IETF 58 PANA WG PANA Update and Open Issues (draft-ietf-pana-pana-02.txt) Dan Forsberg, Yoshihiro Ohba, Basavaraj Patil, Hannes Tschofenig, Alper Yegin.

Slides:



Advertisements
Similar presentations
802.1AF - directions define requirements to find and create connections in terms of Discovery - Authentication - Enable 1.Discover of what can be done.
Advertisements

EAP Channel Bindings Charles Clancy Katrin Hoeper IETF 76 Hiroshima, Japan November 08-13, 2009.
Neighbor Discovery for IPv6 Mangesh Kaushikkar. Overview Introduction Terminology Protocol Overview Message Formats Conceptual Model of a Host.
PANA Requirements and Terminology - IETF54 -. PANA WG, IETF 54, Requirements and Terminology draft-ietf-pana-requirements-02.txt Changes Comments/questions.
1 Improved DNS Server Selection for Multi-Homed Nodes draft-savolainen-mif-dns-server-selection-04 Teemu Savolainen (Nokia) Jun-ya Kato (NTT) MIF WG meeting.
Semester 4 - Chapter 4 – PPP WAN connections are controlled by protocols In a LAN environment, in order to move data between any two nodes or routers two.
Applicability Statement of NSIS Protocols in Mobile Environments (draft-ietf-nsis-applicability-mobility-signaling-03) Sung-Hyuck Lee, Seong-Ho Jeong,
12/05/2007IETF70 PANA WG1 PANA Network Selection draft-ohba-pana-netsel-00.txt Yoshihiro Ohba.
July 15, 2002IETF54 PANA WG1 PANA Usage Scenarios Updates (draft-ietf-pana-usage-scenarios-02.txt) Yoshihiro Ohba Subir Das
March 20, 2006IETF65 PANA WG PANA Specification Updates (draft-ietf-pana-pana-11.txt) Yoshihiro Ohba
Dean Cheng Jouni Korhonen Mehamed Boucadair
Issues to Consider w.r.t Protocol Solution - IETF54 -
7/14/2003IETF57 PANA enabling IPsec based Access control draft-mohanp-pana-ipsec-00.txt Mohan Parthasarathy Tahoe Networks - Presented by Hannes Tschofenig.
IETF54 Charter Issues Dealt with since IETF53 PANA WG Meeting Basavaraj Patil.
August 1, 2005IETF63 PANA WG Pre-authentication Support for PANA (draft-ohba-pana-preauth-00.txt) Yoshihiro Ohba
KAIS T Security architecture in a multi-hop mesh network Conference in France, Presented by JooBeom Yun.
0 NAT/Firewall NSLP IETF 62th – March 2005 draft-ietf-nsis-nslp-natfw-05.txt Martin Stiemerling, Hannes Tschofenig, Cedric Aoun.
Authentication Mechanism for Port Control Protocol (PCP) draft-wasserman-pcp-authentication-01.txt Margaret Wasserman Sam Hartman Painless Security Dacheng.
July 16, Diameter EAP Application (draft-ietf-aaa-eap-02.txt) on behalf of...
IETF-71, Philadelphia PANA in DSL networks draft-morand-pana-panaoverdsl-01.txt Lionel Morand France Telecom Alper Yegin Samsung Yoshihiro Ohba Toshiba.
Dime WG Status Update IETF#80, 1-April Agenda overview Agenda bashing WG status update Active drafts Recently expired IESG processing Current milestones.
PANA Implementation in Open Diameter Victor Fajardo.
SIP working group IETF#70 Essential corrections Keith Drage.
CSC 600 Internetworking with TCP/IP Unit 5: IP, IP Routing, and ICMP (ch. 7, ch. 8, ch. 9, ch. 10) Dr. Cheer-Sun Yang Spring 2001.
3/20/2007IETF68 PANA WG1 PANA Issues and Resolutions Yoshihiro Ohba Alper Yegin.
PANA Framework Prakash Jayaraman, Rafa Marin Lopez, Yoshihiro Ohba, Mohan Parthasarathy, Alper Yegin IETF 59.
Multi-hop PANA IETF Currently: –“For simplicity, it is assumed that the PAA is attached to the same link as the device (i.e., no intermediary IP.
Mar 20, 2005IETF65 PANA WG Requirements for PANA support of location based services draft-anjum-pana-location-requirements-00.txt F. Anjum D. Famolari.
1 draft-hiko-pana-api-02.txt The PANA API draft-hiko-pana-api-02.txt Yoshihiko Kainuma Fumio Teraoka Graduate School of Science and Technology Keio University.
Mobile IPv6 with IKEv2 and revised IPsec architecture IETF 61
IETF66 DIME WG John Loughney, Hannes Tschofenig and Victor Fajardo 3588-bis: Current Issues.
Emu wg, IETF 70 Steve Hanna, EAP-TTLS draft-funk-eap-ttls-v0-02.txt draft-hanna-eap-ttls-agility-00.txt emu wg, IETF 70 Steve Hanna,
IETF 57 PANA WG PANA Discussion and Open Issues (draft-ietf-pana-pana-01.txt) Dan Forsberg, Yoshihiro Ohba, Basavaraj Patil, Hannes Tschofenig, Alper Yegin.
Currently Open Issues in the MIPv6 Base RFC MIPv6 security design team.
Nov. 9, 2004IETF61 PANA WG PANA Specification Last Call Issues Yoshihiro Ohba, Alper Yegin, Basavaraj Patil, D. Forsberg, Hannes Tschofenig.
Channel Binding Support for EAP Methods Charles Clancy, Katrin Hoeper.
NEMO Basic Support update IETF 61. Status IANA assignments done Very close to AUTH48 call Some issues raised recently We need to figure out if we want.
RFC 2716bis Wednesday, July 12, 2006 Draft-simon-emu-rfc2716bis-02.txt Dan Simon Bernard Aboba IETF 66, Montreal, Canada.
RFC 4068bis draft-ietf-mipshop-fmipv6-rfc4068bis-01.txt Rajeev Koodli.
Diameter Group Signaling Thursday, March 6 th, 2014 draft-ietf-diameter-group-signaling-03 Mark Jones, Marco Liebsch, Lionel Morand IETF 89 London, U.K.
IETF69 PANA WG Victor Fajardo, Yoshihiro Ohba and Rafael Marin Lopez PANA State Machine Issue Resolution (draft-ietf-pana-statemachine-05.txt)
August 2, 2005IETF63 EAP WG AAA-Key Derivation with Lower-Layer Parameter Binding (draft-ohba-eap-aaakey-binding-01.txt) Yoshihiro Ohba (Toshiba) Mayumi.
Paris, August 2005 IETF 63 rd – mip6 WG Mobile IPv6 bootstrapping in split scenario (draft-ietf-mip6-bootstrapping-split-00) mip6-boot-sol DT Gerardo Giaretta,
MIP6 RADIUS IETF-72 Update draft-ietf-mip6-radius-05.txt A. LiorBridgewater Systems K. ChowdhuryStarent Networks H. Tschofenig Nokia Siemens Networks.
1 IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: EAP Pre-authentication Problem Statement in IETF HOKEY WG Date Submitted: September,
DHCPv4 option for PANA Authentication Agents draft-suraj-dhcpv4-paa-option-00.txt DHC/PANA WG IETF-63 France, Paris.
PANA in DSL networks draft-morand-pana-panaoverdsl-00.txt Lionel Morand Roberta Maglione John Kaippallimalil Alper Yegin IETF-67, San Diego.
7/24/2007IETF69 PANA WG1 PANA Issues and Resolutions draft-ietf-pana-pana-17.txt draft-ietf-pana-framework-09.txt Yoshihiro Ohba Alper Yegin.
Doc.: IEEE /2179r0 Submission July 2007 Steve Emeott, MotorolaSlide 1 Summary of Updates to MSA Overview and MKD Functionality Text Date:
EAP Applicability IETF-86 Joe Salowey. Open Issues Open Issues with Retransmission and re- authentication Remove text about lack of differentiation in.
Pre-authentication Problem Statement (draft-ohba-hokeyp-preauth-ps-00
<draft-ohba-pana-framework-00.txt>
Open issues with PANA Protocol
PANA in DSL networks draft-morand-pana-panaoverdsl-01.txt
EAP State Machines (draft-vollbrecht-eap-state-04.txt,ps)
PANA Discussion and Open Issues (draft-ietf-pana-pana-01.txt)
PANA Issues and Resolutions
draft-ietf-simple-message-sessions-00 Ben Campbell
Carrying Location Objects in RADIUS
PAA-EP protocol considerations PANA wg - IETF 57 Vienna
ERP extension for EAP Early-authentication Protocol (EEP)
The 66th IETF meeting in Montreal, Canada
CARD Designteam A. Singh, D. Funato, H. Chaskar, M. Liebsch
March 2012 doc.: IEEE March 2012 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title:
Charles Clancy Katrin Hoeper IETF 73 Minneapolis, USA 17 November 2008
PANA Implementation in Open Diameter
PaC State Machine States
802.11i Bootstrapping Using PANA
Protocol for Carrying Authentication for Network Access - PANA -
Diameter ABFAB Application
Presentation transcript:

IETF 58 PANA WG PANA Update and Open Issues (draft-ietf-pana-pana-02.txt) Dan Forsberg, Yoshihiro Ohba, Basavaraj Patil, Hannes Tschofenig, Alper Yegin

Nov IETF58 PANA WG PANA Issues 15 issues for draf-ietf-pana-pana-01were resolved and closed Resolution text incorporated in pana-02 There are 9 open issues for pana-02

Nov IETF58 PANA WG PANA-01 Issues (Closed)

Nov IETF58 PANA WG Message Format Related Issues The same message type is allocated to each pair of Request and Answer message (Issue 22) –use R-flag to distinguish Request from Answer PANA uses its own type space for message and AVP types (Issue 23) –No type space sharing with Diameter A new message “PANA-Error” is defined (Issue 17) –Section defines the error handling rule –Section defines the message format AVP alignment rule is added (Issue 24) –The same 32-bit alignment rule as Diameter Termination-Cause AVP values are defined (Issue 18) Result-Code AVP values are defined (Issue 19)

Nov IETF58 PANA WG Other Issues Defined detailed retransmission behavior and default parameters (Issue 20, explained later) Service Profile Names (Issue 25, explained later) Clarified that Session-Lifetime is non-negotiable and can be carried in PANA-Bind-Request message sent from PAA (Issue 8) Clarified that PAA SHOULD initiate EAP re- authentication before the session lifetime expires (Issue 31) Security Consideration section is updated (Issue 32) –Re-wording “periodical refresh” to “liveness test”, etc. Clarification of Section 4.9 “Device-ID Choice” (Issue 33) –PaC and PAA checks peer’s Device ID each other Minor editorial changes (Issues 21, 26, 30)

Nov IETF58 PANA WG Issue 20: Retransmission Timers and Counters Issue: Define default timer and retransmission counts Resolution: –Adopt the RFC3315 [DHCPv6] model Define algorithm and parameters for retransmission –Use of exponential backoff Classify messages retransmitted by PANA Each class uses the same default parameter values –PANA-PAA-Discover –Other messages Define default values for each class

Nov IETF58 PANA WG Issue 25: Service Profile Names Issue: Carrying network information during discovery and initial handshake phase would be helpful for a user to choose NAP and ISP Resolution: –Defined two new AVPs: NAP-Information AVP and ISP-Information AVP –Defined a new flag (S-flag) –Define the usage of the AVPs and S-flag

Nov IETF58 PANA WG Issue 25 (cont’d) {NAP,ISP}-Information AVP NAP-Information ::= 0*1 { Provider-Identifier } { Provider-Name } * [ AVP ] ISP-Information ::= 0*1 { Provider-Identifier } { Provider-Name } * [ AVP ] Provider-Identifier (Unsigned32): IANA-Assigned Enterprise Identifier Provider-Name (UTF8String)

Nov IETF58 PANA WG Issue 25 (cont’d) {NAP,ISP}-Information AVP Usage PAA can advertise *-Information AVPs in PANA-Start- Request message S-flag in PANA-Start-Request/Answer exchange is used for negotiating NAP/ISP separate authentication –F(inal)-flag is not needed any more During the negotiation, PaC can choose an ISP by including an ISP-Information AVP in the PANA-Start- Answer message PAA can specify which authentication (NAP or ISP) is occuring –by including a corresponding *-Information AVP in the first PANA-Auth-Request message in each authentication

Nov IETF58 PANA WG Issue 25 (cont’d) Example Sequence PANA-PAA-Discover PANA-Start-Request [ISP1, ISP2, NAP] // S-flag set PANA-Start-Answer [ISP1, NAP] // S-flag set PANA-Auth-Request[NAP, EAP{Req.}] PANA-Auth-Answer[EAP{Resp.}] PANA-Bind-Request/Answer PANA-Auth-Request[ISP1, EAP{Req.}] PANA-Auth-Answer[EAP{Resp.}] … PANA-Bind-Request/Answer … NAP Authentication ISP Authentication Discovery& Initial Handshake Execution order can be reversed

Nov IETF58 PANA WG PANA-02 Issues (Open)

Nov IETF58 PANA WG Open Issue List (ordered by importance) Issue #Issue Name 28PaC and PAA State Machines (to be presented by Dan) 34Behavior with NAP and ISP 37Unknown Realm Error Propagation 29EAP Failure & PANA-Bind-Request 36(Re)authentication Race Condition 35EP Information 16Mutihoming Support 12Supporting Network Access Authentication for Ad-hoc Networks 2Downgrading Protection

Nov IETF58 PANA WG Issue: How Session-Lifetime relates to NAP and ISP authentications? Proposed Resolution: –A single Session-Lifetime is bound to a PANA session –When NAP and ISP have different authorization lifetimes, the smaller one relates to the Session- Lifetime –When EAP re-authentication occurs, both NAP and ISP authentications will be performed Issue 34: Behavior with NAP and ISP

Nov IETF58 PANA WG Issue 37: Unknown Realm Error Propagation Issue: –Should “unknown realm” AAA message routing error be propagated to PaC? Discussion: –EAP state machine does not support propagation of AAA errors When such an error occurs, the authentication state machine enters a sink “failure” state without generating any error or an EAP-Failure message Direct interface from AAA to PAA would be needed Resolution?

Nov IETF58 PANA WG Issue 29: EAP Failure and PANA-Bind- Request Issue: –Should PANA-Termination-Request be used for carrying EAP-Failure instead of PANA-Bind-Request? Discussion: –When NAP/ISP separate authentication is performed, a single EAP failure does not mean PANA authentication failure Resolution –PANA-Term.-Request is not appropriate to carry EAP- Failure for the above reason –Use PANA-Bind-{Request,Answer} message to carry EAP- Success/Failure (as the current draft does) –“Bind” may be renamed to “Result” if the word “Bind” does not make sense to carry EAP-Failure

Nov IETF58 PANA WG Issue 36: (Re)authentication Race Condition Issue: –It is possible for both PaC and PAA to simultaneously initiate EAP (re)authentication. How can PANA handle the case? PaCPAA PANA-PAA-Discover PANA-Start-Request (or PANA-Auth-Request) Proposed Resolution: –PAA can always be the winner, by ignoring the received PANA-PAA-Discover message after it sends a PANA-Start- Request (or PANA-Auth-Request)

Nov IETF58 PANA WG Issue 35: EP Information Issue: –PANA-IPsec draft assumes that PaC learns the IP address of the EP during the PANA exchange. But PANA specification does not support it Proposed Resolution: –Having an AVP to carry the Device-Id of EP(s) –Device-Id AVP can have a field to indicate whether the device belongs to PAA or a separate EP –The AVP is carried in PANA-Bind-Request

Nov IETF58 PANA WG Issue 16: Multihoming Support Issue: –When PaC has multiple interfaces on the same IP link, should it be supported with a single PANA session or separate PANA sessions? Discussion –A single PANA session for multiple interfaces is basically an optimization issue Proposed resolution: –We should do a more thorough analysis if we support the scenario with a single PANA session –Until the analysis is made, separate PANA session is sufficient

Nov IETF58 PANA WG Issue 12: Supporting Network Access Authentication for Ad-hoc Networks Issue: –Should PANA support ad-hoc network scenario where there may be one or more untrusted nodes between PaC and PAA? Resolution? PaCPAA ISP Ad-hoc network Untrusted nodes

Nov IETF58 PANA WG Issue 2: Downgrading Protection Issue: –EAP allows negotiation of an EAP method between authenticator and peer. This mechanism is vulnerable to downgrading attacks. Discussion: –Providing downgrading protection in PANA is not good since an EAP server may not be co-located with PAA –EAP method negotiation is not performed by PANA, so this is an EAP issue Resolution: –Text incorporated in Security Considerations section Recommendation of using EAP-GSSAPI to negotiate an EAP method