Nov. 9, 2004IETF61 PANA WG PANA Specification Last Call Issues Yoshihiro Ohba, Alper Yegin, Basavaraj Patil, D. Forsberg, Hannes Tschofenig.

Slides:



Advertisements
Similar presentations
Washinton D.C., November 2004 IETF 61 st – mip6 WG Goals for AAA-HA interface (draft-giaretta-mip6-aaa-ha-goals-00) Gerardo Giaretta Ivano Guardini Elena.
Advertisements

EAP Channel Bindings Charles Clancy Katrin Hoeper IETF 76 Hiroshima, Japan November 08-13, 2009.
AAA Mobile IPv6 Application Framework draft-yegin-mip6-aaa-fwk-00.txt Alper Yegin IETF 61 – 12 Nov 2004.
IETF 58 PANA WG PANA Update and Open Issues (draft-ietf-pana-pana-02.txt) Dan Forsberg, Yoshihiro Ohba, Basavaraj Patil, Hannes Tschofenig, Alper Yegin.
IETF-63Bridgewater/Samsung PANA RADIUS PANA RADIUS draft-ietf-pana-aaa-interworking-00.txt Avi Lior, Bridgewater Systems Alper.
July 16, 2003AAA WG, IETF 571 AAA WG Meeting IETF 57 Vienna, Austria Wednesday, July 16,
Diameter End-to-End Security: Keyed Message Digests, Digital Signatures, and Encryption draft-korhonen-dime-e2e-security-00 Jouni Korhonen, Hannes Tschofenig.
12/05/2007IETF70 PANA WG1 PANA Network Selection draft-ohba-pana-netsel-00.txt Yoshihiro Ohba.
July 15, 2002IETF54 PANA WG1 PANA Usage Scenarios Updates (draft-ietf-pana-usage-scenarios-02.txt) Yoshihiro Ohba Subir Das
March 20, 2006IETF65 PANA WG PANA Specification Updates (draft-ietf-pana-pana-11.txt) Yoshihiro Ohba
March 7, 2005MOBIKE WG, IETF 621 Mobility Protocol Options for IKEv2 (MOPO-IKE) Pasi Eronen.
7/14/2003IETF57 PANA enabling IPsec based Access control draft-mohanp-pana-ipsec-00.txt Mohan Parthasarathy Tahoe Networks - Presented by Hannes Tschofenig.
EAP WG EAP Key Management Framework Draft-ietf-eap-keying-03.txt Bernard Aboba Microsoft.
IETF54 Charter Issues Dealt with since IETF53 PANA WG Meeting Basavaraj Patil.
August 1, 2005IETF63 PANA WG Pre-authentication Support for PANA (draft-ohba-pana-preauth-00.txt) Yoshihiro Ohba
Diameter Group Signaling Thursday, November 07 th, 2013 draft-ietf-dime-group-signaling-02 Mark Jones, Marco Liebsch, Lionel Morand IETF 88 Vancouver,
Authentication Mechanism for Port Control Protocol (PCP) draft-wasserman-pcp-authentication-01.txt Margaret Wasserman Sam Hartman Painless Security Dacheng.
IETF-71, Philadelphia PANA in DSL networks draft-morand-pana-panaoverdsl-01.txt Lionel Morand France Telecom Alper Yegin Samsung Yoshihiro Ohba Toshiba.
SNMP for the PAA-EP protocol PANA wg - IETF 60 San Diego -> Yacine El Mghazli (Alcatel)
July 16, 2003AAA WG, IETF 571 EAP Keying Framework Draft-aboba-pppext-key-problem-07.txt EAP WG IETF 57 Vienna,
1 RADIUS Mobile IPv6 Support draft-ietf-mip6-radius-01.txt Kuntal Chowdhury Avi Lior Hannes Tschofenig.
PANA Implementation in Open Diameter Victor Fajardo.
August 2, 2005draft-vidya-mipshop-fast-handover-aaa-00 Handover Keys using AAA (draft-vidya-mipshop-fast-handover-aaa-00.txt) Vidya Narayanan Narayanan.
SIP working group IETF#70 Essential corrections Keith Drage.
1 © NOKIA diameter-cca-update.PPT Diameter Credit-control Application Harri Hakala.
3/20/2007IETF68 PANA WG1 PANA Issues and Resolutions Yoshihiro Ohba Alper Yegin.
PANA Framework Prakash Jayaraman, Rafa Marin Lopez, Yoshihiro Ohba, Mohan Parthasarathy, Alper Yegin IETF 59.
1 Requirements for Internet Routers (Gateways) and Hosts Relates to Lab 3. (Supplement) Covers the compliance requirements of Internet routers and hosts.
SNMP for the PAA-2-EP protocol PANA wg - IETF 59 Seoul -> Yacine El Mghazli (Alcatel)
Multi-hop PANA IETF Currently: –“For simplicity, it is assumed that the PAA is attached to the same link as the device (i.e., no intermediary IP.
1 draft-hiko-pana-api-02.txt The PANA API draft-hiko-pana-api-02.txt Yoshihiko Kainuma Fumio Teraoka Graduate School of Science and Technology Keio University.
Mobile IPv6 with IKEv2 and revised IPsec architecture IETF 61
IETF66 DIME WG John Loughney, Hannes Tschofenig and Victor Fajardo 3588-bis: Current Issues.
Emu wg, IETF 70 Steve Hanna, EAP-TTLS draft-funk-eap-ttls-v0-02.txt draft-hanna-eap-ttls-agility-00.txt emu wg, IETF 70 Steve Hanna,
IETF 57 PANA WG PANA Discussion and Open Issues (draft-ietf-pana-pana-01.txt) Dan Forsberg, Yoshihiro Ohba, Basavaraj Patil, Hannes Tschofenig, Alper Yegin.
DSLF Subscriber Auth Requirements and IETF PANA Protocol PANA WG Chairs IETF 70 Dec 7, 2007 – Vancouver, Canada.
Washinton D.C., November 2004 IETF 61 st – mip6 WG MIPv6 authorization and configuration based on EAP (draft-giaretta-mip6-authorization-eap-02) Gerardo.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: ID Definition Date Submitted: July 14, 2006 Presented at IEEE session in San.
NEA Working Group IETF meeting July 27, 2011 Jul 27, 2011IETF 81 - NEA Meeting1.
San Diego, August 2004 IETF 60 th – mip6 WG MIPv6 authorization and configuration based on EAP (draft-giaretta-mip6-authorization-eap-01) Gerardo Giaretta.
Minneapolis, March 2005 IETF 62 nd – mip6 WG Goals for AAA-HA interface (draft-giaretta-mip6-aaa-ha-goals-00) Gerardo Giaretta Ivano Guardini Elena Demaria.
Diameter Mobile IPv6: HA-to-AAAH support draft-ietf-dime-mip6-split-01.txt Julien Bournelle (Ed.) Gerardo Giaretta Hannes Tschofenig Madjid Nakhjiri.
Diameter Group Signaling Thursday, March 6 th, 2014 draft-ietf-diameter-group-signaling-03 Mark Jones, Marco Liebsch, Lionel Morand IETF 89 London, U.K.
IETF69 PANA WG Victor Fajardo, Yoshihiro Ohba and Rafael Marin Lopez PANA State Machine Issue Resolution (draft-ietf-pana-statemachine-05.txt)
August 2, 2005IETF63 EAP WG AAA-Key Derivation with Lower-Layer Parameter Binding (draft-ohba-eap-aaakey-binding-01.txt) Yoshihiro Ohba (Toshiba) Mayumi.
MIDCOM MIB Juergen Quittek, Martin Stiemerling, Pyda Srisuresh 60th IETF meeting, MIDCOM session.
Paris, August 2005 IETF 63 rd – mip6 WG Mobile IPv6 bootstrapping in split scenario (draft-ietf-mip6-bootstrapping-split-00) mip6-boot-sol DT Gerardo Giaretta,
Multiple Interfaces (MIF) WG documents status MIF WG IETF 80, Prague Problem statement and current practices documents.
1 IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: EAP Pre-authentication Problem Statement in IETF HOKEY WG Date Submitted: September,
IETF68 DIME WG Diameter Applications Design Guidelines Document (draft-fajardo-dime-app-design-guide-00.txt)
SCVP-28 Tim Polk November 8, Current Status Draft -27 was submitted in June ‘06 –AD requested a revised ID 8/11 –No related discussion on list –Editors.
7/24/2007IETF69 PANA WG1 PANA Issues and Resolutions draft-ietf-pana-pana-17.txt draft-ietf-pana-framework-09.txt Yoshihiro Ohba Alper Yegin.
San Diego, November 2006 IETF 67 th – mip6 WG Goals for AAA-HA interface (draft-ietf-mip6-aaa-ha-goals-03) Gerardo Giaretta Ivano Guardini Elena Demaria.
EAP WG EAP Key Management Framework Draft-ietf-eap-keying-05.txt Bernard Aboba Microsoft IETF 62, Minneapolis, MN.
Doc.: IEEE /2179r0 Submission July 2007 Steve Emeott, MotorolaSlide 1 Summary of Updates to MSA Overview and MKD Functionality Text Date:
IEEE MEDIA INDEPENDENT HANDOVER DCN:
Pre-authentication Problem Statement (draft-ohba-hokeyp-preauth-ps-00
<draft-ohba-pana-framework-00.txt>
Open issues with PANA Protocol
PANA in DSL networks draft-morand-pana-panaoverdsl-01.txt
PANA Discussion and Open Issues (draft-ietf-pana-pana-01.txt)
PANA Issues and Resolutions
Carrying Location Objects in RADIUS
IETF80, Prague Diameter Maintenance and Extensions (DIME) WG
March 2012 doc.: IEEE March 2012 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title:
Charles Clancy Katrin Hoeper IETF 73 Minneapolis, USA 17 November 2008
PANA Implementation in Open Diameter
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
Diameter ABFAB Application
Presentation transcript:

Nov. 9, 2004IETF61 PANA WG PANA Specification Last Call Issues Yoshihiro Ohba, Alper Yegin, Basavaraj Patil, D. Forsberg, Hannes Tschofenig

Nov. 9, 2004IETF61 PANA WG Overview Received many comments –Generated 39 new issues –Thank you for reviewing and giving detailed comments Two categories in this presentation –Category A Issues (24 issues, just listed today): Editorial issues Technical issues that requires minor clarification –Category B Issues (15 issues, discussed today): Technical issues that requires protocol changes or major clarification

Nov. 9, 2004IETF61 PANA WG List of Category A Issues (1/2) Issues 118, 119 (cookie issues: naming change and how to get DI) Issue 120 (removal of sentence on EAP message creation) Issue 121 (clarification on PANA_MAC_KEY and TSK) Issue 122 (clarification on replay attack protection) Issue 123 (clarification on “very first request message”) Issue 124, 133 (clarification on “stateless”) Issue 125 (clarification on why piggybacking EAP-Resp in PAN is not always good) Issue 126 (clarification of PANA-Reauth exchange error) Issue 128 (DI and IP address of PaC in PANA SA attributes) Issue 129 (Clarification of optimized PANA execution)

Nov. 9, 2004IETF61 PANA WG List of Category A Issues (2/2) Issue 130 (replacing the term “client” with “device”) Issue 131, 132 (Clarification in terminology section) Issue 135 (PTR/PTA exchange is not needed after PBR/PBA failure with PANA_AUTHORIZATION_REJECTED) Issue 138 (Clarification of “one IP hop” requirement) Issue 139 (clarification of L2 trigger) Issue 140 (EAP-Success/Failure also carried in PFER) Issue 141 (editorial comments from Gerardo) Issue 142 (section 6.1 needed?) Issue 143 (Clarification of CTP and PANA) Issue 146 (editorial comments from Julien) Issue 147 (which PAA ID with AAA-Key int computation)

Nov. 9, 2004IETF61 PANA WG Category B Issues

Nov. 9, 2004IETF61 PANA WG Issue 112: ‘M’ bit Clarification Issue: –The M (Mandatory) bit is underspecified. When it is set, what happens when it is set/unset and an AVP is not recognized? Proposed Resolution: –If an AVP with the 'M' bit set is unrecognized (unknown type/value), the message MUST be discarded –If an AVP with the 'M' bit cleared is unrecognized, the message MAY simply ignore the AVP –Default value for AVPs defined in this document: The 'M' bit MUST be set. The 'V' bit MUST NOT be set

Nov. 9, 2004IETF61 PANA WG Issue 113: Clarification of Authorization Phase Issue: –The wording “authorization phase” is confusing because authorization is performed at the end of authentication phase Proposed resolution: –Change the name to “Authorized phase” –Revise text for explaining the authorized phase

Nov. 9, 2004IETF61 PANA WG Issue 114: Liveness Test Issue: –Can a PANA exchange other than PANA-Ping exchange be used for liveness test? Discussion –Yes Resolution: –Add the following text in section11.8 “Not only a PANA ping exchange but also other valid recent request/answer exchange can imply the other side is alive.”

Nov. 9, 2004IETF61 PANA WG Issue 115: Clarification of PANA session definition Issue: –Why the session cannot be shared across multiple network interfaces? Discussion: –This is because only one DI of the PaC is allowed to be bound to a PANA session at a time for simplicity –Should be rephrased without using the term “interface” Proposed resolution: –Rephrase the session definition using the term “device identifier” instead of “interface”

Nov. 9, 2004IETF61 PANA WG Issue 116,134: Device-Id, Protection-Cap. and PPAC AVPs handling in PBR Issue: –Rules as to when to or not to include Device-Id AVP in PBR should be more specific Discussion: –Device-Id AVP in PBR needs to be always included when Protection- Capability AVP is carried in PBR –Do we use DI binding only when we use L2/L3 ciphering enable after PANA? (The answer is NO) DI binding without enabling L2/L3 ciphering can be performed without Device-ID AVP (i.e., taking DI from MAC/IP header) But carrying Device-Id in PANA message can make implementation easier Proposed resolution: –Device-Id AVP is carried in PBR if Prot.-Cap. AVP is carried –Dev.-ID AVP MAY be carried in PBR if Prot.-Cap. AVP is not carried –If PBA does not contain Device-Id AVP when expected, the PAA initiates PER/PEA exchange to terminate the session –Other change: When PBR does not carry PANA-SUCCESS result code, Prot.-Cap. AVP and PPAC AVP is not carried in PBR

Nov. 9, 2004IETF61 PANA WG Issue 117: DI with IPsec Clarification Issue: –Which is the DI of PaC, IPsec-TOA or IPsec-TIA? Discussion: ongoing Resolution?

Nov. 9, 2004IETF61 PANA WG Issue 127: Retransmission Acknowledgment Issue: –What would happen if PANA-Auth- Answer(p) is lost? –Could PANA-Auth-Request(q+1) be used to confirm PANA-Auth-Reques(p)? PAN(p) PAR(p)[EAP-Request] PAR(q+1)[EAP-Response] lost Discussion: –Since PAR(q+1) would not have been sent if PAN(p) were not received by PaC, the PAA can accept PAR(q+1) –We are relying on 1- PAR carries EAP, 2- PaC is an EAP peer, 3- EAP peer cannot generate traffic on its own. These may change in a future. More robust mechanism would be needed Proposed Resolution: –No optimization. Let the protocol run as it is should work.

Nov. 9, 2004IETF61 PANA WG Issue 136: Network Selection in PANA and Network Selection in EAP Issue: –Relationship between the two network selection mechanisms at the different layers should be explained Discussion: –Selection in EAP (mainly for AAA proxy selection) occurs always after selection in PANA (ISP selection) in scope of the chosen ISP. No conflict between the two selections –ISP selection should work with roaming case –The two selection can conflict when EAP-based selection is used for ISP selection Implementations should avoid such conflict Proposed Resolution?

Nov. 9, 2004IETF61 PANA WG Issue 137: Lifetimes of session, AAA-Key and PANA_MAC_KEY Issue: –What is the relationship between PANA session lifetime, AAA- Key lifetime and PANA_MAC_KEY lifetimes Discussion: –They are the same Proposed resolution: –Add clarification text to indicate (session lifetime)=(AAA-Key lifetime) = (PANA_MAC_KEY lifetime)

Nov. 9, 2004IETF61 PANA WG Issue 144:Mobility - PAA update in the AAA infrastructure Issue: –In the mobility handling, a mechanism is needed for the old and/or new PAA to inform the AAA server of the movement of the PaC Discussion: –There are several possible methods that can be used for that purpose, as long as state synchronization among the old PAA, new PAA and AAA server is maintained –But this is not PANA issue Consensus? –No additional text in PANA specification

Nov. 9, 2004IETF61 PANA WG Issue 145: Failed AVP Issue: –Failed-AVP AVP is not always needed for PANA-Error-Request There are some errors that is not related to AVP, such as PANA_MESSAGE_UNSUPPORTED –OTOH, more than one Failed-AVP AVPs can be carried in PER, one per errornous AVP Proposed resolution: –Allow zero or more Failed-AVP AVPs for PER –Proposed text posted to the ML

Nov. 9, 2004IETF61 PANA WG Issue 148:ABNF spec into the document Issue: –PANA is trying to reuse Diameter ABNF for message definition, but PANA ABNF is not the same as Diameter ABNF PANA message header is different from Diameter message header Proposed resolution: –Adding PANA ABNF grammar

Nov. 9, 2004IETF61 PANA WG Issue 149: General purpose notification Issue: –PANA currently does not have general purpose notification mechanism –What about defining notification exchange in PANA? Discussion: –Would be useful for having notification mechanism Authorization related information –PAA-to-PaC notification only? Or both PAA-to-PaC and PaC-to- PAA notification? Consensus?

Nov. 9, 2004IETF61 PANA WG Issue 150: PAA mandating separate authentication Issue: –Can the PAA refuse to authenticate if the PaC sets S-Flag to 0 in PANA-Start-Answer message in discovery and handshake phase? –If yes, there should be a way to indicate this decision by the PAA to the PaC Discussion: –Is this refusing functionality useful/or practical? –Anyway, adding such functionality would be easier Resolution?

Nov. 9, 2004IETF61 PANA WG Thank You!