Internet DRAFT - draft-narayanan-mipshop-mn-ar-auth-option
draft-narayanan-mipshop-mn-ar-auth-option
Mipshop N. Venkitaraman
Internet-Draft V. Narayanan
Expires: April 17, 2006 Motorola
October 14, 2005
Mobile Node-Access Router Authentication Option
draft-narayanan-mipshop-mn-ar-auth-option-00.txt
Status of this Memo
By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on April 17, 2006.
Copyright Notice
Copyright (C) The Internet Society (2005).
Abstract
FMIPv6 [4] requires signalling messages to be exchanged between a
mobile node and its access router. For secure interaction, these
messages must be authenticated using a security association between
the access router and the mobile node. To enable the mobile node and
the access router unambiguously identify the correct security
association this document extends the mobility header authentication
option by defining a subtype to indicate a mobile node - access
router SPI. Also, this option can be used in signaling messages used
Venkitaraman & Narayanan Expires April 17, 2006 [Page 1]
Internet-Draft MN-AR Auth Option October 2005
to derive handover keys between the MN and AR, as described in HK_AAA
[5]. The idea here is to re-use the existing mobility option for
authentication and only define an additional sub-type for MN-AR
authentication.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . 3
3. Applicability . . . . . . . . . . . . . . . . . . . . . . . . . 3
4. MN-AR Authentication Mobility Option . . . . . . . . . . . . . 4
4.1. Format . . . . . . . . . . . . . . . . . . . . . . . . . . 4
4.2. Processing Considerations . . . . . . . . . . . . . . . . . 5
5. Security Considerations . . . . . . . . . . . . . . . . . . . . 5
6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . . 6
7. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . 6
8. References . . . . . . . . . . . . . . . . . . . . . . . . . . 6
8.1. Normative References . . . . . . . . . . . . . . . . . . . 6
8.2. Informative References . . . . . . . . . . . . . . . . . . 6
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 7
Intellectual Property and Copyright Statements . . . . . . . . . . 8
Venkitaraman & Narayanan Expires April 17, 2006 [Page 2]
Internet-Draft MN-AR Auth Option October 2005
1. Introduction
Fast Handovers for MIPv6 [4] specifies a protocol to improve handover
latency due to Mobile IPv6 procedures by enabling a mobile node bind
its CoA with its previous Access Router via a Fast Binding Update
(FBU) message. To enable the PAR determine that the FBU is generated
by a genuine MN the FBU message must be protected. Mechanisms to
create a shared key between the MN and the AR have been proposed in
HK_AAA [5] and HK_SEND [6]. This document specifies a means of
securing the FBU using shared keys that exist between the MN and PAR
using a MN-AR authentication option. It extends the mobility message
authentication option defined in [MIP6_Auth] by defining a subtype to
indicate a mobile node - access router Security Association. The
authentication option enables the mobile node and access router to
transfer authentication data and utilize an SPI to index between
multiple MN-AR security associations. The option defined in this
document is also used in HK_AAA [5] to exchange the SPI and secure
MN-AR communication as applicable.
2. Terminology
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC- 2119 [1].
In addition, this document uses the following terms:
MN-AR Mobility Security Association
Security relation between Mobile Node and its Access Router, used
to authenticate the Mobile Node for mobility service. The MN-AR
Security Association between Mobile Node and Access Router
consists of a MN-AR mobility SPI, a shared-key, an authentication
algorithm and the replay protection mechanism in use.
MN-AR Mobility SPI A number in the range [0-4294967296] used to index
into the shared-key based MN-AR security associations to protect
mobility messages.
3. Applicability
The MN-AR Authentication Mobility Option is expected to be used in
FMIPv6 for securing the Fast Binding Update between the MN and the
old AR. Also, this option is used in securing the MN-AR Handover Key
Request/Response messages between the MN and AR in the proposed AAA-
based handover key derivation model, as described in HK_AAA [5].
Venkitaraman & Narayanan Expires April 17, 2006 [Page 3]
Internet-Draft MN-AR Auth Option October 2005
This document itself does not provide guidelines on the exact usage
of this option in these protocols. The exact usage of this option
for an applicable protocol is expected to be defined as part of the
appropriate protocol specification. This document only defines the
type and values for the option itself.
4. MN-AR Authentication Mobility Option
This section defines a subtype for the message authentication
mobility option defined in MIP6_AUTH [2]. The assumption is that
Mobile Node has a shared-key based security association with the
Access Router.
4.1. Format
The format of the MN-AR authentication mobility option is as defined
in Figure 2 in [MIP6_Auth]. It has been reproduced here only for
ease of reference.
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Option Type | Option Length | Subtype |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| MN-AR Mobility SPI |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Authentication Data ....
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 1: MN-AR Authentication Option
The MN-AR authentication mobility option uses the subtype value of 3.
This option should be used to authenticate the Fast Binding Update
and Fast Binding Acknowledgement messages in FMIPv6 [4] when a
shared-key based security association exists between the Mobile Node
and the Access Router. Also, this option should be used in securing
the Handover Key Request and Response messages described in HK_AAA
[5].
This MUST be the last option in a message with mobility header if it
is the only authentication option in the message.
The authentication data is calculated on the message starting from
the mobility header up to and including the mobility SPI value of
this option.
Venkitaraman & Narayanan Expires April 17, 2006 [Page 4]
Internet-Draft MN-AR Auth Option October 2005
Authentication Data = First (96, HMAC_SHA1(MN-AR Shared key, Mobility
Data))
Mobility Data = care-of address | home address | Mobility Header(MH)
Data
MH Data is the content of the Mobility Header up to and including the
mobility SPI field of this option. The Checksum field in Mobility
Header MUST be set to 0 to calculate the Mobility Data.
The first 96 bits from the MAC result are used as the Authentication
Data field.
4.2. Processing Considerations
The Mobile Node should include this option in to secure messages
exchanged with an access router, if it has a shared-key based
mobility security association with the Access Router. While
including this option the Mobile Node SHOULD use the Mobile Node
Identifier Option, specifically the MN-NAI mobility option as defined
in MN_ID_OPT [3] to identify itself while authenticating with the
Access Router.
Mobile Node MAY use Message Identifier option as defined in MIP6_AUTH
[2] for additional replay protection.
The Access Router should include this option in to secure messages
exchanged with a mobile node, if it has a shared-key based mobility
security association with the Mobile Node.
The Mobile Node or Access Router receiving this option MUST verify
the authentication data in the option. If authentication fails, the
Access Router MUST send an error to the other entity. The Access
Router Agent MAY log such events.
The detailed processing rules for messages that contain this option
will be defined by the documents specifying the corresponding
messages. For instance, the use of this option in FMIPv6 will be
defined in the protocol specification for FMIPv6.
5. Security Considerations
This document assumes the existence of a shared key between the
Mobile Node and the Access Router. It proposes new authentication
options to authenticate the control message between Mobile Node and
an Access Router. Given that this option is based on the
authentication protocol defined in MIP6_AUTH [2], any security
Venkitaraman & Narayanan Expires April 17, 2006 [Page 5]
Internet-Draft MN-AR Auth Option October 2005
considerations that apply to the authentication protocol also apply
to this option.
6. IANA Considerations
IANA services are required for this specification. The value for
MN-AR authentication mobility option must be assigned.
7. Acknowledgments
The authors would like to acknowledge that
draft-perkins-mobileip-spi-00 described the use of an SPI option for
Mobile IP.
8. References
8.1. Normative References
[1] Bradner, S., "Key words for use in RFCs to Indicate Requirement
Levels", BCP 14, RFC 2119, March 1997.
[2] Patel, A., "Authentication Protocol for Mobile IPv6",
draft-ietf-mip6-auth-protocol-07 (work in progress),
September 2005.
[3] Patel, A., "Mobile Node Identifier Option for MIPv6",
draft-ietf-mip6-mn-ident-option-03 (work in progress),
September 2005.
8.2. Informative References
[4] Koodli, R., "Fast Handovers for Mobile IPv6", RFC 4068,
July 2005.
[5] Narayanan, V., "Handover Keys using AAA",
draft-vidya-mipshop-handover-keys-aaa-01 (work in progress),
October 2005.
[6] Kempf, J., "Bootstrapping a Symmetric IPv6 Handover Key from
SEND", draft-kempf-mobopts-handover-key-01 (work in progress),
July 2005.
Venkitaraman & Narayanan Expires April 17, 2006 [Page 6]
Internet-Draft MN-AR Auth Option October 2005
Authors' Addresses
Narayanan Venkitaraman
Motorola
1301 E. Algonquin Road
Schaumburg, IL 60196
US
Email: narayanan.venkitaraman@motorola.com
Vidya Narayanan
Motorola
1301 E. Algonquin Road
Schaumburg, IL 60196
US
Email: vidya@motorola.com
Venkitaraman & Narayanan Expires April 17, 2006 [Page 7]
Internet-Draft MN-AR Auth Option October 2005
Intellectual Property Statement
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Disclaimer of Validity
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Copyright Statement
Copyright (C) The Internet Society (2005). This document is subject
to the rights, licenses and restrictions contained in BCP 78, and
except as set forth therein, the authors retain all their rights.
Acknowledgment
Funding for the RFC Editor function is currently provided by the
Internet Society.
Venkitaraman & Narayanan Expires April 17, 2006 [Page 8]