for IP Mobility Protocols

Slides:



Advertisements
Similar presentations
Washinton D.C., November 2004 IETF 61 st – mip6 WG Goals for AAA-HA interface (draft-giaretta-mip6-aaa-ha-goals-00) Gerardo Giaretta Ivano Guardini Elena.
Advertisements

MIP Extensions: FMIP & HMIP
1Nokia Siemens Networks Presentation / Author / Date University of Twente On the Security of the Mobile IP Protocol Family Ulrike Meyer and Hannes Tschofenig.
Mobile IPv6 趨勢介紹 1. Mobile IP and its Variants Mobile IPv4 (MIPv4) – MIPv4 – Low-Latency Handover for MIPv4 (FMIPv4) – Regional Registration for MIPv4.
AAA Mobile IPv6 Application Framework draft-yegin-mip6-aaa-fwk-00.txt Alper Yegin IETF 61 – 12 Nov 2004.
7/13/061 The Problem of Handover Keying IETF 66 Montreal.
Overview of the Mobile IPv6 Bootstrapping Problem James Kempf DoCoMo Labs USA Thursday March 10, 2005.
AAA-Mobile IPv6 Frameworks Alper Yegin IETF Objective Identify various frameworks where AAA is used for the Mobile IPv6 service Agree on one (or.
1 May 14, 2007 Zhibi Wang, Simon Mizikovsky – Alcatel-Lucent Vidya Narayanan, Anand Palanigounder – QUALCOMM ABSTRACT: Access authentication architecture.
November st IETF MIP6 WG Mobile IPv6 Bootstrapping Architecture using DHCP draft-ohba-mip6-boot-arch-dhcp-00 Yoshihiro Ohba, Rafael Marin Lopez,
1 EAP Usage Issues Feb 05 Jari Arkko. 2 Typical EAP Usage PPP authentication Wireless LAN authentication –802.1x and i IKEv2 EAP authentication.
EAP WG EAP Key Management Framework Draft-ietf-eap-keying-03.txt Bernard Aboba Microsoft.
1 Local Security Association (LSA) The Temporary Shared Key (TSK) draft-le-aaa-lsa-tsk-00.txt Stefano M. Faccin, Franck Le.
All Rights Reserved © Alcatel-Lucent 2007, ##### 1 | Presentation Title | January 2007 UMB Security Evolution Proposal Abstract: This contribution proposes.
1 RADIUS Mobile IPv6 Support draft-ietf-mip6-radius-01.txt Kuntal Chowdhury Avi Lior Hannes Tschofenig.
1 IETF 78: NETEXT Working Group IPSec/IKEv2 Access Link Support in Proxy Mobile IPv6 IPSec/IKEv2-based Access Link Support in Proxy Mobile IPv6 Sri Gundavelli.
EAP Extensions for EAP Re- authentication Protocol (ERP) draft-wu-hokey-rfc5296bis-01 Yang Shi Qin Wu Zhen Cao
AAA and Mobile IPv6 Franck Le AAA WG - IETF55. Why Diameter support for Mobile IPv6? Mobile IPv6 is a routing protocol and does not deal with issues related.
Draft-ietf-dime-ikev2-psk-diameter-0draft-ietf-dime-ikev2-psk-diameter-08 draft-ietf-dime-ikev2-psk-diameter-09 in progress Diameter IKEv2 PSK: Pre-Shared.
1 NetLMM Vidya Narayanan Jonne Soininen
November 2005IETF 64, Vancouver, Canada1 EAP-POTP The Protected One-Time Password EAP Method Magnus Nystrom, David Mitton RSA Security, Inc.
EAP Keying Framework Draft-aboba-pppext-key-problem-06.txt EAP WG IETF 56 San Francisco, CA Bernard Aboba.
ICOS BOF EAP Applicability Bernard Aboba IETF 62, Minneapolis, MN.
7/13/061 Handover Keying Reqs IETF 66 Montreal. 7/13/062 Problem scope requirements (1) MUST Support multiple access technologies MUST not require full.
ERP/AAK support for Inter-AAA realm handover discussion Hao Wang, Tina Tsou, Richard.
Mobile IPv6 with IKEv2 and revised IPsec architecture IETF 61
Mobility for IP: Performance, Signaling and Handoff Optimization (MIPSHOP) IETF 73, November 2008 Vijay Devarapalli
Washinton D.C., November 2004 IETF 61 st – mip6 WG MIPv6 authorization and configuration based on EAP (draft-giaretta-mip6-authorization-eap-02) Gerardo.
1 Mobility for IPv6 [MIP6] November 12 th, 2004 IETF61.
San Diego, August 2004 IETF 60 th – mip6 WG MIPv6 authorization and configuration based on EAP (draft-giaretta-mip6-authorization-eap-01) Gerardo Giaretta.
Minneapolis, March 2005 IETF 62 nd – mip6 WG Goals for AAA-HA interface (draft-giaretta-mip6-aaa-ha-goals-00) Gerardo Giaretta Ivano Guardini Elena Demaria.
Diameter Mobile IPv6: HA-to-AAAH support draft-ietf-dime-mip6-split-01.txt Julien Bournelle (Ed.) Gerardo Giaretta Hannes Tschofenig Madjid Nakhjiri.
Paris, August 2005 IETF 63 rd – mip6 WG Mobile IPv6 bootstrapping in split scenario (draft-ietf-mip6-bootstrapping-split-00) mip6-boot-sol DT Gerardo Giaretta,
MIP6 RADIUS IETF-72 Update draft-ietf-mip6-radius-05.txt A. LiorBridgewater Systems K. ChowdhuryStarent Networks H. Tschofenig Nokia Siemens Networks.
San Diego, November 2006 IETF 67 th – mip6 WG Goals for AAA-HA interface (draft-ietf-mip6-aaa-ha-goals-03) Gerardo Giaretta Ivano Guardini Elena Demaria.
Thoughts on Bootstrapping Mobility Securely Chairs, with help from James Kempf, Jari Arkko MIP6 WG/BOF 57 th IETF Vienna Wed. July 16, 2003.
V4 traversal for IPv6 mobility protocols - Scenarios Mip6trans Design Team MIP6 and NEMO WGs, IETF 63.
IEEE MEDIA INDEPENDENT HANDOVER DCN:
Pre-authentication Problem Statement (draft-ohba-hokeyp-preauth-ps-00
Extending EAP Keying Vidya Narayanan Lakshminath Dondeti
Mobility for IPv6 (mip6) IETF64 November 10, 05
<draft-ohba-pana-framework-00.txt>
Informing AAA about what lower layer protocol is carrying EAP
Booting up on the Home Link
Open issues with PANA Protocol
PANA Discussion and Open Issues (draft-ietf-pana-pana-01.txt)
Media-Independent Pre-authentication (MPA) Framework
Hokey Architecture Deployment and Implementation
Next Generation: Internet Protocol, Version 6 (IPv6) RFC 2460
Handover Keys using AAA (draft-vidya-mipshop-fast-handover-aaa-01.txt)
EAP-GEE Lakshminath Dondeti Vidya Narayanan
Mobility for IPv6 (MIP6) IETF66 Thursday, July 13th, 06
ERP extension for EAP Early-authentication Protocol (EEP)
Discussions on FILS Authentication
IETF-70 EAP Method Update (EMU)
Dave Thaler A Comparison of Mobility-Related Protocols: MIP6,SHIM6, and HIP draft-thaler-mobility-comparison-01.txt Dave Thaler.
IETF67 B. Patil, Gopal D., S. Gundavelli, K. Chowdhury
ERP/AAK support for Inter-AAA realm handover discussion
IEEE MEDIA INDEPENDENT HANDOVER
2002 IPv6 技術巡迴研討會 IPv6 Mobility
Charles Clancy Katrin Hoeper IETF 73 Minneapolis, USA 17 November 2008
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: IETF Liaison Report Date Submitted: March 18, 2010 Presented at IEEE session.
IEEE MEDIA INDEPENDENT HANDOVER
Mobile IP Regional Registration
Security Activities in IETF in support of Mobile IP
IEEE IETF Liaison Report
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER
Qin Wu Zhen Cao Yang Shi Baohong He
Presentation transcript:

for IP Mobility Protocols Vancouver, November 2007 IETF 70th – netlmm WG EAP-Based Keying for IP Mobility Protocols draft-vidya-eap-usrk-ip-mobility-01 Vidya Narayanan and Gerardo Giaretta

What is this about The draft defines EAP-based key derivations for MIPv4, MIPv6, HMIPv6 and FMIPv6 The key hierarchy and key derivations are based on the EMSK hierarchy defined in HOKEY The USRK labels required for these protocols and derivation of keys needed between the MN and the corresponding mobility agents are described Left to other individual documents to describe the exact signaling mechanisms that will trigger this keying process and enable

Motivation IP mobility protocols require cryptographic key material for authentication of signaling messages In a system where network access authentication is done using EAP, it is possible to derive keys for use in mobility protocols using the EMSK key hierarchy This prevents the need for having any pre-configured key material being available for each of these protocols used or running a separate security association protocol to establish the necessary keying material (e.g. running again an EAP exchange over IKEv2) Considered at the time of MIPv6 bootstrapping DT but the EMSK hierarchy was not defined yet

HOKEY Background Key generating EAP methods produce a Master Session Key (MSK) and an Extended Master Session Key (EMSK) the MSK is provided to the lower layer Several lower layers use the MSK in various different ways. EMSK hierarchy defined in draft-ietf-hokey-emsk-hierarchy-01 meant to be extensible to derive keys for various usages Usage Specific Root Keys (USRK) and Domain Specific Root Keys (DSRK) may be derived from the EMSK USRKs are meant to be defined for specific usages and the scope of the key will be determined by the EAP Server (or the home AAA server) of the peer DSRKs are limited in scope to a specific domain and are meant to be distributed to local AAA servers in different domains The DSRK may then be used to derive various Domain Specific USRKs (DS-USRK), which are defined for specific usages within the domain for which the DSRK is valid

Key hierarchy EMSK/DSRK Mobility Root Key (MRK) Mobility Integrity Key (MIK) Mobility Usage Session Key (MUSK) MRK is calculated in accordance with the USRK derivation defined in draft-ietf-hokey-emsk-hierarchy-01 may be derived from the EMSK or the DSRK, depending on whether the keys are being derived at the home domain or the local domain MIK is the key used to protect any exchange between the MN and the server deriving the MRK, to prove possession of the MRK used for authentication of messages between the MN and the server that derived the MRK MUSK is the key that is delivered to a mobility agent for a particular mobility session between the MN and the agent may be used to protect the mobility signaling messages between the MN and the mobility agent or to perform IKEv2 authentication to establish an IPsec security association

Key derivation MRK = KDF(Key, Mobility Key Label, Optional Data, Length) Key = EMSK or DSRK Mobility Key Label = the specific label defined for the particular IP mobility protocol Optional Data = NULL Length = 2 byte unsigned integer in network byte order of the output key length in octets Mobility Key Labels defined in the draft MIP4: "Mobile IPv4 Root Key" MIP6: "Mobile IPv6 Root Key" HMIPv6: "Hierarchical Mobile IPv6 Root Key" FMIPv6: "Fast Mobile IPv6 Root Key" Based on the above labels, the following are the specific root keys defined for the various IP mobility protocols: MIP4-RK = KDF (Key, "Mobile IPv4 Root Key", Optional Data, Length) MIP6-RK = KDF (Key, "Mobile IPv6 Root Key", Optional Data, Length) HMIP6-RK = KDF (Key, "Hierarchical Mobile IPv6 Root Key", Optional Data, Length) FMIP6-RK = KDF (Key, "Fast Mobile IPv6 Root Key", Optional Data, Length)

MIPv4 bootstrapping example MN FA HA AAA EAP authentication for network access Agent Solicitation Agent Advertisement Generate MN-AAA key = MIK Generate MN-AAA key = MIK RRQ (MN-AAA Auth Ext) AAA request (RRQ, HA Request) Generate MN-HA key = MUSK AAA (RRQ,MN-HA key) AAA (RRP) AAA reply (RRP) RRP Generate MN-HA key = MUSK

Next steps Looking for an AD sponsored RFC