MIPv4-Diameter Update Tom Hiller Lucent Technologies.

Slides:



Advertisements
Similar presentations
Security Issues In Mobile IP
Advertisements

Dynamic HA Assignment for MIPv4 in WLAN Interworking Raymond Hsu, Qualcomm Inc., Wing C. Lau, Qualcomm Inc., Notice:
External User Security Model (EUSM) for SNMPv3 draft-kaushik-snmp-external-usm-00.txt November, 2004.
Fast and Secure Universal Roaming Service for Mobile Internet Yeali S. Sun, Yu-Chun Pan, Meng-Chang Chen.
1Nokia Siemens Networks Presentation / Author / Date University of Twente On the Security of the Mobile IP Protocol Family Ulrike Meyer and Hannes Tschofenig.
1 DSMIP6 Support QUALCOMM Inc. Jun Wang, George Cherian, Masa Shirota Notice.
H ELSINKI U NIVERSITY OF T ECHNOLOGY AAA Architecture for hierarchical wireless Mobile IPv4 Tom Weckström Telecommunications Software and Multimedia Laboratory.
Note Well Any submission to the IETF intended by the Contributor for publication as all or part of an IETF Internet-Draft or RFC and any statement made.
AAA Mobile IPv6 Application Framework draft-yegin-mip6-aaa-fwk-00.txt Alper Yegin IETF 61 – 12 Nov 2004.
Sun Microsystems, Inc. Security for Mobile IP in the 3G Networks Pat R. Calhoun Network and Security Center Sun Microsystems, Inc.
All-IP distributed (proxy) control model architecture Henrik Basilier, Ericsson ALLIP __ERI_distributed_CM.
Overview of the Mobile IPv6 Bootstrapping Problem James Kempf DoCoMo Labs USA Thursday March 10, 2005.
A Secure Access System for Mobile IPv6 Network ZHANG Hong Aug 28, 2003
1 © NOKIA MitM.PPT/ 6/2/2015 / Kaisa Nyberg (NRC/MNW), N.Asokan (NRC/COM) The Insecurity of Tunnelled Authentication Protocols N. ASOKAN, VALTTERI NIEMI,
Mobile IP Overview: Standard IP Standard IP Evolution of Mobile IP Evolution of Mobile IP How it works How it works Problems Assoc. with it Problems Assoc.
Vault: A Secure Binding Service Guor-Huar Lu, Changho Choi, Zhi-Li Zhang University of Minnesota.
Carrying Location Objects in RADIUS Hannes Tschofenig, Farid Adrangi, Avi Lior, Mark Jones.
A Secure Mobile IP Authentication based on Identification Protocol Authors: Doo Ho Choi, Hyungon Kim and Kyoil Jung Source: International Symposium on.
Session Policy Framework using EAP draft-mccann-session-policy-framework-using-eap-00.doc IETF 76 – Hiroshima Stephen McCann, Mike Montemurro.
July 16, 2003AAA WG, IETF 571 AAA WG Meeting IETF 57 Vienna, Austria Wednesday, July 16,
Mobile IP Performance Issues in Practice. Introduction What is Mobile IP? –Mobile IP is a technology that allows a "mobile node" (MN) to change its point.
Mobile IP Traversal Of NAT Devices By, Vivek Nemarugommula.
1 Chapter06 Mobile IP. 2 Outline What is the problem at the routing layer when Internet hosts move?! Can the problem be solved? What is the standard solution?
Lecture 3a Mobile IP 1. Outline How to support Internet mobility? – by Mobile IP. Our discussion will be based on IPv4 (the current version). 2.
Doc.: IEEE /229r0 Submission Tan Pek-Yew, Panasonic Slide 1 March 2003 Interworking – QoS and Authorization Tan Pek Yew & Cheng Hong Panasonic.
An Integrated QoS, Security and Mobility Framework for Delivering Ubiquitous Services Across All IP-based Networks Haitham Cruickshank University of Surrey.
1 IPsec-based MIP6 Security Qualcomm Inc. Starent Inc. Notice: Contributors grant free, irrevocable license to 3GPP2 and its Organization Partners to incorporate.
3Com Confidential Proprietary 3G CDMA AAA Function Yingchun Xu 3COM.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: MIH_Handover primitives and scenarios Date Submitted: April, 30,
1 cdma2000 Packet Data Security Assessment Christopher Carroll Verizon Wireless April 11, 2001.
1 Motorola PMIPv4 Call Flows: Bearer Setup with Dual Anchoring Parviz YeganiVojislav VuceticAlmon Tang (408) (732) (847)
Secure Authentication Scheme with Anonymity for Wireless Communications Speaker : Hong-Ji Wei Date :
EAP Key Framework Draft-ietf-eap-keying-01.txt IETF 58 Minneapolis, MN Bernard Aboba Microsoft.
Distributed Authentication in Wireless Mesh Networks Through Kerberos Tickets draft-moustafa-krb-wg-mesh-nw-00.txt Hassnaa Moustafa
IETF70 DIME WG1 ; ; Diameter Routing Extensions (draft-tsou-dime-base-routing-ext.
AAA Registration Keys Charles E. Perkins/Nokia Research Pat R. Calhoun/Sun Microsystems.
1 Local Security Association (LSA) The Temporary Shared Key (TSK) draft-le-aaa-lsa-tsk-00.txt Stefano M. Faccin, Franck Le.
All Rights Reserved © Alcatel-Lucent 2007, ##### 1 | Presentation Title | January 2007 UMB Security Evolution Proposal Abstract: This contribution proposes.
AAA and Mobile IPv6 Franck Le AAA WG - IETF55. Why Diameter support for Mobile IPv6? Mobile IPv6 is a routing protocol and does not deal with issues related.
Carrying Location Objects in RADIUS Hannes Tschofenig, Farid Adrangi, Avi Lior, Mark Jones.
Mobility Management in WLAN IW Inma Carrion, Vijay DevarapalliNokia Raymond HsuQualcomm Inc. Pete McCann, Frank AlfanoLucent Serge ManningSprint Notice:
Data Objects and Message Types 49 th IETF AAAarch Research Group David Spence Interlink Networks.
111 © 2001, Cisco Systems, Inc. All rights reserved. Presentation_ID Mobile IPv4 Dynamic Home Agent Assignment Framework (draft-kulkarni-mobileip-dynamic-assignment-01.txt)
Doc.: IEEE /635r1 Submission November 2001 Peter A. Dahl, Verizon WirelessSlide 1 CDMA2000 [the other 3G Standard] Peter Dahl Verizon Wireless.
Spring 2004 Mobile IP School of Electronics and Information Kyung Hee University Choong Seon HONG
Security Mechanisms for Delivering Ubiquitous Services in Next Generation Mobile Networks Haitham Cruickshank University of Surrey workshop on Ubiquitous.
1 © NOKIA FILENAMs.PPT/ DATE / NN AAA-SIP Requirements Current draft: draft-loughney-sip-aaa-req-00.txt draft-calhoun-sip-aaa-reqs-04.txt may not be updated.
1 HRPD Roamer Authentication Zhibi Wang, Sarvar Patel, Simon Mizikovsky, Nancy Lee.
IETF66 DIME WG John Loughney, Hannes Tschofenig and Victor Fajardo 3588-bis: Current Issues.
Mobile IPv4 – Diameter Draft Status Tom Hiller Lucent Technologies.
Draft-ietf-aaa-diameter-mip-15.txt Tom Hiller et al Presented by Pete McCann.
1 Alternative (Future) Proposals for MIPv6 Security MIP6 BOF/WG IETF-57 Jari Arkko, Ericsson Research NomadicLab Charlie Perkins, Nokia Research Center.
Load Balance for Distributed Home Agents in Mobile IPv6 draft-deng-mip6-ha-loadbalance-02.txt Hui Deng Hitachi (China) Brian HaleyHewlett-Packard Company.
MIPv6Security: Dimension Of Danger Unauthorized creation (or deletion) of the Binding Cache Entry (BCE).
Washinton D.C., November 2004 IETF 61 st – mip6 WG MIPv6 authorization and configuration based on EAP (draft-giaretta-mip6-authorization-eap-02) Gerardo.
An Introduction to Mobile IPv4
SPEAKER: HONG-JI WEI DATE: Efficient and Secure Anonymous Authentication Scheme with Roaming Used in Mobile Networks.
Diameter SIP Application
Minneapolis, March 2005 IETF 62 nd – mip6 WG Goals for AAA-HA interface (draft-giaretta-mip6-aaa-ha-goals-00) Gerardo Giaretta Ivano Guardini Elena Demaria.
IP Address Location Privacy and Mobile IPv6: Problem Statement draft-irtf-mobopts-location-privacy-PS-00.txt Rajeev Koodli.
Paris, August 2005 IETF 63 rd – mip6 WG Mobile IPv6 bootstrapping in split scenario (draft-ietf-mip6-bootstrapping-split-00) mip6-boot-sol DT Gerardo Giaretta,
111 © 2001, Cisco Systems, Inc. All rights reserved. Presentation_ID Mobile IPv4 Dynamic Home Agent Assignment Framework (draft-kulkarni-mobileip-dynamic-assignment-02.txt)
MIP6 RADIUS IETF-72 Update draft-ietf-mip6-radius-05.txt A. LiorBridgewater Systems K. ChowdhuryStarent Networks H. Tschofenig Nokia Siemens Networks.
11/20/2002AAA Agenda- IETF 55 Atlanta1 Authentication, Authorization, Accounting (AAA) WG Chairs: Bernard Aboba Dave Mitton.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Flow Distribution Rule Language for Multi-Access Nodes draft-larsson-mext-flow-distribution-rules-01.
Carrying Location Objects in RADIUS
Maryna Komarova (ENST)
3GPP and SIP-AAA requirements
Security Activities in IETF in support of Mobile IP
Lecture 4a Mobile IP 1.
Presentation transcript:

MIPv4-Diameter Update Tom Hiller Lucent Technologies

Review Registration Support –Static Home Agent with static or dynamic home address –Dynamic Home Agent AAAH assigns HA in home network; static or dynamic home address AAAF assigns HA in visited network; dynamic home address only Key distribution –MN-FA and MN-HA keys to FA/HA –AAA Keys distribute nonces to mobile

“AAA Keys” Heads-Up AAA Keys delivers the MN-FA and MN- HA keys to the mobile –Mechanism: nonces generated by the AAAH –AAA Keys is worked in the MIP WG Recent “AAA Keys” revision: –Clarifies use with Diameter and RADIUS –A fix to small error as part of a last call

Security Update Needed Recent Events: –AAA WG drops support of CMS –Security Guidance: Only those entities that use a key shall have the key Implication: –Draft sends keys in the clear through the AAAF –But, keys must not be exposed to the AAAF –Therefore, a different mechanism is needed

Redirect Solution Use “Redirect” to eliminate AAAF (and brokers) from message transaction –MIPv4-Diameter involves the MN, AAAF, AAAH, FA and HA. –The HA may be assigned by the AAAF or the AAAH –Not clear to the author how to eliminate the AAAF involvement with redirect

3GPP2 and AAAF 3GPP2 typically allows AAAF policy to override attributes from the AAAH Eliminating AAAF involvement from AAA responses pushes policy decisions to the FA Preferable that AAAF stay in message exchange

Key Distribution Messages Delete the key AVPs from AMA/HAR – Abandon CMS and hop-by-hop security TLS session to directly transport keys –One TLS session between AAAH and FA –One TLS session between AAAH and HA New Diameter commands allocated –Key Request: HA or FA requests key from AAAH –Key Reply: AAAH provides keys –See suggested flow in subsequent slide

Visited Network Allocates the HA

Home Network Allocates the HA

MN-FA Key Distribution

Discussion Security –Only the HA and FA see the keys; AAAF and brokers do not see the keys –Assumptions: Visited network FA, HA, and AAAF are trustworthy Latency –May create extra registration latency AAAF involvement –AAAF sees authorization attributes

3GPP2 AAA Trust/Security Model All AAA nodes are trustworthy All AAA communications over public facilities are encrypted However: Next slide considers a rouge AAA node attack on HA assignment in visited network

Security Threat? Hypothetical Attack –The AAAF allocates an HA for the user –A rouge broker AAA node changes the HA address or HA identity to a rouge HA –The AAAH provides the MN-HA key to that HA; that HA calculates the MIP Reply –The mobile gets the wrong HA in the MIP Reply Potential Solutions: –The home network verifies the HA belongs to the visited network and not some other network –The visited network verifies the HA in the Reply is the same as it allocated; the AAAH will not over ride an AAAF allocation of an HA, but may refuse the RRQ

Proposed Plan Review of these slides ~3 weeks Review an edit on the current draft –Use MSFT Word revision control on txt –Post that edit in *doc, *pdf, and *ps form –~ 3 weeks Post a new version of the draft – Contingent on “AAA Keys” progressing satisfactorily –~ 3 weeks

Conclusion Proposed plan –Leaves most of the current draft message flows intact –Creates two new Diameter messages –Renders keys visible only to those entities that need the keys –Leaves the AAAF involved to make policy decisions on the attributes returned to the FA –Creates new draft in ~9 weeks, assuming “AAA Keys” progresses