ERP for IKEv2 draft-nir-ipsecme-erx-01. Why ERP for IKEv2? RFC 5296 and the bis document define a quick re- authentication protocol for EAP. ERP requires.

Slides:



Advertisements
Similar presentations
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 4: Configuring Site to Site VPN with Pre-shared keys.
Advertisements

Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London.
1Nokia Siemens Networks Presentation / Author / Date University of Twente On the Security of the Mobile IP Protocol Family Ulrike Meyer and Hannes Tschofenig.
User-Level Authentication in IPsec Scott Kelly IPsec Remote Access Working Group 47th IETF.
What is EAP EAP stands for Extensible Authentication Protocol. Offers a basic framework for authentication. Many different authentication protocols can.
IKEv2 Configuration Payload Integration
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
© 2004 SafeNet, Inc. All rights reserved. Mobike Protocol Design draft-kivinen-mobike-design-00.txt Tero Kivinen
Overview of the Mobile IPv6 Bootstrapping Problem James Kempf DoCoMo Labs USA Thursday March 10, 2005.
Agenda Introduction Network Access Protection platform architecture
Bootstrapping MIP6 Using DNS and IKEv2 (BMIP) James Kempf Samita Chakrarabarti Erik Nordmark draft-chakrabarti-mip6-bmip-01.txt Monday March 7, 2005.
Ubiquitous Access Control Workshop 1 7/17/06 Access Control and Authentication for Converged Networks Z. Judy Fu John Strassner Motorola Labs {judy.fu,
Carrying Location Objects in RADIUS Hannes Tschofenig, Farid Adrangi, Avi Lior, Mark Jones.
Chapter 18 RADIUS. RADIUS  Remote Authentication Dial-In User Service  Protocol used for communication between NAS and AAA server  Supports authentication,
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 20 RADIUS and Internet Authentication Service.
Session Policy Framework using EAP draft-mccann-session-policy-framework-using-eap-00.doc IETF 76 – Hiroshima Stephen McCann, Mike Montemurro.
Chapter 6 Configuring, Monitoring & Troubleshooting IPsec
Network Security1 – Chapter 5 (B) – Using IEEE 802.1x Purpose: (a) port authentication (b) access control An IEEE standard
March 7, 2005MOBIKE WG, IETF 621 Mobility Protocol Options for IKEv2 (MOPO-IKE) Pasi Eronen.
Copyright Kenneth M. Chipps Ph.D. PPP Last Update
70-411: Administering Windows Server 2012
Softwire Security Requirement draft-ietf-softwire-security-requirements-03.txt Softwires WG IETF#69, Chicago 25 th July 2007 Shu Yamamoto Carl Williams.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
RFC5296BIS CHANGES PROPOSAL Sebastien Decugis. Presentation outline  Quick reminder on ERP (RFC5296)  2 change proposals  Problem description  Solution.
DIME Rechartering Hannes Tschofenig & Dave Frascone.
Hokey IETF 81 Quebec1 EAP Extensions for EAP Re- authentication Protocol draft-ietf-hokey-rfc5296bis-04 Qin Wu Zhen Cao Yang Shi Baohong He.
Authentication Mechanism for Port Control Protocol (PCP) draft-wasserman-pcp-authentication-01.txt Margaret Wasserman Sam Hartman Painless Security Dacheng.
July 16, Diameter EAP Application (draft-ietf-aaa-eap-02.txt) on behalf of...
strongSwan Workshop for Siemens
後卓越計畫 進度報告 楊舜仁老師實驗室 GPP-WLAN Interworking (collaboration with ICL/ITRI)
EAP Authentication for SIP & HTTP V. Torvinen (Ericsson), J. Arkko (Ericsson), A. Niemi (Nokia),
1 RADIUS Mobile IPv6 Support draft-ietf-mip6-radius-01.txt Kuntal Chowdhury Avi Lior Hannes Tschofenig.
1 IETF 78: NETEXT Working Group IPSec/IKEv2 Access Link Support in Proxy Mobile IPv6 IPSec/IKEv2-based Access Link Support in Proxy Mobile IPv6 Sri Gundavelli.
EAP Extensions for EAP Re- authentication Protocol (ERP) draft-wu-hokey-rfc5296bis-01 Yang Shi Qin Wu Zhen Cao
Carrying Location Objects in RADIUS Hannes Tschofenig, Farid Adrangi, Avi Lior, Mark Jones.
EAP Extensions for EAP Early Authentication Protocol (EEP) Hao Wang, Yang Shi, Tina Tsou.
Extending ISA/IAG beyond the limit. AGAT Security suite - introduction AGAT Security suite is a set of unique components that allow extending ISA / IAG.
Draft-ietf-dime-ikev2-psk-diameter-0draft-ietf-dime-ikev2-psk-diameter-08 draft-ietf-dime-ikev2-psk-diameter-09 in progress Diameter IKEv2 PSK: Pre-Shared.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
EAP Extensions for EAP Re- authentication Protocol (ERP) draft-wu-hokey-rfc5296bis-01 Glen Zorn Qin Wu Zhen Cao.
ERP/AAK support for Inter-AAA realm handover discussion Hao Wang, Tina Tsou, Richard.
1 HRPD Roamer Authentication Zhibi Wang, Sarvar Patel, Simon Mizikovsky, Nancy Lee.
Mobile IPv6 with IKEv2 and revised IPsec architecture IETF 61
Washinton D.C., November 2004 IETF 61 st – mip6 WG MIPv6 authorization and configuration based on EAP (draft-giaretta-mip6-authorization-eap-02) Gerardo.
IETF #65 Network Discovery and Selection Problem draft-ietf-eap-netsel-problem-04 Farooq Bari Jouni Korhonen.
1 Remote IP Access - Stage 2 Architecture proposal for adoption Peerapol Tinnakornsrisuphap Anand.
Paris, August 2005 IETF 63 rd – mip6 WG Mobile IPv6 bootstrapping in split scenario (draft-ietf-mip6-bootstrapping-split-00) mip6-boot-sol DT Gerardo Giaretta,
MIP6 RADIUS IETF-72 Update draft-ietf-mip6-radius-05.txt A. LiorBridgewater Systems K. ChowdhuryStarent Networks H. Tschofenig Nokia Siemens Networks.
Securing Access to Data Using IPsec Josh Jones Cosc352.
21-07-xxxx IEEE MEDIA INDEPENDENT HANDOVER DCN: xxxx Title: MIH security issues Date Submitted: July, 02, 2007 Presented at.
WLAN IW Enhancement for Multiple Authentications Support QUALCOMM Inc.: Raymond Hsu, QUALCOMM Inc.: Masa Shirota,
Port Based Network Access Control
Thoughts on Bootstrapping Mobility Securely Chairs, with help from James Kempf, Jari Arkko MIP6 WG/BOF 57 th IETF Vienna Wed. July 16, 2003.
CAPWAP Threat Analysis
Informing AAA about what lower layer protocol is carrying EAP
Open issues with PANA Protocol
PANA Discussion and Open Issues (draft-ietf-pana-pana-01.txt)
Hokey Architecture Deployment and Implementation
Carrying Location Objects in RADIUS
IEEE MEDIA INDEPENDENT HANDOVER DCN: xxxx
ERP extension for EAP Early-authentication Protocol (EEP)
IKEv2 Mobility and Multihoming Protocol (MOBIKE)
Network Selection Issues
ERP/AAK support for Inter-AAA realm handover discussion
– Chapter 5 (B) – Using IEEE 802.1x
Charles Clancy Katrin Hoeper IETF 73 Minneapolis, USA 17 November 2008
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
Tero Kivinen, AuthenTec
Tero Kivinen, AuthenTec
Qin Wu Zhen Cao Yang Shi Baohong He
Presentation transcript:

ERP for IKEv2 draft-nir-ipsecme-erx-01

Why ERP for IKEv2? RFC 5296 and the bis document define a quick re- authentication protocol for EAP. ERP requires fewer round-trips, so it’s faster. ERP can be automatic – does not require user interaction. Having ERP allows a smooth transition between local networks such as 802.1x to remote access networking, such as with IKEv2. This is especially desirable in mobile devices. However, IKEv2 (RFC 5996) is not suited for ERP, hence the need for an extension. As section 1 of RFC 5296-bis says: Specifically, the IEEE802.1x specification must be revised and RFC 5996 must be updated to carry ERP messages.

ERP in the IKEv2 protocol Adding ERP was pretty straightforward. Here’s IKE_AUTH: first request --> IDi, SA, TSi, TSr, first response <-- IDr, [CERT+], AUTH, EAP, / --> EAP repeat 1..N times | \ <-- EAP last request --> AUTH last response <-- AUTH, SA, TSi, TSr,

ERP in the IKEv2 protocol Adding ERP was pretty straightforward. Here’s IKE_AUTH with ERP: first request --> EAP(EAP_Initiate/Re-auth), SA, TSi, TSr, first response <-- IDr, [CERT+], AUTH, EAP(EAP-Finish/Re-auth), last request --> AUTH last response <-- AUTH, SA, TSi, TSr,

ERP in IKEv2 Protocol So what’s added? An “ERP supported” notification in the IKE_SA_INIT response. This replaces the Re-auth-Start message, and may contain the domain name. ERP in the first IKE_AUTH exchange. Update RFC 5996 to allow ERP codes. The domain name is passed in the clear. Probably OK.

Open Issues

Local ER Server for IKEv2? RFC 5296 specifies a method-independent re-authentication protocol applicable to two specific deployment scenarios: where the peer’s home EAP server also performs re- authentication; and Where a local re-authentication server exists but is collocated with a AAA proxy within the domain. We’re not convinced that there is a use case for IKE with anything but the first scenario. Although remote-access IKE is a form of network attachment, it works over the Internet, not the local network, so the home attachment point is reachable This is very different from 802.1x or PPP.

Local ER Server for IKEv2? We’re looking for feedback. Is there a use-case for performing IKE with a local as opposed to a home server? Yes, I should be asking the IPSECME group, but they’re not meeting this week. Not too big on responding to the mailing list either… If the answer is no, then the open issue in the next slide probably becomes moot as well.

User Name in ERP? IPSec as defined in RFC 4301 defines a very granular policy related to identities. One user may be allowed to send and receive traffic matching a certain traffic selector, while another may not. With regular EAP the user is identified by either a username or an RFC-822 formatted NAI. With ERP the only identifier is the keyName-NAI TLV that looks like The username part of this NAI is a hexadecimal representation of the EMSKname, which is an ephemeral value. A local ERP server which did not perform the original authentication cannot map this to a user name, and consequently cannot map authorizations.

User Name in ERP? In the first deployment scenario there’s no problem. The ERP server is the same that made the full authentication. It is able to map the ephemeral EMSKname to real username. It can pass the real user name in the AccessAccept message it sends to the VPN gateway. The VPN gateway can then make authorization decisions based on policy. But what do we do if they ERP servers are not the same?

Questions? Answers?