Introduction to centralized Authentication, Authorization and Accounting (AAA) management for distributed IP networks
IETF 89 - Tutorials London, England March 2 - 7, 2014 Presented by: Lionel Morand Co-authored by: Alan Dekok
distributed IP networks IETF 89 - Tutorials London, England March - - PowerPoint PPT Presentation
Introduction to centralized Authentication, Authorization and Accounting (AAA) management for distributed IP networks IETF 89 - Tutorials London, England March 2 - 7, 2014 Presented by: Lionel Morand Co-authored by: Alan Dekok x Introduction
IETF 89 - Tutorials London, England March 2 - 7, 2014 Presented by: Lionel Morand Co-authored by: Alan Dekok
x Introduction
2
3
User AAA Client Access Controller Network Resource AAA Proxy/server AAA Server
AAA Protocols
4
– passwords – one-time token – digital certificates, – or any other information related to the identity (e.g. biometric parameters.)
5
– IP address filtering – IP address assignment – Route assignment – Encryption – QoS/differential services – Bandwidth control/traffic management.
6
– User Id (e.g. lionel@ietf89.com) – Service description – Data volume – Session duration, etc.
7
8
9
10
11
standardized by IETF.
– Still used in Unix environment for remote user authentication and router configuration
12
13
– developed in 1991 but first RFCized in 1997
– including modems, DSL, Wi-Fi access points, VPNs, network ports, web servers, etc.
Public Switched Telephone Network Internet
Modem Network Access Server RADIUS Server 14
15
– PAP (Password Authentication Protocol),
– CHAP (Challenge-handshake Authentication Protocol),
password and a random value received from the network
mechanism
authentication methods called EAP methods.
16
17
Public Switched Telephone Network Internet
Modem Network Access Server RADIUS Server 19
PSTN Internet
Modem Network Access Server RADIUS Server
RADIUS Access-Request
[ User-Name =login] [User-Password =encrypted password] [ NAS-Identifier ] [etc. ]
User Access Request (Login/Password) PPP
20
PSTN Internet
Modem Network Access Server RADIUS Server
RADIUS Access-Request
[ User-Name=login ] [ NAS-Identifier ] [etc. ]
User Access Request (Login) PPP
21
PSTN Internet
Modem Network Access Server RADIUS Server
Challenge PPP RADIUS Access-Challenge
[ Reply-Message ] 22
PSTN Internet
Modem Network Access Server RADIUS Server
New User Access Request (response) PPP RADIUS Access-Request
[ User-Name ] [CHAP-Password =Response] [ NAS-Identifier ] [ etc. ] 23
PSTN Internet
Modem Network Access Server RADIUS Server Local or external Database 24
PSTN Internet
Modem Network Access Server RADIUS Server
Access Request denied (reason) PPP RADIUS Access-Reject
[ Reply-Message ] 25
PSTN Internet
Modem Network Access Server RADIUS Server
RADIUS Access-Accept
[ Reply-Message ] [ Service-Type ] [ Framed-IP-Address ] [ Filter-Id ] [ etc. ] 26
PSTN Internet
Modem Network Access Server RADIUS Server
IP IP PPP Frames
27
PSTN Internet
Modem Network Access Server RADIUS Server
IP IP PPP Frames
RADIUS Accounting-Request
[ User-Name ] [ Acct-Status-Type=Start ] [ Acct-Session-Id ] [ NAS-Identifier ] [ Framed-IP-Address ]
RADIUS Acct-Response
28
PSTN Internet
Modem Network Access Server RADIUS Server
IP PPP Frames
RADIUS Accounting-Request
[ User-Name ] [ Acct-Status-Type=Stop ] [ Acct-Session-Id ] [ NAS-Identifier ] [ Framed-IP-Address ] [ Acct-Input-Octets ] [ Acct-Output-Octets ] [ Acct-Session-Time ] [ Acct-Terminate-Cause ]
RADIUS Acct-Response
29
LAN Internet
Wi-Fi Access Point RADIUS Server 30
LAN Internet
Wi-Fi Access Point RADIUS Proxy RADIUS Server 31
Login: lionel@orange.com
32
Enterprise RADIUS Broadband Access Mobile IP Wi-Fi Hot-Spot Mobile Data Access Services (incl. Web and VoIP) VPN Dial-In Others (e.g. OAM)
33
34
– Designed as simple/efficient solution for access control in size-limited networks
– IP Mobile management, Roaming operations, enhanced access control, etc.
– Server-initiated messages, re-auth during session, realm- based routing, reliable and secure transport, bigger packets for more complex policies, etc.
35
36
37
– TCP or SCTP connection with TLS, DTLS or IPsec
– Dynamic peer discovery and Connectivity management – Dynamic routing based on Realm – Session management – accounting – Basic error handling
38
39
40
Peer DNS
41
Peer Peer 2 TCP/SCTP connection Capability-Exchange-Request
Here are my name and supported App-Id
Capability-Exchange-Answer
Here are mine
Diameter Connection Open Device-Watchdog-Request Disconnect-Peer-Request Are you there? Yep! Device-Watchdog-Answer Disconnect-Peer-Answer Closing the door… OK! Bye!
42
43
44
App-id 1
Routing Management Peer Connection Management Session Management
App-id 2 App-id 2
Routing Management Peer Connection Management Session Management Routing Management Peer Connection Management Routing Management Peer Connection Management Session Management
App-id 2 App-id 1
Routing Management Peer Connection Management Session Management
Client Proxy Server A Server B Relay/Redirect Realm X Realm Y
45
– messages sent first to a domain – forward then to a host in the domain
– Routing table: peer to contact to reach a domain for given application – Peer table: connection to use to reach the peer
46
– Usually retrieved from the User id. (e.g. lionel@ietf89.com)
47
48
49
50
51
IP IP Tunnel Chaining
Mobility Management Entity Relay Agent Relay Agent Home Server 52
Attach Request (User Id) Authentication S6a-Authentication Request S6a-Authentication Material S6a-User Data Request S6a-User profile Radio Access configuration S6a-Location info Request S6a-Location Info report
MME Relay Agent Relay Agent HSS 53
54
55
–
– Closed some issues of the first version widely implemented – Acknowledgement of issues when used in large scale systems – Dedicated IETF's AAA working group to develop a successor
– Main drivers: roaming, Network access requirement enhancements, Mobile IP
– and first IOT issues
– Clarification of the rules for extensibility/routing
– Not a new version of the protocol. Mainly clarifications
– extend RADIUS with new attributes, new data types
56
57
58
59
60
Features Diameter (RFC 6733) RADIUS (RFC 2865) RADEXT Transport TCP or SCTP UDP TCP (RFC 6613 - Exp) Security TLS, DTLS, IPsec IPsec TLS (RFC 6614 – Exp), DTLS (draft) Operation Model Peer-to-Peer Client-Server Server-initiated commands to modify existing sessions (RFC Info) intermediaries Relay, Redirect, Proxy Only Proxy Peer Discovery Static or DNS Static DNS (IETF draft) Routing Realm-based + App-Id IP routing Max # Application 2^32 1 (AAA) Capability negotiation Yes No Based on presence of attributes
61
Features Diameter (RFC 6733) RADIUS (RFC 2865) RADEXT Data Types 8 Basic + 7 complex 5 Basic 12 basic (RFC 6929 - Std) Max # command Up to 2^24 Up to 256 Max Packet size 2^24 octets 4096 octets 65535 (IETF Draft) Max # attributes 2^32 (standard) 256 About 2K (RFC 6929 - Std) Max attribute size 2^24 253 octets 4KB by data fragmentation in consecutive attributes (RFC 6929- Stand) Data Grouping Generic Tags (bad) Sub-attributes (RFC 6929 – Std) compatibility Yes No Failover Yes No Keep-Alive Yes No
62
63
64
65
66
67
68
69
70
71