One document matched: draft-ohba-eap-kde-00.txt
Network Working Group Y. Ohba
Internet-Draft Toshiba
Expires: August 21, 2008 R. Lopez
University of Murcia
February 18, 2008
An EAP Method for Key Distribution Exchange for Handover Re-
authentication
draft-ohba-eap-kde-00
Status of this Memo
By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on August 21, 2008.
Copyright Notice
Copyright (C) The IETF Trust (2008).
Abstract
This document describes an EAP method used for carrying KDE (Key
Distribution Exchange) protocol for handover re-authentication. This
method carries HOKEY KDE messages. This EAP method is designed to
work with stand-alone authenticators.
Ohba & Lopez Expires August 21, 2008 [Page 1]
Internet-Draft EAP-KDE February 2008
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 4
2.1. Protocol Operation . . . . . . . . . . . . . . . . . . . . 4
3. Message Format . . . . . . . . . . . . . . . . . . . . . . . . 5
4. Bootstrapping EAP-KDE . . . . . . . . . . . . . . . . . . . . 5
5. Per-Authenticator Key . . . . . . . . . . . . . . . . . . . . 6
6. EAP Method Attributes . . . . . . . . . . . . . . . . . . . . 7
6.1. MSK and EMSK . . . . . . . . . . . . . . . . . . . . . . . 7
6.2. Server ID . . . . . . . . . . . . . . . . . . . . . . . . 7
7. Security Considerations . . . . . . . . . . . . . . . . . . . 7
8. IANA consideration . . . . . . . . . . . . . . . . . . . . . . 9
9. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 9
10. References . . . . . . . . . . . . . . . . . . . . . . . . . . 10
10.1. Normative References . . . . . . . . . . . . . . . . . . . 10
10.2. Informative references . . . . . . . . . . . . . . . . . . 10
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 10
Intellectual Property and Copyright Statements . . . . . . . . . . 12
Ohba & Lopez Expires August 21, 2008 [Page 2]
Internet-Draft EAP-KDE February 2008
1. Introduction
KDE (Key Distribution Exchange) is a three-party key distribution
protocol designed for handover keying [I-D.ietf-hokey-key-mgm].
EAP-KDE is an EAP method designed for carrying KDE over EAP. This
EAP method is designed to work with stand-alone authenticators. EAP-
KDE has the following characteristics that may achieve the goals in
designing the EAP re-authentication and key management protocol
[I-D.ietf-hokey-reauth-ps].
No modification to lower layer
Since the KDE messages are encapsulated in an EAP method, no
modification to existing EAP lower layer is required.
No modification to EAP
Since the KDE messages encapsulated in an EAP method, no
modification to EAP [RFC3748] is required.
Minimum modification to AAA protocols
For this EAP method to work, some KDE messages need be exchanged
outside this EAP method between an authenticator and a KDE server.
Such KDE messages are carried over AAA protocols. Specifically,
one new AAA attribute is needed to carry KDE messages over
existing AAA protocols between an authenticator and a KDE server.
One roundtrip beyond access network
EAP-KDE requires one AAA roundtrip between authenticator and AAA
server.
Channel Binding
Since KDE cryptographically binds a session key and associated
attributes to the identity of an authenticator, EAP-KDE provides
Channel Binding property.
As observed, EAP-KDE provides the same number of roundtrips (1) as
ERP [I-D.ietf-hokey-erx] between authenticator and AAA server without
modifying EAP.
EAP-KDE creates a new usage of KDE to distribute a per-authenticator
key from a HOKEY server to an authenticator. Therefore, EAP-KDE can
be also considered as an alternative to ERP [I-D.ietf-hokey-erx].
Ohba & Lopez Expires August 21, 2008 [Page 3]
Internet-Draft EAP-KDE February 2008
This EAP method is intended to be used for intra-domain handover
optimization in a AAA domain. A full EAP authentication with any EAP
method is still needed for initial entry of the domain.
It should be noted that a similar method-based mechanism with use of
stand-alone authenticator may be applicable to carry other
authentication and key management protocols such as Kerberos to
achieve the same goals.
2. Terminology
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119].
2.1. Protocol Operation
EAP-KDE works with a stand-alone EAP authenticator that is an EAP
authenticator co-located with an EAP server supporting this EAP
method. In this protocol, an EAP peer is a KDE peer, and an EAP
authenticator is a KDE third party. The KDE server may reside in the
home AAA domain or visited AAA domain.
It is assumed that a Kps (a shared key between the peer and KDE
server) has been established using the bootstrapping mechanism
described in Section 4.
The authenticator that supports EAP-KDE method starts with the EAP-
KDE method when a peer attaches to it by sending an EAP-Request/KDE
carrying a KDE message 0 (KDE0). If the peer does not support the
method or it needs to go through a complete EAP authentication sends
a EAP-NAK. Then the authenticator can start the EAP Request/Identity
to the peer to perform a full EAP authentication using other EAP
method. On the contrary, if the peer supports EAP-KDE and wishes to
run it, it answers with EAP-Response/KDE containing a KDE message 1
(KDE1).
Once the authenticator receives KDE1, it sends a KDE message 2 (KDE2)
to the KDE server over a AAA protocol and waits for a KDE message 3
(KDE3) from the KDE server, and send an EAP-Request/KDE with a KDE
message 4 (KDE4) after receiving the KDE3. The AAA message carrying
the KDE3 also carries authorization data used for network access.
The peer returns an EAP-Request/KDE with an empty Payload in response
to the KDE3. The authenticator returns an EAP-Success. (NOTE:
Failure case is TBD.)
Ohba & Lopez Expires August 21, 2008 [Page 4]
Internet-Draft EAP-KDE February 2008
Peer Authenticator/Server KDE Server/AAA Server
<-- EAP-Request/KDE{KDE0}
--> EAP-Response/KDE{KDE1} --> AAA{KDE2}
<-- EAP-Request/KDE{KDE4} <-- AAA{KDE3, authorization data}
--> EAP-Response/KDE{}
<-- EAP-Success
Figure 1: EAP-KDE Call Flow
3. Message Format
The Code, Identifier, Length, and Type fields are described in
[RFC3748]. The EAP Type for this EAP method is [to be assigned by
IANA]. The Payload-Type field contains the type of Payload. The
optional Payload field contains data specific to Payload-Type
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Code | Identifier | Length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type | Payload-Type | Payload (optional) ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
Figure 2: Message Format
Payload-Type Payload Data
0 Empty
1 KDE message
4. Bootstrapping EAP-KDE
EAP-KDE requires that the following parameters are bootstrapped from
a full EAP authentication with any EAP method that generates EMSK.
o The identity of the KDE server (KDE-SERVER-ID)
o Kps, the secret key shared between peer and the KDE server (KDE-
SERVER-KEY)
KDE-SERVER-ID is statically or dynamically configured on the peer.
DNS or DHCP may be used for dynamically discovering the
KDE-SERVER-ID.
Kps (KDE-SERVER-KEY) is derived from EMSK (EAP Master Session Key) as
Ohba & Lopez Expires August 21, 2008 [Page 5]
Internet-Draft EAP-KDE February 2008
a USRK (Usage Specific Root Key) [I-D.ietf-hokey-emsk-hierarchy] as
follows, where KDF denotes a key derivation function defined in
[I-D.ietf-hokey-emsk-hierarchy] and length denotes the length of the
derived key. The default PRF is used for derivation of Kps.
Kps = KDF(EMSK, key-label + "\0" + op-data + length).
key-label: "kde-boot-key@ietf.org"
op-data: KDE-SERVER-ID
The name of Kps is defined as follows.
Kps Name = SHA-256-64 ( EAP Session-ID + key-label )
where SHA-256-64 is the first 64 bits from the SHA-256 output and EAP
Session-ID is the EAP session id of the EAP method that generated the
EMSK.
The KDE server may reside in the home domain or visited domain. If
the KDE server resides in the home domain, it is assumed that the KDE
server is implemented on the same node as the EAP server for the
initial EAP authentication. Hence, no protocol is needed for
distributing the KDE-SERVER-KEY. If the KDE server resides in the
visited domain, it is implemented on a AAA proxy server in the
visited domain. The KDE-SERVER-KEY is distributed from the home
domain using HOKEY KDE over UDP. Also, the AAA proxy is expected to
store the authorization data obtained from the home AAA server during
the full EAP authentication performed at the time of initial entry of
the visited domain so that the authorization data is associated with
the KDE-SERVER-KEY and subsequent EAP-KDE runs once EAP-KDE is
bootstrapped in the visited domain.
5. Per-Authenticator Key
Kpt, the session key established between the peer and authenticator
is derived from Kps as follows, where KDF denotes a key derivation
function defined in [I-D.ietf-hokey-emsk-hierarchy] and length
denotes the length of the derived key. The default PRF is used for
derivation of Kpt. The op-data is concatenation of TID (Third Party
Identifier) and SEQps of KDE in network byte order.
Kpt = KDF(Kps, "kde-per-authenticator-key@ietf.org" + "\0"
+ op-data + length).
op-data: TID + SEQps
The name of Kpt is defined as follows.
Ohba & Lopez Expires August 21, 2008 [Page 6]
Internet-Draft EAP-KDE February 2008
Kpt Name = SHA-256-64 ( PID + TID + key-label )
where SHA-256-64 is the first 64 bits from the SHA-256 output and EAP
Session-ID is the EAP session id of the EAP method that generated the
EMSK.
6. EAP Method Attributes
6.1. MSK and EMSK
A set of 64-octet MSK and 64-octet EMSK to be exported from EAP-KDE
is derived from Kpt, the KDE session key established between the peer
and stand-alone authenticator as follows. MSK is the first 64-octet
of Kpt. EMSK is the next 64-octet of Kpt. The length of Kpt MUST be
at least 128-octet.
6.2. Server ID
TID (Third party identifier) of KDE is used as the Server ID of this
EAP method.
7. Security Considerations
The EAP-KDE method transports KDE protocol describe in
[I-D.ietf-hokey-key-mgm]. The KDE protocol is a 3-party key
distribution protocol. The security of EAP-KDE mainly depends on the
security of KDE protocol. Security Claims for this EAP method is
provided below.
Auth. mechanism: Pre-shared keys.
Ciphersuite negotiation: No
Mutual authentication: Yes
Integrity protection: Yes
Replay protection: Yes
Confidentiality: No
Key derivation: Yes
Key strength: min(128, Kpt strength)
Dictionary attack prot.: N/A
Fast reconnect: Yes
Crypt. binding: N/A
Session independence: Yes
Fragmentation: TBD
Channel binding: Yes
Ohba & Lopez Expires August 21, 2008 [Page 7]
Internet-Draft EAP-KDE February 2008
Protected ciphersuite negotiation
EAP-KDE does not support ciphercuite negotiation.
Mutual authentication
EAP-KDE transports KDE protocol which provides peer authentication
in KDE0 message and server authentication in message KDE4.
Integrity protection
EAP-KDE is a mere carrier of KDE protocol, which is integrity
protected. Therefore, this property is applied to the Payload
field but not to the whole EAP message.
Replay protection
KDE protocol transported by EAP-KDE provides replay protection.
Additionally, peer receives a success result indication when
receiving KDE4 message.
Confidentiality
EAP-KDE does not provide confidentiality.
Key derivation
EAP-KDE derives a MSK (64 bytes) and EMSK (64 bytes) from session
key Kpt distributed by KDE.
Key strength
The distributed key Kpt shall have at least 128 octets. From that
key, EAP-KDE derives 64 bytes MSK and 64 bytes EMSK. (see
Section 6.1). The key strength of exported keying material
depends on the strength of Kpt.
Dictionary attack resistance
No password authentication is used.
Fast reconnect
EAP-KDE use KDE protocol that provides a fast reconnect feature by
itself. In fact, KDE uses the cryptographic material exported
from a previous full EAP authentication.
Ohba & Lopez Expires August 21, 2008 [Page 8]
Internet-Draft EAP-KDE February 2008
Cryptographic binding
Since EAP-KDE does not tunnel another EAP method, it does not
implement cryptographic binding.
Session independence
Each time EAP-KDE is performed a new fresh per-authenticator key
(Kpt) is derived. Since MSK and EMSK are derived from the new
Kpt, they shall be also fresh keys.
Fragmentation
TBD.
Channel binding
Since KDE is a three-party key distribution protocol it
cryptographically binds a session key and associated attributes to
the identity of an authenticator, EAP-KDE provides this property.
8. IANA consideration
EAP-KDE requires a new EAP Type value assigned by IANA.
EAP-KDE requires a new namespace for EAP-KDE Payload-Type field
managed by IANA. This document uses two Payload-Type values 0
(Empty) and 1 (KDE message).
EAP-KDE requires a new KDE Key Type values 3 (EAP-KDE KDE Server Key)
and 4 (EAP-KDE Per-Authenticator Key) assigned by IANA.
EAP-KDE requires two new USRK key label values
"kde-boot-key@ietf.org" and "kde-per-authenticator-key@ietf.org"
assigned by IANA.
9. Acknowledgements
TBD.
10. References
Ohba & Lopez Expires August 21, 2008 [Page 9]
Internet-Draft EAP-KDE February 2008
10.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC3748] Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., and H.
Levkowetz, "Extensible Authentication Protocol (EAP)",
RFC 3748, June 2004.
[I-D.ietf-hokey-key-mgm]
Nakhjiri, M. and Y. Ohba, "Derivation, delivery and
management of EAP based keys for handover and re-
authentication", draft-ietf-hokey-key-mgm-02 (work in
progress), January 2008.
[I-D.ietf-hokey-emsk-hierarchy]
Salowey, J., Dondeti, L., Narayanan, V., and M. Nakhjiri,
"Specification for the Derivation of Root Keys from an
Extended Master Session Key (EMSK)",
draft-ietf-hokey-emsk-hierarchy-03 (work in progress),
January 2008.
[IANA] Narten, T. and H. Alvestrand, "Guidelines for Writing an
IANA Considerations Section in RFCs", BCP 26, RFC 2434,
October 1998.
10.2. Informative references
[I-D.ietf-eap-keying]
Aboba, B., Simon, D., and P. Eronen, "Extensible
Authentication Protocol (EAP) Key Management Framework",
draft-ietf-eap-keying-22 (work in progress),
November 2007.
[I-D.ietf-hokey-reauth-ps]
Clancy, C., Nakhjiri, M., Narayanan, V., and L. Dondeti,
"Handover Key Management and Re-authentication Problem
Statement", draft-ietf-hokey-reauth-ps-08 (work in
progress), February 2008.
[I-D.ietf-hokey-erx]
Narayanan, V. and L. Dondeti, "EAP Extensions for EAP Re-
authentication Protocol (ERP)", draft-ietf-hokey-erx-09
(work in progress), February 2008.
Ohba & Lopez Expires August 21, 2008 [Page 10]
Internet-Draft EAP-KDE February 2008
Authors' Addresses
Yoshihiro Ohba
Toshiba
Email: yohba@tari.toshiba.com
Rafael Marin Lopez
University of Murcia
Email: rafa@um.es
Ohba & Lopez Expires August 21, 2008 [Page 11]
Internet-Draft EAP-KDE February 2008
Full Copyright Statement
Copyright (C) The IETF Trust (2008).
This document is subject to the rights, licenses and restrictions
contained in BCP 78, and except as set forth therein, the authors
retain all their rights.
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Intellectual Property
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Acknowledgment
Funding for the RFC Editor function is provided by the IETF
Administrative Support Activity (IASA).
Ohba & Lopez Expires August 21, 2008 [Page 12]
| PAFTECH AB 2003-2026 | 2026-04-22 14:16:13 |