Internet DRAFT - draft-weis-radext-mud

draft-weis-radext-mud







Network Working Group                                            B. Weis
Internet-Draft                                             Cisco Systems
Intended status: Standards Track                        October 25, 2016
Expires: April 28, 2017


          RADIUS Extensions for Manufacturer Usage Description
                        draft-weis-radext-mud-00

Abstract

   A Manufacturer Usage Description (MUD) is a file describing the
   expected use of a class of devices, usually an Internet of Things
   class of devices.  It is prepared by a manufacturer and placed on a
   generally available web server, and is addressable via a Uniform
   Resource Identifier (URI).  The URI is often included in a discovery
   protocol (e.g., DNS, LLDP).  A Network Access Server (NAS) in the
   path of the discovery protocol can collect and forward the URI to a
   RADIUS server, which processes the URI.  This draft defines the
   RADIUS extension needed for the NAS to forward the URI to the RADIUS
   server.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on April 28, 2017.

Copyright Notice

   Copyright (c) 2016 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents



Weis                     Expires April 28, 2017                 [Page 1]

Internet-Draft                 RADIUS-MUD                   October 2016


   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
     1.1.  Requirements notation . . . . . . . . . . . . . . . . . .   3
     1.2.  Terminology . . . . . . . . . . . . . . . . . . . . . . .   3
   2.  Acronyms and Abbreviations  . . . . . . . . . . . . . . . . .   4
   3.  Extended Attribute for the MUD URI  . . . . . . . . . . . . .   4
   4.  MUD URI processing  . . . . . . . . . . . . . . . . . . . . .   5
   5.  Security Considerations . . . . . . . . . . . . . . . . . . .   5
   6.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .   5
   7.  Acknowledgements  . . . . . . . . . . . . . . . . . . . . . .   6
   8.  References  . . . . . . . . . . . . . . . . . . . . . . . . .   6
     8.1.  Normative References  . . . . . . . . . . . . . . . . . .   6
     8.2.  Informative Reference . . . . . . . . . . . . . . . . . .   6
   Author's Address  . . . . . . . . . . . . . . . . . . . . . . . .   7

1.  Introduction

   Enterprise networks often use Port-Based Network Access Control
   [IEEE802.1X], where the Authentication Server is a RADIUS server
   [RFC2865].  In some cases a device will authenticate itself to the
   network using IEEE 802.1X with a digital certificate (e.g., an IEEE
   802.1AR Secure Device ID [IEEE802.1AR]) that has been placed into the
   device by the manufacturer.  Manufacturer Usage Description (MUD)
   [I-D.ietf-opsawg-mud] has defined an optional extension for digital
   certificates, which consists of a Uniform Resource Identifier (URI)
   that identifies the MUD file.  A MUD file contains identification and
   network access information for a particular class of device.  This
   information can be used to generate authorization policy such as an
   Access Control List (ACL) describing required network access for the
   device.

   However, there are cases where a MUD URI is not included in a
   device's digital certificate, or it does not support the use of
   digital certificates, or may not even support an IEEE 802.1X
   Supplicant.  This will often be the case with IoT devices, which is a
   primary use case for the use of MUD.  In each of these situations, a
   device could benefit from distributing a MUD URI in a discovery
   message (e.g., a DHCP or LLDP message as defined in
   [I-D.ietf-opsawg-mud]), in hopes that a network element device will
   receive and consume it.




Weis                     Expires April 28, 2017                 [Page 2]

Internet-Draft                 RADIUS-MUD                   October 2016


   As shown in Figure 1, a Network Access Server (NAS) can observe the
   discovery message with the MUD URI and forward it to a RADIUS server.
   This can be done as part of a MAC Authentication Bypass (MAB)
   message.  MAB is a common alternative approach of port-based network
   access control used for devices that cannot support a IEEE 802.1X
   Supplicant.  The RADIUS server and an associated MUD Controller
   (defined in [I-D.ietf-opsawg-mud]) will work together to resolve the
   URI and translate the resulting MUD file into authorization policy.
   The RADIUS server distributes to the NAS authorization RADIUS
   attributes (e.g., an ACL describing required network access) to apply
   to messages received from the device.

                                                RADIUS Server &
            Device            NAS               MUD Controller
              +                +                       |
              | (DHCP or LLDP) |                       |
              |     MUD URI    |                       |
              |  +-----------> |      (RADIUS)         |
              |                |  MUD URI ATTRIBUTE    |
              |                | +------------------>  |
              |                |                       |
              |                |   FILTER ATTRIBUTES   |
              |                | <-------------------+ |
              +                +                       +

                       Figure 1: RADIUS Message Flow

   The only missing piece in this workflow is the ability for the NAS to
   relay the MUD URI to the RADIUS server.  This draft defines a new
   RADIUS attribute for this purpose.  The expectation is that the MUD
   URI will be passed in Access Request or Accounting messages.

1.1.  Requirements notation

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in [RFC2119].

1.2.  Terminology

   The following key terms are used throughout this document:

   MUD Controller  An entity that requests a MUD file from the MUD
         server, and processes the MUD file upon receipt.

   MUD file  A file containing a MUD Yang file definition, as defined in
         [I-D.ietf-opsawg-mud]




Weis                     Expires April 28, 2017                 [Page 3]

Internet-Draft                 RADIUS-MUD                   October 2016


   MUD URI  A URI pointing to a MUD file, typically located on a web
         server.

2.  Acronyms and Abbreviations

   The following acronyms and abbreviations are used throughout this
   document

   DHCP  Dynamic Host Configuration Protocol

   IoT   Internet of Things

   LLDP  Link Layer Discovery Protocol

   MAB   MAC Authentication Bypass

   MUD   Manufacturer Usage Description

   NAS   Network Access Server

3.  Extended Attribute for the MUD URI

   This attribute is of type "TLV" as defined in the RADIUS Protocol
   Extensions [RFC6929].  It is named the MUD-URI Attribute, and is
   defined in Figure 2.

   0                   1                   2                   3
   0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |      Type     |     Length    | Extended-Type |    Value ...
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

                         Figure 2: MUD TLV format

   Type

      TBD1

   Length

      This field indicates the total length in bytes of all fields of
      this attribute, including the Type, Length, Extended-Type, and the
      entire length of the Value.

   Extended-Type

      TBD2




Weis                     Expires April 28, 2017                 [Page 4]

Internet-Draft                 RADIUS-MUD                   October 2016


   Value

      A MUD URI as defined in [I-D.ietf-opsawg-mud], and MUST conform to
      the syntax defined a URI [RFC3986].

4.  MUD URI processing

   When a NAS receives a MUD URI, it forwards it to a RADIUS server
   using the Extended Attribute described in Section 3.

   When a RADIUS server receives a MUD URI, it works in conjunction with
   a MUD Controller to retrieve the MUD file and processes it as
   described in [I-D.ietf-opsawg-mud].  They determine filter policies
   based on the MUD file, and the RADIUS server passes these filter
   policies to the NAS using commonly used RADIUS filter attributes.

   Finally, the NAS receives the RADIUS filter attributes and applies
   them to the network traffic associated with the new device.

5.  Security Considerations

   This document defines a RADIUS attribute, which does not affect the
   security considerations of the RADIUS protocol [RFC2865].

   Security considerations regarding the integrity of the MUD URI are
   outside the scope of this document, but it may be helpful to consider
   how a network using MAB might use a MUD URI.  When retrieved from an
   authenticated device a NAS does not absolutely know if this MUD file
   is correct for the device that proffers the MUD URI, but it can use
   the MUD file as a hint as to the type of device.  A NAS may be able
   to correlate the claimed device type with other policy for this
   device using other mechanisms.  It should also be noted that the
   intent of a MUD policy description is to severely limit the network
   access of the device (e.g., using filters), rather than grant wide
   access to a device.  Therefore, the action of proffering a MUD URI
   indicates a willingness to have its network access restricted rather
   than opened.

6.  IANA Considerations

   TBD1: One of the RADIUS Types that indicates an Extended Type

   TBD2: A RADIUS Extended Type value.








Weis                     Expires April 28, 2017                 [Page 5]

Internet-Draft                 RADIUS-MUD                   October 2016


7.  Acknowledgements

   The author thanks Nancy Cam-Winget for her thoughtful review, which
   resulted in substantial improvements to the memo.

8.  References

8.1.  Normative References

   [I-D.ietf-opsawg-mud]
              Lear, E., Droms, R., and D. Romascanu, "Manufacturer Usage
              Description Specification", draft-ietf-opsawg-mud-01 (work
              in progress), September 2016.

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119,
              DOI 10.17487/RFC2119, March 1997,
              <http://www.rfc-editor.org/info/rfc2119>.

   [RFC2865]  Rigney, C., Willens, S., Rubens, A., and W. Simpson,
              "Remote Authentication Dial In User Service (RADIUS)",
              RFC 2865, DOI 10.17487/RFC2865, June 2000,
              <http://www.rfc-editor.org/info/rfc2865>.

   [RFC3986]  Berners-Lee, T., Fielding, R., and L. Masinter, "Uniform
              Resource Identifier (URI): Generic Syntax", STD 66,
              RFC 3986, DOI 10.17487/RFC3986, January 2005,
              <http://www.rfc-editor.org/info/rfc3986>.

8.2.  Informative Reference

   [IEEE802.1AR]
              IEEE Computer Society, "802.1AR-2009 - IEEE Standard for
              Local and metropolitan area networks--Secure Device
              Identity", February 2010,
              <https://standards.ieee.org/findstds/standard/802.1AR-
              2009.html>.

   [IEEE802.1X]
              IEEE Computer Society, "802.1X-2010 - IEEE Standard for
              Local and metropolitan area networks--Port-Based Network
              Access Control", February 2010,
              <https://standards.ieee.org/findstds/standard/802.1X-
              2010.html>.







Weis                     Expires April 28, 2017                 [Page 6]

Internet-Draft                 RADIUS-MUD                   October 2016


   [RFC6929]  DeKok, A. and A. Lior, "Remote Authentication Dial In User
              Service (RADIUS) Protocol Extensions", RFC 6929,
              DOI 10.17487/RFC6929, April 2013,
              <http://www.rfc-editor.org/info/rfc6929>.

Author's Address

   Brian Weis
   Cisco Systems
   170 W. Tasman Drive
   San Jose, California  95134-1706
   USA

   Phone: +1 408 526 4796
   Email: bew@cisco.com




































Weis                     Expires April 28, 2017                 [Page 7]