One document matched: draft-giaretta-mip6-authorization-eap-04.txt

Differences from draft-giaretta-mip6-authorization-eap-03.txt




   MIP6 Working Group                                       G. Giaretta 
   Internet Draft                                           I. Guardini 
   Expires: April 2007                                       E. Demaria 
                                                         Telecom Italia 
                                                           J. Bournelle 
                                                 M. Laurent-Maknavicius 
                                                                GET/INT 
                                                           October 2006 
    
           MIPv6 Authorization and Configuration based on EAP 
             <draft-giaretta-mip6-authorization-eap-04.txt> 
    
    
Status of this Memo 
    
   By submitting this Internet-Draft, each author represents that       
   any applicable patent or other IPR claims of which he or she is       
   aware have been or will be disclosed, and any of which he or she       
   becomes aware will be disclosed, in accordance with Section 6 of       
   BCP 79. 
    
   Internet-Drafts are working documents of the Internet Engineering 
   Task Force (IETF), its areas, and its working groups.  Note that 
   other groups may also distribute working documents as Internet-
   Drafts. 
   Internet-Drafts are draft documents valid for a maximum of six 
   months and may be updated, replaced, or obsoleted by other 
   documents at any time.  It is inappropriate to use Internet-Drafts 
   as reference material or to cite them other than as "work in 
   progress." 
    
   The list of current Internet-Drafts can be accessed at 
        http://www.ietf.org/ietf/1id-abstracts.txt 
    
   The list of Internet-Draft Shadow Directories can be accessed at 
        http://www.ietf.org/shadow.html 
    
   This Internet-Draft will expire on April 27, 2007. 
    
   Copyright Notice 
    
      Copyright (C) The Internet Society (2006).  All Rights 
   Reserved. 
 
Abstract 
    
   This draft defines an architecture, and related protocols, for 
   performing dynamic Mobile IPv6 authorization and configuration 
   relying on a AAA infrastructure. The necessary interaction between 
   the AAA server of the home provider and the mobile node is 
   realized using EAP, exploiting the capability of some EAP methods 
   to convey generic information items together with authentication 
   data. This approach has the advantage that the access equipment 
   acts as a simple pass-through for EAP messages and therefore does 
   not play any active role in the Mobile IPv6 negotiation procedure, 
   which makes the solution easier to deploy and maintain. 
 








 
 
Giaretta, et al.           Expires - September 2006           [Page 1] 
Internet-Draft     MIPv6 Authorization based on EAP       October 2006 
 
 
Table of Contents 
    
   1.   Introduction................................................3 
   2.   Terminology.................................................4 
   3.   Protocol Overview...........................................5 
   4.   Requirements on EAP methods.................................9 
   5.   Detailed description of the Protocol.......................11 
      5.1  Mobile node bootstrapping...............................11 
      5.2  Management of re-authentication events..................15 
   6.   Home Agent considerations..................................16 
      6.1  Requirements on AAAH-HA communication...................16 
      6.2  Management of MIPv6 authorization state.................17 
   7.   The MIPv6-Authorization container..........................18 
      7.1  PEAPv2..................................................18 
      7.2  EAP-FAST................................................19 
      7.3  EAP-SIM.................................................19 
      7.4  EAP-AKA.................................................19 
      7.5  EAP-TTLS................................................19 
      7.6  EAP-IKEv2...............................................20 
   8.   New TLVs...................................................22 
      8.1  Service-Status-TLV......................................22 
      8.2  Service-Selection-TLV...................................22 
      8.3  Service-Options-TLV.....................................23 
      8.4  Home-Agent-Address-TLV..................................23 
      8.5  Home-Address-TLV........................................24 
      8.6  IKE-Authentication-Options-TLV..........................25 
      8.7  IKE-Bootstrap-Information-TLV...........................25 
      8.8  Negotiation-Result-TLV..................................26 
      8.9  Authorization-Lifetime-TLV..............................27 
   9.   Security Considerations....................................28 
   10.  References.................................................29 
      10.1   Normative References..................................29 
      10.2   Informative References................................29 
   Acknowledgments.................................................31 
   Authors’ Addresses..............................................31 
   Intellectual Property Statement.................................32 
    



























 
 
Giaretta, et al.              Expires - April 2007           [Page 2] 
Internet-Draft     MIPv6 Authorization based on EAP       October 2006 
 
 
1. Introduction 
    
   Mobile IPv6 [RFC3775] requires that Mobile Nodes (MNs) and Home 
   Agents (HAs) share a set of configuration parameters: the MN must 
   know its Home Address, the Home Agent Address and the 
   cryptographic material needed to protect MIPv6 signaling (e.g. 
   shared keys or certificates to setup an IPsec security 
   association). MIPv6 base protocol does not specify any method to 
   automatically acquire this information; which means that network 
   administrators are normally required to manually set configuration 
   data on MNs and HAs. 
    
   Manual configuration of Home Agents and Mobile Nodes also works as 
   an implicit method for Mobile IPv6 authorization, because only the 
   users that have been administratively enabled on a specific Home 
   Agent are allowed to exploit Mobile IPv6 and its features. 
    
   However, in a large network (e.g. the network of a mobile 
   operator), which may include millions of users and many Home 
   Agents, the operational and administrative burden of this 
   procedure may easily become overwhelming. In addition, the 
   extensive use of manual and static configurations limits the 
   flexibility and reliability of the system, in that it is not 
   possible to dynamically assign the HA when the user enters the 
   network, which would help to optimize performance and resource 
   utilization (e.g. assignment of the HA closest to the MN’s point 
   of attachment). 
    
   This is generally referred to as the Mobile IPv6 bootstrapping 
   problem. As discussed in [RFC4640], several bootstrapping 
   scenarios can be identified depending on the relationship between 
   the network operator providing IP services to the MN (Access 
   Service Provider, ASP) and the service provider managing the HA 
   (Mobility Service Provider, MSP). This document describes a 
   solution to the bootstrapping problem that is applicable in a 
   scenario where the ASP and the MSP are the same provider 
   (Integrated ASP, IASP). 
    
   The proposed solution performs dynamic Mobile IPv6 authorization 
   and configuration together with MN authentication for network 
   access. MIPv6 negotiation and bootstrapping is controlled by the 
   AAA server of the home provider (IASP), that interacts with the 
   mobile node relying on AAA routing and EAP, exploiting the 
   capability of some EAP methods (e.g. PEAPv2 [PEAPv2], EAP-FAST 
   [EAP-FAST]) to convey generic information items together with 
   authentication data. 
    
    
















 
 
Giaretta, et al.              Expires - April 2007           [Page 3] 
Internet-Draft     MIPv6 Authorization based on EAP       October 2006 
 
 
2. Terminology 
 
   General mobility terminology can be found in [RFC3753]. The 
   following additional terms are used here: 
    
   ASP     Access Service Provider 
    
   IASP    Integrated Access Service Provider 
    
   MSP     Mobility Service Provider 
    
   AAA     Authentication Authorization Accounting 
    
   AAAH    AAA server of the Home domain 
 
 
















































 
 
Giaretta, et al.              Expires - April 2007           [Page 4] 
Internet-Draft     MIPv6 Authorization based on EAP       October 2006 
 
 
3. Protocol Overview 
    
   The basic idea behind the solution proposed herewith is to perform 
   Mobile IPv6 bootstrapping during the authentication procedure 
   undertaken by the Mobile Node to gain network access. 
   In particular, this draft defines a method to: 
    
   - explicitly authorize the use of Mobile IPv6 based on the service 
     profile of the user, its position within the network, etc. 
    
   - dynamically allocate a Home Agent to the Mobile Node; 
 
   - dynamically configure Mobile IPv6 start-up parameters (i.e. 
     MIPv6 bootstrapping) on the Mobile Node. These parameters 
     include the Home Address and the cryptographic material needed 
     to set-up the IPsec Security Association used to protect Mobile 
     IPv6 signaling (i.e. Binding Updates and Binding 
     Acknowledgements). 
 
   Figure 1 shows the overall architecture of the solution proposed 
   in this draft. The central element of the architecture is the AAA 
   server of the Home Domain (i.e. AAAH), which interacts with both 
   the MN and the selected HA to perform service authorization and 
   configuration. 
    
                                  AAA                                    
                                 Client                                  
                 IEEE 802.1x    +------+      RADIUS                     
                   or PANA      |      |    or Diameter                  
    +--------+ /--------------EAP Exchange-----------------\ +-------
   -+  
    | Mobile |/ <------------Authentication---------------> \|  AAAH  
   |  
    |  Node  |\ <--MIPv6 authorization and configuration--> /| Server 
   |  
    +--------+ \-------------------------------------------/ +-------
   -+  
                                |      |                         /\      
                                +------+                        /||\     
                                 Router                          ||      
                                 or AP                 AAAH-HA   ||      
                             (pass through)            Protocol  ||      
                                                                \||/     
                                                                 \/      
                                                             +-------
   -+  
                                                             |  Home  
   |  
                                                             |  Agent 
   |  
                                                             +-------
   -+  
                                                                         
                    Figure 1 - Solution architecture  
    
   The solution is applicable to any access network relying on EAP 
   [RFC3748] for user authentication and works with all EAP methods 
   supporting the exchange of general purpose information elements, 
   in any form (e.g. TLVs or AVPs), between EAP peers. Exploiting 
   this capability, MN and AAAH can piggyback Mobile IPv6 negotiation 
   messages within the same EAP conversation used to carry out user 
   authentication. 
 

 
 
Giaretta, et al.              Expires - April 2007           [Page 5] 
Internet-Draft     MIPv6 Authorization based on EAP       October 2006 
 
 
   This kind of operation is already supported by several tunneled 
   (e.g. PEAPv2 [PEAPv2]) and non tunneled (e.g. EAP-IKEv2 [EAP-
   IKEv2]) EAP methods, that also include native support for 
   encryption, authentication and integrity protection of exchanged 
   configuration data (e.g. HA address). 
 
   Figure 2 shows an overview of the procedure defined to handle 
   MIPv6 bootstrap on the Mobile Node. For the sake of simplicity it 
   is assumed that the employed AAA protocol is Diameter, but 
   obviously RADIUS is suitable as well. 
    
         EAP over                                                        
       IEEE 802.1x        EAP over Diameter             AAAH-HA          
         or PANA    AAA      (or RADIUS)      AAAH      Protocol         
    MN +---------+ Client +----------------+ Server +-------------+ 
   HA   
                                                                         
   1) <--Req. Id.---                                                     
      --Identity--->    --Diameter EAP Req.-->                           
       /-------------------------------------\                           
   2) /      Set-up of protected channel      \                          
      \      e.g. TLS Tunnel (optional)       /                          
       \-------------------------------------/                           
       /-------------------------------------\                           
   3) /            Authentication             \                          
      \                 Phase                 /                          
       \-------------------------------------/                           
       /-------------------------------------\ +-+ /--------------\ 
   +-+  
   4) /           Mobile IPv6 service         \| |/ HoA selection  \| 
   |  
      \    authorization and configuration    /| |\ and HA config. /| 
   |  
       \-------------------------------------/ +-+ \--------------/ 
   +-+  
                                            Home Agent             
   State 
                                            Selection             
   Set-up 
                                                                         
   5) <-----EAP-----    <-----Diameter EAP----                           
      Success/Failure   Answer (Success/Failure                          
                        and authorization AVPs)                          
                                                                         
       /----------------------------------------------------------\      
   6) /           Set-up Security Association MN-HA and            \     
      \     Mobile IPv6 registration (exchange of BU and BA)       /     
       \----------------------------------------------------------/      
                                     
         Figure 2 - Overview of Mobile IPv6 bootstrap procedure 
    
   The whole procedure can be divided in six steps: 
    
   1. EAP identity exchange (i.e. exchange of EAP Request Identity and 
     EAP Response Identity messages); 
    
   2. set-up of a protected channel (e.g. TLS tunnel) for the delivery 
     of subsequent EAP signaling. This is an optional step that is 
     present only if the EAP method provides confidentiality support. 
     It is mandatory only if the MIPv6 negotiation procedure involves 
     the exchange of sensitive information; 
 
   3. authentication phase. The actual authentication procedure and 
     its security properties depend on the selected EAP method. In 
 
 
Giaretta, et al.              Expires - April 2007           [Page 6] 
Internet-Draft     MIPv6 Authorization based on EAP       October 2006 
 
 
     tunneled EAP methods (e.g. PEAPv2) this step may involve one or 
     more complete EAP conversations occurring within a previously 
     negotiated TLS session. Each EAP conversation may accomplish 
     user authentication relying on any available EAP method (e.g. 
     EAP-MD5, EAP-SIM, EAP-AKA); 
 
   4. Mobile IPv6 service authorization and configuration. MN and AAAH 
     exchange a sequence of signaling messages to authorize and 
     configure Mobile IPv6. Those messages are encapsulated as 
     requested by the employed EAP method (e.g. TLVs or AVPs) and 
     delivered as part of the on-going EAP session. If the EAP method 
     provides confidentiality this protocol handshake is encrypted 
     using the previously negotiated ciphersuite. During this phase, 
     AAAH selects a suitable Home Agent for the MN and exchanges 
     authorization and configuration data with it using a AAAH-HA 
     protocol, whose specification is out of the scope of the present 
     document. Further analysis on the definition of such an 
     interface can be found in [AAAMIP6] and [AAAMIPFWK]. At the end 
     of this phase, the MN knows its own Home Address, the address of 
     the correspondent Home Agent, the peer authentication method 
     (i.e. certificates or pre-shared key) and the cryptographic 
     material (e.g. pre-shared key) needed to set-up an IPsec 
     security association with IKE [RFC2409]. The IKE pre-shared key 
     can be either constructed by AAAH and then delivered to MN in a 
     proper TLV (or AVP) or independently derived by MN and AAAH from 
     the EAP key hierarchy; 
 
   5. EAP session termination. Assuming the mobile node has been 
     successfully authenticated, the AAAH server sends a Diameter EAP 
     Answer message with Result-Code equal to SUCCESS. The AAA client 
     extracts the EAP Success message from the Diameter EAP Answer 
     and forwards it to the MN terminating the EAP session; 
 
   6. set-up of IPsec Security Association and MIPv6 registration. At 
     the end of the EAP communication, the MN gains network access 
     and acquires a valid Care-of Address within the visited subnet 
     (e.g. via stateless autoconfiguration); then it performs an IKE 
     exchange to establish the IPsec Security Association with the 
     HA, using the authentication method and the cryptographic 
     material negotiated during the MIPv6 service configuration phase 
     (step 4). Finally, the MN performs MIPv6 registration, sending a 
     Binding Update (protected with IPsec) to the HA. 
    
   This draft also defines the procedures to handle re-authentication 
   events and to manage the termination of the Mobile IPv6 session.  
    
   In summary, the proposed architecture has the following 
   advantages: 
    
   - allows the MSP to maintain a centralized management (on the AAA 
     server) of the user profiles and the authentication, 
     authorization and accounting procedures for any type of service, 
     including Mobile IPv6; 
    
   - improves the reliability and performance of the Mobile IPv6 
     protocol, in that the HA to be dynamically assigned to the MN 
     can be freely chosen among those that are closest to the user’s 
     point of attachment, thus optimizing network usage and reducing 
     the transfer delay for data traffic in bi-directional tunneling; 
 
   - can be deployed, or extended with new features, without having 
     to update the access equipment and the AAA protocols in use. 
     Only minor changes in the AAA servers, the Home Agents and the 
     mobile terminals are required, in that the AAA client does not 
 
 
Giaretta, et al.              Expires - April 2007           [Page 7] 
Internet-Draft     MIPv6 Authorization based on EAP       October 2006 
 
 
     play any active role in MIPv6 negotiation (i.e. it is a pass-
     through for EAP signaling). This reduces the deployment costs 
     and makes the solution easy to use even when a Mobile Node is 
     roaming with a provider different from its own; 
 
   - allows the usage of any AAA protocol supporting the transport of 
     EAP messages for the communication between the AAA client and 
     server (i.e. not just Diameter, but also RADIUS). This 
     significantly simplifies the deployment of MIPv6 in existing 
     communication networks, where support for Diameter protocol in 
     access equipment is not so extensive. 
 
   - allows the operator to dynamically choose the authentication 
     method for IKE bootstrapping and to automatically distribute the 
     pre-shared key eventually needed; in this way the pre-shared key 
     must not be pre-configured and can be frequently changed 
     increasing resistance to attacks. In the case of an EAP method 
     providing dynamic generation of keying material the pre-shared 
     key can be derived from EAP hierarchy avoiding the need to 
     explicitly send it to the MN [MIPv6AMSK].  
    
   As a whole, the solution adds a maximum of 2 RTTs (see the 
   detailed protocol description in section 5) to the EAP 
   conversation carried out by the mobile node to authenticate itself 
   and gain network access. The number of extra RTTs can be reduced 
   if the employed EAP method has the capability of transporting 
   MIPv6 negotiation TLVs (or AVPs) together with authentication 
   data. Nonetheless, it should be noted that the full negotiation 
   procedure can be undertaken by the MN only during its initial 
   bootstrapping, and therefore the performance requirements are not 
   so strict. 
    
    































 
 
Giaretta, et al.              Expires - April 2007           [Page 8] 
Internet-Draft     MIPv6 Authorization based on EAP       October 2006 
 
 
4. Requirements on EAP methods 
    
   In EAP methods, the EAP peer and EAP server exchange data in order 
   to authenticate the EAP peer and eventually the EAP server (mutual 
   authentication). This draft proposes the use of these exchanges to 
   transport MIPv6 parameters, as part of an handshake that requires 
   at maximum 2 RTTs. Thus, the main requirement for the 
   applicability of the solution is: 
    
   - the EAP method must provide a way to carry arbitrary parameters 
     during or after the authentication phase. This implies that the 
     EAP method must provide messages and mechanisms for this 
     purpose. 
    
   Then, for security reasons, the EAP method must provide the 
   following properties: 
    
   - mutual authentication: the EAP method must provide mutual 
     authentication. The access network must authenticate users   
     before granting them Mobile IPv6 service and the EAP peer should 
     authenticate the access network before delivering sensitive    
     data; 
 
   - integrity: the exchanged MIPv6 parameters must be protected 
     against any alteration and thus the EAP method must provide 
     integrity protection; 
    
   - replay protection: the EAP messages containing MIPv6 parameters 
     must be protected against Replay Attack, so that an attacker is 
     not able to get previous given data by replaying an old request; 
 
   - confidentiality: depending on which data the AAA server provides 
     to the mobile node (e.g. an IKE pre-shared key), it may be 
     necessary to protect the message exchange against eavesdropping. 
 
   The table below checks some existing EAP methods against the 
   requirements listed above. 
    
    
    
    
    
    
    
    
    
    
    
    
    
     M-A: Mutual Authentication 
     R-P: Replay Protection 
    
                  +---+----------+---+---------------+-------------+     
                  |   |          |   |               | Exchange    |     
                  |M-A| Integrity|R-P|Confidentiality| of arbitrary|     
                  |   |          |   |               | Parameters  |     
     +------------+---+----------+---+---------------+-------------+     
     | PEAPv2     | x |    x     | x |        x      |     x       |     
     +------------+---+----------+---+---------------+-------------+     
     | EAP-FAST   | x |    x     | x |        x      |     x       |     
     +------------+---+----------+---+---------------+-------------+     
     | EAP-TTLS   | x |    x     | x |        x      |     x       |     
     +------------+---+----------+---+---------------+-------------+     
 
 
Giaretta, et al.              Expires - April 2007           [Page 9] 
Internet-Draft     MIPv6 Authorization based on EAP       October 2006 
 
 
     | EAP-IKEv2  | x |    x     | x |        x      |     x       |     
     +------------+---+----------+---+---------------+-------------+     
     | EAP-SIM    | x |    x     | x |        x      |     x       |     
     +------------+---+----------+---+---------------+-------------+     
     | EAP-AKA    | x |    x     | x |        x      |     x       |     
     +------------+---+----------+---+---------------+-------------+     
     | EAP-TLS    | x |    x     | x |        x      |             |     
     +------------+---+----------+---+---------------+-------------+     
     | EAP-MD5    |   |          |   |               |             |     
     +------------+---|----------|---|---------------|-------------|     
    
    
   In summary, it is possible to note that the procedure described in 
   this draft can be successfully undertaken with several tunneled 
   (PEAPv2, EAP-FAST and EAP-TTLS) and non tunneled EAP methods (EAP-
   IKEv2, EAP-SIM, EAP-AKA), that all support the transport of 
   arbitrary parameters.  
 
    













































 
 
Giaretta, et al.              Expires - April 2007          [Page 10] 
Internet-Draft     MIPv6 Authorization based on EAP       October 2006 
 
 
5. Detailed description of the Protocol 
    
   This section details the procedures and message exchanges that can 
   be adopted by the network operator to explicitly authorize the 
   activation of Mobile IPv6 support for a specific user as well as 
   enable dynamic bootstrapping of MIPv6 protocol parameters (e.g. 
   Home Address, Home Agent Address). 
    
5.1 Mobile node bootstrapping 
    
   If EAP is used for access control, when the MN enters the network 
   it is immediately polled for its identity, by means of an EAP 
   Request Identity message. This message is used to start the EAP 
   communication. The MN replies sending its identity, in the form of 
   a NAI (Network Access Identifier), within an EAP Response Identity 
   message, that is received by a AAA client (e.g. the Access Point 
   in the case of a Wireless LAN) and forwarded via AAA routing to 
   the AAAH server using the Diameter EAP Application (or the RADIUS 
   EAP extensions). Then the AAAH server selects an EAP method (e.g. 
   based on the user service profile) and proposes it to the MN in 
   subsequent EAP messages. In order to enable the Mobile IPv6 
   negotiation procedure defined in this document, the EAP method 
   chosen by the AAAH server must be an EAP method supporting the 
   transport of general purpose and variable length information 
   elements, in the form of TLVs (or AVPs), together with 
   authentication data (see section 4). 
    
   After this initial handshake, MN and AAAH undertake the actual 
   authentication phase, that may require the exchange of a variable 
   number of EAP Request/Response messages. In many EAP methods, like 
   PEAPv2 or EAP-IKEv2, the authentication phase is preceded by the 
   establishment of an encrypted channel between MN and AAAH that 
   provides protection capabilities (i.e. privacy, integrity 
   protection, etc.) for all the messages exchanged during the rest 
   of the EAP conversation. 
    
   As soon as the authentication phase is completed, the procedure 
   for MIPv6 bootstrapping may take place. For that purpose, the MN 
   and the AAAH server exploit the on-going EAP communication to 
   exchange a sequence of signaling messages transporting 
   configuration parameters. 
    
   All the messages used for MIPv6 bootstrapping are encoded in TLVs 
   carried by a generic MIPv6-Authorization container. This choice 
   simplifies a lot the deployment of the procedure with any EAP 
   method satisfying the requirements listed in section 4. In fact, 
   only the structure of the MIPv6-Authorization container needs to 
   be adapted to the actual message format of the employed EAP 
   method. 
    
   For the sake of simplicity, in this section it is assumed that the 
   EAP method used for network access authentication supports the 
   transport of arbitrary parameters in TLV format. In this case the 
   MIPv6-Authorization container becomes a MIPv6-Authorization-TLV. 
   Nonetheless, in section 7 the format of the container is defined 
   for all the EAP methods identified in section 4. 
    
   The whole bootstrapping procedure is depicted in Figure 3.  
    
                                          AAAH                           
       MN +----------------------------+ Server +----------------+ HA    
                                                                         
                      <---------------------                             
                       MIPv6-Authorization-TLV(                          
 
 
Giaretta, et al.              Expires - April 2007          [Page 11] 
Internet-Draft     MIPv6 Authorization based on EAP       October 2006 
 
 
                       Service-Status,                                   
                       [Service-Options])                                
                                                                         
        ----------------------->                                         
        MIPv6-Authorization-TLV(                                         
        Service-Selection, [Service-Options],                            
        [Home-Agent-Address], [Home-Address],                            
        [Interface-Identifier],                                          
        [IKE-Authentication-Options])                                    
                                             +-+                  +-+    
                                             | |/----------------\| |    
                                             | |\----------------/| |    
                                             +-+                  +-+    
                                          Home Agent              HA     
                                          Selection              
   Conf.   
                                                                         
                      <---------------------                             
                       MIPv6-Authorization-TLV(                          
                       Home-Address, Home-Agent-Address,                 
                       IKE-Bootstrap-Information,                        
                       Authorization-Lifetime)                           
                                                                         
        ----------------------->                                         
        MIPv6-Authorization-TLV(                                         
        Negotiation-Result)                                              
                                                                         
                Figure 3 - MIPv6 bootstrapping procedure                 
    
   AAAH starts the MIPv6 negotiation phase sending to the MN a MIPv6-
   Authorization-TLV including the following TLVs: 
    
   - Service-Status-TLV: used to communicate whether the home domain 
     is willing to provide Mobile IPv6 service to the MN. This might 
     depend on the user service profile or on other administrative 
     rules (e.g. service accountability); 
    
   - Service-Options-TLV (optional): used to specify other service 
     options the MN can ask for (e.g. allocation of a HA in the 
     visited domain). 
    
   MN replies to this first message confirming its intention to start 
   Mobile IPv6 and, optionally, providing a set of hints on the 
   desired service capabilities; this is achieved delivering a MIPv6-
   Authorization-TLV including the following TLVs: 
    
   - Service-Selection-TLV: used by the MN to specify if it is 
     willing to activate Mobile IPv6 protocol operation; 
    
   - Service-Options-TLV (optional): used by the MN to communicate 
     which service options, among those previously advertised by 
     AAAH, it would like make use of; 
 
   - Home-Agent-Address-TLV (optional): used by the MN to suggest a 
     preferred Home Agent. This can be a HA with whom the MN has a 
     pre-configured Security Association or a HA acquired through 
     dynamic HA address discovery. The AAAH server treats this 
     indication just as a hint, which means that, for administrative 
     reasons, the MN may be assigned a Home Agent different from the 
     one previously requested; 
 
   - Home-Address-TLV (optional): used by the MN to suggest a 
     preferred Home Address (e.g. an address pre-configured on one of 

 
 
Giaretta, et al.              Expires - April 2007          [Page 12] 
Internet-Draft     MIPv6 Authorization based on EAP       October 2006 
 
 
     its network interfaces); like the previous TLV, this indication 
     is considered only as a hint by the AAAH server; 
 
   - Interface-Identifier-TLV (optional): through this TLV, the MN 
     can suggest a preferred Interface Identifier (selected according 
     to [RFC3041] or following other criteria) to be used by the AAA 
     infrastructure to build the Home Address starting from the 
     selected home prefix. Also in this case, this information, if 
     present, is treated as a pure hint by the AAAH server. 
 
   - IKE-Authentication-Options-TLV (optional): through this TLV, the 
     MN communicates to the AAAH server in order of preference the 
     peer authentication methods it supports for IKE bootstrapping. 
     The lack of this TLV means that the MN supports only the default 
     method.  
    
   The solution described in this document supports the following 
   methods for peer authentication in IKE phase 1: 
    
   - use of a pre-shared key (PSK) derived by the AAAH server and 
     sent to the MN and the HA; in this case confidentiality must be 
     provided by both the AAAH-HA protocol and the EAP session 
     between the MN and the AAAH server. This is the default method. 
    
   - use of a pre-shared key independently derived by the MN and the 
     AAAH server from the keying material exported by the employed 
     EAP method. This key can be derived from an Application Master 
     Session Key (AMSK) specific to Mobile IPv6, which can be 
     constructed as explained in [MIPv6AMSK]. The PSK is then 
     delivered by the AAAH server to the HA by means of a AAAH-HA 
     protocol providing confidentiality; 
    
   - use of digital certificates. This solution involves the 
     employment of digital signatures and public key encryption as 
     stated in [RFC2409]. This method requires the availability of a 
     PKI.  
    
   If in the Service-Selection-TLV the MN has chosen not to make use 
   of Mobile IPv6, AAAH terminates the EAP communication sending an 
   EAP Success message, since the authentication procedure has been 
   accomplished successfully. 
    
   Otherwise, if the MN has confirmed its willingness to start MIPv6 
   service, AAAH selects a suitable Home Agent through a Home Agent 
   Selection Algorithm. Possible parameters to be taken into account 
   by this algorithm include: current load of available HAs (e.g. 
   number of active bindings), location of the MN and, eventually, 
   the preferences provided by the MN itself in the previous message 
   exchange (i.e. Service-Options-TLV, Home-Agent-Address-TLV, Home-
   Address-TLV, IKE-Authentication-Options-TLV). For example, based 
   on the knowledge of the MN's current point of attachment (i.e. the 
   current AAA client), the AAAH server may select, among the HAs 
   available in the home domain, the one that is closest to the MN in 
   terms of IP routing hops. This approach is normally expected to 
   improve performance. However, the detailed definition of a Home 
   Agent Selection Algorithm is out of the scope of this document. 
    
   After a suitable HA has been identified, the AAAH server selects 
   the peer authentication method to be used in IKE phase 1. The peer 
   authentication methods supported by the MN are known from the IKE-
   Authentication-Options-TLV received during the previous exchange. 
   If possible, the AAAH server should choose the method on top of 
   the list provided by the MN (i.e. the one with the highest 
   preference). 
 
 
Giaretta, et al.              Expires - April 2007          [Page 13] 
Internet-Draft     MIPv6 Authorization based on EAP       October 2006 
 
 
    
   As soon as the peer authentication method has been identified, the 
   AAAH server interacts with the HA to dynamically configure the 
   state needed to enable subsequent MIPv6 protocol operations, 
   including the authorization lifetime of the MIPv6 service granted 
   to the MN and the necessary security parameters (e.g. pre-shared 
   key). Possible protocols that can be used for this purpose include 
   Diameter (through a new Diameter Application), SNMPv3 or COPS-PR. 
   Further details about this communication are provided in section 
   6. Anyway, the detailed specification of the interface between 
   AAAH and HA is out of the scope of this document. Additional 
   considerations on the nature and goals of such an interface can be 
   found in [AAAMIP6] and [AAAMIPFWK]. 
    
   The security parameters that the AAAH server delivers to the HA 
   may vary depending on the peer authentication method chosen for 
   IKE bootstrapping: 
    
   - if the AAAH server selects pre-shared key as peer authentication 
     method it needs to send the chosen PSK (randomly generated or 
     derived from the EAP key hierarchy) to the HA together with the 
     associated lifetime; 
 
   - if the AAAH server selects a peer authentication method based on 
     certificates it does not need to derive keys nor to send 
     security parameters to the HA. 
    
   After the AAAH server has configured the state on the HA, it 
   continues the EAP session communicating to the MN all the MIPv6 
   configuration data it is waiting for. This is achieved delivering 
   to the MN an EAP Request containing a MIPv6-Authorization-TLV and 
   the following sub-TLVs: Home-Address-TLV (i.e. the home address), 
   Home-Agent-Address-TLV (i.e. the address of the HA), IKE-
   Bootstrap-Information-TLV (i.e. the peer authentication method to 
   be used in IKE phase 1 and associated cryptographic material) and 
   Authorization-Lifetime-TLV (i.e. the lifetime granted to the MN 
   for this session).  
 
   After the MN has received all the configuration data from the AAAH 
   server (i.e. HA address, Home Address and IKE bootstrap 
   information), it sends back an EAP Response containing a 
   Negotiation-Result-TLV, stating whether it accepts, or refuses, 
   the proposed arrangement. If the MN refuses the configuration, the 
   AAAH server should immediately release the resources previously 
   allocated on the Home Agent. 
    
   After the completion of the EAP session, MN holds all data needed 
   to perform Mobile IPv6 registration: the MN knows its Home 
   Address, the address of the correspondent Home Agent and all 
   cryptographic data needed to establish the IPsec security 
   association with it; furthermore, since it has been successfully 
   authenticated, the MN can acquire an IPv6 address to be used as 
   Care-of Address. 
    
   The first operation carried out by the MN after the acquisition of 
   the Care-of Address is the establishment of the IPsec Security 
   Association with the HA, that is mandated by [RFC3775] to protect 
   MIPv6 location update signaling. Set-up of the IPsec SA can be 
   accomplished following the procedure detailed in [RFC3776]. 
    
   As soon as the IPsec Security Association is established, MN can 
   send a Binding Update to the HA, thus starting up Mobile IPv6 
   service. 
    
 
 
Giaretta, et al.              Expires - April 2007          [Page 14] 
Internet-Draft     MIPv6 Authorization based on EAP       October 2006 
 
 
5.2 Management of re-authentication events 
    
   At the expiration of AAA session time-outs or after a change in 
   the point of attachment to the network (e.g. change of Access 
   Point), a re-authentication procedure is performed leading to the 
   user identity to be checked again along with its right to continue 
   exploiting network resources. To that purpose the AAAH server may 
   repeat a full authentication or, alternatively, decide to use 
   optimizations in order to make the procedure faster. Once this 
   phase is completed the AAAH server also undertakes the re-
   negotiation of the MIPv6 service. 
    
   Since the MIPv6 bootstrapping procedure is assumed to be 
   completely stateless, when a re-authentication event occurs the 
   AAAH server may not know the state of the MIPv6 service on the MN. 
   For this reason the AAAH server starts the MIPv6 negotiation like 
   in the bootstrapping case: it delivers a MIPv6-Authorization-TLV 
   containing a Service-Status-TLV and optionally a Service-Options-
   TLV. 
    
   If the MIPv6 service is not active on the MN the procedure 
   continues as described in section 5.1. Otherwise, the MN replies 
   with a MIPv6-Authorization-TLV containing a Service-Selection-TLV 
   indicating that the MIPv6 service is already in use. Furthermore, 
   the MN inserts the Home-Agent-Address-TLV, the Home-Address-TLV 
   and the IKE-Authentication-Options-TLV to inform the AAAH server 
   about its current state. The AAAH server can then get in touch 
   with the HA to check the integrity of the state, renew the MIPv6 
   authorization lifetime and eventually refresh the security 
   parameters. 
    
   If the peer authentication method used by the MN in IKE phase 1 is 
   pre-shared key, the AAAH server must derive a new PSK and send it 
   to the HA together with the associated lifetime. In case the PSK 
   is not derived from the EAP key hierarchy (i.e. it is randomly 
   generated by the AAAH server), the AAAH server must communicate it 
   also to the MN. Instead, in case of authentication based on 
   certificates, the AAAH server does not need to derive keys nor 
   deliver additional security data to the HA and the MN. 
    
   If the state on the HA is successfully updated, the AAAH server 
   terminates the EAP communication sending an EAP Success message. 
   Otherwise, the AAAH server should continue the EAP communication 
   renegotiating the MIPv6 service (i.e. allocation of a new HA and 
   related Home Address). 
    
   This solution can be easily deployed even within a network 
   including several AAA servers, each one managing a subset of the 
   available Network Access Servers (NASs). This is because the re-
   negotiation procedure does not assume to have any long term state 
   related to Mobile IPv6 stored on the AAAH server. In this way, 
   everything works correctly even if, due to MN's movements within 
   the network, the AAAH server that handles the re-authentication is 
   not the same server that authenticated the MN for the first time 
   and performed the MIPv6 bootstrapping procedure. 
    
   As explained above, the re-authentication events are normally 
   triggered by the network. Nonetheless, if the EAP lower layer 
   offers a way to trigger EAP re-authentications (e.g. PANA supports 
   this feature), it may be possible for the MN to re-negotiate the 
   MIPv6 service at any time. 
    


 
 
Giaretta, et al.              Expires - April 2007          [Page 15] 
Internet-Draft     MIPv6 Authorization based on EAP       October 2006 
 
 
6. Home Agent considerations 
    
   This section provides further thoughts about the AAAH-HA 
   communication and lists specific features that have to be 
   supported by the Home Agent to allow dynamic negotiation of Mobile 
   IPv6 protocol parameters. 
    
6.1 Requirements on AAAH-HA communication 
    
   This draft details only the message exchange between the MN and 
   the AAAH server. Obviously a complete Mobile IPv6 bootstrapping 
   solution requires also the definition of a mechanism for the 
   communication between the AAAH server and the Home Agent. Possible 
   protocols that may be used for this purpose include SNMPv3, COPS-
   PR or Diameter but a formal definition of such a protocol is out 
   of scope of this document.  
    
   A detailed analysis of the goals for a generic AAAH-HA protocol 
   can be found in [AAAMIP6]; in this section some requirements, 
   specific to this scenario, are highlighted.  
    
   The selected protocol should allow the AAAH server to: 
    
   - use a Network Access Identifier (NAI) to identify the mobile 
     node in the communication with the HA; 
 
   - send an authorization lifetime to the HA to limit Mobile IPv6 
     session duration for the MN; 
 
   - send to the HA a set of hints for the construction of the Home 
     Address (e.g. a preferred Home Address or a preferred Interface 
     Identifier); 
 
   - poll the designated HA for the allocation of a Home Address to 
     the MN; 
 
   - force the HA to terminate an active Mobile IPv6 session for 
     authorization policy reasons (e.g. credit exhaustion or 
     reallocation of a new HA to the MN); 
 
   - enforce explicit operational limitations and authorization 
     restrictions on the HA (e.g. packet filters, QoS parameters); 
 
   - retrieve the Mobile IPv6 state associated to a specific MN from 
     the correspondent HA. This may be useful to periodically verify 
     the Mobile IPv6 service status; 
 
   - send to the HA the security data needed to setup the IPsec SA 
     with the MN. Possible security data are the authentication 
     method and the cryptographic material to be used for IKE 
     bootstrapping.  
 
   Moreover, the protocol selected to implement the communication 
   between the AAAH server and the HA should fulfill the following 
   general requirements: 
    
   - the AAAH server and the HA must be able to authenticate each 
     other (mutual authentication) in order to prevent the 
     installation of unauthorized state on the HA; 
 
   - the AAA-HA interface must provide integrity protection in order 
     to prevent any alteration of exchanged data (e.g. Mobile IPv6 
     configuration parameters); 
 
 
 
Giaretta, et al.              Expires - April 2007          [Page 16] 
Internet-Draft     MIPv6 Authorization based on EAP       October 2006 
 
 
   - the AAA-HA interface must provide replay protection; 
 
   - the AAA-HA interface should provide confidentiality since it may 
     be used to transfer security parameters (e.g. IKE pre-shared 
     key); 
 
   - the AAA-HA interface should support inactive peer detection. 
     This functionality can be used by the AAAH server to maintain a 
     list of active HAs (e.g. useful for HA selection); 
 
 
6.2 Management of MIPv6 authorization state 
    
   The Home Agent is required to store some authorization data for 
   each of the MNs it is serving. A new data structure may be used 
   for this purpose and it should include at least the following 
   fields:  
    
   - NAI of the user; 
    
   - Home Address assigned to the MN; 
 
   - Cryptographic Data: this field includes the peer authentication 
     method to be used in IKE and, if needed, the pre-shared key and 
     its lifetime; 
 
   - Authorization Lifetime: it is the lifetime of the Mobile IPv6 
     service granted to the MN; 
 
   At the expiration of the Authorization Lifetime the HA should 
   check if there is an active entry for the MN in its Binding Cache 
   in order to verify if the MN is still using Mobile IPv6. If the 
   entry is available the Home Agent should negotiate with the AAAH 
   server an extension of the Authorization Lifetime granted to the 
   MN. Otherwise, the HA should immediately release the authorization 
   state associated to that MN and eventually notify the session 
   termination to the AAAH server (e.g. by means of a Session 
   Termination Request if the employed AAAH-HA protocol is Diameter). 
    
   Moreover, the release of the resources previously allocated on the 
   Home Agent can be undertaken at any time by the AAAH server. 
   Typically this happens at credit exhaustion or when the MN 
   disconnects from the network. 
    
   The policies adopted by the AAAH server to release the resources 
   allocated to the MN may vary depending on the user service 
   profile. For instance, the AAAH server may decide to postpone the 
   release of the resources on the HA in order to allow the MN to 
   continue using the Mobile IPv6 service even if it has moved to an 
   access network for which no roaming agreements are in place (e.g. 
   a corporate network or a network providing cost-free access). In 
   that case, the MN can continue to rely on the IPsec SA previously 
   negotiated with the HA and the respective authorization is managed 
   through the Mobile IPv6 Authorization Lifetime. 
 
 








 
 
Giaretta, et al.              Expires - April 2007          [Page 17] 
Internet-Draft     MIPv6 Authorization based on EAP       October 2006 
 
 
7. The MIPv6-Authorization container 
    
   All the messages used for MIPv6 bootstrapping are encoded in TLVs 
   carried by a generic MIPv6-Authorization container. In this way, 
   only the structure of the container needs to be adapted to the 
   actual message format of the employed EAP method. 
    
   The MIPv6-Authorization container can be implemented as a TLV, as 
   an AVP or in some other way depending on the specific 
   characteristics of the EAP method used for network access 
   authentication (see Figure 4). 
                                                                     
       +----------------------------------------------------------+  
       |            MIPv6 bootstrapping TLVs (Sec. 8)             |  
       +------+--------------+--------------+--------------+------+  
              |              |              |              |         
              |              |              |              |         
       +------+-----+ +------+-----+ +------+-----+ +------+------+  
       |   MIPv6    | |   MIPv6    | |   MIPv6    | |    MIPv6    |  
       | Auth. TLV  | | Auth. TLV  | | Auth. AVP  | | Auth. IKEv2 |  
       |            | |            | |            | |   Payload   |  
       | (Sec. 7.1) | | (Sec. 7.3) | | (Sec. 7.5) | | (sec. 7.6)  |  
       +------------+ +------------+ +------------+ +-------------+  
       |   PEAPv2   | |  EAP-SIM   | |  EAP-TTLS  | |  EAP-IKEv2  |  
       |  EAP-FAST  | |  EAP-AKA   | |            | |             |  
       +------------+ +------------+ +------------+ +-------------+  
                                                                     
           Figure 4 - Transport of MIPv6 bootstrapping messages      
    
   In the following the format of the MIPv6-Authorization container 
   is defined for each EAP method identified in section 4. This list 
   is not exhaustive and does not prevent the use of other EAP 
   methods satisfying all the requirements listed in this document. 
    
7.1 PEAPv2 
    
   The exchange of arbitrary information in PEAPv2 is based on EAP-
   TLVs. In this case the MIPv6-Authorization container is encoded as 
   an EAP-TLV and has the structure depicted below: 
    
                                                                         
       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 
   1   
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
   +-+  
      |M|R|             Type          |            Length             
   |  
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
   +-+  
      |                              Value                            
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
   +-+  
    
    
    
    
      M 
    
         0 - Non-mandatory TLV 
    
      R 
    
         Reserved, set to zero (0) 
    
 
 
Giaretta, et al.              Expires - April 2007          [Page 18] 
Internet-Draft     MIPv6 Authorization based on EAP       October 2006 
 
 
      Type 
    
         TBD - MIPv6-Authorization 
    
      Length 
    
         The length of the Value field in octets 
    
      Value 
    
         This field carries the subsequent TLVs 
    
    
7.2 EAP-FAST 
    
   The format of the messages for EAP-FAST [EAP-FAST] is the same as 
   PEAPv2. 
    
    
7.3 EAP-SIM 
    
   EAP-SIM [EAP-SIM] allows the transport of additional information 
   in form of TLVs. The format of the MIPv6-Authorization container 
   is depicted below: 
    
                                                                         
       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 
   1   
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
   +-+  
      |      Type     |    Length     |         Value                    
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
   +-+  
    
      Type 
    
         TBD – MIPv6-Authorization 
    
      Length 
    
         Indicates the length of this attribute in multiples of four 
         bytes. The maximum length of an attribute is 1024 bytes. The 
         length includes the Type and Length bytes. 
    
      Value 
    
         This field carries the subsequent TLVs 
    
    
7.4 EAP-AKA 
    
   The format of the messages for EAP-AKA [EAP-AKA] is the same as 
   EAP-SIM.  
 
7.5 EAP-TTLS 
    
   EAP-TTLS messages [EAP-TTLS] allow the exchange of arbitrary data 
   in the form of AVPs encapsulated in the TLS record. The MIPv6-
   Authorization container is encoded as depicted below: 
    
                                                                         
       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 
   1   

 
 
Giaretta, et al.              Expires - April 2007          [Page 19] 
Internet-Draft     MIPv6 Authorization based on EAP       October 2006 
 
 
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
   +-+  
      |                           AVP Code                            
   |  
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
   +-+  
      |V M r r r r r r|                 AVP Length                    
   |  
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
   +-+  
      |                        Vendor ID (opt)                        
   |  
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
   +-+  
      |                             Data                                 
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
   +-+  
 
    
      AVP Code  
    
         TBD - MIPv6-Authorization 
    
      Flag 'V' (Vendor-Specific)  
    
         0 
    
      Flag 'M' (Mandatory)  
    
         0 
    
      Flag 'r' (reserved) 
    
         must be set to 0 
    
    
    
    
      AVP Length  
    
         the length of this AVP including the AVP Code, AVP  
         Length, flags, Vendor-ID (if present) and Data. 
    
      Data 
    
         this field carries subsequent TLVs 
    
7.6 EAP-IKEv2 
    
   EAP-IKEv2 [EAP-IKEv2] allows the transport of generic data in the 
   form of IKEv2 payloads. The MIPv6-Authorization container is 
   encoded as depicted below: 
    
                                                                         
       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 
   1   
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
   +-+  
      | Next Payload  |C|  RESERVED   |        Payload Length         
   |  
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
   +-+  
      |                        Data                                   
   ~  
 
 
Giaretta, et al.              Expires - April 2007          [Page 20] 
Internet-Draft     MIPv6 Authorization based on EAP       October 2006 
 
 
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
   +-+  
    
      Next Payload (1 octet)  
    
         TBD - MIPv6-Authorization 
    
      Critical (1 bit)  
    
         must be set to zero 
    
      RESERVED (7 bits) 
    
         must be sent as zero; must be ignored on receipt. 
    
      Payload Length (2 octets) 
    
         Length in octets of the current payload, including the 
   generic  
         payload header 
    
      Data  
    
         It contains subsequent TLVs 
    
    






































 
 
Giaretta, et al.              Expires - April 2007          [Page 21] 
Internet-Draft     MIPv6 Authorization based on EAP       October 2006 
 
 
8. New TLVs 
    
   Independently from the EAP method used for network access 
   authentication, the MIPv6-Authorization container enables to 
   transport a series of TLVs. This gives more flexibility to the 
   whole solution and permits the definition of new TLVs that do not 
   need to be bound to a specific EAP method. 
     
   The following TLVs have been defined so far: 
    
         Service-Status-TLV 
         Service-Selection-TLV 
         Service-Options-TLV 
         Home-Agent-Address-TLV 
         Home-Address-TLV 
         IKE-Authentication-Options-TLV 
         IKE-Bootstrap-Information-TLV 
         Negotiation-Result-TLV 
    
    
8.1 Service-Status-TLV 
    
   This TLV is sent by the AAAH to inform the MN about the status of 
   Mobile IPv6 service. It is defined as follows: 
    
       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 
   1   
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
   +-+  
      |      Type=Service-Status      |             Length            
   |  
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
   +-+  
      |     Code      |                                                  
      +-+-+-+-+-+-+-+-+                                                  
    
      Type 
    
         TBD - Service-Status 
    
      Length 
    
         1 
    
      Code 
    
         0 = MIPv6 service is available 
         1 = MIPv6 service is not available 
    
    
8.2 Service-Selection-TLV 
    
   This TLV is sent by the MN to inform the AAAH whether it wants to 
   activate MIPv6 service or whether the service is already active. 
    
       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 
   1   
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
   +-+  
      |    Type=Service-Selection     |             Length            
   |  
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
   +-+  
      |     Code      |                                                  
 
 
Giaretta, et al.              Expires - April 2007          [Page 22] 
Internet-Draft     MIPv6 Authorization based on EAP       October 2006 
 
 
      +-+-+-+-+-+-+-+-+                                                  
    
      Type 
    
         TBD - Service-Selection 
    
      Length 
    
         1 
    
      Code 
    
         0 = activate MIPv6 service 
         1 = MIPv6 service already active 
         2 = do not activate MIPv6 service 
    
 
8.3 Service-Options-TLV 
    
   This TLV is used by the AAAH server to advertise the service 
   options the MN can ask for. It is also used by the MN to 
   communicate its selection to the AAAH. So far only the HA in 
   visited domain option has been defined. The TLV has the following 
   format: 
    
       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 
   1   
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
   +-+  
      |      Type=Service-Options     |             Length            
   |  
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
   +-+  
      |V|        Reserved             |                                  
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+                                  
    
      Type 
    
         TBD - Service-Options 
    
      Length 
    
         2 
    
      V 
         from AAAH to MN: 
            0 = AAAH cannot provide a HA in the visited domain 
            1 = AAAH can provide a HA in the visited domain 
          
         from MN to AAAH: 
            0 = MN does not specify any preference on HA location 
            1 = MN is requesting a HA in the visited domain 
    
      Reserved 
    
         15 bit reserved set to 0 
    
8.4 Home-Agent-Address-TLV 
    
   This TLV carries the Home Agent’s address and it’s defined as 
   follows: 
    
       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 
   1   
 
 
Giaretta, et al.              Expires - April 2007          [Page 23] 
Internet-Draft     MIPv6 Authorization based on EAP       October 2006 
 
 
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
   +-+  
      |      Type=HA-Address          |             Length            
   |  
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
   +-+  
      |                                                               
   |  
      |                      Home Agent Address                       
   |  
      |                                                               
   |  
      |                                                               
   |  
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
   +-+  
    
      Type 
    
         TBD - Home-Agent-Address 
    
      Length 
    
         16 
    
      Value 
    
         Home Agent Address 
    
 
8.5 Home-Address-TLV 
    
   This TLV carries the Home Address assigned to the MN. It is 
   defined as follows: 
    
    
    
    
       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 
   1   
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
   +-+  
      |      Type=Home-Address        |            Length             
   |  
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
   +-+  
      |                                                               
   |  
      |                        Home Address                           
   |  
      |                                                               
   |  
      |                                                               
   |  
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
   +-+  
    
      Type 
    
         TBD - Home-Address 
    
      Length 
    
         16 
 
 
Giaretta, et al.              Expires - April 2007          [Page 24] 
Internet-Draft     MIPv6 Authorization based on EAP       October 2006 
 
 
    
      Value 
    
         Home Address 
    
 
8.6 IKE-Authentication-Options-TLV 
    
   This TLV carries data related to IKE bootstrapping. If used during 
   the initial MIPv6 bootstrapping procedure, the value field 
   contains the list of peer authentication methods supported by the 
   MN. Otherwise, if used during re-authentication events, the value 
   field contains only the peer authentication method currently in 
   use. 
    
       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 
   1   
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
   +-+  
      |Type=IKE-Authentication-Options|            Length             
   |  
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
   +-+  
      | AuthMethod-1  | AuthMethod-2  | ...                              
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
   +-+  
 
      Type 
    
         TBD - IKE-Authentication-Options 
    
      Length 
    
         Length of this TLV. 
 
 
 
      Value 
    
         AuthMethod – code corresponding to the authentication method  
                      supported for IKE phase 1. All the methods  
                      supported by the MN are inserted in order of  
                      preference. The following values are defined: 
                
         Authentication Method                     AuthMethod 
          
         PSK  (pre-shared key generated by AAAH)   0 
         AMSK (pre-shared key derived from EAP)    1 
         CERT (use of certificates)                2 
 
 
8.7 IKE-Bootstrap-Information-TLV 
    
   This TLV carries data related to the set-up of an IPsec Security 
   Association with the Home Agent. It contains the peer 
   authentication method to be used for IKE phase 1 and, eventually, 
   the related cryptographic material (e.g. pre-shared key). 
    
    
       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 
   1   
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
   +-+  

 
 
Giaretta, et al.              Expires - April 2007          [Page 25] 
Internet-Draft     MIPv6 Authorization based on EAP       October 2006 
 
 
      |Type= IKE-Bootstrap-Information|            Length             
   |  
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
   +-+  
      |  AuthMethod   |              key Length                       
   |  
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
   +-+  
      |                            Key Lifetime                       
   |  
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
   +-+  
      |                            Key Value                             
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
   +-+  
    
 
      Type 
    
         TBD - IKE-Bootstrap-Information 
    
      Length 
    
         Length of this TLV. 
    
      Value 
      
         AuthMethod – the authentication method to be used in IKE  
                      phase 1. This field can assume a value among  
                      those defined in section 8.6 (i.e. PSK, AMSK  
                      or CERT). 
      
         Key Length – the length of the key to be used as pre-shared 
     key  
                      for IKE phase 1 authentication. This field must 
     be  
                      present if AuthMethod is set to PSK and may be  
                      present if AuthMethod is set to AMSK. 
      
         Key Lifetime - the lifetime of the key in seconds. A value 
     of  
                        all ones means infinite. This field is 
     present  
                        only if the AuthMethod field is set to PSK or  
                        AMSK. 
    
         Key Value – the value of the key. This field is present only 
   if  
                     the AuthMethod field is set to PSK. 
 
 
8.8 Negotiation-Result-TLV 
    
   It is defined as follows: 
    
       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 
   1   
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
   +-+  
      |    Type=Negotiation-Result    |             Length            
   |  
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
   +-+  
      | Result-Code   |                                                  
 
 
Giaretta, et al.              Expires - April 2007          [Page 26] 
Internet-Draft     MIPv6 Authorization based on EAP       October 2006 
 
 
      +-+-+-+-+-+-+-+-+                                                  
                                                                         
       
   Type 
    
         TBD - Result 
    
      Length 
    
         1 
    
      Value 
    
           0 = Success 
         128 = Failure 
    
    
    
    
    
    
    
    
    
    
    
8.9 Authorization-Lifetime-TLV 
    
   It is defined as follows: 
    
       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 
   1   
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
   +-+  
      |  Type= Authorization-Lifetime |             Length            
   |  
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
   +-+  
      |    Authorization-Lifetime     |                                  
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
    
       
   Type 
    
         TBD - Authorization-Lifetime 
    
      Length 
    
         2 
    
      Value 
    
         The lifetime granted to the MN (in seconds) 
    
    









 
 
Giaretta, et al.              Expires - April 2007          [Page 27] 
Internet-Draft     MIPv6 Authorization based on EAP       October 2006 
 
 
9. Security Considerations 
    
   The Mobile IPv6 bootstrapping procedure described in this document 
   assumes the MN and the AAA server of the home domain exchange the 
   necessary parameters exploiting the EAP communication established 
   for network access authentication. Therefore, to secure the 
   bootstrapping procedure, the employed EAP method must support 
   mutual authentication as well as integrity and replay protection. 
    
   Moreover, if the pre-shared key needed to bootstrap the IPsec SA 
   with the Home Agent is not derived from the EAP key hierarchy but 
   explicitly delivered to the MN by the AAAH server, the EAP method 
   must also provide confidentiality. Several tunneled and non 
   tunneled EAP methods, like PEAPv2 and EAP-IKEv2, fulfill all of 
   these security requirements. 

















































 
 
Giaretta, et al.              Expires - April 2007          [Page 28] 
Internet-Draft     MIPv6 Authorization based on EAP       October 2006 
 
 
10. References 
 
10.1 Normative References 
 
   [RFC3775]   Johnson, D., Perkins, C. and J. Arkko, "Mobility 
   Support  
               in IPv6”, RFC 3775, June 2004. 
    
   [RFC3776]   Arkko, J., Devarapalli, V., Dupont, F., "Using IPsec 
   to  
               Protect Mobile IPv6 Signaling between Mobile Nodes and  
               Home Agents", RFC 3776, June 2004. 
    
   [RFC3748]   B. Aboba, L. Blunk, J. Vollbrecht, J. Carlson, H.  
               Levkowetz, "Extensible Authentication Protocol (EAP)",  
               RFC 3748, June 2004. 
    
   [RFC2409]   Harkins, D., Carrel, D., "The Internet Key Exchange  
               (IKE)", RFC 2409, November 1998. 
    
   [PEAPv2]    Palekar, A. et al., "Protected EAP Protocol (PEAP)  
               Version 2", draft-josefsson-pppext-eap-tls-eap-11 
   (work  
               in progress), September 2005. 
    
   [EAPKEYFWK] Aboba, B., Simon, D., Arkko, J., Levkowetz, H.,  
               "Extensible Authentication Protocol (EAP) Key 
   Management  
               Framework", draft-ietf-eap-keying-14 (work in 
   progress), 
               June 2006. 
    
   [MIPv6AMSK] Giaretta, G., Guardini, I., Demaria, E., Bournelle,  
               J., Laurent-Maknavicius, M., "Application Master 
   Session  
               Key (AMSK) for Mobile IPv6", draft-giaretta-mip6-amsk-
   02  
               (work in progress), October 2006 
    
    
10.2 Informative References 
    
   [RFC4640]  Patel, A., Giaretta, G., "Problem Statement for 
              bootstrapping Mobile IPv6 (MIPv6)”, RFC 4640, 
              September 2006. 
    
   [RFC3753]   Manner, J., Kojo, M. "Mobility Related Terminology”, 
   RFC  
               3753, June 2004. 
    
   [RFC3041]   Narten, T., Draves, R., "Privacy Extensions for 
   Stateless  
               Address Autoconfiguration in IPv6", RFC 3041, January  
               2001. 
    
   [AAAMIP6]   Giaretta, G., Guardini, I., Demaria, E., Bournelle, 
   J.,  
               Lopez, R., "AAA Goals for Mobile IPv6", draft-ietf- 
               mip6-aaa-ha-goals-03 (work in progress), September 
   2006 
    
   [AAAMIPFWK] Yegin, A., "AAA Mobile IPv6 Application Framework",  
               draft-yegin-mip6-aaa-fwk-01 (expired), February  
               2005 
 
 
Giaretta, et al.              Expires - April 2007          [Page 29] 
Internet-Draft     MIPv6 Authorization based on EAP       October 2006 
 
 
    
   [RFC3084]   K. Chan, D. Durham, S. Gai, S. Herzog, K. McCloghrie, 
   F.  
               Reichmeyer, J. Seligson, A. Smith, R. Yavatkar, "COPS  
               Usage for Policy Provisioning,", RFC 3084, March 2001. 
    
   [MIPv6APP]  Faccin, S., Perkins, C., Le, F., Patil, B., "Diameter  
               Mobile IPv6 Application", draft-le-aaa-diameter-  
               mobileipv6-04 (expired), November 2004. 
    
   [PANA]      Forsberg, D. et al., "Protocol for Carrying  
               Authentication for Network Access (PANA)", draft-ietf- 
               pana-pana-12 (work in progress), August 2006. 
    
   [RFC3410]   Case, J., Mundy, R., Partain, D. and B. Stewart,  
               "Introduction and Applicability Statements for 
   Internet- 
               Standard Management Framework", RFC 3410, December 
   2002. 
    
   [EAP-TTLS]  Funk, P., Blake-Wilson, S., "EAP Tunneled TLS  
               Authentication Protocol (EAP-TTLS)", draft-ietf-
   pppext- 
               eap-ttls-05 (expired), July 2004. 
    
   [EAP-IKEv2] Tschofenig, H., Kroeselberg, D., Ohba, Y., "EAP  
               IKEv2 Method", draft-tschofenig-eap-ikev2-11 (work in  
               progress), June 2006. 
    
   [EAP-SIM]   Haverinen, H. and J. Salowey, "Extensible 
   Authentication  
               Protocol Method for GSM Subscriber Identity Modules 
   (EAP- 
               SIM)", RFC 4186, January 2006. 
    
   [EAP-AKA]   Arkko, J. and H. Haverinen, "EAP-AKA Authentication",  
               RFC 4187, January 2006. 
    
   [EAP-FAST]  N.Cam-Winget, D. McGrew, J. Salowey, H.Zhou, "The  
               Flexible Authentication via Secure Tunneling 
   Extensible  
               Authentication Protocol Method (EAP-FAST)", draft-cam- 
               winget-eap-fast-05.txt (work in progress), October 
   2006. 
    
    


















 
 
Giaretta, et al.              Expires - April 2007          [Page 30] 
Internet-Draft     MIPv6 Authorization based on EAP       October 2006 
 
 
Acknowledgments 
    
   The authors would like to thank Simone Ruffino, Tom Hiller, Hannes 
   Tschofening, Rafael Marin Lopez, Hiroyuki Ohnishi, Mayumi 
   Yanagiya, James Kempf and Yoshihiro Ohba for their valuable 
   comments. 
    
 
Authors’ Addresses 
    
   Gerardo Giaretta 
   Telecom Italia Lab 
   via G. Reiss Romoli, 274  
   10148 TORINO 
   Italy 
   Phone: +39 011 2286904 
   Email: gerardo.giaretta@telecomitalia.it 
     
   Ivano Guardini 
   Telecom Italia Lab 
   via G. Reiss Romoli, 274  
   10148 TORINO 
   Italy 
   Phone: +39 011 2285424 
   Email: ivano.guardini@telecomitalia.it 
    
   Elena Demaria 
   Telecom Italia Lab 
   via G. Reiss Romoli, 274  
   10148 TORINO 
   Italy 
   Phone: +39 011 2285403 
   Email: elena.demaria@telecomitalia.it 
    
   Julien Bournelle 
   GET/INT 
   9 rue Charles Fourier 
   Evry  91011 
   France 
   Email: julien.bournelle@int-evry.fr 
    
   Maryline Laurent-Maknavicius 
   GET/INT 
   9 rue Charles Fourier 
   Evry  91011 
   France 
   Email: maryline.maknavicius@int-evry.fr 
 
 















 
 
Giaretta, et al.              Expires - April 2007          [Page 31] 
Internet-Draft     MIPv6 Authorization based on EAP       October 2006 
 
 
Intellectual Property Statement 
    
  The IETF takes no position regarding the validity or scope of any 
  Intellectual Property Rights or other rights that might be claimed 
  to pertain to the implementation or use of the technology described 
  in this document or the extent to which any license under such 
  rights might or might not be available; nor does it represent that 
  it has made any independent effort to identify any such rights. 
  Information on the procedures with respect to rights in RFC 
  documents can be found in BCP 78 and BCP 79. 
    
  Copies of IPR disclosures made to the IETF Secretariat and any 
  assurances of licenses to be made available, or the result of an 
  attempt made to obtain a general license or permission for the use 
  of such proprietary rights by implementers or users of this 
  specification can be obtained from the IETF on-line IPR repository 
  at http://www.ietf.org/ipr. 
   
  The IETF invites any interested party to bring to its attention any 
  copyrights, patents or patent applications, or other proprietary 
  rights that may cover technology that may be required to implement 
  this standard.  Please address the information to the IETF at  
  ietf-ipr@ietf.org. 
 
 
Disclaimer of Validity 
 
  This document and the information contained herein are provided on 
  an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE 
  REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND 
  THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, 
  EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT 
  THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR 
  ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A 
  PARTICULAR PURPOSE. 
 
 
Copyright Statement 
    
  Copyright (C) The Internet Society (2006). This document is subject 
  to the rights, licenses and restrictions contained in BCP 78, and 
  except as set forth therein, the authors retain all their rights. 
    
    
Acknowledgement 
    
  Funding for the RFC Editor function is currently provided by the 
  Internet Society. 
















 
 
Giaretta, et al.              Expires - April 2007          [Page 32] 

PAFTECH AB 2003-20262026-04-22 03:56:50