Internet DRAFT - draft-xue-radext-key-management

draft-xue-radext-key-management







Network Working Group                                             L. Xue
Internet-Draft                                                  D. Zhang
Intended status: Informational                                    Huawei
Expires: January 5, 2015                                          B. Gao
                                                           China Telecom
                                                                  D. Liu
                                                            China Mobile
                                                            July 4, 2014


          RADIUS Extensions for Key Management in WLAN network
                   draft-xue-radext-key-management-03

Abstract

   When a mobile device (referred to as Station (STA)) tries to connect
   to a Wireless Local Area Network (WLAN), it needs to first perform
   mutual authentication with the EAP server of the network.  As a
   result of successful authentication, a Pairwise Master Key (PMK) will
   be generated, and distributed to the STA and the Authenticator of the
   network by the EAP server respectively.  The PMK is used for securing
   the subsequent communications between the STA and the Wireless
   Termination Point (WTP) it attaches to.  In practice, the
   authenticator may not be deployed on the WTP.  In this case, an
   approach is required to help the WTP to obtain the PMK.  This work
   tries to discuss the issues related with this topic and proposes a
   RADIUS extension to address the problem.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on January 5, 2015.







Xue, et al.              Expires January 5, 2015                [Page 1]

Internet-Draft          key management via radius              July 2014


Copyright Notice

   Copyright (c) 2014 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  Requirements Language . . . . . . . . . . . . . . . . . . . .   3
   3.  Terminology . . . . . . . . . . . . . . . . . . . . . . . . .   3
   4.  EAP in WLAN . . . . . . . . . . . . . . . . . . . . . . . . .   4
   5.  Motivation Scenario . . . . . . . . . . . . . . . . . . . . .   5
   6.  Protocol overview . . . . . . . . . . . . . . . . . . . . . .   8
     6.1.  RADIUS Commands for PMK Transportation  . . . . . . . . .   8
   7.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .  11
   8.  Security Considerations . . . . . . . . . . . . . . . . . . .  11
   9.  References  . . . . . . . . . . . . . . . . . . . . . . . . .  11
     9.1.  Normative References  . . . . . . . . . . . . . . . . . .  11
     9.2.  Informative References  . . . . . . . . . . . . . . . . .  12
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  13

1.  Introduction

   WLAN is now widely used by service operators as a complement of the
   cellular (2G/3G/LTE) networks, and Extensible Authentication Protocol
   (EAP)[RFC3748] is regarded as a widely preferred solution for STA
   authentication in WLAN.  When a STA tries to connect to the WLAN, it
   needs to mutually authenticate with the EAP server of the network
   first.

   According to the security requirements specified in [IEEE-802.11i], a
   successful EAP authentication procedure must result in a Pairwise
   Master Key (PMK) for the communication between the STA and the EAP
   server.  In addition, the EAP server also distribute the PMK to the
   Authenticator.

   In practice, the encryption/decryption operations on the STA traffics
   are carried out either on the WTP or the associated Access Controller



Xue, et al.              Expires January 5, 2015                [Page 2]

Internet-Draft          key management via radius              July 2014


   (AC) [RFC5416], and so they need to get the PMK to perform this job.
   In some deployment scenarios, the Authenticator may be deployed on a
   Gateway (GW) node rather than on the WTP or the AC.  In this case, a
   solution needs to be provided in order to forward keys to the WTP/AC.

   This document discribes the motivation scenario and further proposes
   a solution which extends RADIUS so as to enable an Authenticator to
   transfer PMKs to the associated WTPs or ACs.

2.  Requirements Language

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in [RFC2119].

3.  Terminology

   This document uses the same terminologies as found in [RFC5415]
   and[RFC5247].  Some of the terms defined in the document have been
   repeated in this section for the reader convenience, along with
   additional terminologies used by this document.

   Access Controller (AC)

   The network entity that provides WTP access to the network
   infrastructure in the data plane, control plane, management plane, or
   a combination therein.

   Authenticator

   The entity initiating EAP authentication.

   Backend Authentication Server

   A backend authentication server is an entity that provides an
   authentication service to an authenticator.  When used, this server
   typically executes EAP methods for the authenticator.  This
   terminology is also used in [IEEE-802.1X]

   EAP Server

   The entity that terminates the EAP authentication method with the
   supplicant.  In the case where no backend authentication server is
   used, the EAP server is part of the authenticator.  In the case where
   the authenticator operates in pass-through mode, the EAP server is
   located on the backend authentication server.  In this work, the
   latter case is considered.




Xue, et al.              Expires January 5, 2015                [Page 3]

Internet-Draft          key management via radius              July 2014


   Gateway (GW)

   A device in operator access network, who can charge the subscriber
   authentication and IP address management.

   Station (STA)

   A device that contains an interface to a wireless medium.  User
   equipment (UE) with (U)SIM is one type of STA.  In authentication
   procedure, STA is the Supplicant.

   Pairwise Master Key (PMK)

   PMK is a fresh symmetric key controlling STA's and the encryption/
   decryption node (WTP or AC) access to 802.11 channel during the
   session.

   Pairwise Transient Key (PTK)

   PTK is used to encrypt/decrypt unicast traffic for STA which is
   derived from the 4-way handshake [IEEE-802.11i].

   Group Temporal Key (GTK)

   GTK is used to encrypt/decrypt multicast/broadcast traffic for STA,
   which is derived from the 4-way handshake[IEEE-802.11i].

   Wireless Termination Point (WTP)

   The physical or logical network entity that contains an RF antenna
   and wireless physical layer (PHY) to transmit and receive station
   traffic for wireless access networks.

4.  EAP in WLAN

   In WLAN, EAP [RFC3748] messages are normally transported over RADIUS
   [RFC2865][RFC2866][RFC3579].  An example of end-to-end EAP
   authentication procedure in WLAN is illustrated in Figure 1.













Xue, et al.              Expires January 5, 2015                [Page 4]

Internet-Draft          key management via radius              July 2014


    Supplicant (STA)          Authenticator               EAP Server

    +-------+                  +-------+                  +-------+
    |       |                  |       |                  |       |
    |       |                  |       |                  |       |
    |       |                  |       |                  |       |
    +-------+                  +-------+                  +-------+

        |                          |                          |
        |EAP-Request Identity      |                          |
        |<-------------------------+                          |
        |EAP-Response Identity     |                          |
        |                          |                          |
        |------------------------->|                          |
        |                          |    RADIUS Access Request |
        |                          +------------------------->|
        |               EAP type specific                     |
        |             mutual authentication                   |
        |<-------------------------o------------------------->|
        |                          |                          |
        |                          |RADIUS Access Accept(with PMK)
        |                          |<-------------------------+
        |   EAP-Success            |                          |
        |<-------------------------+                          |
        |                          |                          |


                         Figure 1.  EAP Procedure

   In the EAP authentication framework, there are three entities:

   o  Supplicant: The end of the link that responds to the
      Authenticator.  In this work, a supplicant is actually a STA.

   o  Authenticator: An entity that facilitates authentication of other
      entities attached to the same LAN.  In a WLAN, an Authenticator
      could be deployed on WTP, AC or GW according to the operator's
      requirements.

   o  EAP Server : An entity provides an authentication service to an
      authenticator.  In this work, it is assumed that an EAP server is
      deployed on a backend device (e.g., AAA server).

5.  Motivation Scenario

   The architecture of a typical hotspot WLAN deployment [BBF-WT-321] is
   shown in Figure 2 .




Xue, et al.              Expires January 5, 2015                [Page 5]

Internet-Draft          key management via radius              July 2014


                                   +--------+  +--------+
                                   | AAA    |  |  DHCP  |
                                   +---\----+  +----/---+
                                         \         /
                                           \     /            /----\
   +----+    +--------+     +--------+     +-+--+---+        /      \
   |STA +----+  WTP   +-----+  AC    +-----+  GW    +-------| IP MAN |
   +----+    +--------+     +--------+     +--------+        \      /
                                                              \----/

                        Figure 2 WLAN architecture

   As illustrated in this diagram:

   o  AC and GW are deployed separately.

   o  AC is responsible for AP management as [RFC5415].

   o  GW is responsible to provide IP address management and traffic
      management ( e.g., QoS, Charging, Remark, etc) for each STA
      attached to it.  When a STA attempts to access the WLAN, GW will
      assign an IPv4 address to the STA after the STA has been
      authenticated.  In addition, based on the privileges associated
      with a STA, GW can decide whether to forward (maybe certain types
      of) STA traffics not.

   Assuming a STA is attached to the WLAN.  After a successful EAP
   session, the GW needs to obtain sufficient information about the STA
   (including authentication and authorization results) to provide IP
   address management and traffic management.  There are two candidate
   solutions to achieve this.

   The first solution is to deploy the Authenticator on the AC.  In this
   case the GW can act as a RADIUS PROXY during EAP procedure to get the
   STA information, as shown in figure 3Figure 1.  In this solution,
   both the GW and the AC MUST be involved with the EAP authentication
   procedure, and the STA related information needs to be redundantly
   maintained on both the GW and the AC.  In addition, this solution
   will make ACs more complex.  Especially, in the scenarios where there
   are large amount of WTPs, ACs MUST be deployed close to the WTPs
   because of normally a AC is only able to manage a limited number of
   WTPs.  As a result, there will be a large amount of ACs in the
   network, which could be costly for operators and could introduce
   enormous management costs on both EAP servers and ACs.  Moreover, the
   encryption of the communication between EAP server and ACs may damage
   the effectiveness of this solution.





Xue, et al.              Expires January 5, 2015                [Page 6]

Internet-Draft          key management via radius              July 2014


   The second solution is to deploy the Authenticator on the GW.  This
   solution can largely avoid this issues occurred in the first
   solution.  ACs do not have to support EAP procedures, and the number
   of GWs could be much less than the number of ACs in a WLAN.
   Especially, some operators prefer to forward the customer data packet
   to GW rather than AC in order to meet the scalability requirement
   [I-D.ietf-opsawg-capwap-alt-tunnel] . In this scenario, GW is
   preferred to be the Authenticator in order to achieve customer
   traffic management based on the customer authentication and
   authorization result.  However, in the second solution, the GW needs
   to find a way to forward the PMK to the AC,which is the objective of
   this work.

                                  Authenticator               EAP Server

    +-------+   +----+    +----+    +-------+                  +-------+
    |       |   |    |    |    |    |       |                  |       |
    |  STA  |   |WTP |    | AC |    |  GW   |                  |  EAP  |
    |       |   |    |    |    |    |       |                  | Server|
    +-------+   +----+    +----+    +-------+                  +-------+

      |                     |           |                          |
      |EAP-Request Identity |           |                          |
      <---------------------+           |                          |
      |EAP-Response Identity|           |                          |
      |-------------------->|           |                          |
      |                     |     RADIUS Access Request            |
      |                     +----------->------------------------->|
      |                     |           |                          |
      |                     |     RADIUS Access Challenge          |
      |                     |<----------<--------------------------|
      |   EAP Exchange      |           |                          |
      |<------------------->|           |                          |
      |                     |     RADIUS|Access Request            |
      |                     +----------->------------------------->|
      |                     |           |                          |
      |                     |     RADIUS Access Accept             |
      |                     |<----------<--------------------------|
      |    EAP Success      |           |                          |
      |<--------------------+           |                          |
      |                     |           |                          |
      |          DHCP Exchange          |                          |
      |<--------------------+---------->|                          |
      |                     |           |   Accounting             |
      |                     |           +---------------------->   |

                Figure 1: Figure 3 GW acts as RADIUS PROXY




Xue, et al.              Expires January 5, 2015                [Page 7]

Internet-Draft          key management via radius              July 2014


6.  Protocol overview

   As introduced above, the encryption/decryption operations could be
   performed on either AC or WTP.  If the AC is the encryption/
   decryption node, the Authenticator then needs to send the PMK to AC.
   If the WTP is the encryption/decryption node, the Authenticator can
   also send the PMK to AC, and AC then forwards the PMK to WTP via
   protocol defined in [RFC4564].  Therefore, this work specifies three
   RADIUS commands and a set of attributes for PMK transportation from
   Authenticator(GW) to AC, i.e., Key-of-Announcement (KoA), KoA-ACK and
   KoA-NAK.

   The PMK transportation is trigged when the Authenticator receives a
   RADIUS Accept message in EAP session which indicates the
   authentication success.

6.1.  RADIUS Commands for PMK Transportation

                                          Authenticator
    +---------+                            +---------+
    |         |                            |         |
    |         |                            |         |
    |  AC     |                            |   GW    |
    |         |                            |         |
    +---------+                            +---------+

        |                                       |
        |            KoA Message                |
        |<--------------------------------------|
        |                                       |
        |                                       |
        |                                       |
        |            KoA ACK/NAK Message        |
        |-------------------------------------> |
        |                                       |
        |                                       |
        |                                       |
        |                                       |

              Figure 4 RADIUS Commands for PMK Transportation

   As illustrated in the above figure, during the authentication
   procedure between a STA and a EAP server, the GW acts as an
   Authenticator.  The GW constructs a KoA message and forwards the
   message to the AC when it obtains the PMK carried in the RADIUS
   Accept message from EAP server.  The AC responds with a KoA-ACK
   message after successfully accept the PMK.  Otherwise, the AC
   responds with a KoA-NAK.



Xue, et al.              Expires January 5, 2015                [Page 8]

Internet-Draft          key management via radius              July 2014


   The commands use the format of Change-of-Authorization Messages (CoA)
   [RFC5176], presented as follows

    0                 1                   2                   3
      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     |     Code      |  Identifier   |            Length             |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     |                                                               |
     |                         Authenticator                         |
     |                                                               |
     |                                                               |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     |  Attributes ...
     +-+-+-+-+-+-+-+-+-+-+-+-+-

                          Figure 5 Packet Format

   Code

   The Code field is one octet, and identifies the type of RADIUS
   packet.  Three new RADIUS codes are defined.

   o  100 - Key-of-Announcement

   o  101 - KoA-ACK

   o  102 - KoA-NAK

   Identifier

   This field is one octet, and aids in matching requests and replies.
   This value is set by GW when GW sends the KoA message to the AC.  It
   is used to identifier a pair of KoA and KoA-ACK/NAK message.  The
   Identifier field must be changed by GW whenever a valid reply has
   been received for a previous request.

   Authenticator

   The same as defined in [RFC5176].

   The following attributes should be included in KoA, KoA-ACK and KoA-
   NAK messages.

   o  Calling-Station-Id.  This attribution is used to take the STA
      identifier, for example MAC address.  It can be used to bind the
      PMK to a special STA.  This attribute may include within KoA, KoA-
      ACK and KoA-NAK messages.  The values are shown below.



Xue, et al.              Expires January 5, 2015                [Page 9]

Internet-Draft          key management via radius              July 2014


   Type

   31 as defined in [RFC5176].

   Length

   8

   Value

   The Value field is 6 octets, containing the STA MAC address.

   o  Keying-Material.  This attribute is used by GW to transport the
      PMK to the AC.  This attribute may include within KoA, KoA-ACK and
      KoA-NAK messages.  The format and the values are shown below.

    0               1               2                 3             4
     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |     Type      |    Length     |            Value              |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |                                                               |
    |                         Value                                 |
    ~                                                               ~
    |                                                               |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

                 Figure 6 Keying-Material Attribute Format

   Type

   The type could be an unassigned type right now.  In this
   specification, type 17 is recommended.

   Length

   34

   Value

   The Value field is 32 octets, containing the PMK information.

   o  KoA-Feedback.  It is responsible to provide the feedback when AC
      receives the KoA command from GW.  This attribute may include
      within KoA-ACK/NAK messages.  The format is shown below.






Xue, et al.              Expires January 5, 2015               [Page 10]

Internet-Draft          key management via radius              July 2014


    0               1               2                 3             4
     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |     Type      |    Length     |            Value              |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

                  Figure 7 KoA-Feedback Attribute Format

   Type

   The type could be an unassigned type right now.  In this
   specification, type 21 is recommended.  Considering the
   compatibility, the type 18 can also be used referenced in[RFC2865].

   Length

   4

   Value

   The Value field is 2 octets, containing the feedback from the AC when
   received the KoA message.  It could be reasons for PMK transportation
   fails.

7.  IANA Considerations

   TBD

8.  Security Considerations

   TBD

9.  References

9.1.  Normative References

   [BBF-WT-321]
              "Public Wi-Fi Access in Multi-service Broadband Networks",
              January 2014.

   [IEEE-802.11i]
              "Institute of Electrical and Electronics Engineers,
              "Unapproved Draft Supplement to Standard for
              Telecommunications and Information Exchange Between
              Systems-LAN/MAN Specific Requirements -Part 11: Wireless
              LAN Medium Access Control (MAC) and Physical Layer (PHY)
              Specifications: Specification for Enhanced Security" "",
              September 2004.



Xue, et al.              Expires January 5, 2015               [Page 11]

Internet-Draft          key management via radius              July 2014


   [IEEE-802.1X]
              "Institute of Electrical and Electronics Engineers, "Local
              and Metropolitan Area Networks: Port-Based Network Access
              Control"", September 2001.

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119, March 1997.

   [RFC2865]  Rigney, C., Willens, S., Rubens, A., and W. Simpson,
              "Remote Authentication Dial In User Service (RADIUS)", RFC
              2865, June 2000.

   [RFC2866]  Rigney, C., "RADIUS Accounting", RFC 2866, June 2000.

   [RFC3579]  Aboba, B. and P. Calhoun, "RADIUS (Remote Authentication
              Dial In User Service) Support For Extensible
              Authentication Protocol (EAP)", RFC 3579, September 2003.

   [RFC3748]  Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., and H.
              Levkowetz, "Extensible Authentication Protocol (EAP)", RFC
              3748, June 2004.

   [RFC4564]  Govindan, S., Cheng, H., Yao, ZH., Zhou, WH., and L. Yang,
              "Objectives for Control and Provisioning of Wireless
              Access Points (CAPWAP)", RFC 4564, July 2006.

   [RFC5176]  Chiba, M., Dommety, G., Eklund, M., Mitton, D., and B.
              Aboba, "Dynamic Authorization Extensions to Remote
              Authentication Dial In User Service (RADIUS)", RFC 5176,
              January 2008.

   [RFC5247]  Aboba, B., Simon, D., and P. Eronen, "Extensible
              Authentication Protocol (EAP) Key Management Framework",
              RFC 5247, August 2008.

   [RFC5415]  Calhoun, P., Montemurro, M., and D. Stanley, "Control And
              Provisioning of Wireless Access Points (CAPWAP) Protocol
              Specification", RFC 5415, March 2009.

   [RFC5416]  Calhoun, P., Montemurro, M., and D. Stanley, "Control and
              Provisioning of Wireless Access Points (CAPWAP) Protocol
              Binding for IEEE 802.11", RFC 5416, March 2009.

9.2.  Informative References







Xue, et al.              Expires January 5, 2015               [Page 12]

Internet-Draft          key management via radius              July 2014


   [I-D.ietf-opsawg-capwap-alt-tunnel]
              Zhang, R., Cao, Z., Deng, H., Pazhyannur, R., Gundavelli,
              S., and L. Xue, "Alternate Tunnel Encapsulation for Data
              Frames in CAPWAP", draft-ietf-opsawg-capwap-alt-tunnel-00
              (work in progress), May 2014.

Authors' Addresses

   Li Xue
   Huawei
   No.156 Beiqing Rd. Z-park, Shi-Chuang-Ke-Ji-Shi-Fan-Yuan,
   Beijing, HaiDian District  100095
   China

   Email: xueli@huawei.com


   Dacheng Zhang
   Huawei
   Beijing
   China

   Email: zhangdacheng@huawei.com


   Bo Gao
   China Telecom
   No. 1835, South Pudong Road
   Shanghai  200122
   China

   Email: gaobo@sttri.com.cn


   Dapeng Liu
   China Mobile
   Unit 2, 28 Xuanwumenxi Ave, Xuanwu District
   Beijing  100053
   China

   Email: liudapeng@chinamobile.com










Xue, et al.              Expires January 5, 2015               [Page 13]