aaa based keying for wireless handovers problem statement
play

AAA based Keying for Wireless Handovers: Problem Statement - PowerPoint PPT Presentation

AAA based Keying for Wireless Handovers: Problem Statement draft-nakhjiri-aaa-hokey-ps-03 Madjid Nakhjiri (Huawei USA/Motorola Labs) Mohan Parthasarathy (Nokia) Julien Bournelle (GET/INT/FT) Hannes Tschofenig (Siemens) R. Marin Lopez (TARI)


  1. AAA based Keying for Wireless Handovers: Problem Statement draft-nakhjiri-aaa-hokey-ps-03 Madjid Nakhjiri (Huawei USA/Motorola Labs) Mohan Parthasarathy (Nokia) Julien Bournelle (GET/INT/FT) Hannes Tschofenig (Siemens) R. Marin Lopez (TARI) IETF 67 San Diego Nov 2006 1

  2. Slide from IETF 65: EAP Keying for fixed peers Holds Peer credential EAP/AAA peer Authenticator server Generation of EAP-XXX Method Authentication Generation of MSK, EMSK, MSK, EMSK, EAP over L2 EAP over AAA EAP MSK transport EAP complete complete Security Association Protocol (TSKs) Transported MSK Generation of Generation TSKs of TSKs Use TSKs for link security Nov 2006 2

  3. Mobility Old Access link (Old SA) MSK1 MN Auth-1/AN1 New link (new SA) MSK2 Auth2/AN2 EAP/AAA server • Secure Access link: MN-AN SA • Access link Handover: create MN-AN2 SA • If Authenticator=AN: – MSK goes to AN1 – MN-AN2 SA: requires new MSK at AN2? • Run EAP again?? Handover performance suffers • Don ’ t send MSK to Authenticator, • Extend key hierarchy, create a per-authenticator key derived from previous EAP Nov 2006 3

  4. Session Longevity Access link established MSK MN Auth EAP/AAA server • Secure session established: previous lengthy EAP-XXX • Session and keys about to expire • Run EAP-XXX again? • No, perform a “ fast re-authentication ” – Use state/keys from previous EAP – Design specific signaling for re-authentication Nov 2006 4

  5. Network Management scalability Wireless Access Network Architecture/CAPWAP Access Gateway Access link MN Access Gateway AAA server Access Node • Access Nodes (WiMAX: BS, CAPWAP/802.11: WTP/AP) – providing access links (wireless termination) – Lightweight/ less security-AAA functions/ less need for upgrades • Access Gateways (WiMAX: ASN-GW, CAPWAP AC) – Management functions, backend communications – More trusted, AAA server interaction – Manages mobility across ANs (handovers) without interaction with AAA server – Typically manages one access technology. Nov 2006 5

  6. EAP authenticator split to Manage scalability and AN-handover performance Authenticator TSK PMK MN EAP. AAA server MSK AG AG ANs • Splitting the EAP authenticator into 2 solves the intra-authenticator handover performance problem (SDOs) 1. ASN_GW, R0KH, AC: – holds key from AAA server, creates per AN keys: 2. AN, WTP, Auth port – receives Per AN keys, creates SA with peer (MN) • It does not solve Inter-authenticator problem • Authenticator a logical function, AN/AG physical entities (channel binding) • Solutions varies between SDOs: media-independent handover difficult Nov 2006 6

  7. Goals and Requirements Authentication Of Prevention of Channel binding All parties Media Independence domino effect, Key scope Fresh keys, key life times Delay performance Security Requirements Mobility Requirements Session longevity Network Mgmt (re-auth) EAP based Scalability Key distribution Key Hierarchy Mobility Protocol design (handovers) Key Mgmt Reduce AAA Design Goals specifications roundtrips Consistent terminology Tools/ideas Nov 2006 7

  8. Problem statement/ To Dos • Create consistent terminology • Specify security, mobility, management goals • Decide levels of key hierarchy – Map hierarchy levels to key holders – Define key derivation function and parameters – Define messaging to exchange the parameters – Define key management rules • How far down the key hierarchy can IETF go? • Do the needed protocols exist? Nov 2006 8

  9. New Terminology/ Concepts • Handover Root Key (HRK) – Used as the root of key hierarchy for handover (and re-auth) – AAA server is HRK holder – HRK is used to create per-ADC keys (ADMSKs) • Access Domain Controller (ADC) – Top level key holder in an access domain (holds ADMSK) – Responsible for keying needs within an Access Domain (reduce the need to AAA interactions). – 802.11r calls this Mobility domain controller (MDC): • MDC or ADC? Nov 2006 9

  10. Access Domain controllers Access domain 1 TSK MN EAP. AAA server ADMSK1 ADC ADC ADMSK2 HRK ANs Access domain 2 • ADC is a key holder and a AAA client – It can be the authenticator, but does not have to be – ADC is a AAA client (it receives ADMSK from AAA server) – Both authenticator-split and flat architectures can be supported. – ADC provisions the access domain ANs with keys – Access domain can be mapped to an access technology region, if needed Nov 2006 10

  11. Tough problems • Terminology, Terminology, terminology • What key to use to derive handover root key? – MSK or as USRK from EMSK? (created at EAP server?) • Compatibility with other SDOs? Backward compatibility? • Architecture: – ADC part of the authenticator? Positioning ADC vs Authenticator? – Access technology mapping – To accomodate physically separate ADC and AN? • Channel binding/ key derivation parameters/ Messaging – ADC and AN collocated (EAP keying) or not (SDO) • Messaging – Exchange parameters for key derivation (e.g. ADC-ID) • Channel binding – EAP keying item: ADC and AN are both part of Authenticator – Handover keying with deeper hierarchy? Nov 2006 11

  12. Problem: IETF scope? LSAP-MK should be defined in Info RFCs, IMHO • Intra ADC handover: Key management and key derivation inside same ADC (Is this within IETF scope? Info RFCs?) • Inter ADC handover: Key Management and key derivation through different ADCs but same AAA, without running EAP again. AN1 ADC1 LSAP LSAP-MK1 MN AAA ADMSK-1 server Intra-ADC HO LSAP-MK2 AD1 Inter-ADC HO HRK AN2 ADMSK-2 ADC2 LSAP-MK3 AN3 AD2 Nov 2006 12

  13. Positioning of EAP authenticator wrt ADC (alternative 1) AAA server ADMSK1 AD2 AD1 LSAP-MK ADC1/ ADC2 Authenticator Key Holder 1 AN1: port1 AN3 AN2 LSK EAP signaling MN Non-EAP signaling Channel binding issues Nov 2006 13

  14. Positioning of EAP authenticator wrt ADC (alternative 1) AAA server EAP signaling AD2 AD1 ADMSK1 ADC2 Authenticator ADC1/ LSAP-MK Key Holder 1 AN3 AN1 AN2 LSK MN Nov 2006 14

  15. Backup:Related charter deliverables • Re-authentication (including handover) and key management problem statement – Security and performance goals. • Choice of MSK or EMSK in HRK (not a deliverable, but important) • Handover Root Key (HRK) and key hierarchy derivation and management specification • Handover/re-authentication protocol specification • Key distribution protocol specifications Nov 2006 15

  16. Backup: Why ADC instead of Authenticator • Allows for easier management of heterogeneous roaming/ handovers (e.g. per-domain technology) – Combine key mgmt with mobility mgmt • Handover root key transport/caching behavior – HRK (e.g. MSK) is kept at AAA server, not sent to authenticator – A per ADC master keys (ADMSK) are sent to ADC • Separation of EAP auth. and handover keying signaling – Key mgmt and mobility mgmt can be inside an ADC, independent of entity that acts as pass-thru Auth, – Pass-thru auth either in AN or ADC • More crisp key usage guidelines – Authenticator master key<->Authenticator port master key? – Use ADC master key (ADMSK) and AN master key (LSAP_MK) instead Nov 2006 16

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend