Authors: Hannes Tschofenig Henning Schulzrinne Maarten Buechli

Slides:



Advertisements
Similar presentations
MONET Problem Scope and Requirements draft-kniveton-monet-requirements-00 T.J. Kniveton Alper Yegin IETF March 2002.
Advertisements

2 Introduction A central issue in supporting interoperability is achieving type compatibility. Type compatibility allows (a) entities developed by various.
Oct 15 th, 2009 OGF 27, Infrastructure Area: Status of FVGA-WG Status of Firewall Virtualization for Grid Applications - Working Group
L. Alchaal & al. Page Offering a Multicast Delivery Service in a Programmable Secure IP VPN Environment Lina ALCHAAL Netcelo S.A., Echirolles INRIA.
1Nokia Siemens Networks Presentation / Author / Date University of Twente On the Security of the Mobile IP Protocol Family Ulrike Meyer and Hannes Tschofenig.
1 Network Architecture and Design Advanced Issues in Internet Protocol (IP) IPv4 Network Address Translation (NAT) IPV6 IP Security (IPsec) Mobile IP IP.
1 © NOKIA NSIS MIPv6 FW/ November 8 th 2004 Mobile IPv6 - NSIS Interaction for Firewall traversal draft-thiruvengadam-nsis-mip6-fw-01 S. Thiruvengadam.
Telematics group University of Göttingen, Germany Overhead and Performance Study of the General Internet Signaling Transport (GIST) Protocol Xiaoming.
1 IETF 64th meeting, Vancouver, Canada Design Options of NSIS Diagnostics NSLP Xiaoming Fu Ingo Juchem Christian Dickmann Hannes Tschofenig.
Interdomain and end-to- end QoS issues Henning Schulzrinne Columbia University NSF QoS workshop – April 2002.
July 2008IETF 72 - NSIS1 Permission-Based Sending (PBS) NSLP: Network Traffic Authorization draft-hong-nsis-pbs-nslp-01 Se Gi Hong & Henning Schulzrinne.
Internet Telephony Helen J. Wang Network Reading Group, Jan 27, 99 Acknowledgement: Jimmy, Bhaskar.
Carrying Location Objects in RADIUS Hannes Tschofenig, Farid Adrangi, Avi Lior, Mark Jones.
Internet/Intranet firewall security – policy, architecture and transaction services Written by Ray Hunt This presentation will Examines Policies that influence.
Omniran PtP Links across IEEE 802 Bridged Infrastructure Date: Authors: NameAffiliationPhone Max
Ernst Langmantel Technical Director, Austrian Regulatory Authority for Broadcasting and Telecommunication (RTR GmbH) The opinions expressed in this presentation.
Differences between In- and Outbound Internet Backbone Traffic Wolfgang John and Sven Tafvelin Dept. of Computer Science and Engineering Chalmers University.
ACE BOF, IETF-89 London Authentication and Authorization for Constrained Environments (ACE) BOF Wed 09:00-11:30, Balmoral BOF Chairs: Kepeng Li, Hannes.
NSIS Authentication, Authorization and Accounting Issues (draft-tschofenig-nsis-aaa-issues-00.txt) Authors: Hannes Tschofenig Henning Schulzrinne Maarten.
© 2006 Cisco Systems, Inc. All rights reserved. 3.3: Selecting an Appropriate QoS Policy Model.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 3: Introduction to IP QoS.
Draft-campbell-dime-load- considerations-01 IETF 92 DIME Working Group Meeting Dallas, Texas.
Architectural Considerations for GEOPRIV/ECRIT Presentation given by Hannes Tschofenig.
NSIS Path-coupled Signaling for NAT/Firewall Traversal Martin Stiemerling, Miquel Martin (NEC) Hannes Tschofenig (Siemens AG) Cedric Aoun (Nortel)
Secure Systems Research Group - FAU Classifying security patterns E.B.Fernandez, H. Washizaki, N. Yoshioka, A. Kubo.
Group Communications at Concordia J. William Atwood High Speed Protocols Laboratory Concordia University Montreal, Quebec, Canada.
3Com Confidential Proprietary 3G CDMA AAA Function Yingchun Xu 3COM.
GEOPRIV Layer 7 Location Configuration Protocol; Problem Statement and Requirements draft-tschofenig-geopriv-l7-lcp-ps-00.txt Hannes Tschofenig, Henning.
QoS NSLP draft-ietf-nsis-qos-nslp-06.txt Slides: Sven van den Bosch, Georgios Karagiannis, Andrew McDonald.
0 NAT/Firewall NSLP Activities IETF 60th - August 2nd 2004 Cedric Aoun, Martin Stiemerling, Hannes Tschofenig.
AAA and Mobile IPv6 Franck Le AAA WG - IETF55. Why Diameter support for Mobile IPv6? Mobile IPv6 is a routing protocol and does not deal with issues related.
Carrying Location Objects in RADIUS Hannes Tschofenig, Farid Adrangi, Avi Lior, Mark Jones.
OGF DMNR BoF Dynamic Management of Network Resources Documents available at: Guy Roberts, John Vollbrecht.
ACHIEVING MULTIMEDIA QOS OVER HYBRID IP/PSTN INFRASTRUCTURES QOS Signalling and Media Gateway Control ITU-T SG13/SG16 Workshop on IP Networking and Mediacom.
Privacy Considerations for Internet Protocols Alissa Cooper 1.
An NSLP for Quality of Service draft-buchli-nsis-nslp-00.txt draft-mcdonald-nsis-qos-nslp-00.txt draft-westberg-proposal-for-rsvpv2-nslp-00.txt Slides:
MIPSHOP – November, 2005 Event Services and Command Services for Media Independent Handover Presentation prepared by: Srini Sreemanthula Presented by:
1 Protecting Network Quality of Service against Denial of Service Attacks Douglas S. Reeves S. Felix Wu Chandru Sargor N. C. State University / MCNC October.
Implications of Trust Relationships for NSIS Signaling (draft-tschofenig-nsis-casp-midcom.txt) Authors: Hannes Tschofenig Henning Schulzrinne.
CSCI 465 D ata Communications and Networks Lecture 24 Martin van Bommel CSCI 465 Data Communications & Networks 1.
Extended QoS Authorization for the QoS NSLP Hannes Tschofenig, Joachim Kross.
NSIS QoS NSLP Authorzation Issues Hannes Tschofenig.
Security Hannes Tschofenig. Goal for this Meeting Use the next 2 hours to determine what the security consideration section of the OAuth draft(s) should.
NSIS NAT/Firewall Signaling NSIS Interim Meeting Romsey/UK, June 2004 Martin Stiemerling, Hannes Tschofenig, Cedric Aoun.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
NSLP for Quality of Service Sven van den Bosch (ed) Georgios Karagiannis Andrew McDonald (et al.) draft-ietf-nsis-qos-nslp-02.txt Slides:
1 NSIS: A New Extensible IP Signaling Protocol Suite Myungchul Kim Tel:
Some basics of a AAA Control model
VoIP ALLPPT.com _ Free PowerPoint Templates, Diagrams and Charts.
End-to-End VoMPLS Header Compression (draft-ash-e2e-vompls-hdr-compress-00.txt) End-to-End VoIP Header Compression Using cRTP (draft-ash-e2e-crtp-hdr-compress-00.txt)
Inter domain signaling protocol
NSLP for Quality of Service
Zueyong Zhu† and J. William Atwood‡
NDN (Named Data Networking)
Carrying Location Objects in RADIUS
P2P Streaming for Mobile Nodes: Scenarios and Related Issues
In-network Support for VoIP and Multimedia Applications
Goals of soBGP Verify the origin of advertisements
EA C451 Vishal Gupta.
Report about the Design Team on "Diameter Routing" ietf
MLEF Without Capacity Admission Does Not Satisfy MLPP Requirements
Taxonomy of network applications
Hannes Tschofenig Henning Schulzrinne M. Shanmugam
Securing the CASP Protocol
Taxonomy of real time applications
NSIS Operation Over IP Tunnels draft-shen-nsis-tunnel-01.txt
RNAP: A Resource Negotiation and Pricing Protocol
Hannes Tschofenig Henning Schulzrinne
CIS679: Two Planes and Int-Serv Model
EE 122: Lecture 22 (Overlay Networks)
Presentation transcript:

NSIS Authentication, Authorization and Accounting Issues (draft-tschofenig-nsis-aaa-issues-00.txt) Authors: Hannes Tschofenig Henning Schulzrinne Maarten Buechli Sven Van den Bosch

Draft Scope This draft is: A first attempt to describe AAA issues relevant for NSIS. It points to the importance of authorization/charging for QoS signaling. The draft is not: A summary of mathematical pricing models A new protocol proposal A motivation for a certain architecture

Authorization = ability to charge someone1 Introduction At the last IETF Steve Bellovin talked about security issues in NSIS. He pointed to the importance of authorization for an NSIS protocol. An interesting aspect of authorization for QoS signaling is: Authorization = ability to charge someone1 1 There are other authorization issues (e.g. session ownership).

Introduction (cont.) Authorization has an implication on the security architecture. We looked at two possible models: New Jersey Turnpike Model New Jersey Parkway Model

New Jersey Turnpike Model Network A Network B Network C Data Sender Data Receiver Node B Node A Peering relationship is used to provide charging between neighboring networks Similar to edge pricing proposed by Schenker et. al.

NJ Turnpike Model Issues Establishment of the financial settlement between end host (data sender favorable) and access network based on network access procedure (not per-session based) Simple (if data sender is charged for the reservation) More difficult: receiver-initiated signaling and charging for data receiver Unfortunately it is possible to fully avoid reverse charging (e.g. #800 numbers).

New Jersey Parkway Model Network A Network B Network C Direct AAA relationship to intermediate networks Data Sender Data Receiver Node B Node A Financial settlement has to be provided on a per-session basis More complex: financial settlement to intermediate networks required (authentication alone is insufficient)

NJ Parkway Model Issues Trusted third party might be required such as a clearing house since intermediate networks have no direct relationship to end host Financial settlement has to be provided on a per-session basis  scalability and deployment problem More flexible signaling protocol functionality required: A route change might require interaction with end host. Signaling protocol might support the possibility for intermediate networks to interact with the end host Aggregation in the core network might be difficult to use if per-session information is required for charging.

Who is charged for what? Basic question: Charging for data sender or data receiver Sender- vs. receiver oriented signaling adds some issues but is not the source of the problem. What is the problem? Per-session based establishment of financial settlement Example: Sender-initiated reservation with charging for data receiver (see next slide)

Sender-initiated reservation with charging for data receiver Network A Network B Network C RESV RESV RESV RESV “Authorization Information” Data Sender Data Receiver Node B Node A Node A indicates that some other entity is paying for the reservation. Why should Network A authorize the reservation request?

Not enough problems already? Price Distribution Price for a QoS reservation:  Price cannot be deferred from the destination IP address alone (unlike telephone numbers)  Price distribution required (can be in-band, out-of-band or a combination of both)  Price depends on the route (number of traversed networks)  Price is directional (due to cost and route asymmetry) An end user wants to know the price before issuing a reservation request.

Price distribution Building Blocks A resource negotiation and pricing protocol (RNAP) An embedded charging approach for RSVP Border Pricing Protocol (BPP) Billing Information Protocol (BIP) Tariff Distribution Protocol (TDP) Internet Open Trading Protocol (IOTP) Open Settlement Protocol (OSP) Not surprising: Many of these protocols require the same properties as a QoS signaling protocol.

Conclusion Peer-to-peer security is fine for a simple charging model (NJ Turnpike). Authorization issues needs additional security protection. Charging is not only an end-to-end (application) issue. The network needs some information. Some authorization/charging objects have to be included into a NSIS protocol. An NSIS protocol needs to be flexible. (e.g. support for several roundtrips).