Session ID Georg Carle, John Vollbrecht, Sebastian Zander, Tanja Zseby San Diego, December 2000.

Slides:



Advertisements
Similar presentations
Authentication Authorization Accounting and Auditing
Advertisements

Slide 1 Insert your own content. Slide 2 Insert your own content.
Internet Telecom Expo September 20, 2000 SIP vs. H.323 SIP vs. H.323 Will the Real IP Telephony Please Stand Up? Jonathan Rosenberg.
TRIP: Recent Changes and Open Issues Jonathan Rosenberg, Hussein Salama, Matt Squire Pittsburgh IETF August 3, 2000.
Policy-based Accounting Draft Version 01 Policy-based Accounting Draft Version 01 Georg Carle, Sebastian Zander, Tanja Zseby GMD FOKUS - German National.
Doc.: IEEE /1186r0 Submission October 2004 Aboba and HarkinsSlide 1 PEKM (Post-EAP Key Management Protocol) Bernard Aboba, Microsoft Dan Harkins,
Doc.: IEEE /087 Submission May, 2000 Steven Gray, NOKIA Jyri Rinnemaa, Jouni Mikkonen Nokia Slide 1.
802.1AF - directions define requirements to find and create connections in terms of Discovery - Authentication - Enable 1.Discover of what can be done.
Confidential 1 Phoenix Security Architecture and DevID July 2005 Karen Zelenko Phoenix Technologies.
ASYCUDA Overview … a summary of the objectives of ASYCUDA implementation projects and features of the software for the Customs computer system.
Secure Naming structure and p2p application interaction IETF - PPSP WG July 2010 Christian Dannewitz, Teemu Rautio and Ove Strandberg.
M2M Architecture Inge Grønbæk, Telenor R&I ETSI Workshop on RFID and The Internet Of Things, 3rd and 4th December 2007.
1MEDIACON 2004 © 2001, Cisco Systems, Inc. A View on Mobility for Multimedia Arthur Feather Mobile Wireless Group Cisco Systems Arthur Feather Mobile Wireless.
Internet Protocol Security (IP Sec)
0 - 0.
Yunling Wang VoIP Security COMS 4995 Nov 24, 2008 XCAP The Extensible Markup Language (XML) Configuration Access Protocol (XCAP)
SIP for Light Bulbs Using SIP to Support Communication with Networked Appliances SIP for Light Bulbs Using SIP to Support Communication with Networked.
Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi
1 Authentication Applications Ola Flygt Växjö University, Sweden
Kerberos and X.509 Fourth Edition by William Stallings
5.9 + = 10 a)3.6 b)4.1 c)5.3 Question 1: Good Answer!! Well Done!! = 10 Question 1:
Trust Router Overview IETF 86, Orlando, FL Trust Router Bar BOF Margaret Wasserman
Washinton D.C., November 2004 IETF 61 st – mip6 WG Goals for AAA-HA interface (draft-giaretta-mip6-aaa-ha-goals-00) Gerardo Giaretta Ivano Guardini Elena.
External User Security Model (EUSM) for SNMPv3 draft-kaushik-snmp-external-usm-00.txt November, 2004.
Registry system data exchange General design requirements Pre-sessional Consultations on Registries 19 October 2002 New Delhi, India UNFCCC secretariat.
State of DNS Security Extensions Edward Lewis February 26, 2001 APRICOT 2001 Panel.
PEAP & EAP-TTLS 1.EAP-TLS Drawbacks 2.PEAP 3.EAP-TTLS 4.EAP-TTLS – Full Example 5.Security Issues 6.PEAP vs. EAP-TTLS 7.Other EAP methods 8.Summary.
EAP Channel Bindings Charles Clancy Katrin Hoeper IETF 76 Hiroshima, Japan November 08-13, 2009.
IRTF - AAAARCH - RG Authentication Authorisation Accounting ARCHitecture RG chairs: J. Vollbrecht and C. de Laat RFC 2903, 2904, 2905,
IRTF - AAAARCH - RG Authentication Authorisation Accounting ARCHitecture RG chairs: C. de Laat and J. Vollbrecht RFC 2903, 2904, 2905,
IRTF - AAAARCH - RG Authentication Authorisation Accounting ARCHitecture RG chairs: J. Vollbrecht and C. de Laat RFC 2903, 2904, 2905,
Policy-based Accounting Tanja Zseby, Georg Carle, Sebastian Zander GMD FOKUS - German National Research Institute for Information Technology Competence.
QoS Auditing Sebastian Zander, Tanja Zseby GMD FOKUS - German National Research Institute for Information Technology Competence Center Global Networking.
9,825,461,087,64 10,91 6,00 0,00 8,00 SIP Identity Usage in Enterprise Scenarios IETF #64 Vancouver, 11/2005 draft-fries-sipping-identity-enterprise-scenario-01.txt.
Some Thoughts on Data Representation 47th IETF AAAarch Research Group David Spence Merit Network, Inc.
Policy-based Accounting Draft Update Tanja Zseby, Sebastian Zander Fraunhofer Institute FOKUS Competence Center for Global Networking (GloNe) [zseby,
8/2/ IETF, Pittsburgh Kutscher/Ott/Bormann SDPng Requirements draft-kutscher-mmusic-sdpng-req-00.txt Dirk Jörg
Examples for Policy-based Accounting in the AAA Framework Georg Carle, Sebastian Zander, Tanja Zseby GMD FOKUS German National Research Institute for Information.
Policy-based Accounting Draft Sebastian Zander, Tanja Zseby GMD FOKUS - German National Research Institute for Information Technology Competence Center.
IRTF - AAAARCH - RG Authentication Authorisation Accounting ARCHitecture RG chairs: C. de Laat and J. Vollbrecht RFC 2903, 2904, 2905,
Accounting, Auditing and Session IDs Nevil Brownlee The University of Auckland / CAIDA Adelaide, March 2000.
Policy-based Accounting: Accounting Issues Georg Carle, Sebastian Zander, Tanja Zseby GMD FOKUS - German National Research Center for Information Technology.
IRTF - AAAARCH - RG Authentication Authorisation Accounting ARCHitecture RG chairs: J. Vollbrecht and C. de Laat RFC 2903, 2904, 2905,
IRTF - AAAARCH - RG Authentication Authorisation Accounting ARCHitecture RG chairs: C. de Laat and J. Vollbrecht RFC 2903,
A Use Case for SAML Extensibility Ashish Patel, France Telecom Paul Madsen, NTT.
PPSP Tracker Protocol draft-gu-ppsp-tracker-protocol PPSP WG IETF 82 Taipei Rui Cruz (presenter) Mário Nunes, Yingjie Gu, Jinwei Xia, David Bryan, João.
3Com Confidential Proprietary 3G CDMA AAA Function Yingchun Xu 3COM.
1 Course Number Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved. External User Security Model (EUSM) for SNMPv3 draft-kaushik-snmp-external-usm-00.txt.
Jun Li DHCP Option for Access Network Information draft-lijun-dhc-clf-nass-option-01.
QUALCOMM Incorporated 1 Protocol Options for BSN- BSMCS Controller Interface Jun Wang, Kirti Gupta 05/16/2005 Notice: Contributors grant a free, irrevocable.
EAP Key Framework Draft-ietf-eap-keying-01.txt IETF 58 Minneapolis, MN Bernard Aboba Microsoft.
Doc.: IEEE /1572r0 Submission December 2004 Harkins and AbobaSlide 1 PEKM (Post-EAP Key Management Protocol) Dan Harkins, Trapeze Networks
Real-time Flow Management 2 BOF: Remote Packet Capture Extensions Jürgen Quittek NEC Europe Ltd, Heidelberg, Germany Georg Carle GMD.
VoN September ‘98 1 9/17/98 VoN Standards Update Jonathan Rosenberg Bell Laboratories September 17, 1998.
1 Network Security Lecture 7 Overview of Authentication Systems Waleed Ejaz
1 sip-aaa-req.PPT/ 16 Jul 2002 / John Loughney SIP-AAA Requirements John Loughney Gonzalo Camarillo IETF 54.
1 © NOKIA FILENAMs.PPT/ DATE / NN AAA-SIP Requirements Current draft: draft-loughney-sip-aaa-req-00.txt draft-calhoun-sip-aaa-reqs-04.txt may not be updated.
IP Multicast Receiver Access Control draft-atwood-mboned-mrac-req draft-atwood-mboned-mrac-arch.
Slide # 1 IETF-62 March 2005Conference Package Conference Package Status March 11 th, 2005 IETF 62, Minnesota draft-sipping-conference-package-09.
August 2, 2005IETF63 EAP WG AAA-Key Derivation with Lower-Layer Parameter Binding (draft-ohba-eap-aaakey-binding-01.txt) Yoshihiro Ohba (Toshiba) Mayumi.
RADIUS Attributes for the Delivery of Keying Material Joe Salowey Jesse Walker Tiebing Zhang Glen Zorn.
Some basics of a AAA Control model
Georg Carle, Sebastian Zander, Tanja Zseby
draft-ietf-simple-message-sessions-00 Ben Campbell
UNIT.4 IP Security.
ERP extension for EAP Early-authentication Protocol (EEP)
IETF 56 – XMPP WG *prep e2e TINS.
Application Layer Mobility Management Scheme for Wireless Internet
PAA-2-EP protocol PANA wg - IETF 58 Minneapolis
Presentation transcript:

Session ID Georg Carle, John Vollbrecht, Sebastian Zander, Tanja Zseby San Diego, December 2000

San Diego IETF, December 2000: AAAARCH Meeting - Session ID 2 Overview Binding Objectives Binding Concepts Related Work Requirements Session ID Generation Examples Summary

San Diego IETF, December 2000: AAAARCH Meeting - Session ID 3 Binding Objectives Authentication, Authorization and Accounting with the Service provisioning process (Service Session) Accounting records (maybe generated by different hosts) which provide the accounting data for the services a user has used Different service sessions that logically belong together Binding needed for Auditing and Accounting

San Diego IETF, December 2000: AAAARCH Meeting - Session ID 4 Binding Objectives Time Service Usage Session Subsession 1 AuthAuthoriz Subsession 2 Accounting

San Diego IETF, December 2000: AAAARCH Meeting - Session ID 5 Binding Concepts Hierarchical Binding: Subsession IDs are derived from supersession (e.g. key ring approach) Peer-to-peer Binding: Two equal sessions without specifying hierarchy Late Binding: Binding is not done during session lifetime but is created later if needed based on attributes (e.g. IP address, start time)

San Diego IETF, December 2000: AAAARCH Meeting - Session ID 6 Related Work RADIUS DIAMETER WWW based Services RTSP SIP SDP/SAP

San Diego IETF, December 2000: AAAARCH Meeting - Session ID 7 Requirements Binding –Flexibility –Scalability Session ID –Globally unique –Privacy Security is important

San Diego IETF, December 2000: AAAARCH Meeting - Session ID 8 Session ID Generation Server generates ID during initial message exchange (e.g. authentication) –user and/or server specific information –time or increasing number –cryptographic hash Simple scheme to create global unique ID: AAA ID + Service ID + Session ID AAA ID: Global unique ID of the AAA server Service ID: Identify a service at a AAA server Session ID: Unique ID in the scope of the service

San Diego IETF, December 2000: AAAARCH Meeting - Session ID 9 Example: VoD over Diffserv 1 User CP: Content Provider TP: Transport Provider CP TP 1TP 2 Y (Diffserv Access) X (Content) Z (Diffserv) ID: X ID: Z ID: X ID: Y X Y Z Y Z

San Diego IETF, December 2000: AAAARCH Meeting - Session ID 10 Example: VoD over Diffserv 2 User CP: Content Provider TP: Transport Provider CP TP 1TP 2 Z (Diffserv Access) Y (Content) X (Diffserv) ID: Y ID: X ID: Y ID: X XY Z Z Z

San Diego IETF, December 2000: AAAARCH Meeting - Session ID 11 Z Example: VoD over Diffserv 3 User CP: Content Provider TP: Transport Provider CP TP 1TP 2 Y (Diffserv Access) X (Content) V (Diffserv) ID: X ID: V ID: X ID: V W X YZ W (Diffserv) VW TP 3 ID: W Y Y Z, Z

San Diego IETF, December 2000: AAAARCH Meeting - Session ID 12 Example: VoD over Diffserv 3 Auditing –auditing information is transferred to trusted server during session lifetime –binding is done when needed (i.e. audit request) user audit_server: query X audit_server CP: X... audit_server user: audit info X, Y, Z, V, W

San Diego IETF, December 2000: AAAARCH Meeting - Session ID 13 Summary Currently only AAAARCH internal draft Terminology Problem Statement Related Work Requirements Examples Number of open issues

San Diego IETF, December 2000: AAAARCH Meeting - Session ID 14 The End

San Diego IETF, December 2000: AAAARCH Meeting - Session ID 15 Open Issues How does this work with the different authorization models (RFC2904) Do we need to encode session hierarchy in the session id? More precise definitions (i.e. subsession) Look at SIP, RTSP, SDP/SAP More examples rework existing concepts