One document matched: draft-ietf-dhc-aaa-requirements-00.txt


Network Working Group                                          Subir Das
INTERNET-DRAFT                                           Anthony McAuley
Internet Engineering Task Force                   Telcordia Technologies
draft-ietf-dhc-aaa-requirements-00.txt                     Shinichi Baba
Date: March 8, 2000                                     Yasuro Shobatake
Expires: August, 2000                      Toshiba America Research Inc.



   Authentication, Authorization, and Accounting Requirements for 
                    Roaming Nodes using DHCP
    


Status of this memo 

   This document is an Internet-Draft and is in full conformance with 
   all provisions of sections 10 of RFC 2026.
   
   Internet-Drafts are working documents of the Internet Engineering 
   Task Force (IETF), its areas, and its working groups. Note that 
   other groups may also distribute working documents as Internet-
   Drafts.
   
   Internet-Drafts are draft documents valid for a maximum of six 
   months and may be updated, replaced, or obsoleted by other 
   documents at any time. It is inappropriate to use Internet-
   Drafts as reference material or to cite them other than as 
   "work in progress".
   
   The list of current Internet-Drafts can be accessed at 
   http://www.ietf.org/ietf/1id-abstracts.txt
   
   The list of Internet-Draft Shadow Directories can be accessed at 
   http://www.ietf.org/shadow.html.



Abstract

   The AAA working group is currently defining the requirements for 
   Authentication, Authorization, and Accounting (AAA).  This draft
   lists the AAA requirements to aid roaming nodes using a dynamic 
   address configuration protocol such as DHCP. The node may or may 
   not be using Mobile IP [3] (with co-located care-of-address) or other
   dynamic address binding protocol.





ITSUMO Group               Expires August 2000                 [Page 1]

Internet Draft          AAA Requirements using DHCP           March 2000



1. Introduction

   A network providing communication services to nodes from foreign 
   domains, must use Authorization, Authentication, and Accounting (AAA)
   services [1,2]. A dynamically roaming node places stronger 
   requirements on AAA than a static node. Moreover, next generation 
   network applications will raise the requirements on IP network even
   higher. The Mobile IP [3] Working Group is currently specifying the 
   requirements for a roaming node using Mobile IP with Foreign Agents 
   [4]. This document specifies the requirements for a roaming node who
   obtains an address using DHCP [5] [17] or similar node configuration 
   protocol (e.g., DRCP [6]). 

   Recent drafts [7,8] specify how to add authentication to DHCP 
   messages. This allows clients to verify DHCP servers or servers to 
   verify DHCP clients. It does not, however, specify the interaction 
   with a AAA protocol to allow roaming users to access networks in 
   multiple administrative domains.

   The document is independent of whether the roaming node uses dynamic
   address binding. The roaming node getting an address through DHCP [5]
   and once authenticated via AAA [1, 13,14] may also use Mobile IP with
   co-located addresses, dynamic DNS updates [9,10], or any other 
   dynamic address binding techniques [15,16]. The document does not 
   discuss the pros and cons of how best to support roaming users, only
   to ensure that the AAA protocol is sufficiently flexible to support 
   both nodes using Mobile IP with Foreign Agents and nodes using DHCP 
   (with or without Mobile IP). 

   Since many of the requirements for DHCP are similar to those for
   Mobile IP with Foreign Agents, we borrow heavily from the Mobile IP 
   requirements document [3, 4].


1.1 Requirements Terminology 
    
   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC 2119 [REQ].











ITSUMO Group               Expires August 2000                 [Page 2]

Internet Draft          AAA Requirements using DHCP           March 2000


  
2. Basic Model

   Figure 2 shows that our general model is very much similar to that 
   described in [4]. The only change is that we do not assume the AAA 
   authentication is necessarily done in a home domain. We assume, more 
   generally, that the roaming node authentication is done in a 
   (possibly distributed) Public AAA (AAAP), which is similar to AAA 
   broker model. The reasons for using the AAAP are discussed in section
   4. Each DHCP client might use a different AAAP that can check its 
   credentials, or they may share the same AAAP (even if they are from 
   different domains).   


                        Local Domain                  Internet
                      +-------------+              +----------------+
                      |  +------+   |              |   +------+     |
                      |  | AAAL |   | AAA Protocol |   | AAAP |     |
                      |  |      +----------------------+      |     |
                      |  +---+--+   |              |   +------+     |
                      |      |      |              |                |
                      |      |      |              +----------------+
                      |      |      |       
                      |      |      |
     +--------+       |  +---+---+  |
     | DHCP   |  DHCP |  | DHCP  |  |       
     | Client |-------|--| Server|  | 
     +--------+       |  +-------+  |         AAAP =  Public authority
                      |             |         AAAL =  local authority
                      +-------------+

            Figure 1: AAA Servers Model


    DHCP server does not have direct access to the data needed for 
    authentication. So it is expected that the server will consult the
    local authority (AAAL) for verification. Since the server and the 
    local authority are in the same domain it is assumed that they will
    have strong security associations. Alternatively, they may be 
    co-located. On the other hand, AAAL itself may not have enough 
    information stored locally to complete the transaction. However, 
    AAAL is expected to be configured with enough information to 
    negotiate the client's verification with corresponding AAAP. 
    Sometimes client may notify its own AAAP for verification via its 
    registration message (e.g., Client's NAI [11]). The local AAA and 
    public AAA should have sufficient security relationships and access 
    control so that they can negotiate the authorization and enable the
    client to have the requested resources. Once this is over, DHCP 



ITSUMO Group               Expires August 2000                 [Page 3]

Internet Draft          AAA Requirements using DHCP           March 2000


    server will be notified about the successful negotiation and the 
    server can provide the requested resources to the client. If it is 
    not authorized, server will be informed to terminate the service to
    the client. 



3. Requirements
     
     Based on the above scenarios, the following specific requirements 
     for AAA can be ascertained.

    -  Either the DHCP Server and AAAL are co-located or they share a 
       security relationship.
       
    -  The DHCP server should be configured to obtain authorization from
       a trusted local AAA server (AAAL).
       
    -  The local authority (AAAL) has to share, or dynamically
       establish, security relationships with public authorities (AAAP)
       that are able to check client credentials. 
       
    -  The client must have a security association with its public 
       authority (AAAP). 
       
    -  Nobody can reconstruct and reuse the credentials that the client
       uses.
   
    -  The DHCP  server MUST be able to terminate service to the 
       client based on policy determination by the AAA server.
       
    -  The DHCP server should be able to handle requests for many 
       clients simultaneously. 
       
    -  The client may resend a request if it does not get a reply in
       some time, so the AAA entities must be designed to operate 
       correctly and efficiently with multiple requests for the same 
       client.
       
    -  The DHCP server has to keep state for pending client requests 
       while the local authority contacts the appropriate external 
       authority.
                                                                                                                   
    -  Support replay protection and optional non-repudiation
       capabilities for all authorization and accounting messages. 
       
    -  AAA server need not know any IP address of the client and it
       identifies clients by other means, e.g., Network Access  



ITSUMO Group               Expires August 2000                 [Page 4]

Internet Draft          AAA Requirements using DHCP           March 2000


       Identifier (NAI).
       
    -  Client NAI domain allows AAAL to easily determine the AAAP.
    
    -  The local AAA server MUST support anonymous access.
       
    -  There is no requirement for AAA to transport `DHCP or other 
       node configuration messages'.
    
    -  AAA must complete in one round trip. A major component of the  
       setup latency is the time taken to traverse the wide-area 
       Internet that is likely to separate the AAAL and the AAAP. 

    -  AAA must allow a node to register once in its domain and move
       among subnets in the same domain without requiring more AAA.
       After the initial registration, the AAAP  and AAAL would not
       be needed.
       
    -  Support accounting information via AAAP servers providing 
       accounting clearinghouse and reconciliation between serving and
       home networks. 
       
    -  AAA MUST support message privacy and integrity.
      


4. Reasons for using Public AAA

   AAA servers model in [4] shows a configuration in which the local
   and the home authority have to share trust.  This configuration
   causes a quadratic growth in the number of trust relationships as
   the number of AAA authorities (local AAA and home AAA) increases. 
   This has been identified as a problem by the roamops working group 
   [12], and any AAA proposal MUST solve this problem. Using public AAA 
   (AAAP) solves many of the scalability problems associated with 
   requiring direct business/roaming relationships between every two 
   administrative domains. A public AAA may play the role of a proxy
   between two administrative domains which have security associations 
   with the AAAP, and relay AAA messages back and forth securely.

   The AAAP enables the local and home domains to cooperate without
   requiring each of the networks to have a direct business or security
   relationship with all the other networks.  Thus, AAAPs offer the
   needed scalability for managing trust relationships between otherwise
   independent network domains.  Use of the AAAP does not preclude
   managing separate trust relationships between domains, but it does
   offer an alternative suitable for commercial environments. 




ITSUMO Group               Expires August 2000                 [Page 5]

Internet Draft          AAA Requirements using DHCP           March 2000



   
5. Security Considerations
   
   This draft defines the AAA requirements for roaming nodes using 
   DHCP or similar type of node configuration protocol. Since AAA is 
   security driven, most of this documents addresses the security 
   considerations AAA must make on behalf of roaming nodes using node 
   configuration protocols. 



6. Acknowledgements

   The requirements in section 3 were taken from a draft submitted by 
   S. Glass, S. Jacobs, and C. Perkins of the Mobile IP working group. 
   We would like to acknowledge their work. 

   The authors acknowledge the contributions of other members of the
   ITSUMO (Internet Technologies Supporting Universal Mobile Operation)
   team from Telcordia (P. Agrawal, J.C. Chen, A. Dutta, D. Famolari, 
   S. Madhani, F. Vakil, P. Ramanathan, H. Sherry and R. Wolff) and 
   Toshiba America Research Incorporated (T. Kodama).



References

   [1] S. Farrell, J. Vollbrecht, P. Calhoun, L. Gommans, G. Gross,
       B. de Bruijn, C. de Laat, M. Holdrege and D. Spence,  "AAA 
       Authorizatiopn Requirements,"
       <draft-ietf-aaa-authorization-reqs-01.txt>, October 1999.
     
   [2] J. Arkko, "Requirements  for Internet-scale Accounting 
       Management," <draft-arkko-acctreq-00.txt>, August, 1998.

   [3] C. Perkins, "IP Mobility Support," RFC 2002, October 1996.

   [4] S. Glass, S. Jacobs, C. Perkins, "Mobile IP Authentication, 
       Authorization, and Accounting Requirements," 
       <draft-ietf-mobileip-aaa-reqs-00.txt>, October, 1999.

   [5] R. Droms, "Dynamic Host Configuration Protocol," Request for
       Comments 2131, March, 1997.
   
   [6] A. McAuley, S. Das, S. Baba, Y. Shobatake, "Dynamic Registration
       and Configuration Protocol (DRCP)," <draft-itsumo-drcp-00.txt>, 
       October, 1999.    



ITSUMO Group               Expires August 2000                 [Page 6]

Internet Draft          AAA Requirements using DHCP           March 2000


             
   [7] R. Droms, "Authentication for DHCP Messages," <draft-gupta-dhcp-
       auth-12.txt>, October, 1999.
       
   [8] V. Gupta, "Flexible Authentication for DHCP Messages," 
       <draft-ietf-dhc-authentication-12.txt>, October, 1998.

   [9] A. Gustafsson, "A DNS RR for encoding DHCP information,"
       <draft-ietf-dnsind-dhcp-rr.00.txt>, October, 1999.
       
   [10] M. Stapp, Y. Rekhter, "Interaction between DHCP and DNS,"
        <draft-ietf-dhc-dhcp-dns-11.txt>, October, 1999.

   [11] B. Aboba and M. A. Beadles, "The network access identifier,"
        RFC 2486, January 1999.

   [12] B. Adoba and G. Zorn, "Criteria for evaluating roaming  
        protocols," RFC 2477, December 1998.
        
   [13] J. Wang and R. Wang, "Cellular network Authentication,
        Authorization, and Accounting requirements,"
        <draft-wang-aaa-cel-req-00.txt>, October, 1999.
        
   [14] M. Beadles and et.al., "Criteria for evaluating AAA protocols 
        for network access", <draft-ietf-aaa-na-reqts-01.txt>, October
        1999.

   [15] H. Schulzrinne and et. al., "SIP: Session initiation protocol,"
        RFC 2543, March 1999.
        
   [16] E. Wedlund and H. Schulzrinne, "Mobility support using SIP", 
        Proc. The second ACM International workshop on Wireless Mobile 
        Multimedia, ACM/IEEE, pp 76-82, August, 1999.

   [17] A. McAuley, S. Das, S. Baba, Y. Shobatake, " Requirements for 
        Extending DHCP into New Environments," 
        <draft-dhc-enhance-requirements-00.txt>, March, 2000.    



7. Authors' Addresses

   Subir Das
   MCC 1D210R, Telcordia
   445 South Street, Morristown, NJ 07960
   Phone: +1 973 829 4959
   email: subir@research.telcordia.com




ITSUMO Group               Expires August 2000                 [Page 7]

Internet Draft          AAA Requirements using DHCP           March 2000



   Anthony J. McAuley                     
   MCC 1C235B, Telcordia
   445 South Street, Morristown, NJ 07960
   Phone: +1 973 829 4698
   email: mcauley@research.telcordia.com


   Shinichi Baba
   Toshiba America Research Inc.
   P.O. Box 136 Convent Station, NJ 07961-0136
   Phone: +1 973 829 4759 
   email: sbaba@tari.toshiba.com

   
   Yasuro Shobatake
   Toshiba America Research Inc.
   P.O. Box 136 Convent Station, NJ 07961-0136
   Phone: +1 973 829 3951
   email: yasuro.shobatake@toshiba.co.jp































ITSUMO Group               Expires August 2000                 [Page 8]

PAFTECH AB 2003-20262026-04-24 14:53:33