed specification of the interface between
AAAH and HA is out of the scope of this document. Additional
considerations on the nature and goals of such an interface can be
found in [AAAMIP6] and [AAAMIPFWK].
The security parameters that the AAAH server delivers to the HA
may vary depending on the peer authentication method chosen for
IKE bootstrapping:
- if the AAAH server selects pre-shared key as peer authentication
method it needs to send the chosen PSK (randomly generated or
derived from the EAP key hierarchy) to the HA together with the
associated lifetime;
- if the AAAH server selects a peer authentication method based on
certificates it does not need to derive keys nor to send
security parameters to the HA.
After the AAAH server has configured the state on the HA, it
continues the EAP session communicating to the MN all the MIPv6
configuration data it is waiting for. This is achieved delivering
to the MN an EAP Request containing a MIPv6-Authorization-TLV and
the following sub-TLVs: Home-Address-TLV (i.e. the home address),
Home-Agent-Address-TLV (i.e. the address of the HA), IKE-
Bootstrap-Information-TLV (i.e. the peer authentication method to
be used in IKE phase 1 and associated cryptographic material) and
Authorization-Lifetime-TLV (i.e. the lifetime granted to the MN
for this session).
After the MN has received all the configuration data from the AAAH
server (i.e. HA address, Home Address and IKE bootstrap
information), it sends back an EAP Response containing a
Negotiation-Result-TLV, stating whether it accepts, or refuses,
the proposed arrangement. If the MN refuses the configuration, the
AAAH server should immediately release the resources previously
allocated on the Home Agent.
After the completion of the EAP session, MN holds all data needed
to perform Mobile IPv6 registration: the MN knows its Home
Address, the address of the correspondent Home Agent and all
cryptographic data needed to establish the IPsec security
association with it; furthermore, since it has been successfully
authenticated, the MN can acquire an IPv6 address to be used as
Care-of Address.
The first operation carried out by the MN after the acquisition of
the Care-of Address is the establishment of the IPsec Security
Association with the HA, that is mandated by [RFC3775] to protect
MIPv6 location update signaling. Set-up of the IPsec SA can be
accomplished following the procedure detailed in [RFC3776].
As soon as the IPsec Security Association is established, MN can
send a Binding Update to the HA, thus starting up Mobile IPv6
service.
Giaretta, et al. Expires - April 2007 [Page 14]
Internet-Draft MIPv6 Authorization based on EAP October 2006
5.2 Management of re-authentication events
At the expiration of AAA session time-outs or after a change in
the point of attachment to the network (e.g. change of Access
Point), a re-authentication procedure is performed leading to the
user identity to be checked again along with its right to continue
exploiting network resources. To that purpose the AAAH server may
repeat a full authentication or, alternatively, decide to use
optimizations in order to make the procedure faster. Once this
phase is completed the AAAH server also undertakes the re-
negotiation of the MIPv6 service.
Since the MIPv6 bootstrapping procedure is assumed to be
completely stateless, when a re-authentication event occurs the
AAAH server may not know the state of the MIPv6 service on the MN.
For this reason the AAAH server starts the MIPv6 negotiation like
in the bootstrapping case: it delivers a MIPv6-Authorization-TLV
containing a Service-Status-TLV and optionally a Service-Options-
TLV.
If the MIPv6 service is not active on the MN the procedure
continues as described in section 5.1. Otherwise, the MN replies
with a MIPv6-Authorization-TLV containing a Service-Selection-TLV
indicating that the MIPv6 service is already in use. Furthermore,
the MN inserts the Home-Agent-Address-TLV, the Home-Address-TLV
and the IKE-Authentication-Options-TLV to inform the AAAH server
about its current state. The AAAH server can then get in touch
with the HA to check the integrity of the state, renew the MIPv6
authorization lifetime and eventually refresh the security
parameters.
If the peer authentication method used by the MN in IKE phase 1 is
pre-shared key, the AAAH server must derive a new PSK and send it
to the HA together with the associated lifetime. In case the PSK
is not derived from the EAP key hierarchy (i.e. it is randomly
generated by the AAAH server), the AAAH server must communicate it
also to the MN. Instead, in case of authentication based on
certificates, the AAAH server does not need to derive keys nor
deliver additional security data to the HA and the MN.
If the state on the HA is successfully updated, the AAAH server
terminates the EAP communication sending an EAP Success message.
Otherwise, the AAAH server should continue the EAP communication
renegotiating the MIPv6 service (i.e. allocation of a new HA and
related Home Address).
This solution can be easily deployed even within a network
including several AAA servers, each one managing a subset of the
available Network Access Servers (NASs). This is because the re-
negotiation procedure does not assume to have any long term state
related to Mobile IPv6 stored on the AAAH server. In this way,
everything works correctly even if, due to MN's movements within
the network, the AAAH server that handles the re-authentication is
not the same server that authenticated the MN for the first time
and performed the MIPv6 bootstrapping procedure.
As explained above, the re-authentication events are normally
triggered by the network. Nonetheless, if the EAP lower layer
offers a way to trigger EAP re-authentications (e.g. PANA supports
this feature), it may be possible for the MN to re-negotiate the
MIPv6 service at any time.
Giaretta, et al. Expires - April 2007 [Page 15]
Internet-Draft MIPv6 Authorization based on EAP October 2006
6. Home Agent considerations
This section provides further thoughts about the AAAH-HA
communication and lists specific features that have to be
supported by the Home Agent to allow dynamic negotiation of Mobile
IPv6 protocol parameters.
6.1 Requirements on AAAH-HA communication
This draft details only the message exchange between the MN and
the AAAH server. Obviously a complete Mobile IPv6 bootstrapping
solution requires also the definition of a mechanism for the
communication between the AAAH server and the Home Agent. Possible
protocols that may be used for this purpose include SNMPv3, COPS-
PR or Diameter but a formal definition of such a protocol is out
of scope of this document.
A detailed analysis of the goals for a generic AAAH-HA protocol
can be found in [AAAMIP6]; in this section some requirements,
specific to this scenario, are highlighted.
The selected protocol should allow the AAAH server to:
- use a Network Access Identifier (NAI) to identify the mobile
node in the communication with the HA;
- send an authorization lifetime to the HA to limit Mobile IPv6
session duration for the MN;
- send to the HA a set of hints for the construction of the Home
Address (e.g. a preferred Home Address or a preferred Interface
Identifier);
- poll the designated HA for the allocation of a Home Address to
the MN;
- force the HA to terminate an active Mobile IPv6 session for
authorization policy reasons (e.g. credit exhaustion or
reallocation of a new HA to the MN);
- enforce explicit operational limitations and authorization
restrictions on the HA (e.g. packet filters, QoS parameters);
- retrieve the Mobile IPv6 state associated to a specific MN from
the correspondent HA. This may be useful to periodically verify
the Mobile IPv6 service status;
- send to the HA the security data needed to setup the IPsec SA
with the MN. Possible security data are the authentication
method and the cryptographic material to be used for IKE
bootstrapping.
Moreover, the protocol selected to implement the communication
between the AAAH server and the HA should fulfill the following
general requirements:
- the AAAH server and the HA must be able to authenticate each
other (mutual authentication) in order to prevent the
installation of unauthorized state on the HA;
- the AAA-HA interface must provide integrity protection in order
to prevent any alteration of exchanged data (e.g. Mobile IPv6
configuration parameters);
Giaretta, et al. Expires - April 2007 [Page 16]
Internet-Draft MIPv6 Authorization based on EAP October 2006
- the AAA-HA interface must provide replay protection;
- the AAA-HA interface should provide confidentiality since it may
be used to transfer security parameters (e.g. IKE pre-shared
key);
- the AAA-HA interface should support inactive peer detection.
This functionality can be used by the AAAH server to maintain a
list of active HAs (e.g. useful for HA selection);
6.2 Management of MIPv6 authorization state
The Home Agent is required to store some authorization data for
each of the MNs it is serving. A new data structure may be used
for this purpose and it should include at least the following
fields:
- NAI of the user;
- Home Address assigned to the MN;
- Cryptographic Data: this field includes the peer authentication
method to be used in IKE and, if needed, the pre-shared key and
its lifetime;
- Authorization Lifetime: it is the lifetime of the Mobile IPv6
service granted to the MN;
At the expiration of the Authorization Lifetime the HA should
check if there is an active entry for the MN in its Binding Cache
in order to verify if the MN is still using Mobile IPv6. If the
entry is available the Home Agent should negotiate with the AAAH
server an extension of the Authorization Lifetime granted to the
MN. Otherwise, the HA should immediately release the authorization
state associated to that MN and eventually notify the session
termination to the AAAH server (e.g. by means of a Session
Termination Request if the employed AAAH-HA protocol is Diameter).
Moreover, the release of the resources previously allocated on the
Home Agent can be undertaken at any time by the AAAH server.
Typically this happens at credit exhaustion or when the MN
disconnects from the network.
The policies adopted by the AAAH server to release the resources
allocated to the MN may vary depending on the user service
profile. For instance, the AAAH server may decide to postpone the
release of the resources on the HA in order to allow the MN to
continue using the Mobile IPv6 service even if it has moved to an
access network for which no roaming agreements are in place (e.g.
a corporate network or a network providing cost-free access). In
that case, the MN can continue to rely on the IPsec SA previously
negotiated with the HA and the respective authorization is managed
through the Mobile IPv6 Authorization Lifetime.
Giaretta, et al. Expires - April 2007 [Page 17]
Internet-Draft MIPv6 Authorization based on EAP October 2006
7. The MIPv6-Authorization container
All the messages used for MIPv6 bootstrapping are encoded in TLVs
carried by a generic MIPv6-Authorization container. In this way,
only the structure of the container needs to be adapted to the
actual message format of the employed EAP method.
The MIPv6-Authorization container can be implemented as a TLV, as
an AVP or in some other way depending on the specific
characteristics of the EAP method used for network access
authentication (see Figure 4).
+----------------------------------------------------------+
| MIPv6 bootstrapping TLVs (Sec. 8) |
+------+--------------+--------------+--------------+------+
| | | |
| | | |
+------+-----+ +------+-----+ +------+-----+ +------+------+
| MIPv6 | | MIPv6 | | MIPv6 | | MIPv6 |
| Auth. TLV | | Auth. TLV | | Auth. AVP | | Auth. IKEv2 |
| | | | | | | Payload |
| (Sec. 7.1) | | (Sec. 7.3) | | (Sec. 7.5) | | (sec. 7.6) |
+------------+ +------------+ +------------+ +-------------+
| PEAPv2 | | EAP-SIM | | EAP-TTLS | | EAP-IKEv2 |
| EAP-FAST | | EAP-AKA | | | | |
+------------+ +------------+ +------------+ +-------------+
Figure 4 - Transport of MIPv6 bootstrapping messages
In the following the format of the MIPv6-Authorization container
is defined for each EAP method identified in section 4. This list
is not exhaustive and does not prevent the use of other EAP
methods satisfying all the requirements listed in this document.
7.1 PEAPv2
The exchange of arbitrary information in PEAPv2 is based on EAP-
TLVs. In this case the MIPv6-Authorization container is encoded as
an EAP-TLV and has the structure depicted below:
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0
1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
+-+
|M|R| Type | Length
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
+-+
| Value
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
+-+
M
0 - Non-mandatory TLV
R
Reserved, set to zero (0)
Giaretta, et al. Expires - April 2007 [Page 18]
Internet-Draft MIPv6 Authorization based on EAP October 2006
Type
TBD - MIPv6-Authorization
Length
The length of the Value field in octets
Value
This field carries the subsequent TLVs
7.2 EAP-FAST
The format of the messages for EAP-FAST [EAP-FAST] is the same as
PEAPv2.
7.3 EAP-SIM
EAP-SIM [EAP-SIM] allows the transport of additional information
in form of TLVs. The format of the MIPv6-Authorization container
is depicted below:
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0
1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
+-+
| Type | Length | Value
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
+-+
Type
TBD – MIPv6-Authorization
Length
Indicates the length of this attribute in multiples of four
bytes. The maximum length of an attribute is 1024 bytes. The
length includes the Type and Length bytes.
Value
This field carries the subsequent TLVs
7.4 EAP-AKA
The format of the messages for EAP-AKA [EAP-AKA] is the same as
EAP-SIM.
7.5 EAP-TTLS
EAP-TTLS messages [EAP-TTLS] allow the exchange of arbitrary data
in the form of AVPs encapsulated in the TLS record. The MIPv6-
Authorization container is encoded as depicted below:
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0
1
Giaretta, et al. Expires - April 2007 [Page 19]
Internet-Draft MIPv6 Authorization based on EAP October 2006
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
+-+
| AVP Code
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
+-+
|V M r r r r r r| AVP Length
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
+-+
| Vendor ID (opt)
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
+-+
| Data
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
+-+
AVP Code
TBD - MIPv6-Authorization
Flag 'V' (Vendor-Specific)
0
Flag 'M' (Mandatory)
0
Flag 'r' (reserved)
must be set to 0
AVP Length
the length of this AVP including the AVP Code, AVP
Length, flags, Vendor-ID (if present) and Data.
Data
this field carries subsequent TLVs
7.6 EAP-IKEv2
EAP-IKEv2 [EAP-IKEv2] allows the transport of generic data in the
form of IKEv2 payloads. The MIPv6-Authorization container is
encoded as depicted below:
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0
1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
+-+
| Next Payload |C| RESERVED | Payload Length
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
+-+
| Data
~
Giaretta, et al. Expires - April 2007 [Page 20]
Internet-Draft MIPv6 Authorization based on EAP October 2006
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
+-+
Next Payload (1 octet)
TBD - MIPv6-Authorization
Critical (1 bit)
must be set to zero
RESERVED (7 bits)
must be sent as zero; must be ignored on receipt.
Payload Length (2 octets)
Length in octets of the current payload, including the
generic
payload header
Data
It contains subsequent TLVs
Giaretta, et al. Expires - April 2007 [Page 21]
Internet-Draft MIPv6 Authorization based on EAP October 2006
8. New TLVs
Independently from the EAP method used for network access
authentication, the MIPv6-Authorization container enables to
transport a series of TLVs. This gives more flexibility to the
whole solution and permits the definition of new TLVs that do not
need to be bound to a specific EAP method.
The following TLVs have been defined so far:
Service-Status-TLV
Service-Selection-TLV
Service-Options-TLV
Home-Agent-Address-TLV
Home-Address-TLV
IKE-Authentication-Options-TLV
IKE-Bootstrap-Information-TLV
Negotiation-Result-TLV
8.1 Service-Status-TLV
This TLV is sent by the AAAH to inform the MN about the status of
Mobile IPv6 service. It is defined as follows:
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0
1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
+-+
| Type=Service-Status | Length
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
+-+
| Code |
+-+-+-+-+-+-+-+-+
Type
TBD - Service-Status
Length
1
Code
0 = MIPv6 service is available
1 = MIPv6 service is not available
8.2 Service-Selection-TLV
This TLV is sent by the MN to inform the AAAH whether it wants to
activate MIPv6 service or whether the service is already active.
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0
1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
+-+
| Type=Service-Selection | Length
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
+-+
| Code |
Giaretta, et al. Expires - April 2007 [Page 22]
Internet-Draft MIPv6 Authorization based on EAP October 2006
+-+-+-+-+-+-+-+-+
Type
TBD - Service-Selection
Length
1
Code
0 = activate MIPv6 service
1 = MIPv6 service already active
2 = do not activate MIPv6 service
8.3 Service-Options-TLV
This TLV is used by the AAAH server to advertise the service
options the MN can ask for. It is also used by the MN to
communicate its selection to the AAAH. So far only the HA in
visited domain option has been defined. The TLV has the following
format:
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0
1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
+-+
| Type=Service-Options | Length
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
+-+
|V| Reserved |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type
TBD - Service-Options
Length
2
V
from AAAH to MN:
0 = AAAH cannot provide a HA in the visited domain
1 = AAAH can provide a HA in the visited domain
from MN to AAAH:
0 = MN does not specify any preference on HA location
1 = MN is requesting a HA in the visited domain
Reserved
15 bit reserved set to 0
8.4 Home-Agent-Address-TLV
This TLV carries the Home Agent’s address and it’s defined as
follows:
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0
1
Giaretta, et al. Expires - April 2007 [Page 23]
Internet-Draft MIPv6 Authorization based on EAP October 2006
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
+-+
| Type=HA-Address | Length
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
+-+
|
|
| Home Agent Address
|
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
+-+
Type
TBD - Home-Agent-Address
Length
16
Value
Home Agent Address
8.5 Home-Address-TLV
This TLV carries the Home Address assigned to the MN. It is
defined as follows:
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0
1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
+-+
| Type=Home-Address | Length
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
+-+
|
|
| Home Address
|
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
+-+
Type
TBD - Home-Address
Length
16
Giaretta, et al. Expires - April 2007 [Page 24]
Internet-Draft MIPv6 Authorization based on EAP October 2006
Value
Home Address
8.6 IKE-Authentication-Options-TLV
This TLV carries data related to IKE bootstrapping. If used during
the initial MIPv6 bootstrapping procedure, the value field
contains the list of peer authentication methods supported by the
MN. Otherwise, if used during re-authentication events, the value
field contains only the peer authentication method currently in
use.
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0
1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
+-+
|Type=IKE-Authentication-Options| Length
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
+-+
| AuthMethod-1 | AuthMethod-2 | ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
+-+
Type
TBD - IKE-Authentication-Options
Length
Length of this TLV.
Value
AuthMethod – code corresponding to the authentication method
supported for IKE phase 1. All the methods
supported by the MN are inserted in order of
preference. The following values are defined:
Authentication Method AuthMethod
PSK (pre-shared key generated by AAAH) 0
AMSK (pre-shared key derived from EAP) 1
CERT (use of certificates) 2
8.7 IKE-Bootstrap-Information-TLV
This TLV carries data related to the set-up of an IPsec Security
Association with the Home Agent. It contains the peer
authentication method to be used for IKE phase 1 and, eventually,
the related cryptographic material (e.g. pre-shared key).
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0
1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
+-+
Giaretta, et al. Expires - April 2007 [Page 25]
Internet-Draft MIPv6 Authorization based on EAP October 2006
|Type= IKE-Bootstrap-Information| Length
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
+-+
| AuthMethod | key Length
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
+-+
| Key Lifetime
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
+-+
| Key Value
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
+-+
Type
TBD - IKE-Bootstrap-Information
Length
Length of this TLV.
Value
AuthMethod – the authentication method to be used in IKE
phase 1. This field can assume a value among
those defined in section 8.6 (i.e. PSK, AMSK
or CERT).
Key Length – the length of the key to be used as pre-shared
key
for IKE phase 1 authentication. This field must
be
present if AuthMethod is set to PSK and may be
present if AuthMethod is set to AMSK.
Key Lifetime - the lifetime of the key in seconds. A value
of
all ones means infinite. This field is
present
only if the AuthMethod field is set to PSK or
AMSK.
Key Value – the value of the key. This field is present only
if
the AuthMethod field is set to PSK.
8.8 Negotiation-Result-TLV
It is defined as follows:
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0
1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
+-+
| Type=Negotiation-Result | Length
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
+-+
| Result-Code |
Giaretta, et al. Expires - April 2007 [Page 26]
Internet-Draft MIPv6 Authorization based on EAP October 2006
+-+-+-+-+-+-+-+-+
Type
TBD - Result
Length
1
Value
0 = Success
128 = Failure
8.9 Authorization-Lifetime-TLV
It is defined as follows:
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0
1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
+-+
| Type= Authorization-Lifetime | Length
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
+-+
| Authorization-Lifetime |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type
TBD - Authorization-Lifetime
Length
2
Value
The lifetime granted to the MN (in seconds)
Giaretta, et al. Expires - April 2007 [Page 27]
Internet-Draft MIPv6 Authorization based on EAP October 2006
9. Security Considerations
The Mobile IPv6 bootstrapping procedure described in this document
assumes the MN and the AAA server of the home domain exchange the
necessary parameters exploiting the EAP communication established
for network access authentication. Therefore, to secure the
bootstrapping procedure, the employed EAP method must support
mutual authentication as well as integrity and replay protection.
Moreover, if the pre-shared key needed to bootstrap the IPsec SA
with the Home Agent is not derived from the EAP key hierarchy but
explicitly delivered to the MN by the AAAH server, the EAP method
must also provide confidentiality. Several tunneled and non
tunneled EAP methods, like PEAPv2 and EAP-IKEv2, fulfill all of
these security requirements.
Giaretta, et al. Expires - April 2007 [Page 28]
Internet-Draft MIPv6 Authorization based on EAP October 2006
10. References
10.1 Normative References
[RFC3775] Johnson, D., Perkins, C. and J. Arkko, "Mobility
Support
in IPv6”, RFC 3775, June 2004.
[RFC3776] Arkko, J., Devarapalli, V., Dupont, F., "Using IPsec
to
Protect Mobile IPv6 Signaling between Mobile Nodes and
Home Agents", RFC 3776, June 2004.
[RFC3748] B. Aboba, L. Blunk, J. Vollbrecht, J. Carlson, H.
Levkowetz, "Extensible Authentication Protocol (EAP)",
RFC 3748, June 2004.
[RFC2409] Harkins, D., Carrel, D., "The Internet Key Exchange
(IKE)", RFC 2409, November 1998.
[PEAPv2] Palekar, A. et al., "Protected EAP Protocol (PEAP)
Version 2", draft-josefsson-pppext-eap-tls-eap-11
(work
in progress), September 2005.
[EAPKEYFWK] Aboba, B., Simon, D., Arkko, J., Levkowetz, H.,
"Extensible Authentication Protocol (EAP) Key
Management
Framework", draft-ietf-eap-keying-14 (work in
progress),
June 2006.
[MIPv6AMSK] Giaretta, G., Guardini, I., Demaria, E., Bournelle,
J., Laurent-Maknavicius, M., "Application Master
Session
Key (AMSK) for Mobile IPv6", draft-giaretta-mip6-amsk-
02
(work in progress), October 2006
10.2 Informative References
[RFC4640] Patel, A., Giaretta, G., "Problem Statement for
bootstrapping Mobile IPv6 (MIPv6)”, RFC 4640,
September 2006.
[RFC3753] Manner, J., Kojo, M. "Mobility Related Terminology”,
RFC
3753, June 2004.
[RFC3041] Narten, T., Draves, R., "Privacy Extensions for
Stateless
Address Autoconfiguration in IPv6", RFC 3041, January
2001.
[AAAMIP6] Giaretta, G., Guardini, I., Demaria, E., Bournelle,
J.,
Lopez, R., "AAA Goals for Mobile IPv6", draft-ietf-
mip6-aaa-ha-goals-03 (work in progress), September
2006
[AAAMIPFWK] Yegin, A., "AAA Mobile IPv6 Application Framework",
draft-yegin-mip6-aaa-fwk-01 (expired), February
2005
Giaretta, et al. Expires - April 2007 [Page 29]
Internet-Draft MIPv6 Authorization based on EAP October 2006
[RFC3084] K. Chan, D. Durham, S. Gai, S. Herzog, K. McCloghrie,
F.
Reichmeyer, J. Seligson, A. Smith, R. Yavatkar, "COPS
Usage for Policy Provisioning,", RFC 3084, March 2001.
[MIPv6APP] Faccin, S., Perkins, C., Le, F., Patil, B., "Diameter
Mobile IPv6 Application", draft-le-aaa-diameter-
mobileipv6-04 (expired), November 2004.
[PANA] Forsberg, D. et al., "Protocol for Carrying
Authentication for Network Access (PANA)", draft-ietf-
pana-pana-12 (work in progress), August 2006.
[RFC3410] Case, J., Mundy, R., Partain, D. and B. Stewart,
"Introduction and Applicability Statements for
Internet-
Standard Management Framework", RFC 3410, December
2002.
[EAP-TTLS] Funk, P., Blake-Wilson, S., "EAP Tunneled TLS
Authentication Protocol (EAP-TTLS)", draft-ietf-
pppext-
eap-ttls-05 (expired), July 2004.
[EAP-IKEv2] Tschofenig, H., Kroeselberg, D., Ohba, Y., "EAP
IKEv2 Method", draft-tschofenig-eap-ikev2-11 (work in
progress), June 2006.
[EAP-SIM] Haverinen, H. and J. Salowey, "Extensible
Authentication
Protocol Method for GSM Subscriber Identity Modules
(EAP-
SIM)", RFC 4186, January 2006.
[EAP-AKA] Arkko, J. and H. Haverinen, "EAP-AKA Authentication",
RFC 4187, January 2006.
[EAP-FAST] N.Cam-Winget, D. McGrew, J. Salowey, H.Zhou, "The
Flexible Authentication via Secure Tunneling
Extensible
Authentication Protocol Method (EAP-FAST)", draft-cam-
winget-eap-fast-05.txt (work in progress), October
2006.
Giaretta, et al. Expires - April 2007 [Page 30]
Internet-Draft MIPv6 Authorization based on EAP October 2006
Acknowledgments
The authors would like to thank Simone Ruffino, Tom Hiller, Hannes
Tschofening, Rafael Marin Lopez, Hiroyuki Ohnishi, Mayumi
Yanagiya, James Kempf and Yoshihiro Ohba for their valuable
comments.
Authors’ Addresses
Gerardo Giaretta
Telecom Italia Lab
via G. Reiss Romoli, 274
10148 TORINO
Italy
Phone: +39 011 2286904
Email: gerardo.giaretta@telecomitalia.it
Ivano Guardini
Telecom Italia Lab
via G. Reiss Romoli, 274
10148 TORINO
Italy
Phone: +39 011 2285424
Email: ivano.guardini@telecomitalia.it
Elena Demaria
Telecom Italia Lab
via G. Reiss Romoli, 274
10148 TORINO
Italy
Phone: +39 011 2285403
Email: elena.demaria@telecomitalia.it
Julien Bournelle
GET/INT
9 rue Charles Fourier
Evry 91011
France
Email: julien.bournelle@int-evry.fr
Maryline Laurent-Maknavicius
GET/INT
9 rue Charles Fourier
Evry 91011
France
Email: maryline.maknavicius@int-evry.fr
Giaretta, et al. Expires - April 2007 [Page 31]
Internet-Draft MIPv6 Authorization based on EAP October 2006
Intellectual Property Statement
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed
to pertain to the implementation or use of the technology described
in this document or the extent to which any license under such
rights might or might not be available; nor does it represent that
it has made any independent effort to identify any such rights.
Information on the procedures with respect to rights in RFC
documents can be found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use
of such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository
at http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Disclaimer of Validity
This document and the information contained herein are provided on
an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE
REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND
THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES,
EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT
THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR
ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A
PARTICULAR PURPOSE.
Copyright Statement
Copyright (C) The Internet Society (2006). This document is subject
to the rights, licenses and restrictions contained in BCP 78, and
except as set forth therein, the authors retain all their rights.
Acknowledgement
Funding for the RFC Editor function is currently provided by the
Internet Society.
Giaretta, et al. Expires - April 2007 [Page 32] | PAFTECH AB 2003-2026 | 2026-04-22 03:56:50 |