One document matched: draft-perkins-netext-eapbu-00.xml


<?xml version="1.0" ?>
<!DOCTYPE rfc SYSTEM "rfc2629.dtd">
<?rfc toc="yes"?>
<?rfc rfcedstyle="yes"?>
<?rfc symrefs="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<rfc ipr="trust200811" category="info" docName="draft-perkins-netext-eapbu-00.txt">


  <front>

	  <title abbrev="Optimizing MIP/PMIP EAP Authentication">
		  Optimizing IP Mobility Authentication with EAP</title>
    <author initials="C.P." surname="Perkins" fullname="Charles E. Perkins">
      <organization>Tellabs</organization>
      <address>
        <phone>+1-408-970-6560</phone>
        <email>charliep@tellabs.com</email>
      </address>
    </author>
      <author initials="B" surname="Patil" fullname="Basavaraj Patil">
         <organization>Nokia</organization>
         <address>
        <postal>
          <street>6021 Connection Drive</street>
          <city>Irving,</city>
          <code>TX  75039</code>
          <country>USA</country>
        </postal>
        <email>basavaraj.patil@nokia.com</email>
      </address>
      </author>

    <date day='25' month='Oct' year='2011'/>
    <area>Internet</area>
    <workgroup>NETLMM extensions [netext]</workgroup>
    <keyword>I-D</keyword>
    <keyword>Internet Draft</keyword>
    <!-- <t><vspace blankLines="6" /></t>  -->

<abstract>
<t>
	The Extensible Authentication Protocol (EAP) is commonly
	used for access authentication in many wireless networks.
	EAP methods often involve AAA servers to effect the
	required authentications; notifications about success or
	failure are then relayed back to a functional module in
	the access network known as the Network Access Server.
	The Binding Authentication Data option has been defined
	for enabling alternative methods for authentication in the
	context of Mobile IPv6, and there is a subtype allocated for
	AAA-based authentication methods such as EAP.  However, some
	EAP methods require additional handling 
	that requires specification not yet available in the existing
	documentation for the Binding Authentication Data option.	
	This document provides the required specification for at least
	some very widely deployed EAP methods.  In many situations requiring
	the use of EAP, this enables much faster operation for Mobile IPv6
	tunnel redirection to a wireless device's new care-of address
	by avoiding having to do multiple authentications.
</t>
</abstract>
</front>

<middle>
<section anchor='introduction' title='Introduction'>

<t>
	The Extensible Authentication Protocol (EAP) <xref target="RFC3748"/>
	is commonly used for access authentication in many wireless
	networks. 
	EAP methods often involve AAA servers to effect the
	required authentications; notifications are then relayed back to
	a functional module in the access network known as the Network
	Access Server.
	For Mobile IPv6 <xref target="RFC6275"/>, the
	Binding Authentication Data option <xref target="RFC4285"/>
	has been defined for enabling alternative methods for authentication,
	and a subtype has been allocated for AAA-based authentication methods
	such as EAP.  However, some EAP methods require additional handling
	that requires specification not yet available in the existing
	documentation for the Binding Authentication Data option.	
	This document provides the required specification for at least
	some very widely deployed EAP methods.  In many situations requiring
	the use of EAP, this enables much faster operation for Mobile IPv6
	tunnel redirection to a wireless device's new care-of address.
</t>

</section>

<section anchor='PS' title='Problem Statement'>
  <t>
    Mobile IPv6 <xref target="RFC6275"/> requires the mobile node (MN) to
    authenticate with its assigned home agent. Establishing an IPsec
    SA is accomplished after the MN has been authenticated.  EAP
    methods may be used within IKEv2 to authenticate the MN and then
    establish the MN's IPsec security association (SA). The authentication
    and establishment of
    the IPsec SA is required in addition to access network
    authentication. Most networks require a user/device to authenticate
    prior to be being connected to the network. This results in the MN
    having to perform two authentications. The MN has to first
    perform access authentication and then authenticate again for a
    second time with the home agent to establish the IPsec SA. This
    causes significant delay in the MN being registered with the
    HA. It should be noted that when the MN moves to a different
    access network, access network authentication is typically
    performed.  However, when the IPsec SA already exists, that SA only needs
    to be updated with the changed end-point. This can be achieved by
    setting the 'K' bit in the
    binding update sent from the new care-of-address.
  </t>
  <t>
    In the case of network based mobility, i.e Proxy Mobile IPv6
    <xref target="RFC5213"/> the Mobility Access Gateway (MAG)
    performs registration with the Local Mobility Agent (LMA)
    following access authentication. The MAG receives confirmation
    from a AAA server if the MN is authorized for mobility service and
    only after that does it send the proxy binding update to the
    LMA. 
  </t>
  <t>
    Combining access authentication with mobility authentication
    results in an optimization and faster connectivity. How to
    optimize or combine the access authentication with the
    authentication required for obtaining mobility service is the
    problem dealt with in this document.

  </t>
  
</section>

<section anchor='Proposal' title='Proposed Solution'>
  <t>
    The proposal contained in this I-D is to combine access
    authentication with Mobile IPv6 authentication. As a result it
    saves at least one authentication sequence and hence speeds up the
    process of sending and receiving packets via the home agent or
    LMA. 
  </t>
  <t>
    EAP is commonly used for access authentication. Many of the EAP
    authentication methods interact with a AAA server which contain
    the credentials of the user. The NAS element in an access network
    is essentially a AAA relay entity. The proposal contained in this
    document aims to utilize the information available to the NAS from
    the access authentication phase to perform Mobile IP
    authentication as well. The extensions needed to EAP and the
    Mobile IP signaling are described in the following sections. 
  </t>

</section>

<!-- Open questions that we need to think about:

0. Regarding the title "Enabling EAP methods for MIP6:
   - MIP6 already supports EAP authentication. IKEv2 is used for
   establishing the IPsec SAs between the MN and HA. IKEv2 can perform
   authentication using any EAP method.
   - I would propose the title as "Optimizing IP Mobility
   authentication" (This will make it applicable for MIP6 and PMIP6)

1. Access authentication needs to be performed at every network the MN
attaches to. This model is not going to change since operators who
invest in the infrastructure would like to make sure they are
providing access to users who are authenticated and authorized (in
other words they have a way to charge them).

2. Mobile IPv6 authentication and setup of the SAs happens only at the
time of registration. Once the SAs are setup there is no more MIP6
authentications. Subsequent registrations as a result of change of CoA
utilize the already established SA and in effect there is no 2nd
authentication.

3. In the case of Proxy MIP6, the MAG is the entity which has the SA
with the LMA. The MAG is on the path of the access authentication. The
MAG entity is included within the NAS of the access network. When
access authentication response is received, the MAG triggers the PBU
to the LMA and since this registration is being sent over an existing
SA the LMA will simply accept and process the PBU and create the
binding. So there is no second authentication per se.

4. For the upcoming meeting, I think we should spend time on
discussing the problem and how a more optimal approach can be
specified rather than any specific solution. Hence it would be okay to
go ahead and submit this I-D and then work on it some more in the
coming week.

5. I still have several doubts about the problem and proposed
solution. We need to have a brainstorming discussion. Let me schedule
a meeting at IETF82 and include Sri and Kent as well.

-->

<section anchor='EAP_type' title='EAP subtype for Binding Authentication Data'>

<t>
	This specification defines a new subtype, called the EAP
	Authentication Data [EAPAD] subtype, for the Binding
	Authentication Data suboption for Mobile IPv6.  The EAPAD
	subtype has the following format, which is identical to the
	EAP message format:

<figure><artwork>
    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |     Code      |  Identifier   |            Length             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |     Type      |  Type-Data ...
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-

</artwork>
</figure>

</t>

<t>
	Please consult the EAP specification <xref target="RFC3748"/> for
	details about these header fields.
</t>

<!--
<t>
</t>
-->

</section>

<section anchor="BAck_AD"
	title="Binding Acknowledgement Authentication Data option">
	
<t>	
	The Binding Acknowledgement Authentication Data option [BAckAD]
	is specified to enable the EAP method to return data from the
	AAA server back to the Authenticator and the Peer as may
	be required by the EAP method specification.  The nature of
	the data returned in the BAckAD depends on the method.  The
	EAP message is of type EAP Success or EAP Failure.

<figure><artwork>
    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
                   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
                   |  Option Type  | Option Length |  Subtype      |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |     Code      |  Identifier   |            Length             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |     Type      |  Type-Data ...
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-

</artwork>
</figure>
</t>

<t>
	The Subtype for the Binding Acknowledgement Authentication
	Data option is 0, for EAP methods.  There is no need for the
	SPI field.  The Type-Data is the EAP method-specific data.  Since
	this option appears in the Binding Acknowledgement message,
	the Code will either correspond to EAP-Success or EAP-Failure.
</t>

</section>

<section anchor="EAP_AKA_example"
	title="Example of use with EAP-AKA">

<t>
	The following figure shows how to use the new Binding
	Authentication Data subtype along with the new Binding
	Acknowledgement Authentication Data subtype with EAP-AKA
	<xref target="RFC4187"/>.  A very similar procedure will
	also work for EAP-AKA' <xref target="RFC5448"/>.
</t>


<t>
<figure><artwork>

      Peer                     Authenticator       Home     AAA Server
        |                            |             Agent        |
        | EAP-Request/Identity       |               |          |
        |<---------------------------|               |          |
        |                            |               |          |
        | EAP-Response/Identity      |               |          |
        | (Includes user''s NAI)     |               |          |
        |--------------------------->+------------------------->|
        |                            |               |      +-----------+
        |                            |               |      | Process A |
        |                            |               |      +-----------+
        | EAP-Request/AKA-Challenge  |               |          |
        | (AT_RAND, AT_AUTN, AT_MAC) |               |          |
        |<---------------------------+<-------------------------|
    +-----------+                    |               |          |
    | Process B |                    |               |          |
    +-----------+                    |               |          |
        | EAP-Response/AKA-Challenge | PBU           | EAP      |
        | (AT_RES, AT_MAC)           |(EAP-Response) | Response |
        |--------------------------->+-------------->+--------->|
        |                            |               |      +-----------+
        |                            |               |      | Process C |
        |                            |  PBAck        | EAP  +-----------+
        |                            |  (EAP-Success)| Success  |
        |<---------------------------+<--------------+<---------|

</artwork>
</figure>

</t>

<t>
	where:
<list style='hanging'>

<t hangText='Process A'> <vspace blankLines='1' />
means "Server runs AKA algorithms, generates RAND and AUTN."
</t>

<t hangText='Process B'> <vspace blankLines='1' />
means "Peer runs AKA algorithms, verifies AUTN and MAC, derives RES and session key"                   
</t>

<t hangText='Process C'> <vspace blankLines='1' />
means "Server checks the given RES, and MAC and finds them correct."
</t>

</list>
</t>

</section>

<section anchor="security" title="Security Considerations">

<t>
	This document introduces a new subtype for the
	Binding Authentication Data of Mobile IPv6.  The security
	characteristics for the authentication data are exactly those
	of the base EAP method which defines the data fields and
	security parameters for the new subtype.
</t>

<t>
	This document specifies the Binding Acknowledgement Data option,
	which is a new option for the Binding Acknowledgement message of
	Mobile IPv6.  The security characteristics for the new
	option are exactly those
	of the base EAP method which defines the data fields and
	security parameters for the new option.
	The Mobile-Home Authentication extension is still also required
	for the Binding Acknowledgement, but additional security features
	and notifications may be included in the EAP method data
	defining the contents of the new option.
</t>

</section>

<section anchor="iana" title="IANA Considerations">
<t>
	This document requires allocation of a new subtype for the
	Binding Authentication Option of Mobile IPv6.
</t>
<t>
	This document specifies the Binding Acknowledgement Data option,
	which is a new option for the Binding Acknowledgement message of
	Mobile IPv6.
</t>

</section>
</middle>

<back>

<references title="Normative References">

<?rfc include='reference.RFC.3748.xml'?>
<?rfc include='reference.RFC.4285.xml'?>
<?rfc include='reference.RFC.6275.xml'?>
 
</references>

<references title="Informational References">

<?rfc include='reference.RFC.4187.xml'?>
<?rfc include='reference.RFC.5213.xml'?>
<?rfc include='reference.RFC.5448.xml'?>
 
</references>

<!--
<section anchor="acknowledgements" title="Acknowledgements">

<t>
	This document stems from discussions with the following people,
	in alphabetical order:
</t>

</section>
 -->

</back>

</rfc>

PAFTECH AB 2003-20262026-04-24 01:06:35