Internet DRAFT - draft-mccann-session-policy-framework-using-eap

draft-mccann-session-policy-framework-using-eap



EMU Working Group                                              S. McCann
Internet Draft                                        Research in Motion
Intended status: Standards Track                           M. Montemurro
Expires: July 8, 2013                                 Research in Motion
                                                         January 8, 2013

                    Session Policy Framework using EAP
           draft-mccann-session-policy-framework-using-eap-07.txt


Abstract

   This document specifies a framework for implementing a session policy
   channel using EAP. It defines a standard mechanism by which a mobile
   device can conduct a session policy exchange with a policy network
   component, using EAP as a lower layer protocol, to obtain session
   policies. EAP Re-authentication Protocol is suggested as a mechanism
   to allow asynchronous use of SIP at upper layers.

Status of this Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on July 8, 2013.

Copyright Notice

   Copyright (c) 2012 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of



McCann                    Expires July 8, 2013                  [Page 1]

Internet-Draft   Session Policy Framework using EAP         January 2013  


   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

   This document may contain material from IETF Documents or IETF
   Contributions published or made publicly available before November
   10, 2008.  The person(s) controlling the copyright in some of this
   material may not have granted the IETF Trust the right to allow
   modifications of such material outside the IETF Standards Process.

   Without obtaining an adequate license from the person(s) controlling
   the copyright in such materials, this document may not be modified
   outside the IETF Standards Process, and derivative works of it may
   not be created outside the IETF Standards Process, except to format
   it for publication as an RFC or to translate it into languages other
   than English.



Table of Contents

1. Introduction ..................................................... 3
2. Terminology ...................................................... 3
3. Session Policy ................................................... 4
  3.1. SIP background ............................................... 4
  3.2. 3GPP IMS ..................................................... 4
  3.3. Management of Asynchronous Session Events .................... 6
4. Session policy channel ........................................... 6
  4.1. Session Policy Documents ..................................... 7
    4.1.1. Network Triggered Policy Change .......................... 8
5. Architecture Considerations ...................................... 8
  5.1. Session Policy Exchange (SPE) ................................ 8
    5.1.1. Session Policy Channel Initialization .................... 9
    5.1.2. Session Establishment (Mobile Device Triggered) ......... 10
    5.1.3. Session Establishment (Network Triggered) ............... 11
6. Encapsulation of SPEs ........................................... 12
  6.1. Encapsulation within an TLV ................................. 12
  6.2. Encapsulation within an AVP ................................. 13
    6.2.1. Session Policy Exchange AVP ............................. 13
    6.2.2. Session Policy Change Event AVP ......................... 14
7. Use with SIP .................................................... 15
8. Security Considerations ......................................... 15
9. IANA Considerations ............................................. 15


McCann                    Expires July 8, 2013                  [Page 2]

Internet-Draft   Session Policy Framework using EAP         January 2013  


  9.1. Registration of EAP Session Policy TLV ...................... 15
  9.2. Registration of Diameter Session Policy AVP ................. 16
10. References ..................................................... 16
  10.1. Normative References ....................................... 16
  10.2. Informative References ..................................... 16
11. Specific Transport Mechanism ................................... 16
12. Acknowledgments ................................................ 17
13. Authors' Addresses ............................................. 17


1. Introduction

   The Session Initiation Protocol (SIP) [RFC 3261] is an application-
   layer control (signaling) protocol for creating, modifying and
   terminating sessions with one or more participants. These sessions
   can include VoIP (Voice over IP) telephone calls, and multimedia
   conferences. Service providers may have policies that apply to the
   media types negotiated for SIP sessions and hence it is necessary for
   proxy servers to be able to influence the Session Description
   Protocol negotiation during SIP session establishment and
   modification.

   This document specifies an alternative policy channel mechanism,
   enabling a user agent (i.e. a mobile device) to send session policy
   requests to a policy network component (e.g. a policy server) using a
   lower layer protocol (e.g. EAP and PPP), to obtain session policies,
   primarily for bandwidth constrained networks.

2. Terminology

   In this document, the key words "MUST", "MUST NOT", "REQUIRED",
   "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY",
   and "OPTIONAL" are to be interpreted as described in RFC 2119
   [RFC2119].

   A mixture of both EAP and SIP terminology is used within this
   document, with the following equivalence:

   EAP client = SIP user agent (UA) = Mobile Device
   EAP peer = Home Network Server = AAAh
   Authenticator = Intermediate Component (IC) = Gateway

   In addition, this document uses the following terms:

   ERP - EAP re-authentication Protocol


McCann                    Expires July 8, 2013                  [Page 3]

Internet-Draft   Session Policy Framework using EAP         January 2013  


   IMS - IP Multimedia Subsystem
   PCC - Policy Control and Charging
   PNC - Policy Network Component
   PNCh - Home PNC
   PNCv - Visited PNC
   SDP - Session Description Protocol
   SIP - Session Initiation Protocol
   SPE - Session Policy Exchange (i.e. session policy request and
   response)

3. Session Policy

3.1. SIP background

   Using SIP for the policy channel provides a good general purpose
   solution for the internet being independent of the underlying policy
   and network architecture and ensures that all SIP user agents (mobile
   devices) can interact with any PNC.  However, for limited bandwidth
   access networks, such as cellular systems, the SIP Events framework
   [RFC 3265] is an inefficient realization of the policy channel. With
   limited bandwidth access networks the large SIP messages take a
   significant amount of time to be transported between the mobile
   device and a PNC.

3.2. 3GPP IMS

   3GPP has defined IMS as a next generation network architecture for
   establishing IP multimedia sessions including services such as
   multimedia telephony. Although originally developed for cellular
   networks, other technologies such as fixed line DSL networks and
   DOCSIS cable networks together with wireless technologies such as
   WLAN and WIMAX can be used to access IMS networks and work is
   currently in progress to use IMS for SIP based enterprise access and
   interconnect.

   3GPP has defined an architecture for Policy Control and Charging
   (PCC), realized by PNCs, that performs the necessary Authorization
   and Accounting functions for mobile device access to IMS bearer
   resources.  Typical PNCs are policy servers, entities with "Policy
   Control and Charging Rules Function" or "Policy Control and
   Enforcement Functions", which based on inputs from various sources,
   determines which mobile devices are allowed bearer access based on
   the attributes and characteristics of the session (such as the number
   of streams, the media types, and the codecs).

   Within these architectures, IMS PNCs are usually co-located with the
   AAA, so network paths are already established.


McCann                    Expires July 8, 2013                  [Page 4]

Internet-Draft   Session Policy Framework using EAP         January 2013  

















































McCann                    Expires July 8, 2013                  [Page 5]

Internet-Draft   Session Policy Framework using EAP         January 2013  


   As the separate PNCs within the PCC communicate using the Diameter or
   RADIUS protocol it is quite appropriate that a mature authentication
   protocol be considered for session policy establishment, operating
   within a Diameter and RADIUS AAA server regime.

   EAP is a good candidate because it allows a mobile device to
   communicate with AAA infrastructure. Its advantages are:

   1. IMS PNCs use Diameter or RADIUS and EAP already operates over
   these networks without requiring an upgrade.

   2. EAP is already implemented or will be implemented in many mobile
   terminals since EAP is specified for use by mobile terminals for
   authentication when using WLAN access.

   3. EAP is access independent and compatible for use with all the
   access networks and policy control architectures of the current IMS
   stakeholders.

   4. EAP is a lightweight protocol that is efficient for transport over
   bandwidth constrained access networks with minimal round trip delay
   and power consumption.

3.3. Management of Asynchronous Session Events

   Although EAP does show some advantages, it is primarily designed to
   be an authentication mechanism, which establishes a security
   association (SA), prior to any application session being considered.
   In this respect EAP exchanges are expected to occur once a wireless
   connection has been made, as opposed to every time a SIP session
   wishes to commence.

   However, using the EAP Re-authentication Protocol [RFC5296], it is
   possible to re-establish an EAP method independent tunnel, with a
   similar security association to that of the initial EAP exchange. It
   supports EAP re-authentication for a mobile device (i.e. the EAP
   peer) that has valid, unexpired key material from a previously
   performed EAP authentication

   In this manner, ERP can be utilized every time the mobile device
   wishes to initialize a SIP session.

4. Session policy channel

   An EAP based session policy channel is an alternative mechanism for
   implementing the policy channel defined in [I-D.ietf-sip-session-
   policy-framework] that builds upon the capabilities that exist in IMS


McCann                    Expires July 8, 2013                  [Page 6]

Internet-Draft   Session Policy Framework using EAP         January 2013  


   networks while being more suited for use by SIP mobile devices in
   these bandwidth constrained networks.


                                  domain 1
                               +-----------+
                        .------|   proxy   |----...
         +--------+    /       +-----------+
         |        |---'        +-----------+
         |        |            |    PNC    |
         | mobile |============|           |
         | device |            +-----------+
         |        |****        +-----------+
         +--------+    *       |  policy   |
                        *******|enforcement|****...
                               +-----------+

         --- EAP Signaling
         === Session Policy Channel
         *** Media


                  Figure 1 - Session Policy Architecture

   Figure 1 illustrates a system in which SPEs are sent by encapsulating
   the messages within EAP. In the process of authenticating the mobile
   device, a lower layer communication path (equivalent to a session
   policy channel) is created between the mobile device and the PNC.

   The mobile device sends the session policy request to a PNC using a
   generic message (section 6.1. ) encapsulated within an EAP TLV
   message [I-D.draft-cam-winget-eap-tlv]. The session policy response
   sends the resulting session policy documents from the PNC back to the
   mobile device.

   Although only one PNC is shown in Figure 1, multiple PNCs could be
   present in the system.

4.1. Session Policy Documents

   Session policy documents are typically the info offer, info answer ,
   policy offer and policy answer, which define policy as stated in [I-
   D.ietf-sip-session-policy-framework].

   These documents are carried within the SPE messages as shown in
   section 6.



McCann                    Expires July 8, 2013                  [Page 7]

Internet-Draft   Session Policy Framework using EAP         January 2013  


   The mobile device gains access to the PNC to obtain the session
   policy documents based on a URI (Uniform Resource Indicator) provided
   in the SPE message header.

  4.1.1. Network Triggered Policy Change

   For session-dependent policies, if the session policies change during
   a session (because of a change in the available radio resources, for
   example due to congestion or change of access network type), the PNC
   sends a modified session policy document (Figure 4) to the mobile
   device to inform it that the policies have changed so that the mobile
   device can re-start a new SPE, which re-negotiates the session
   policy.

5. Architecture Considerations

   The SPEs are access network agnostic.  The SPE passes through an IC
   (e.g. gateway, access point, network access server) between the
   mobile device and the PNC. The mobile device connects to an IC via
   one or more of several different wired (e.g. DSL networks and DOCSIS)
   or wireless (e.g. WLAN and WiMAX) access network technologies.

   Essentially a lower layer protocol (e.g. a wired or wireless protocol
   together with EAP) is used for transporting the session policy
   request between the mobile device and the IC, and then another lower
   layer protocol (e.g. RADIUS or Diameter together with EAP) transports
   the session policy request between the IC and the PNC.

   Since these architectures typically rely on Diameter or RADIUS based
   PNCs, the mobile device can transmit SPEs to the PCN, regardless of
   which access networks the mobile device uses to finally connect to
   the network.

5.1. Session Policy Exchange (SPE)

   From a single PNC, together with the appropriate AAA servers (such as
   other PNCs), the SPEs can traverse many other network components and
   cross domains.  This potentially enables a PNC at the edge of the
   network (subject to service agreements) to communicate with other
   PNCs in other domains in order to supply a composite policy document
   reflecting the policies from multiple domains that the SIP signaling
   request traverses.

   The mobile device can contact many PNCs via a single SPE with its
   home PNC (PNCh). The PNCh contacts other visited PNCs (PNCv) and
   returns their policy documents back to the PNCh where they are



McCann                    Expires July 8, 2013                  [Page 8]

Internet-Draft   Session Policy Framework using EAP         January 2013  


   aggregated before returning that aggregated policy information to the
   mobile device.

   Thus the mobile device can potentially obtain a single policy
   document that reflects the session policies of all the impacted
   domains in a single SPE instead of having to contact multiple PNCs
   individually.

   As the mobile device transmits a session policy request to the PNC
   using a tunneled EAP protocol (e.g. using EAP-FAST or EAP-TTLS), the
   SPE is secure within an authenticated outer tunnel.

  5.1.1. Session Policy Channel Initialization

   The following message flow illustrates how a mobile device initiates
   the session policy channel.

Mobile Device            IC             AAAv(PNCv)          AAAh(PNCh)
     |                   |                   |                   |
     |(1) EAP Method Exchange (tunnel initialization)            |
     |<----------------->|<------------------------------------->|
     |                   |                   |                   |
     |(2) [SIP registration with PNCh]       |                   |
     |<--------------------------------------------------------->|
     |                   |                   |                   |

                    Figure 2 - EAP Tunnel Initialization

   Message Details:

   (1) EAP Method Exchange (tunnel initialization)

   An EAP exchange is performed between the mobile device and the PNC
   with the authentication messages being forwarded to the home network
   AAA server. It is assumed that the PNCh is co-located with the AAAh.
   A suitable EAP method is used to establish a tunnel (e.g. EAP-FAST),
   from which the relevant ERP keys are derived for subsequent use
   [RFC5296].

    (2) [SIP registration with PNCh]

   Although not a part of the layer 2 exchange, it is worth showing that
   SIP registration between the mobile device and the PNCh occurs at
   this point. Subsequent SIP level flows are not shown.





McCann                    Expires July 8, 2013                  [Page 9]

Internet-Draft   Session Policy Framework using EAP         January 2013  


  5.1.2. Session Establishment (Mobile Device Triggered)

   The following message flow illustrates how a mobile device initiates
   a session policy using a re-established EAP tunnel. This is a result
   of a mobile device triggered event.

Mobile Device           IC             AAAv(PNCv)          AAAh(PNCh)
     |                   |                   |                   |
     |(3) EAP-Initiate/Re-auth               |                   |
     |---------------------------------------------------------->|
     |                   |                   |                   |
     |(4) EAP tunnel(Policy Request)         |                   |
     |<--------------------------------------------------------->|
     |                   |                   |                   |
     |                   |                   |       (5)Policy-h |---
     |                   |                   |                   |   |
     |                   |                   |                   |<--
     |                   |               (6)AAA (Policy Request) |
     |                   |                   |<------------------|
     |                   |                   |                   |
     |                   |              (7)AAA (Policy Response) |
     |                   |                   |------------------>|
     |                   |                   |                   |
     |(8) EAP tunnel(Policy Response)        |                   |
     |<----------------------------------------------------------|
     |                   |                   |                   |

          Figure 3 - Mobile Device Triggered Session Policy Request

     Message Details:

   (3) EAP-Initiate/Re-auth

   The ERP exchange is performed between the mobile device and the home
   AAA (PNCh).

   (4) EAP tunnel(Policy Request)

   The session policy request is transported within the EAP tunnel
   (using EAP TLV - 6.1) to the PNCh.

   (5) Policy-h

   At the home AAA server, the home network policy is determined for
   subsequent SIP sessions.

   (6) AAA (Policy Request)


McCann                    Expires July 8, 2013                 [Page 10]

Internet-Draft   Session Policy Framework using EAP         January 2013  



   The home AAA server, requests policy information from all visited
   networks PNCs, through which the SIP session will traverse, utilizing
   an AAA Policy Request message (typically using RADIUS or Diameter.)

   (7) AAA (Policy Response)

   Each visited PNC will return its network policy back to the home
   network, where the session policy document is aggregated.

   (8) EAP tunnel(Policy Response)

   The session policy document is encapsulated within the EAP TLV,
   before being returned to the mobile device.

  5.1.3.  Session Establishment (Network Triggered)

   The following message flow illustrates how a network initiates a
   session policy re-establishment. This is a result of a network
   triggered event.

Mobile Device            IC             AAAv(PNCv)         AAAh(PNCh)
     |                   |                   |                   |
     |                   |               (9)AAA(Policy Change)   |
     |                   |                   |------------------>|
     |                   |                   |                   |
   (11) EAP Initiate/Re-auth-Start   (10)AAA(Policy Change Event)|
     |<------------------|<--------------------------------------|
     |                   |                                       |
     |(3) EAP re-establish Tunnel(Channel Bindings)              |
     |<--------------------------------------------------------->|
     |                   |                   |                   |
     |(4) EAP tunnel(Policy Request)         |                   |
     |---------------------------------------------------------->|
     |                   |                   |                   |
     |(8) EAP tunnel(Policy Response)        |                   |
     |<----------------------------------------------------------|
     |                   |                   |                   |


             Figure 4 - Network Triggered Session Policy Request


     Message Details:

   (9) AAA (Policy Change)



McCann                    Expires July 8, 2013                 [Page 11]

Internet-Draft   Session Policy Framework using EAP         January 2013  


   A visited PNC changes the session policy (most likely whilst the
   mobile device session is on-going) and indicates to the PNCh that a
   policy change has occurred.

   (10) AAA (Policy Change Event)

   The PNCh sends a policy change event message to the IC (most likely
   within RADIUS or Diameter)

   (11) EAP Initiate/Re-auth-Start

   The IC requests the mobile device to execute the ERP.

   The rest of the message flow continues, as described above in section
   5.1.2.

6. Encapsulation of SPEs

   The SPE comprises identification, routing and session policy
   documents, which allows the policy information to be generated
   (typically within the session policy documents themselves), as the
   SPEs traverse the network.

   The SPE is encapsulated within an EAP type-length-value (TLV)
   structure between the mobile device and the PCNh and within a
   RADIUS/Diameter AVP message for the onward network traversal between
   the PCNh and PCNv(s).

6.1. Encapsulation within an TLV

   [I-D.draft-cam-winget-eap-tlv] explains how type-length-value (TLV)
   structures, may be used to transport the SPE from the mobile device
   to a PNC within a secure tunnel.

   The SPE TLV is defined as follows:

   0                   1                   2                   3
   0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |M|R|         TLV Type          |            Length             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                   Session Policy Exchange (SPE)...
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   Flags

   M


McCann                    Expires July 8, 2013                 [Page 12]

Internet-Draft   Session Policy Framework using EAP         January 2013  


      0 - Optional TLV

   R
      Reserved, set to zero (0)

   TLV Type
      <Defined by IANA>

   Length
      >=0

   Session Policy Exchange
      This is the Session Policy Exchange (SPE) as defined in section
   5.1.

   The following is an example of such a message from the network to the
   mobile device:
   EAP Code: 2 (Response)
   Type: <IANA> SessionPolicy
   Length: Variable
   Value:
   [Session Policy Request]

6.2. Encapsulation within an AVP

   The attribute-value-pair (AVP) structure, may be used to transport
   the 2 new required AAA messages as defined in section 5.1.2

  6.2.1. Session Policy Exchange AVP

   The structure to transport the SPE from the PNCh to various PNCv(s)
   is defined as:

       0                   1                   2                   3
       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |                           AVP Code                            |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |V M P r r r r r|                  AVP Length                   |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |                  Session Policy Exchange (SPE)...
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+


   AVP Code
    <Defined by IANA>



McCann                    Expires July 8, 2013                  [Page 13]

Internet-Draft   Session Policy Framework using EAP          January 2013  


   Flags

   V
    0 - Not a vendor specific AVP

   M
    0 - Optional AVP

   P
    0 - End to end encryption is not required

   AVP Length
    >=0

   Session Policy Exchange (SPE)
      This is the Session Policy Exchange as defined in section 5.1


  6.2.2. Session Policy Change Event AVP

   The structure to transport the session change event from the PNCh to
   the IC is defined as:

       0                   1                   2                   3
       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |                           AVP Code                            |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |V M P r r r r r|                  AVP Length                   |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |                   Session Policy Change Event...
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+


   AVP Code
    <defined by IANA>

   Flags

   V
    0 - Not a vendor specific AVP

   M
    0 - Optional AVP

   P
    0 - End to end encryption is not required


McCann                    Expires July 8, 2013                 [Page 14]

Internet-Draft   Session Policy Framework using EAP         January 2013  



   AVP Length
    >=0

   Session Policy Change Event
      This is a message which indicates to the IC, that the session
   policy within the network has changed. It triggers the IC to send an
   EAP-Initiate to the mobile device, requesting that a further SPE be
   re-started.

7. Use with SIP

   The EAP mechanisms described above can be used by the mobile device
   for obtaining both session-independent policies and session-specific
   policies, as defined in [I-D.ietf-sip-session-policy-framework].  The
   above discussion focuses on obtaining session-specific polices, but
   the mechanisms can also be used by the mobile device prior to session
   establishment to obtain session-independent policies.

   In addition to media policies, the mechanisms defined herein can be
   used to inform the mobile device to use a different IP address in the
   SDP Offer or Answer, to navigate firewalls or NATs, or to route media
   via a transcoder or other media relay as defined in [I-D.ietf-sip-
   session-policy-framework].

8. Security Considerations

   Session policies can significantly change the behavior of a mobile
   device and can be used by an attacker to compromise such a device.
   For example, session policies can be used to prevent a mobile device
   from successfully establishing a session (e.g., by setting the
   available bandwidth to zero). Such a policy can be submitted to the
   mobile device during a session, which causes the mobile device to
   terminate the session.

   For transmissions over the air, [I-D. draft-cam-winget-eap-tlv]
   assures that the SPE (encapsulated within an EAP TLV) is transmitted
   within an authenticated tunnel using a suitable EAP method (e.g. EAP-
   FAST or EAP-TTLS)

9. IANA Considerations

9.1. Registration of EAP Session Policy TLV

   Name of Header Field: TLV Type

   Short form: none


McCann                   Expires July 8, 2013                  [Page 15]

Internet-Draft   Session Policy Framework using EAP         January 2013  


   Normative description: Section 6.1 of this document

9.2. Registration of Diameter Session Policy AVP

   Name of Header Field: AVP Code

   Short form: none

   Normative description: Section 6.2 of this document

10. References

10.1. Normative References

   [I-D.ietf-sip-session-policy-framework]
           Hilt, V., Camarillo, G., and J. Rosenberg, "A Framework
           for Session Initiation Protocol (SIP) Session Policies",
           draft-ietf-sip-session-policy-framework-10 (work in
           progress), Feburary 2011.

   [I-D.draft-cam-winget-eap-tlv]
           Cam-Winget, N.,Zhou, H., McCann, S., "EAP Type-Length-Value
             Container", draft-cam-winget-eap-tlv-02 (work in progress)
             , January 2011

   [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
           Requirement Levels", BCP 14, RFC 2119, March 1997.

   [RFC3748] Aboba, B. et al, "Extensible Authentication Protocol
             (EAP)", June 2004

   [RFC5296] Narayanan, V., "EAP Extensions for EAP Re-authentication
             Protocol (ERP)", August 2008

10.2. Informative References

   [RFC3261] Rosenberg, J. et al, "SIP: Session Initiation Protocol",
             June 2002

   [RFC3265] Roach, A.B., "Session Initiation Protocol (SIP)-Specific
             Event Notification", June 2002

11. Specific Transport Mechanism

   The following specific transport mechanisms could be considered for
   transporting EAP session policy information:


McCann                    Expires July 8, 2013                 [Page 16]

Internet-Draft   Session Policy Framework using EAP         January 2013  



      . IP-CAN (IP (Internet Protocol) Connectivity Access Network) via
        IKEv2 (Internet Key Exchange version 2) as per RFC 5269.

      . PPP (Point-to-Point Protocol) as per RFC 2284.

      . wired IEEE 802 LANs (IEEE-802.1X).
      . IEEE 802.11 wireless LANs (IEEE-802.11).

   Using any of these transport protocols, EAP messages are sent at a
   lower protocol layer than the SIP messages themselves, which are
   typically sent at the application layer.

12. Acknowledgments

   The authors would like to acknowledge Andrew Allen and Nancy Cam-
   Winget for their contributions to this document.

   This document was prepared using 2-Word-v2.0.template.dot.

13. Authors' Addresses

   Stephen McCann
   Research in Motion
   200 Bath Road
   Slough
   Berkshire, SL1 3XE, UK
   Email: smccann@rim.com

   Mike Montemurro
   Research in Motion
   Mississauga
   Ontario, Canada
   Email: mmontemurro@rim.com













McCann                    Expires July 8, 2013                [Page 17]