One document matched: draft-yacine-preauth-ipsec-00.txt
Network Working Group Y. El Mghazli
Internet-Draft Alcatel
Expires: August 27, 2006 J. Bournelle
GET/INT
February 23, 2006
MPA using IKEv2 and MOBIKE
draft-yacine-preauth-ipsec-00
Status of this Memo
By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on August 27, 2006.
Copyright Notice
Copyright (C) The Internet Society (2006).
Abstract
This document discusses the details of pre-authentication in a IPsec
protected access environment. It describes an optimized solution
that avoids re-establishing an IPsec tunnel after the handover,
leveraging on IKEv2 and MOBIKE protocol.
El Mghazli & Bournelle Expires August 27, 2006 [Page 1]
Internet-Draft MPA using IKEv2 and MOBIKE February 2006
Table of Contents
1. Terminology and Definitions . . . . . . . . . . . . . . . . . 3
2. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 5
2.1. Media Pre-Authentication Framework . . . . . . . . . . . . 5
2.2. IKEv2 and MOBIKE overview . . . . . . . . . . . . . . . . 5
2.2.1. IKEv2 . . . . . . . . . . . . . . . . . . . . . . . . 5
2.2.2. MOBIKE . . . . . . . . . . . . . . . . . . . . . . . . 6
2.3. IPsec protection in the access network . . . . . . . . . . 6
3. MPA with IKEv2 and MOBIKE . . . . . . . . . . . . . . . . . . 7
3.1. Initial Step: IKEv2 authentication . . . . . . . . . . . . 7
3.2. First Step: IKEv2 pre-authentication . . . . . . . . . . . 7
3.3. Completing MPA with MOBIKE . . . . . . . . . . . . . . . . 9
4. Security Considerations . . . . . . . . . . . . . . . . . . . 11
5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 12
6. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 13
7. References . . . . . . . . . . . . . . . . . . . . . . . . . . 14
7.1. Normative References . . . . . . . . . . . . . . . . . . . 14
7.2. Informative References . . . . . . . . . . . . . . . . . . 14
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 16
Intellectual Property and Copyright Statements . . . . . . . . . . 17
El Mghazli & Bournelle Expires August 27, 2006 [Page 2]
Internet-Draft MPA using IKEv2 and MOBIKE February 2006
1. Terminology and Definitions
Most of the terms are extracted from [I-D.ohba-mobopts-mpa-framework]
and [I-D.ietf-mobike-protocol].
Media-independent Pre-Authentication Mobile Node (MN):
A mobile terminal of media-independent pre-authentication (MPA)
which is a mobile-assisted, secure handover optimization scheme
that works over any link-layer and with any mobility management
protocol. An MPA mobile node is an IP node. In this document,
the term "mobile node" or "MN" without a modifier refers to "MPA
mobile node". An MPA mobile node usually has a functionality of a
mobile node of a mobility management protocol as well.
Candidate Target Network (CTN):
A network to which the mobile may move in the near future.
Gateway (GW):
In this document, a Gateway is an Access Router using IKEv2.
IPsec TIA
Inner Address of the IPsec Tunnel.
IPsec TOA
Outer Address of the IPsec Tunnel.
Target Network (TN):
The network to which the mobile has decided to move. The target
network is selected from one or more candidate target network.
Proactive Handover Tunnel:
A bidirectional IP tunnel that is established between the MPA
mobile node and an access router of a candidate target network.
In this document, the term "tunnel" without a modifier refers to
"proactive handover tunnel".
Care-of Address:
El Mghazli & Bournelle Expires August 27, 2006 [Page 3]
Internet-Draft MPA using IKEv2 and MOBIKE February 2006
An IP address used by a mobility management protocol as a locator
of the MPA mobile node.
El Mghazli & Bournelle Expires August 27, 2006 [Page 4]
Internet-Draft MPA using IKEv2 and MOBIKE February 2006
2. Introduction
2.1. Media Pre-Authentication Framework
One of the current goal in IP based network is to achieve seamless
handover. While it exists solutions at layer 2 or IP level, the
authentication process is most of the time not considered. The
document [I-D.ohba-mobopts-mpa-framework] introduces a framework to
achieve this goal by relying on pre-authentication. This means the
mobile authenticates to a candidate target network before attaching
to it.
The proposed framework is the following (extracted from [I-D.ohba-
mobopts-mpa-framework]):
1. The Mobile establish a Security Association with a Candidate
Target Network (CTN) to secure subsequent protocol signalling.
2. It securely executes a configuration protocol to obtain an IP
address and other parameters from the CTN.
3. It executes a tunnel management protocol to establish a Proactive
Handover Tunnel (PHT) (i.e. a bidirectionnal tunnel between the
MN and an access router of the CTN).
4. Through this PHT, the MN can send and receives IP packets
including signaling messages for the Mobility Management
Protocol. As a consequence, it can receives IP data packets
resulting from this new binding.
5. Finally, it deletes or disables the PHT immediatly before
attaching to the CTN. Then it reassigns the inner address of the
PHT to the physical interface immediatly after the MN is attached
to the CTN.
In this document, we propose a solution for MPA based on IKEv2 and
MOBIKE.
2.2. IKEv2 and MOBIKE overview
2.2.1. IKEv2
The IKEv2 protocol [RFC4306] mutually authenticate two peers (named
Initiator and Responder) in order to dynamically and securely
establish IPsec SAs. It can be divided in two main phases. In the
first phase called IKE_SA_INIT, the two peers establish an IKE SA
(Security Association) to protect subsequent messages. In the second
phase, called IKE_AUTH, the two peers authenticate each other and
El Mghazli & Bournelle Expires August 27, 2006 [Page 5]
Internet-Draft MPA using IKEv2 and MOBIKE February 2006
start to configure IPsec SAs. If others IPsec SAs are needed, they
use the CREATE_CHILD_SA exchange which relies on previous
authenticated IKE SA.
The two main features of interest for this document are:
1. The IKEv2 specification allows the Responder to authenticate
Initiator by using the EAP protocol [RFC3748]. This permits to
the Responder to rely on a AAA server to authenticate the
Initiator. Note that Initiator authenticates the responder based
on public-key based mechanism.
2. The IKEv2 allows to establish an IPsec tunnel between the
Initiator and the Responder to protect data traffic.
2.2.2. MOBIKE
The MOBIKE protocol [I-D.ietf-mobike-protocol] is an extension of
IKEv2. It allows to change an IP address associated with IKEv2 and
an IPsec tunnel to change without reusing IKEv2 from scratch. This
feature is particulary useful to achieve an efficient MPA with IKEv2.
2.3. IPsec protection in the access network
This document discusses the specific case where IPsec protection is
used systematically in the access segment. This is typically the
case in 3G/WLAN interworking technologies, namely UMA [UMA] and
I-WLAN [I-WLAN]. Here one or several IPsec tunnels are used to
connect the terminal to the mobile operators network.
El Mghazli & Bournelle Expires August 27, 2006 [Page 6]
Internet-Draft MPA using IKEv2 and MOBIKE February 2006
3. MPA with IKEv2 and MOBIKE
The solution described here leverage on MOBIKE extensions to IKEv2 in
order to keep the PHT SA for the Access Tunnel. This avoids the need
to re-establish new SA after the handover. When coupled with a
seamless handover mechanism in the Access network, combining the
benefits of MOBIKE and Pre-Authentication in such specific contexts
enables to reduce the overall IP connectivity establishment delay to
L2 handoff only.
The MPA framework considers the 3 following entities:
1. The Authentication Agent: this entity is responsible of the pre-
authentication.
2. The Configuration Agent: this entity is responsible to securely
deliver an IP address and other configuration parameters to the
mobile node.
3. The Access Router: It is the router with which the Mobile Node
establishes a proactive handover tunnel.
In the proposed approach, the three following functionalities are
handled by the IKEv2 Responder colocated with the Access Router.
3.1. Initial Step: IKEv2 authentication
At the beginning, the Mobile Node establish an IPsec tunnel with a
Gateway (GW). This GW is located in the Access Router and is
collocated with the IKEv2 Responder. In this access network, the
mobile node uses the CoA as the address attached to its physical
interface.
The IPsec tunnel has the following header:
o IPsec TOA: CoA and GW
o IPsec TIA: CoA and Correspondant Node
3.2. First Step: IKEv2 pre-authentication
Thanks to a mechanism out-of scope of this document, the Mobile Node
discovers a new GW to which it may attach.
It starts a pre-authentication procedure with this nGW using IKEv2.
This IKEv2 preauthentication procedure has the following goals:
El Mghazli & Bournelle Expires August 27, 2006 [Page 7]
Internet-Draft MPA using IKEv2 and MOBIKE February 2006
o Establish an IPsec tunnel between MN and the nGW.
o Obtains an address valid in the Candidate Target Network. This is
achieved thanks to CFG_REQUEST/CFG_REPLY of IKEv2.
This address will be be attached to the physical interface after the
Mobile Node attaches to the new access network. As a consequence,
after attachment, this new address will be used as the outer address
of the tunnel between MN and the nGW and thus must be valid in the
new visited access network.
The following IKEv2 messages are exchanged between MN and the nGW.
These exchanges occur while the Mobile Node is still in the previous
access network.
Mobile Node new GW
----------- ------
(coa:500 -> nGW:500)
---------------------------------->
HDR, SAi1, KEi, Ni
(nGW:500 -> coa:500)
<----------------------------------
HDR, SAr1, KEr, Nr
---------------------------------->
HDR, SK{IDi, [CERTREQ,], CP(CFG_REQUEST)
SAi2, TSi, TSr, N(MOBIKE_SUPPORTED)}
(MN does not include AUTH to be authenticated by EAP)
<----------------------------------
HDR, SK{IDr, [CERT,], AUTH, EAP}
...
<----------------------------------
HDR, SK{ EAP (success)}
----------------------------------->
HDR, SK{AUTH}
<-----------------------------------
HDR, SK{AUTH, CP(CFG_REPLY), SAr2,
TSi, TSr, N(MOBIKE_SUPPORTED)
After IKEv2 preauthentication, the Mobile Node has an IPsec tunnel
with the nGW.
The IPsec tunnel with nGW has the following header:
El Mghazli & Bournelle Expires August 27, 2006 [Page 8]
Internet-Draft MPA using IKEv2 and MOBIKE February 2006
o IPsec TOA: CoA and nGW
o IPsec TIA: nCoA and Correspondent Node
This IPsec tunnel corresponds to the secure Proactive Tunnel. The
Mobile Node can use its Mobility Management Protocol inside this
tunnel to indicate its future new location (nCoA).
Thus, at this point of time, the Mobile Node owns 2 tunnels: one with
the current Gateway and one with the new Gateway. While the binding
is executed, the Mobile Node is ready to moves in the CTN.
When the MN changes of visited network, the source outer adress is no
longer valid. The next section explains how MOBIKE can be used to
achieve an efficient handover.
The new GW has allocated the nCoA for the Mobile Node which is not
yet in its access network. However, it knows that the Mobile Node is
supposed to come in its access network.
At this point of time, it is not clear if the Mobile Node must
indicate in this IKEv2 exchange that it is a pre-authentication.
3.3. Completing MPA with MOBIKE
As a result of the IKEv2 preauthentication with nGW, the Mobile has
an IKE_SA with the nGW. However, the source outer address of the
IPsec tunnel is not valid in nGW's access network. To avoid a
complete reauthentication procedure with nGW, we propose to use the
MOBIKE protocol.
For this purpose, the Mobile Node sends an INFORMATIONAL IKEv2
messages containg an UPDATE_SA_ADDRESSES:
Mobile Node nGW
----------- -----------
HDR, SK { N(UPDATE_SA_ADDRESSES),
[N(NAT_DETECTION_SOURCE_IP),
N(NAT_DETECTION_DESTINATION_IP)],
[N(NO_NATS_ALLOWED)],
[N(COOKIE2)] } -->
Note that this packet is sent right after the Mobile Node has
performed its IP handover and as such the Mobile Node uses its nCoA
as source IP address.
As it is the nGW which has allocated this nCoA, it can validate this
El Mghazli & Bournelle Expires August 27, 2006 [Page 9]
Internet-Draft MPA using IKEv2 and MOBIKE February 2006
request. Then it updates its IKE_SA with the IP address of the IP
header of the IKEv2 message. It replies with an IKEv2 INFORMATIONAL
message and finally it updates the IPsec SAs associated with this
IKE_SA with the new addresses.
If the MOBIKE exchange is successfull, the Mobile Node now has the
following tunnel with the nGW:
o IPsec TOA: nCoA and nGW
o IPsec TIA: nCoA and CN
This optimized approach recycles the PHT as the IPsec tunnel, which
protects the data flows in an IPsec-protected access environment.
This avoids the need to re-authenticate with the nGW and re-establish
an IPsec tunnel for this purpose.
El Mghazli & Bournelle Expires August 27, 2006 [Page 10]
Internet-Draft MPA using IKEv2 and MOBIKE February 2006
4. Security Considerations
TBD
El Mghazli & Bournelle Expires August 27, 2006 [Page 11]
Internet-Draft MPA using IKEv2 and MOBIKE February 2006
5. IANA Considerations
El Mghazli & Bournelle Expires August 27, 2006 [Page 12]
Internet-Draft MPA using IKEv2 and MOBIKE February 2006
6. Acknowledgements
The authors would like to thank Maryline Laurent-Maknavicius and
Olivier Marce for useful discussions on this topic.
El Mghazli & Bournelle Expires August 27, 2006 [Page 13]
Internet-Draft MPA using IKEv2 and MOBIKE February 2006
7. References
7.1. Normative References
[I-D.ietf-mobike-protocol]
Eronen, P., "IKEv2 Mobility and Multihoming Protocol
(MOBIKE)", draft-ietf-mobike-protocol-07 (work in
progress), December 2005.
[RFC4306] Kaufman, C., "Internet Key Exchange (IKEv2) Protocol",
RFC 4306, December 2005.
7.2. Informative References
[RFC3748] Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., and H.
Levkowetz, "Extensible Authentication Protocol (EAP)",
RFC 3748, June 2004.
[RFC3344] Perkins, C., "IP Mobility Support for IPv4", RFC 3344,
August 2002.
[RFC3775] Johnson, D., Perkins, C., and J. Arkko, "Mobility Support
in IPv6", RFC 3775, June 2004.
[I-D.ietf-mobike-design]
Kivinen, T. and H. Tschofenig, "Design of the MOBIKE
Protocol", draft-ietf-mobike-design-07 (work in progress),
January 2006.
[I-D.ohba-mobopts-mpa-framework]
Ohba, Y., "A Framework of Media-Independent Pre-
Authentication (MPA)", draft-ohba-mobopts-mpa-framework-01
(work in progress), July 2005.
[I-D.ohba-mobopts-mpa-implementation]
Ohba, Y., "Media-Independent Pre-Authentication (MPA)
Implementation Results",
draft-ohba-mobopts-mpa-implementation-01 (work in
progress), July 2005.
[I-D.ohba-mobopts-heterogeneous-requirement]
Dutta, A., "Problem Statement for Heterogeneous Handover",
draft-ohba-mobopts-heterogeneous-requirement-00 (work in
progress), October 2005.
[I-D.ietf-pana-preauth]
Ohba, Y., "Pre-authentication Support for PANA",
draft-ietf-pana-preauth-00 (work in progress),
El Mghazli & Bournelle Expires August 27, 2006 [Page 14]
Internet-Draft MPA using IKEv2 and MOBIKE February 2006
October 2005.
[I-WLAN] 3GPP, "3GPP system to Wireless Local Area Network (WLAN)
interworking; System description", TS 23.234,
December 2005.
[UMA] UMA technology, "Unlicensed Mobile Access", Stage 2
Specifications R1.0.4, May 2005.
El Mghazli & Bournelle Expires August 27, 2006 [Page 15]
Internet-Draft MPA using IKEv2 and MOBIKE February 2006
Authors' Addresses
Yacine El Mghazli
Alcatel
Route de Nozay
Marcoussis 91460
France
Email: yacine.el_mghazli@alcatel.fr
Julien Bournelle
GET/INT
9, rue Charles Fourier
Evry 91011
France
Email: julien.bournelle@int-evry.fr
El Mghazli & Bournelle Expires August 27, 2006 [Page 16]
Internet-Draft MPA using IKEv2 and MOBIKE February 2006
Intellectual Property Statement
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Disclaimer of Validity
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Copyright Statement
Copyright (C) The Internet Society (2006). This document is subject
to the rights, licenses and restrictions contained in BCP 78, and
except as set forth therein, the authors retain all their rights.
Acknowledgment
Funding for the RFC Editor function is currently provided by the
Internet Society.
El Mghazli & Bournelle Expires August 27, 2006 [Page 17]
| PAFTECH AB 2003-2026 | 2026-04-22 22:15:07 |