netext C. Zhu Internet-Draft X. Zhou Intended status: Standards Track ZTE Corporation Expires: October 8, 2011 April 06, 2011 The interworking between IKEv2 and PMIPv6 draft-zhu-netext-ikev2-interworking-pmip-00.txt Abstract During the network operation, there is a scenario where the IKEv2 is used between MN and MAG while the PMIPv6 is used between MAG and LMA. Hence, the interworking between IKEv2 and PMIPv6 need to be considered in this scenario. Status of this Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at http://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on October 8, 2011. Copyright Notice Copyright (c) 2011 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Zhu & Zhou Expires October 8, 2011 [Page 1] Internet-Draft The interworking between IKEv2 and PMIPv6 April 2011 Table of Contents 1. Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2. Protocol Overview . . . . . . . . . . . . . . . . . . . . . . 4 3. New Mobility Option-IKEv2 Container . . . . . . . . . . . . . 6 4. MAG Operation . . . . . . . . . . . . . . . . . . . . . . . . 7 5. LMA Operation . . . . . . . . . . . . . . . . . . . . . . . . 8 6. Security Considerations . . . . . . . . . . . . . . . . . . . 9 7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 10 8. Normative References . . . . . . . . . . . . . . . . . . . . . 11 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 12 Zhu & Zhou Expires October 8, 2011 [Page 2] Internet-Draft The interworking between IKEv2 and PMIPv6 April 2011 1. Motivation Non-transparent access is supported in UMTS since Release 99 and in Rel-8 it was naturally extended to the EPS with 3GPP access. In both UMTS and EPS, the credentials for PAP or CHAP authentication with the private Packet Data Network (PDN) are carried transparently between the UE and the GGSN/PGW inside the Protocol Configuration Options (PCO) information element. In I-WLAN it is possible to access a private PDN via a Packet Data Gateway (PDG) as defined in 3GPP TS 29.161. The approach specified in 3GPP TS 29.161 relies on multiple IKEv2 authentication exchanges, based on rfc4739. However, access to private PDNs is still not possible via untrusted non-3GPP IP access, e.g. WLAN access with PMIPv6-based interface. Since the ePDG (i.e. MAG, contrary to the PDG in I-WLAN) has no RADIUS or Diameter interface with the AAA server in the private network, even according to rfc4739 the ePDG is not able to contact the AAA Server for the external authentication and authorization after receiving the credentials. This document attempts to figure out the issue described above via extending PMIPv6 to achieve external authentication and authorization between UE and the AAA server. Zhu & Zhou Expires October 8, 2011 [Page 3] Internet-Draft The interworking between IKEv2 and PMIPv6 April 2011 2. Protocol Overview It is proposed to define a new mobility option as a container (IKEv2 container) in Proxy Binding Update and Proxy Binding Acknowledge, which can be used to convey the information from IKEv2 and the result of external authentication and authorization. The following steps is performed during the external authentication and authorization as described in Figure 1. +-------+ +---------+ +--------+ +-----------+ | MN | | MAG | | LMA | | External | +-------+ +---------+ +--------+ |AAA Server | | | | +-----------+ +--------------------------------------+ | | | 1.Procedures until the MAG obtaining | | | | the credentials in the rfc4739 | | | +--------------------------------------+ | | | | | | | | 2.PBU(IKEv2 Container) | | | |------------------------>| | | | |3.Access-Req/Resp| | | |<--------------->| | | | | | |<-4.PBA(IKEv2 Container)-| | | | | | | | | | +----------------------------------------+ | | | 5.Procedures after the MAG obtaining | | | | the credentials and completing the | | | | external Authentication/Authorization| | | +----------------------------------------+ | | | | | | | | | | | | | | Figure 1: Authentication and authorization for the Private network access The steps of the procedure in Figure 1 are as following. 1. The mobile node performs additional authentication and authorization with an external AAA Server as specified in rfc4739 2. The MAG contructs the IKEv2 container (e.g. PCO) in the Proxy Binding Update, copies the information from IKEv2 (e.g. User ID and password) into the IKEv2 container and sends the PBU to the LMA. Zhu & Zhou Expires October 8, 2011 [Page 4] Internet-Draft The interworking between IKEv2 and PMIPv6 April 2011 3. The LMA uses the authentication credentials provided in the IKEv2 container to perform an additional authentication and authorisation with an external AAA server. 4. Upon receiving the access response from external AAA server the LMA copies the results from the response message to the IKEv2 container which is included in the Proxy Binding Acknowledge. 5. Upon receiving credentials in the Proxy Binding Acknowledge the MAG performs the procedure as described in rfc4739 to complete the external Authentication/Authorization. Zhu & Zhou Expires October 8, 2011 [Page 5] Internet-Draft The interworking between IKEv2 and PMIPv6 April 2011 3. New Mobility Option-IKEv2 Container TBD Zhu & Zhou Expires October 8, 2011 [Page 6] Internet-Draft The interworking between IKEv2 and PMIPv6 April 2011 4. MAG Operation TBD Zhu & Zhou Expires October 8, 2011 [Page 7] Internet-Draft The interworking between IKEv2 and PMIPv6 April 2011 5. LMA Operation TBD Zhu & Zhou Expires October 8, 2011 [Page 8] Internet-Draft The interworking between IKEv2 and PMIPv6 April 2011 6. Security Considerations TBD Zhu & Zhou Expires October 8, 2011 [Page 9] Internet-Draft The interworking between IKEv2 and PMIPv6 April 2011 7. IANA Considerations TBD Zhu & Zhou Expires October 8, 2011 [Page 10] Internet-Draft The interworking between IKEv2 and PMIPv6 April 2011 8. Normative References [RFC4739] Eronen, P. and J. Korhonen, "Multiple Authentication Exchanges in the Internet Key Exchange (IKEv2) Protocol", RFC 4739, November 2006. Zhu & Zhou Expires October 8, 2011 [Page 11] Internet-Draft The interworking between IKEv2 and PMIPv6 April 2011 Authors' Addresses Chunhui Zhu ZTE Corporation No.50 Ruanjiandadao Rd,Yuhuatai District Nanjing China Email: zhu.chunhui@zte.com.cn Xingyue Zhou ZTE Corporation No.50 Ruanjiandadao Rd,Yuhuatai District Nanjing China Phone: +86-25-8801-4634 Email: zhou.xingyue@zte.com.cn Zhu & Zhou Expires October 8, 2011 [Page 12]