Presentation is loading. Please wait.

Presentation is loading. Please wait.

EAP-GEE Lakshminath Dondeti Vidya Narayanan

Similar presentations


Presentation on theme: "EAP-GEE Lakshminath Dondeti Vidya Narayanan"— Presentation transcript:

1 EAP-GEE Lakshminath Dondeti Vidya Narayanan
Vidya Narayanan EAP WG meeting, IETF-65, Dallas, Mar 2006

2 Requirements Access and service authentication may both use EAP via the same authenticator Need to differentiate EAP-based access and service authentication L2 and L3 service providers may be different (e.g., MVNOs) Allow parallel execution of the two EAP exchanges No current means to distinguish the two EAP exchanges between a peer and authenticator without additional signaling An MSP may want to require Mobile IP-based service authentication instead of EAP-based service authentication

3 Network Model with Separate ANP and SNP
Service network provider (SNP) Access network provider (ANP) Authenticator MN AAA-ANP AAA-SNP

4 Proposing Generic EAP Encapsulation
The GEE protocol runs between the peer and the authenticator We introduce a GEE layer between the EAP layer and the EAP lower layer The GEE header (16 bits) indicates to the peer and the authenticator whether the authentication is for access (L2) or service (L3) Whether the service is Mobile IP or not

5 GEE header format EAP lower Layer hdr GEE Hdr EAP Packet Reserved
(6bits) Version (8bits) A M We introduce a 16-bit GEE header between the EAP header and the lower-layer header. It contains An 8-bit version header; Version = 0 for this version 1-bit A flag: If A==1, the EAP exchange is for access authentication If A==0, the EAP exchange is for service authentication 1-bit M flag: Valid only on an EAP Failure packet Ignored when A==1 If A == 0, M == 1 indicates peer MUST use MIP for service authentication A 6-bit Reserved field (unused, MBZ)

6 GEE multiplexing model
Method1 Method2 Method1 Method2 Peer Layer Authenticator Layer EAP Layer EAP Layer GEE Layer GEE Layer Lower Layer Lower Layer EAP Peer EAP Authenticator

7 GEE pass-through multiplexing model
Method1 Method2 Method1 Method2 Peer Layer Peer Authenticator Authenticator Layer EAP Layer EAP Layer EAP Layer GEE Layer GEE Layer Lower Layer Lower Layer AAA/IP AAA/IP Authentication Server EAP Peer Authenticator

8 Next steps This work is NOT within the EAP WG scope
Plan is to seek input from the EAP WG Submit as an individual I-D to the IESG for review


Download ppt "EAP-GEE Lakshminath Dondeti Vidya Narayanan"

Similar presentations


Ads by Google