Hokey Architecture Deployment and Implementation

Slides:



Advertisements
Similar presentations
xxx IEEE MEDIA INDEPENDENT HANDOVER DCN: xxx Title: Proposal for adding a key hierarchy based approach in the security.
Advertisements

AAA Mobile IPv6 Application Framework draft-yegin-mip6-aaa-fwk-00.txt Alper Yegin IETF 61 – 12 Nov 2004.
Network Discovery and Selection/Re-selection. 2 OUTLINE Network Model Use-case Scenario Solution IP Addressing.
Carrying Location Objects in RADIUS Hannes Tschofenig, Farid Adrangi, Avi Lior, Mark Jones.
ERP for IKEv2 draft-nir-ipsecme-erx-01. Why ERP for IKEv2? RFC 5296 and the bis document define a quick re- authentication protocol for EAP. ERP requires.
Session Policy Framework using EAP draft-mccann-session-policy-framework-using-eap-00.doc IETF 76 – Hiroshima Stephen McCann, Mike Montemurro.
xxx IEEE MEDIA INDEPENDENT HANDOVER DCN: xxx Title: Proposal for adding a key hierarchy based approach in the security.
IPv6 RADIUS attributes for IPv6 access networks draft-lourdelet-radext-ipv6-access-01 Glen Zorn, Benoit Lourdelet Wojciech Dec, Behcet Sarikaya Radext/dhc.
Dynamic IPv4 Provisioning for Lightweight 4over6 draft-liu-softwire-lw4over6-dhcp-deployment-04 C. Liu (Presenter), Q. Sun, J. Wu 1.
November st IETF MIP6 WG Mobile IPv6 Bootstrapping Architecture using DHCP draft-ohba-mip6-boot-arch-dhcp-00 Yoshihiro Ohba, Rafael Marin Lopez,
RFC5296BIS CHANGES PROPOSAL Sebastien Decugis. Presentation outline  Quick reminder on ERP (RFC5296)  2 change proposals  Problem description  Solution.
Using DHCPv6 for DNS Configuration in Hosts draft-ietf-droms-dnsconfig-dhcpv6-00.txt Ralph Droms.
Hokey IETF 81 Quebec1 EAP Extensions for EAP Re- authentication Protocol draft-ietf-hokey-rfc5296bis-04 Qin Wu Zhen Cao Yang Shi Baohong He.
Authentication Mechanism for Port Control Protocol (PCP) draft-wasserman-pcp-authentication-01.txt Margaret Wasserman Sam Hartman Painless Security Dacheng.
1 Motorola PMIPv4 Call Flows: Bearer Setup with Dual Anchoring Parviz YeganiVojislav VuceticAlmon Tang (408) (732) (847)
Jun Li DHCP Option for Access Network Information draft-lijun-dhc-clf-nass-option-01.
CP-a Emergency call stage 2 requirements - A presentation of the requirements from 3GPP TS Keith Drage.
IETF70 DIME WG1 ; ; Diameter Routing Extensions (draft-tsou-dime-base-routing-ext.
1 RADIUS Mobile IPv6 Support draft-ietf-mip6-radius-01.txt Kuntal Chowdhury Avi Lior Hannes Tschofenig.
RADIUS issues in IPv6 deployments draft-hu-v6ops-radius-issues-ipv6-01 J. Hu, YL. Ouyang, Q. Wang, J. Qin,
EAP Extensions for EAP Re- authentication Protocol (ERP) draft-wu-hokey-rfc5296bis-01 Yang Shi Qin Wu Zhen Cao
AAA and Mobile IPv6 Franck Le AAA WG - IETF55. Why Diameter support for Mobile IPv6? Mobile IPv6 is a routing protocol and does not deal with issues related.
EAP Extensions for EAP Early Authentication Protocol (EEP) Hao Wang, Yang Shi, Tina Tsou.
1 IEEE MEDIA INDEPENDENT HANDOVER DCN: sec Title: Detailed analysis on MIA/MSA architecture Date Submitted: January 5, 2010 Present.
Draft-ietf-dime-ikev2-psk-diameter-0draft-ietf-dime-ikev2-psk-diameter-08 draft-ietf-dime-ikev2-psk-diameter-09 in progress Diameter IKEv2 PSK: Pre-Shared.
AAAv6 Charles E. Perkins Patrik Flykt Thomas Eklund.
EAP Extensions for EAP Re- authentication Protocol (ERP) draft-wu-hokey-rfc5296bis-01 Glen Zorn Qin Wu Zhen Cao.
ERP/AAK support for Inter-AAA realm handover discussion Hao Wang, Tina Tsou, Richard.
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
Washinton D.C., November 2004 IETF 61 st – mip6 WG MIPv6 authorization and configuration based on EAP (draft-giaretta-mip6-authorization-eap-02) Gerardo.
Diameter Group Signaling Thursday, August 02 nd, 2013 draft-ietf-diameter-group-signaling-01 Mark Jones, Marco Liebsch, Lionel Morand IETF 87 Berlin, Germany.
Minneapolis, March 2005 IETF 62 nd – mip6 WG Goals for AAA-HA interface (draft-giaretta-mip6-aaa-ha-goals-00) Gerardo Giaretta Ivano Guardini Elena Demaria.
1 Extensible Authentication Protocol (EAP) Working Group IETF-57.
Paris, August 2005 IETF 63 rd – mip6 WG Mobile IPv6 bootstrapping in split scenario (draft-ietf-mip6-bootstrapping-split-00) mip6-boot-sol DT Gerardo Giaretta,
DHCPv4 option for PANA Authentication Agents draft-suraj-dhcpv4-paa-option-00.txt DHC/PANA WG IETF-63 France, Paris.
SPPP Transport Session Peering Provisioning Protocol draft-ietf-drinks-sppp-over-soap-04.
San Diego, November 2006 IETF 67 th – mip6 WG Goals for AAA-HA interface (draft-ietf-mip6-aaa-ha-goals-03) Gerardo Giaretta Ivano Guardini Elena Demaria.
DIME Virtual Interim Meeting 19th February, 8PM PST Dave Frascone Hannes Tschofenig.
Doc.: IEEE /2179r0 Submission July 2007 Steve Emeott, MotorolaSlide 1 Summary of Updates to MSA Overview and MKD Functionality Text Date:
CAPWAP Threat Analysis
Pre-authentication Problem Statement (draft-ohba-hokeyp-preauth-ps-00
<draft-ohba-pana-framework-00.txt>
Booting up on the Home Link
Open issues with PANA Protocol
PANA Discussion and Open Issues (draft-ietf-pana-pana-01.txt)
IEEE 802 OmniRAN Study Group: SDN Use Case
draft-ietf-dime-erp-02
Katrin Hoeper Channel Bindings Katrin Hoeper
Handover Keys using AAA (draft-vidya-mipshop-fast-handover-aaa-01.txt)
Carrying Location Objects in RADIUS
TGaq Service Transaction Protocol for ANDSF Discovery Service
for IP Mobility Protocols
IEEE MEDIA INDEPENDENT HANDOVER DCN:
ERP extension for EAP Early-authentication Protocol (EEP)
Discussions on FILS Authentication
Running Multiple PLATs in 464XLAT
WLAN Paging and Idle Mode
ERP/AAK support for Inter-AAA realm handover discussion
IEEE MEDIA INDEPENDENT HANDOVER
2002 IPv6 技術巡迴研討會 IPv6 Mobility
Charles Clancy Katrin Hoeper IETF 73 Minneapolis, USA 17 November 2008
IEEE MEDIA INDEPENDENT HANDOVER DCN:
AbbottLink™ - IP Address Overview
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: IETF Liaison Report Date Submitted: March 18, 2010 Presented at IEEE session.
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER
Mobile IP Regional Registration
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER
Qin Wu Zhen Cao Yang Shi Baohong He
Presentation transcript:

Hokey Architecture Deployment and Implementation Qin Wu Hoeper Katrin

Hokey Architectural Deployment and Implementation Objective Deploying ERP and EAP early authentication protocol in the mobile environment. Also there are useful scenarios which need to be addressed. Motivation Provide guidelines to make progress on Diameter ERP document Design ERP or Early authentication enabling architecture Enable the deployment of hokey architecture in real life environment investigate scalability and performance issues that Re-authentication and Early authentication might raise.

Problem Description Different Deployment has different scenario for Re-authentication and Early authentication.

Deployments Consideration The hokey server is separated from the home AAA server and deployed in the home domain and the hokey proxy is separated from AAA proxy and deployed in the local domain. Deployment 2: The hokey server is collocated with the home AAA server and is collocated with AAA proxy and deployed in the local domain. Deployment 3: The hokey server is separated from AAA proxy and deployed in each local domain. There is no hokey server in the home domain Deployment 4: The hokey server is collocated with AAA proxy and deployed in each local domain. There is no hokey server in the home domain

Re-authentication Scenario A Home AAA Domain Local ER Server/Local EAP server Transport DSRK, Home ER Server/Home EAP server The Mobile know the local domain name a Mobile Visited AAA Domain Previous NAS DHCPv6 server b New NAS Mobile a. Explicit ERP bootstrapping occurs in the initial full authentication with the home ER server when the peer firstly attaches to one domain or enter into a new domain. It is used to re-authentication the peer in the home domain and transport the local root key to the local ER server b. when the peer associate with the new authenticator, ERP in the local domain is used to re-authenticate the peer in the local domain.

Re-authentication Scenario B Home AAA Domain Local ER Server/Local EAP server Transport DSRK, Local Domain name Home ER Server/Home EAP Server The Mobile doesn’t know the local domain name a Mobile Visited AAA Domain DHCPv6 server Previous NAS b New NAS Mobile a. Explicit ERP bootstrapping occurs in the initial full authentication with the home ER server when the peer firstly attaches to one domain or enter into a new domain. It is used to re-authentication the peer in the home domain and transport the local root key to the local ER server. Also it is used to request the local domain name for the peer. b. when the peer associate with the new authenticator, ERP in the local domain is used to re-authenticate the peer in the local domain.

Re-authentication Scenario C Home AAA Domain Local ER Server/Local EAP Server Transport DSRK To Local server Home ER Server/Home EAP Server The Mobile doesn’t know the local domain name Previous NAS a Mobile Visited AAA Domain DHCPv6 server b c New NAS Mobile a. Implicit bootstrapping occurs in the initial EAP full authentication when the peer first attaches to one domain or enter into a new domain and is used to transport local root key to the local ER server b. When the peer moves to the new NAS and doesn’t know the local domain name, Explicit ERP bootstrapping is used to request local domain name for the peer and is used to re-authenticate the peer in the local domain. c. The peer use local domain name available to perform ERP with the local ER server without involvement of the home EAP server.

Re-authentication Scenario D Home AAA Domain Local ER Server/Local EAP Server Transport DSRK To Local server Home EAP Server The Mobile doesn’t know the local domain name a Mobile Visited AAA Domain DHCPv6 server Previous NAS/DHCP Relay b c Mobile New NAS a. In the Initial EAP full authentication (Implicit bootstrapping), the local ER server request DSRK from home EAP server. b. The peer use DHCP procedure to request local domain name. c. When Re-authentication occurs after initial EAP full authentication, the peer use local domain name available to perform ERP with the local ER server without involvement of the home EAP server.

Early Authentication Scenario A Local EAP Serve/ Hokey Server Home AAA Domain Transport Candidate NAS Home EAP Server a Mobile a Visited AAA Domain Previous NAS New NAS1 Transport key b AAA Proxy Visited AAA Domain Mobile b Transport key New NAS2 a. Before the mobile moves to the new NAS, the mobile or the previous NAS discovers candidate NAS and transports it to the AAA server. b. The AAA server in the home domain transports the key to the new NAS2.

Early Authentication Scenario B Local EAP Server /Hokey Server Home AAA Domain Mobile Home EAP Server a Visited AAA Domain Previous NAS New NAS1 b b Mobile AAA Proxy b New NAS2 Before the mobile moves to the new NAS, the Previous NAS discover candidate NAS, i.e., New NAS2. b. The NAS forward EAP Pre-authentication signaling to the new NAS2 and the new NAS exchanges with AAA server to finish EAP Pre-authentication.

Early Authentication Scenario C Local EAP Server /Hokey Server Home AAA Domain Home EAP Server Mobile a Visited AAA Domain Previous NAS b b Mobile b AAA Proxy New NAS Before the mobile moves to the new NAS, the Mobile discover candidate NAS, i.e., New NAS2. b. The Mobile send EAP Pre-authentication signaling directly to the new NAS2 and the new NAS exchanges with AAA server to finish EAP Pre-authentication.

ML Discussion Summary Some discussion and supports are received as regarding hokey architecture work. Hokey architecture commented to be useful to progress Diameter ERP work. Routing issues were raised Whether Defining new Diameter application ID can be used to resolve all the routing issue. Whether Decorated NAI can also be used to resolve routing issue. Depend on specific deployment, e.g., Suppose multiple proxies located in the local domain, how routing work? Confusion in RFC5296 addressed In the implicit bootstrapping, whether the AAA server is EAP server? Whether implicit bootstrapping is EAP full authentication described in figure3.

Proposal Adopt it as a new WG item?

Thanks www.ietf.org