Session Policy Framework using EAP draft-mccann-session-policy-framework-using-eap-00.doc IETF 76 – Hiroshima Stephen McCann, Mike Montemurro.

Slides:



Advertisements
Similar presentations
Adapted Multimedia Internet KEYing (AMIKEY): An extension of Multimedia Internet KEYing (MIKEY) Methods for Generic LLN Environments draft-alexander-roll-mikey-lln-key-mgmt-01.txt.
Advertisements

Secure Mobile IP Communication
External User Security Model (EUSM) for SNMPv3 draft-kaushik-snmp-external-usm-00.txt November, 2004.
Packet Based Multimedia Communication Systems H.323 & Voice Over IP Outline 1. H.323 Components 2. H.323 Zone 3. Protocols specified by H Terminal.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
1 © NOKIA MitM.PPT/ 6/2/2015 / Kaisa Nyberg (NRC/MNW), N.Asokan (NRC/COM) The Insecurity of Tunnelled Authentication Protocols N. ASOKAN, VALTTERI NIEMI,
Session Initiation Protocol (SIP) By: Zhixin Chen.
8/2/ IETF, Pittsburgh Kutscher/Ott/Bormann SDPng Requirements draft-kutscher-mmusic-sdpng-req-00.txt Dirk Jörg
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
Chapter 5 Secure LAN Switching.  MAC Address Flooding Causing CAM Overflow and Subsequent DOS and Traffic Analysis Attacks.
Academic Advisor: Dr. Yuval Elovici Professional Advisor: Yuri Granovsky Team: Yuri Manusov Yevgeny Fishman Boris Umansky.
ABFAB Multihop Federations draft-mrw-abfab-multihop-fed-01.txt Margaret Wasserman
Session-based Security Model for SNMPv3 (SNMPv3/SBSM) David T. Perkins Wes Hardaker IETF November 12, 2003.
July 16, 2003AAA WG, IETF 571 AAA WG Meeting IETF 57 Vienna, Austria Wednesday, July 16,
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Light Weight Access Point Protocol (LWAPP) IETF 57 Pat Calhoun, Airespace.
Network Security1 – Chapter 5 (B) – Using IEEE 802.1x Purpose: (a) port authentication (b) access control An IEEE standard
Interworking Architecture Between 3GPP and WLAN Systems 張憲忠, 何建民, 黃瑞銘, 紀嘉雄, 李有傑.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. IEEE 802.1x An internet standard created to perform authentication services for remote access to a central LAN. An internet standard.
Eugene Chang EMU WG, IETF 70
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
03/09/2003Helsinki University of Technology1 Overview of Thesis Topic Presented By: Zhao Xuetao.
Session Initiation Protocol (SIP). What is SIP? An application-layer protocol A control (signaling) protocol.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
August 1, 2005IETF63 PANA WG Pre-authentication Support for PANA (draft-ohba-pana-preauth-00.txt) Yoshihiro Ohba
Shambhu Upadhyaya Security –Upper Layer Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 10)
Authentication Mechanism for Port Control Protocol (PCP) draft-wasserman-pcp-authentication-01.txt Margaret Wasserman Sam Hartman Painless Security Dacheng.
1 Motorola PMIPv4 Call Flows: Bearer Setup with Dual Anchoring Parviz YeganiVojislav VuceticAlmon Tang (408) (732) (847)
A Conference Gateway Supporting Interoperability Between SIP and H.323 Jiann-Min Ho (Presenter) Jia-Cheng Hu Information Networking Institute Peter Steenkiste.
Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication.
July 16, Diameter EAP Application (draft-ietf-aaa-eap-02.txt) on behalf of...
EAP Authentication for SIP & HTTP V. Torvinen (Ericsson), J. Arkko (Ericsson), A. Niemi (Nokia),
All Rights Reserved © Alcatel-Lucent 2007, ##### 1 | Presentation Title | January 2007 UMB Security Evolution Proposal Abstract: This contribution proposes.
EAP Extensions for EAP Re- authentication Protocol (ERP) draft-wu-hokey-rfc5296bis-01 Yang Shi Qin Wu Zhen Cao
Session Initiation Protocol (SIP) Chapter 5 speaker : Wenping Zhang data :
EAP-FAST Version 2 draft-zhou-emu-eap-fastv2-00.txt Hao Zhou Nancy Cam-Winget Joseph Salowey Stephen Hanna March 2011.
EAP Keying Framework Draft-aboba-pppext-key-problem-06.txt EAP WG IETF 56 San Francisco, CA Bernard Aboba.
ICOS BOF EAP Applicability Bernard Aboba IETF 62, Minneapolis, MN.
CSE5803 Advanced Internet Protocols and Applications (14) Introduction Developed in recent years, for low cost phone calls (long distance in particular).
Mar 20, 2005IETF65 PANA WG Requirements for PANA support of location based services draft-anjum-pana-location-requirements-00.txt F. Anjum D. Famolari.
1 HRPD Roamer Authentication Zhibi Wang, Sarvar Patel, Simon Mizikovsky, Nancy Lee.
IP Multicast Receiver Access Control draft-atwood-mboned-mrac-req draft-atwood-mboned-mrac-arch.
Washinton D.C., November 2004 IETF 61 st – mip6 WG MIPv6 authorization and configuration based on EAP (draft-giaretta-mip6-authorization-eap-02) Gerardo.
Diameter Overload DIME WG IETF 87 July, Starting Point DIAMETER_TOO_BUSY provides little guidance on what a Diameter client should do when it receives.
Diameter SIP Application
Extended QoS Authorization for the QoS NSLP Hannes Tschofenig, Joachim Kross.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
Partial Notifications IETF 56 SIMPLE WG draft-lonnfors-simple-presinfo-deliv-reqs-00 draft-lonnfors-simple-partial-notify-00 Mikko Lönnfors
User Application Control (Keypress Events) SIPPING WG - IETF 53 Robert Fairlie-Cuninghame, Bert Culpepper, Jean-François Mulé.
S Postgraduate Course in Radio Communications. Application Layer Mobility in WLAN Antti Keurulainen,
Introduction to Port-Based Network Access Control EAP, 802.1X, and RADIUS Anthony Critelli Introduction to Port-Based Network Access Control.
Doc.: IEEE /0122r0 Submission January 2012 Dorothy Stanley, Aruba NetworksSlide 1 IEEE IETF Liaison Report Date: Authors:
Port Based Network Access Control
MIPv4-Diameter Update Tom Hiller Lucent Technologies.
CLASSe PROJECT: IMPROVING SSO IN THE CLOUD Alejandro Pérez Rafael Marín Gabriel López
EAP Applicability IETF-86 Joe Salowey. Open Issues Open Issues with Retransmission and re- authentication Remove text about lack of differentiation in.
Richard EAP-WAI Authentication Protocol Stockholm, IETF 75th draft-richard-emu-wai-00.
MQTT-255 Support alternate authenticaion mechanisms
Informing AAA about what lower layer protocol is carrying EAP
Booting up on the Home Link
Hokey Architecture Deployment and Implementation
Carrying Location Objects in RADIUS
ERP extension for EAP Early-authentication Protocol (EEP)
Discussions on FILS Authentication
Charles Clancy Katrin Hoeper IETF 73 Minneapolis, USA 17 November 2008
3GPP and SIP-AAA requirements
Presentation transcript:

Session Policy Framework using EAP draft-mccann-session-policy-framework-using-eap-00.doc IETF 76 – Hiroshima Stephen McCann, Mike Montemurro

Overview Service providers may have policies that apply to the media types, codecs etc negotiated for SIP sessions. SIP WG has defined a session policy framework that defines a policy channel for mobile device to communicate with a policy server to obtain session policies during SIP session establishment and modification Currently uses SIP Event Notification mechanism (RFC 3265) to realise the policy channel SIP Event Notification mechanism is not appropriate for bandwidth constrained links. It is proposed to have an alternative realisation of the policy channel using a new EAP TLV. This could be also be used for other more general non SIP applications where clients need to obtain policies from a server using EAP.

Solution Perform initial EAP exchange. Store keying material from exchange, together with relevant state information. Re-use ERP Encapsulate the Session Policy Exchanges within a TLV (e.g. Policy Request & Info Answer). TLV is carried within ERP Determine media authorization information, at L2, in parallel to AAA authentication. Media authorization can be implemented more efficiently using EAP/ERP

Initialisation

(1) EAP Method Exchange (tunnel initialization) –An EAP exchange is performed between the mobile device and the initial network component (e.g. Packet Data Gateway) with the authentication messages being forwarded to the home network AAA server. A suitable EAP method is used to establish a tunnel (e.g. EAP-FAST), from which the relevant ERP key material is derived for subsequent use. (2) SIP registration with PCCh –Although not a part of the layer 2 exchange, it is worth showing that SIP registration between the mobile device and the PCCh (home PCC) occurs at this point. Subsequent SIP level flows are not shown.

Mobile Device Triggered

(3) EAP-Initiate/Re-auth-Start –An ERP exchange is performed between the mobile device and the INC (e.g. Packet Data Gateway) with the authentication messages being forwarded to the home AAA server. (4) ERP (Policy Request) –The policy request message is then transported within ERP (typically using a TLV) to the INC, and then forwarded (using Diameter) to the PCCh. (5) Policy-h –At the home AAA server, the home network policy is determined for subsequent SIP sessions. (6) AAA (Policy Request) –The home AAA server, then requests policy information from all visited networks PCCs, through which the SIP session will traverse, utilizing a AAA Policy Request message. (7) AAA (Policy Response) –Each visited PCC will then return its network policy back to the home network, where the session policy document is compiled. (8) ERP (Policy Response) –The session policy document is returned to the INC and is then encapsulated within ERP, before being returned to the mobile device.

Network Triggered

(9) AAA (Policy Change) –A visited PCC changes the session policy (most likely whilst the mobile device session is on-going) and indicates to the home network server that a policy change has occurred. (10) AAA (Policy Change Event) –The home network server, sends an Event message to the INC (most likely within Diameter) (11) EAP Initiate/Re-auth-Start –The INC then requests the mobile device to execute ERP. Message flow continues, as described in (4) and (8).

Future Work How exactly is the ERP payload carried in the network –Diameter? –Do these messages need to be encrypted? Can the EAP/ERP credentials be tied to the SIP session? Requirements on mobile device? –Password –Certificate –Username

Relevant Documents EAP –draft-mccann-session-policy-framework-using-eap-00 SIP –draft-ietf-sip-session-policy-framework-06 –draft-ietf-sipping-media-policy-dataset-07