EAP Authentication for SIP & HTTP V. Torvinen (Ericsson), J. Arkko (Ericsson), A. Niemi (Nokia),

Slides:



Advertisements
Similar presentations
SIPPING 3GPP Requirements Ad Hoc Meeting Georg Mayer IETF#53, Minneapolis.
Advertisements

SIP and Instant Messaging. SIP Summit SIP and Instant Messaging What Does Presence Have to Do With SIP? How to Deliver.
Doc.: IEEE /039 Submission January 2001 Haverinen/Edney, NokiaSlide 1 Use of GSM SIM Authentication in IEEE System Submitted to IEEE
Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London.
External User Security Model (EUSM) for SNMPv3 draft-kaushik-snmp-external-usm-00.txt November, 2004.
URP Usage Scenarios for NAS Yoshihiro Ohba August 2001 Toshiba America Research, Inc.
Company Confidential 1 © 2005 Nokia V1-Filename.ppt / yyyy-mm-dd / Initials Pre-Shared Key TLS with GBA support Thesis presentation ESPOO, Finland.
6 The IP Multimedia Subsystem Selected Topics in Information Security – Bazara Barry.
1 © NOKIA MitM.PPT/ 6/2/2015 / Kaisa Nyberg (NRC/MNW), N.Asokan (NRC/COM) The Insecurity of Tunnelled Authentication Protocols N. ASOKAN, VALTTERI NIEMI,
SIP roaming solution amongst different WLAN-based service providers Julián F. Gutiérrez 1, Alessandro Ordine 1, Luca Veltri 2 1 DIE, University of Rome.
1 © NOKIA MitM.PPT/ 6/2/2015 / Kaisa Nyberg (NRC/MNW), N.Asokan (NRC/COM) The Insecurity of Tunnelled Authentication Protocols N. ASOKAN, VALTTERI NIEMI,
Doc.: IEEE /0408r0 Submission March 2004 Colin Blanchard, BTSlide 1 3GPP WLAN Interworking Security Colin Blanchard British Telecommunications.
SIPPING IETF51 3GPP Security and Authentication Peter Howard 3GPP SA3 (Security) delegate
1 © NOKIA MitM.PPT (v0.2) / 6-Nov-02 / Kaisa Nyberg (NRC/MNW), N.Asokan (NRC/COM) The Insecurity of Tunnelled Authentication Protocols N. ASOKAN, VALTTERI.
Ubiquitous Access Control Workshop 1 7/17/06 Access Control and Authentication for Converged Networks Z. Judy Fu John Strassner Motorola Labs {judy.fu,
History Since created in 1995, RADIUS has been used to provide authentication, authorization and generate accounting information for dial-in users. However,
802.1x EAP Authentication Protocols
1 Extending SIP Speaker: Hsuan-Ming Chen Adviser: Ho-Ting Wu Date: 2005/04/26.
Georgy Melamed Eran Stiller
SIP Session Initiation Protocol Short Introduction Artur Hecker, ENST.
ERP for IKEv2 draft-nir-ipsecme-erx-01. Why ERP for IKEv2? RFC 5296 and the bis document define a quick re- authentication protocol for EAP. ERP requires.
Session Policy Framework using EAP draft-mccann-session-policy-framework-using-eap-00.doc IETF 76 – Hiroshima Stephen McCann, Mike Montemurro.
EAP Overview (Extensible Authentication Protocol) Team Golmaal: Vaibhav Sharma Vineet Banga Manender Verma Lovejit Sandhu Abizar Attar.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
Network Security1 – Chapter 5 (B) – Using IEEE 802.1x Purpose: (a) port authentication (b) access control An IEEE standard
Remedies Use of encrypted tunneling protocols (e.g. IPSec, Secure Shell) for secure data transmission over an insecure networktunneling protocolsIPSecSecure.
Interworking Architecture Between 3GPP and WLAN Systems 張憲忠, 何建民, 黃瑞銘, 紀嘉雄, 李有傑.
SIP/RTSP convergence draft-whitehead-mmusic-sip-for-streaming-media-05
SIP OAuth Rifaat Shekh-Yusef IETF 90, SIPCore WG, Toronto, Canada July 21,
“Securing IP Multimedia Subsystem (IMS) infrastructures …,” M. Tsagkaropoulos UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless.
Support Services & IP Multimedia Subsystem (IMS)
COMMUNICATION SYSTEMS, NETWORKS AND DIGITAL SIGNAL PROCESSING Fifth International Symposium July, 2006, Patras, Greece Security in Wireless Networks:
50 th IETF BURP BOF, March 20, 2001 Applicability of a User Registration Protocol Yoshihiro Ohba (Toshiba America Research, Inc.) Henry Haverinen (Nokia)
1 © 1999, Cisco Systems, Inc. AAA/Mobile IP For 3G CDMA Systems Gopal Dommety and Allen Long.
1 EAP Usage Issues Feb 05 Jari Arkko. 2 Typical EAP Usage PPP authentication Wireless LAN authentication –802.1x and i IKEv2 EAP authentication.
11/26 Integration of wireless LAN and 3G wireless - Interworking architecture between 3GPP and WLAN systems Ahmavaara, K.; Haverinen, H.; Pichna, R.; Communications.
3Com Confidential Proprietary 3G CDMA AAA Function Yingchun Xu 3COM.
AIMS’99 Workshop Heidelberg, May 1999 P805: Internet Roaming Giuseppe Sisto - Telecom Italia / CSELT Project participants:
2003/12/291 Security Aspects of 3G-WLAN Interworking 組別: 2 組員: 陳俊文 , 李奇勇 , 黃弘光 , 林柏均
KAIS T Wireless Network Security and Interworking Minho Shin, et al. Proceedings of the IEEE, Vol. 94, No. 2, Feb Hyeongseop Shim NS Lab, Div. of.
EAP Keying Problem Draft-aboba-pppext-key-problem-03.txt Bernard Aboba
Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication.
July 16, Diameter EAP Application (draft-ietf-aaa-eap-02.txt) on behalf of...
All Rights Reserved © Alcatel-Lucent 2006, ##### 2G IMS CAVE Based Security Replay Protection Alec Brusilovsky, Zhibi Wang Alcatel-Lucent, July 24, 2007.
©Stephen Kingham SIP Protocol overview SIP Workshop APAN Taipei Taiwan 23rd Aug 2005 By Stephen Kingham
1 Background and Introduction. 2 Outline History Scope Administrative.
All Rights Reserved © Alcatel-Lucent 2006, ##### 2G IMS CAVE Based Security Replay Protection Zhibi Wang January, 2007.
Problem Scope Objective To demonstrate/determine clearly the need for an edge protocol that allows a user to interact with an agent in the network for.
ICOS BOF EAP Applicability Bernard Aboba IETF 62, Minneapolis, MN.
March 17, 2003 IETF #56, SAN FRANCISCO1 Compound Authentication Binding Problem (EAP Binding Draft) Jose Puthenkulam Intel Corporation (
Diameter NAPT Control Application: Discussion on naming of involved entities Frank Brockners.
1 HRPD Roamer Authentication Zhibi Wang, Sarvar Patel, Simon Mizikovsky, Nancy Lee.
September 28, 2006 Page 1 3GPP2 MMD Status for IMS Workshop Jack Nasielski
DSLF Subscriber Auth Requirements and IETF PANA Protocol PANA WG Chairs IETF 70 Dec 7, 2007 – Vancouver, Canada.
3GPP GBA Overview Adrian Escott.
N. Asokan, Kaisa Nyberg, Valtteri Niemi Nokia Research Center
Diameter SIP Application
Extended QoS Authorization for the QoS NSLP Hannes Tschofenig, Joachim Kross.
University of Murcia Gabriel López.  Network authentication in eduroam and SSO token distribution ◦ RADIUS hierarchy ◦ Token based on SAML  Network.
1 SECMECH BOF EAP Methods IETF-63 Jari Arkko. 2 Outline Existing EAP methods Technical requirements EAP WG process for new methods Need for new EAP methods.
S Postgraduate Course in Radio Communications. Application Layer Mobility in WLAN Antti Keurulainen,
WLAN IW Enhancement for Multiple Authentications Support QUALCOMM Inc.: Raymond Hsu, QUALCOMM Inc.: Masa Shirota,
Virtual Private Networks
SIP Protocol overview SIP Workshop APAN Taipei Taiwan 23rd Aug 2005
Informing AAA about what lower layer protocol is carrying EAP
Discussions on FILS Authentication
Securing Access to Mobile Operator Core Networks using IKEv2
SIP Authentication using CHAP-Password
AAA: A Survey and a Policy- Based Architecture and Framework
Security Activities in IETF in support of Mobile IP
Presentation transcript:

EAP Authentication for SIP & HTTP V. Torvinen (Ericsson), J. Arkko (Ericsson), A. Niemi (Nokia),

Current SIP Authentication Situation HTTP basic HTTP digest PGP Existing security can be used at an outer layer Client SIP-server AAA-server TLS, IKE/IPsec New DIAMETER extensions Certain SIP-specific methods exist. Work going on to refine these. Work has started to extend DIAMETER to support HTTP authentication methods

How Does This Work Fit to the Picture? HTTP basic HTTP digest HTTP EAP PGP Client SIP-server AAA-server TLS, IKE/IPsec New DIAMETER Extensions Reusing existing RADIUS and DIAMETER We define a new alternative HTTP authentication method which is - more flexible than previous ones - takes less roundtrips than e.g. IKE - implies no changes protocols or SIP server as new auth mechanisms are invented We reuse existing AAA protocols directly

Background for Our Work Third generation mobile networks will provide a multimedia system that runs over IP and uses SIP The 3GPP is working on security to ensure such multimedia service can be trusted and can be billed for One of the issues is the authentication of devices/users towards the home operator during registration We’d like to define a mechanism that satisfies the requirements of 3GPP networks as well as other uses of SIP 3GPP needs UMTS AKA and other authentication methods - EAP (RFC 2284) for allow many methods

3GPP Requirements Use less roundtrips per authentication event – Use SIP authentication rather than an outer layer protocol such as TLS or IKE. Find light but secure authentication method – Do not apply HTTP basic/digest or PGP because they are either insecure or too heavy. – Do not develop a new method Authentication is typically applied at registration time 3GPP needs to use UMTS AKA for authentication –Devices already have a SIM card for this purpose –For access independence and ability to use laptops without SIM cards, other methods also highly desirable –A generic scheme such as GSS_API, SASL, EAP is therefore desired

Introduction to EAP Extensible Authentication Protocol, RFC 2284 Originally used in PPP Being adopted for WLANs, possibly for Bluetooth Extensible protocol framework: –Same protocol can carry various authentication methods –AAA protocols for carrying EAP exist (RADIUS and DIAMETER) –Some have already been defined for EAP such as passwords, token-cards, TLS, GSS_API, GSM, UMTS AKA, etc. –New ones can be defined –Clients and AAA servers must support the method they use –NASes, proxies, etc. can ignore what happens inside EAP

SIP Authentication Schemes HTTP EAP SIP HTTP AuthenticationPGP HTTP Digest HTTP Basic EAP AKA EAP GSMEAP TLSEAP...EAP Token Card

Concrete Authentication Example in SIP REGISTER sip:… SIP/2.0 SIP/ Authentication Required WWW-Authenticate: eap eap-packet REGISTER sip:… SIP/2.0 Authorization: eap eap-packet SIP/ OK Authentication-info: eap-packet User agent Reg. server May be repeated

Conclusions and Going Forward Looks like HTTP EAP provides a flexible authentication scheme for SIP, and allows us to leverage existing EAP methods Feedback is sought on the applicability, security and other aspects of this approach We’d like this work to be a work item of the WG Further work is needed at least on the following issues: –How headers and subsequent SIP messages can be protected by the keys generated by some EAP methods –While the authentication can reuse DIAMETER NASREQ extension, it may still be necessary to define new attributes that tell the DIAMETER server more about what is happening at SIP level (3GPP has also special requirements and needs an own DIAMETER extension).