RFC5296BIS CHANGES PROPOSAL Sebastien Decugis. Presentation outline  Quick reminder on ERP (RFC5296)  2 change proposals  Problem description  Solution.

Slides:



Advertisements
Similar presentations
xxx IEEE MEDIA INDEPENDENT HANDOVER DCN: xxx Title: Proposal for adding a key hierarchy based approach in the security.
Advertisements

Doc.: IEEE /1160 Submission NameAffiliationsAddressPhone George CherianQualcomm 5775 Morehouse Dr, San Diego, CA, USA
1Nokia Siemens Networks Presentation / Author / Date University of Twente On the Security of the Mobile IP Protocol Family Ulrike Meyer and Hannes Tschofenig.
SIP issues with S/MIME and CMS Rohan Mahy SIP, SIPPING co-chair.
Carrying Location Objects in RADIUS Hannes Tschofenig, Farid Adrangi, Avi Lior, Mark Jones.
ERP for IKEv2 draft-nir-ipsecme-erx-01. Why ERP for IKEv2? RFC 5296 and the bis document define a quick re- authentication protocol for EAP. ERP requires.
1 IEEE MEDIA INDEPENDENT HANDOVER DCN: sec Title: ERP proposal Date Submitted: October 11, 2011 Authors or Source(s): Fernando Bernal-Hidalgo,
Session Policy Framework using EAP draft-mccann-session-policy-framework-using-eap-00.doc IETF 76 – Hiroshima Stephen McCann, Mike Montemurro.
Location Hiding: Problem Statement, Requirements, (and Solutions?) Richard Barnes IETF 71, Philadelphia, PA, USA.
Lecture 3a Mobile IP 1. Outline How to support Internet mobility? – by Mobile IP. Our discussion will be based on IPv4 (the current version). 2.
xxx IEEE MEDIA INDEPENDENT HANDOVER DCN: xxx Title: Proposal for adding a key hierarchy based approach in the security.
1 © NOKIA Web Service Reliability NOKIA. 2 © NOKIA Content What is reliability ? Guaranteed Delivery Duplicate Elimination Ordering Crash tolerance State.
EAP WG EAP Key Management Framework Draft-ietf-eap-keying-03.txt Bernard Aboba Microsoft.
Hokey IETF 81 Quebec1 EAP Extensions for EAP Re- authentication Protocol draft-ietf-hokey-rfc5296bis-04 Qin Wu Zhen Cao Yang Shi Baohong He.
Authentication Mechanism for Port Control Protocol (PCP) draft-wasserman-pcp-authentication-01.txt Margaret Wasserman Sam Hartman Painless Security Dacheng.
sec1 IEEE MEDIA INDEPENDENT HANDOVER DCN: sec Title: TGa_Proposal_Antonio_Izquierdo (Protecting the Information Service.
CP-a Emergency call stage 2 requirements - A presentation of the requirements from 3GPP TS Keith Drage.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
All Rights Reserved © Alcatel-Lucent 2007, ##### 1 | Presentation Title | January 2007 UMB Security Evolution Proposal Abstract: This contribution proposes.
EAP Extensions for EAP Re- authentication Protocol (ERP) draft-wu-hokey-rfc5296bis-01 Yang Shi Qin Wu Zhen Cao
EAP Extensions for EAP Early Authentication Protocol (EEP) Hao Wang, Yang Shi, Tina Tsou.
1 IEEE MEDIA INDEPENDENT HANDOVER DCN: sec Title: Detailed analysis on MIA/MSA architecture Date Submitted: January 5, 2010 Present.
1 Lecture 9: Cryptographic Authentication objectives and classification one-way –secret key –public key mutual –secret key –public key establishing session.
NFD Tunnel Authentication Junxiao Shi,
EAP-PSK v8 IETF 63 – Paris, France August EAP-PSK: an independent submission to IESG Requested EAP method type number allocation Reviewed June 2005.
August 2, 2005draft-vidya-mipshop-fast-handover-aaa-00 Handover Keys using AAA (draft-vidya-mipshop-fast-handover-aaa-00.txt) Vidya Narayanan Narayanan.
SIP working group IETF#70 Essential corrections Keith Drage.
ICOS BOF EAP Applicability Bernard Aboba IETF 62, Minneapolis, MN.
EAP Extensions for EAP Re- authentication Protocol (ERP) draft-wu-hokey-rfc5296bis-01 Glen Zorn Qin Wu Zhen Cao.
ERP/AAK support for Inter-AAA realm handover discussion Hao Wang, Tina Tsou, Richard.
1 HRPD Roamer Authentication Zhibi Wang, Sarvar Patel, Simon Mizikovsky, Nancy Lee.
Using SAML for SIP H. Tschofenig, J. Peterson, J. Polk, D. Sicker, M. Tegnander.
Distributed File Systems 11.2Process SaiRaj Bharath Yalamanchili.
Mobile IPv6 with IKEv2 and revised IPsec architecture IETF 61
Magnus Westerlund 1 The RTSP Core specification draft-ietf-mmusic-rfc2326bis-06.txt Magnus Westerlund Aravind Narasimhan Rob Lanphier Anup Rao Henning.
IETF66 DIME WG John Loughney, Hannes Tschofenig and Victor Fajardo 3588-bis: Current Issues.
Washinton D.C., November 2004 IETF 61 st – mip6 WG MIPv6 authorization and configuration based on EAP (draft-giaretta-mip6-authorization-eap-02) Gerardo.
Design Guidelines Thursday July 26, 2007 Bernard Aboba IETF 69 Chicago, IL.
Nov. 9, 2004IETF61 PANA WG PANA Specification Last Call Issues Yoshihiro Ohba, Alper Yegin, Basavaraj Patil, D. Forsberg, Hannes Tschofenig.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt RTSP draft-ietf-mmusic-rfc2396bis-10 Magnus Westerlund Co-auhtors: Henning Schulzrinne, Rob Lanphier,
NEMO Basic Support update IETF 61. Status IANA assignments done Very close to AUTH48 call Some issues raised recently We need to figure out if we want.
Diameter Group Signaling Thursday, August 02 nd, 2013 draft-ietf-diameter-group-signaling-01 Mark Jones, Marco Liebsch, Lionel Morand IETF 87 Berlin, Germany.
DIME WG IETF 84 Diameter Design Guidelines draft-ietf-dime-app-design-guide-15 Tuesday, July 31, 2012 Lionel Morand.
August 2, 2005IETF63 EAP WG AAA-Key Derivation with Lower-Layer Parameter Binding (draft-ohba-eap-aaakey-binding-01.txt) Yoshihiro Ohba (Toshiba) Mayumi.
Paris, August 2005 IETF 63 rd – mip6 WG Mobile IPv6 bootstrapping in split scenario (draft-ietf-mip6-bootstrapping-split-00) mip6-boot-sol DT Gerardo Giaretta,
Collecting Copyright Transfers and Disclosures via Editorial Manager™ -- Editorial Office Guide 2015.
1 IEEE MEDIA INDEPENDENT HANDOVER DCN: sec Title: ERP proposal Date Submitted: October 13, 2011 Authors or Source(s): Fernando Bernal-Hidalgo,
Doc.: IEEE /2179r0 Submission July 2007 Steve Emeott, MotorolaSlide 1 Summary of Updates to MSA Overview and MKD Functionality Text Date:
MQTT-255 Support alternate authenticaion mechanisms
Booting up on the Home Link
Open issues with PANA Protocol
PANA Issues and Resolutions
Hokey Architecture Deployment and Implementation
Katrin Hoeper Channel Bindings Katrin Hoeper
Carrying Location Objects in RADIUS
for IP Mobility Protocols
IEEE MEDIA INDEPENDENT HANDOVER DCN:
ERP extension for EAP Early-authentication Protocol (EEP)
Discussions on FILS Authentication
ERP/AAK support for Inter-AAA realm handover discussion
Charles Clancy Katrin Hoeper IETF 73 Minneapolis, USA 17 November 2008
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER
Agricultural Data Collection System
FTM Frame Exchange Authentication
Overview of Improvements to Key Holder Protocols
Overview of Improvements to Key Holder Protocols
Lecture 4a Mobile IP 1.
Qin Wu Zhen Cao Yang Shi Baohong He
Presentation transcript:

RFC5296BIS CHANGES PROPOSAL Sebastien Decugis

Presentation outline  Quick reminder on ERP (RFC5296)  2 change proposals  Problem description  Solution proposed  Discussion about these issues is welcome.

Some facts on ERP (RFC 5296)  ERP is initiated by the peer  (authenticator SHOULD help with LDN in E-I/R-A-S)  An ER server is available, somewhere  Safe to assume a local server when E-I/R-A-S is received.  Safe to assume a home server exists.  No E-I/R-A-S & in foreign domain: conf, or guess work   This ER server may or may not already have the rRK  (implicit bootstrapping or not, state lost after reboot, …)

Some facts on ERP, cont.  Peer sends the first EAP-Initiate, 2 possibilities:  With ‘B’ flag keyName-NAI = Auth tag signed by rIK derived from rRK.  Without ‘B’ flag keyName-NAI = Auth tag signed by DS-rIK derived from DS-rRK.  Clear difference when localdomain != homedomain  Otherwise, does not really matter.

First change, problem description  For the peer to choose ‘B’ or not ‘B’, it must know if the local ER server is bootstrapped. Otherwise:  If ‘B’ is used while local ER server is bootstrapped: Local ER server cannot verify the authentication tag Message is FW to home domain while not necessary Local ER server receives a duplicate of the same DS-rRK.  If ‘B’ is not used but local ER server not bootstrapped: Local ER server cannot verify the authentication tag, Cannot answer, And cannot forward to home domain because it is unknown.

First change, solution  The solution is as follow:  The peer always add enough data in E-I/R-A to allow a local ER server to request the DS-rRK from home domain if it does not have it.  The peer always attempts to use the local ER server, when it knows there is one.

First change, protocol impact  This is done with the following changes to ERP:  Deprecate the ‘B’ flag ‘bootstrapping’ message is not used anymore ‘B’ flag is redundant anyway with the keyName-NAI.  Always add the home domain name in a separate TLV.  And slightly change the behavior of the local ER server and home ER server, to request / provide DS-rRK as needed (even for non-`bootstrapping’ exchanges).

First change, additional comments  LDN problem: local domain name learned only via ERP protocol (E-I/R-A-S or E-F/R-A), or acquired by other mean but with explicit ERP usage indication, should be used.  Otherwise there is no guarantee that a local ER server exists, which results in an error of the protocol.  It should be safe to re-use last known LDN after a handover, when the LDN of new attachment point is not available, but it requires a few additional changes to the local ER server handling. (FFS)

Second change, problem description  RFC 5296 : “local ER server” & “home ER server”.  But:  Differences are not only location but also features.  Home ER server has to: 1. Authorize ER servers in other domains 2. Derive DS-rRK from the EMSK (locked in EAP server) 3. Validate authentication tag of ERP messages. 4. Create ERP answers and derive rMSK from rRK.  Local ER server needs only 3 & 4. And 5. Request a DS-rRK from the home domain.

Second change, solution  Use the terms “ER backend” and “ER proxy”  The ER backend has to be collocated with EAP server. It can access the EMSK It supports key derivation for all domains.  ER proxy is optional to deploy. It only operates its domain-specific keys.  These names describe better the functions performed by the logical entities involved in ERP.  It does not preclude on deployment / implementation.  (ex: ER backend can act as ER proxy for visiting peers)

Thank you -- Discussion time  Time for comments…  1 st proposed change make peer unaware of ER server state. remove the error-prone ‘bootstrapping’ exchange.  2 nd proposed change “home ER server”  “ER backend” “local ER server”  “ER proxy”