Carrying Location Objects in RADIUS Hannes Tschofenig, Farid Adrangi, Avi Lior, Mark Jones.

Slides:



Advertisements
Similar presentations
Washinton D.C., November 2004 IETF 61 st – mip6 WG Goals for AAA-HA interface (draft-giaretta-mip6-aaa-ha-goals-00) Gerardo Giaretta Ivano Guardini Elena.
Advertisements

1Nokia Siemens Networks Presentation / Author / Date University of Twente On the Security of the Mobile IP Protocol Family Ulrike Meyer and Hannes Tschofenig.
AAA Mobile IPv6 Application Framework draft-yegin-mip6-aaa-fwk-00.txt Alper Yegin IETF 61 – 12 Nov 2004.
Security Threats and Security Requirements for the Access Node Control Protocol (ANCP) IETF 67 - ANCP WG November 5-10, 2006 draft-moustafa-ancp-security-threats-00.txt.
Overview of the Mobile IPv6 Bootstrapping Problem James Kempf DoCoMo Labs USA Thursday March 10, 2005.
1 © NOKIA MitM.PPT/ 6/2/2015 / Kaisa Nyberg (NRC/MNW), N.Asokan (NRC/COM) The Insecurity of Tunnelled Authentication Protocols N. ASOKAN, VALTTERI NIEMI,
Identity, Spheres and Privacy Rules Henning Schulzrinne (with Hannes Tschofenig and Richard Barnes) Workshop on Identity, Information and Context October.
AAA-Mobile IPv6 Frameworks Alper Yegin IETF Objective Identify various frameworks where AAA is used for the Mobile IPv6 service Agree on one (or.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 20 RADIUS and Internet Authentication Service.
Session Policy Framework using EAP draft-mccann-session-policy-framework-using-eap-00.doc IETF 76 – Hiroshima Stephen McCann, Mike Montemurro.
July 16, 2003AAA WG, IETF 571 AAA WG Meeting IETF 57 Vienna, Austria Wednesday, July 16,
NSIS Authentication, Authorization and Accounting Issues (draft-tschofenig-nsis-aaa-issues-00.txt) Authors: Hannes Tschofenig Henning Schulzrinne Maarten.
Architectural Considerations for GEOPRIV/ECRIT Presentation given by Hannes Tschofenig.
Internet Goes Mobile Alper Yegin KIOW 2003 at APNIC 16 August 19th, Seoul, Korea.
November st IETF MIP6 WG Mobile IPv6 Bootstrapping Architecture using DHCP draft-ohba-mip6-boot-arch-dhcp-00 Yoshihiro Ohba, Rafael Marin Lopez,
3Com Confidential Proprietary 3G CDMA AAA Function Yingchun Xu 3COM.
Identities and Network Access Identifier in M2M Page 1 © GPP2 3GPP2 and its Organizational Partners claim copyright in this document and individual.
Authentication Mechanism for Port Control Protocol (PCP) draft-wasserman-pcp-authentication-01.txt Margaret Wasserman Sam Hartman Painless Security Dacheng.
2003/12/291 Security Aspects of 3G-WLAN Interworking 組別: 2 組員: 陳俊文 , 李奇勇 , 黃弘光 , 林柏均
QUALCOMM Incorporated 1 Protocol Options for BSN- BSMCS Controller Interface Jun Wang, Kirti Gupta 05/16/2005 Notice: Contributors grant a free, irrevocable.
GEOPRIV Layer 7 Location Configuration Protocol; Problem Statement and Requirements draft-tschofenig-geopriv-l7-lcp-ps-00.txt Hannes Tschofenig, Henning.
EAP Key Framework Draft-ietf-eap-keying-01.txt IETF 58 Minneapolis, MN Bernard Aboba Microsoft.
July 16, Diameter EAP Application (draft-ietf-aaa-eap-02.txt) on behalf of...
1 Local Security Association (LSA) The Temporary Shared Key (TSK) draft-le-aaa-lsa-tsk-00.txt Stefano M. Faccin, Franck Le.
1 RADIUS Mobile IPv6 Support draft-ietf-mip6-radius-01.txt Kuntal Chowdhury Avi Lior Hannes Tschofenig.
1 RADIUS Attribute Harmonization and Informational guidelines for PWLAN Farid Adrangi Intel Corporation ( )
Carrying Location Objects in RADIUS Hannes Tschofenig, Farid Adrangi, Avi Lior, Mark Jones.
EAP Extensions for EAP Early Authentication Protocol (EEP) Hao Wang, Yang Shi, Tina Tsou.
Draft-ietf-dime-ikev2-psk-diameter-0draft-ietf-dime-ikev2-psk-diameter-08 draft-ietf-dime-ikev2-psk-diameter-09 in progress Diameter IKEv2 PSK: Pre-Shared.
Some use cases and requirements for handover Information Services Greg Daley MIPSHOP Session IETF 64.
ICOS BOF EAP Applicability Bernard Aboba IETF 62, Minneapolis, MN.
IEEE Emergency Services DCN: Title: 802 Location Report Date Submitted: May 06, 2011 Presented at IEEE
SAML for SIP Hannes Tschofenig, Jon Peterson, James Polk, Douglas Sicker, Marcus Tegnander.
Implications of Trust Relationships for NSIS Signaling (draft-tschofenig-nsis-casp-midcom.txt) Authors: Hannes Tschofenig Henning Schulzrinne.
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential.
1 Bandwidth Profile Negotiation over AAA Farid Adrangi, Paul Congdon, Chuck Black, Avi Lior, Farooq Bari draft-adrangi-radius-bandwidth-capability-01.txt.
Carrying Location Objects in RADIUS Presentation written by: Hannes Tschofenig, Allison Mankin Draft Authors: Hannes Tschofenig, F. Adrangi, A. Lior, M.
Draft-ietf-aaa-diameter-mip-15.txt Tom Hiller et al Presented by Pete McCann.
Washinton D.C., November 2004 IETF 61 st – mip6 WG MIPv6 authorization and configuration based on EAP (draft-giaretta-mip6-authorization-eap-02) Gerardo.
Softwire Security Requirement Update draft-ietf-softwire-security-requirements-02.txt IETF Meeting, Prague March 19, 2007 Shu Yamamoto Carl Williams Florent.
Omniran CF00 1 Key Concepts of Authentication and Trust Establishment Date: Authors: NameAffiliationPhone Max RiegelNokia Networks+49.
San Diego, August 2004 IETF 60 th – mip6 WG MIPv6 authorization and configuration based on EAP (draft-giaretta-mip6-authorization-eap-01) Gerardo Giaretta.
Minneapolis, March 2005 IETF 62 nd – mip6 WG Goals for AAA-HA interface (draft-giaretta-mip6-aaa-ha-goals-00) Gerardo Giaretta Ivano Guardini Elena Demaria.
Extended QoS Authorization for the QoS NSLP Hannes Tschofenig, Joachim Kross.
Doc.: IEEE /0448r0 Submission March, 2007 Srinivas SreemanthulaSlide 1 Joiint TGU : Emergency Identifiers Notice: This document has been.
Paris, August 2005 IETF 63 rd – mip6 WG Mobile IPv6 bootstrapping in split scenario (draft-ietf-mip6-bootstrapping-split-00) mip6-boot-sol DT Gerardo Giaretta,
K. Salah1 Security Protocols in the Internet IPSec.
MIP6 RADIUS IETF-72 Update draft-ietf-mip6-radius-05.txt A. LiorBridgewater Systems K. ChowdhuryStarent Networks H. Tschofenig Nokia Siemens Networks.
1 IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: EAP Pre-authentication Problem Statement in IETF HOKEY WG Date Submitted: September,
August 4, 2004EAP WG, IETF 601 Authenticated service identities for EAP (draft-arkko-eap-service-identity-auth-00) Jari Arkko Pasi Eronen.
MIPv4-Diameter Update Tom Hiller Lucent Technologies.
CAPWAP Threat Analysis
Pre-authentication Problem Statement (draft-ohba-hokeyp-preauth-ps-00
Open issues with PANA Protocol
Phil Hunt, Hannes Tschofenig
Hokey Architecture Deployment and Implementation
Handover Keys using AAA (draft-vidya-mipshop-fast-handover-aaa-01.txt)
Carrying Location Objects in RADIUS
Pre-authentication Overview
ERP extension for EAP Early-authentication Protocol (EEP)
draft-ietf-geopriv-lbyr-requirements-02 status update
HTTP Enabled Location Delivery (HELD)
Charles Clancy Katrin Hoeper IETF 73 Minneapolis, USA 17 November 2008
Securing the CASP Protocol
Authors: Hannes Tschofenig Henning Schulzrinne Maarten Buechli
IEEE MEDIA INDEPENDENT HANDOVER
IEEE MEDIA INDEPENDENT HANDOVER DCN: xxx
Security Activities in IETF in support of Mobile IP
Diameter ABFAB Application
Presentation transcript:

Carrying Location Objects in RADIUS Hannes Tschofenig, Farid Adrangi, Avi Lior, Mark Jones

RADIUS / Geopriv A quick reminder... Figure 1: Example Network Topology Access Network Mobile Node AP RADIUS Home Network AAAL AAAH RADIUS IEEE 802.1x Location Objects are attached to RADIUS messages Location based authorization and taxation possible at home AAA server.

What happened since the last IETF meeting? Two presentations have been given at the last IETF meeting: — The authors of the two drafts got together and wrote a new draft: Carrying Location Objects in RADIUS

Delivery Methods for Location Information Goal: Location Information must be available at the home AAA server Two means to deliver Location Information to the AAAH: — Authentication/Authorization Phase Delivery — Mid-session Delivery

Delivery Methods for Location Information Authentication/Authorization Phase Delivery NAS AAA Start Auth. Phase RADIUS Access-Request + Loc-Attr.... multiple roundtrips... Access-Accept Auth. Accept MN RADIUS Accounting Request + Loc-Attr.

Delivery Methods for Location Information Mid-session Delivery Legend: Change of Authorization (CoA) message [RFC3576] NAS AAA COA + Service-Type "Authorize Only" COA NAK + Service-Type "Authorize Only" + Error-Cause "Request Initiated" Access-Request + Service-Type "Authorize Only" + Loc-Attr. Access-Accept

New RADIUS Attributes Reusing existing Geopriv work! Operator-Name Attribute — This attribute contains an operator name which uniquely identifies the ownership of an access network. Location-Information Attribute — Civil Location Information Format [ietf-geopriv-dhcp-civil] — Geospatial Location Information Format [RFC3825] Policy-Information Attribute — Reuses basic authorization policies from [PDIF-LO] Location-Type Attribute — Classes of location types (from 'Coffee Shop' to 'Public Place') Billing-Description Attribute — Unstructured text to be printed on the users bill

Location-Information Attribute | Type | Length | Code | Precision | | Location-Info (0) Civil (1) Geospatial (0) NAS (1) AAA server (2) User (3) Network | LaRes | Latitude | Latitude | LoRes | Longitude | Longitude | AT | AltRes | Altitude | Altitude | Datum | | Countrycode | Civic address elements Civil Location Information Geospatial Location Information TLV elements: CAtype CAlength CAvalue Example:

Policy-Information Attribute Fields of the 'usage-rules' element defined in [PIDF-LO]: — 'retransmission-allowed': '0' = Recipient is not permitted to share the enclosed Location Information '1' = Recipient is allowed to share Location Information with other parties. — 'retention-expires': Absolute date at which time the Recipient is no longer permitted to possess the location information. — 'ruleset-reference': This field contains a URI that indicates where a fuller ruleset of policies related to this object can be found.

Privacy Considerations Eavesdropping Threat: Eavesdropper learning Location Information + NAI Assumption: — NAI reveals true user identity (might not be the case for some EAP methods) Solution: — Use IPsec ESP between AAA servers — Already required for key transport Cannot protect against entities participating in the signaling exchange (e.g., AAA server) itself => no true "end-to-end" security

Privacy Considerations Home AAA server acts as Location Server Scenario: — Home AAA server retrieves location information and wants to use it for location-based services. Typically no problem since — User has a strong trust relationship with home operator based on a contract. — Authorization policies can be provided to the home AAA server (or the home network) before the protocol execution starts.

Privacy Considerations Visited AAA server acts as Location Server (1) Scenario: — Visited AAA server collects and distributes location information of attached users. — The same is applicable to AAA brokers — User might not even allow location information to be forwarded to home network Problem: — End host and visited network typically shares not trust relationship. — Network access authentication procedure is executed to dynamically establish the trust relationship and to establish session keys. — These keys are available after successful authentication and authorization. — Successful authentication and authorization might require location information

Privacy Considerations Visited AAA server acts as Location Server (2) Approach 1: Use EAP method with active user identity confidentiality Problem: The choice of an EAP method is not only user driven Approach 2: Mandate default policy Problem: Will it be considered by all hot spots? Approach 3: Authorization policies are provided by the home AAA server - possible for mid-session delivery Problem: Addresses only some problems Approach 4: User provides authorization rules to visited network Problem: — Securing the LO/Rules is difficult (key management problem) — Existing protocols due not support this functionality (see EAP, PANA) — Not a RADIUS problem

Outside the Scope Protocols executed between end host and NAS (e.g., EAP) Example: — End host providing location information to RADIUS server

Next Steps / Open Issues Should this document become a working group item in the Geopriv working group? Technical issues to add for the next draft version: — Scenarios need more text — Interworking with DIAMETER needs to be described — Discussion on the privacy issues Comments are appreciated!

Questions?