Network Working Group                                         K. Gaonkar
Internet-Draft                           Georgia Institute of Technology
Intended status: Standards Track                              L. Dondeti
Expires: June 15, 2008                                      V. Narayanan
                                                          QUALCOMM, Inc.
                                                       December 13, 2007


     RADIUS attributes for Domain-specific Key Request and Delivery
                   draft-gaonkar-radext-erp-attrs-02

Status of this Memo

   By submitting this Internet-Draft, each author represents that any
   applicable patent or other IPR claims of which he or she is aware
   have been or will be disclosed, and any of which he or she becomes
   aware will be disclosed, in accordance with Section 6 of BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt.

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

   This Internet-Draft will expire on June 15, 2008.

Copyright Notice

   Copyright (C) The IETF Trust (2007).

Abstract

   This document specifies the Key-Request and Key-Response attributes
   in Remote Authentication and Dial-In User Service (RADIUS).  These
   attributes can be used by a visited network entity to request a key
   from the home network and the home domain to deliver the key to the
   visited network entity; the request and response may be piggy-backed
   on the EAP authentication or EAP Re-authentication bootstrapping



Gaonkar, et al.           Expires June 15, 2008                 [Page 1]


Internet-Draft       RADIUS Key Request and Response       December 2007


   exchange between the user and the user's home RADIUS server or may be
   part of a separate exchange.


Table of Contents

   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  3
   2.  Terminology  . . . . . . . . . . . . . . . . . . . . . . . . .  3
   3.  RADIUS Key-Request Attribute . . . . . . . . . . . . . . . . .  3
   4.  RADIUS Key-Response Attribute  . . . . . . . . . . . . . . . .  4
   5.  Security Considerations  . . . . . . . . . . . . . . . . . . .  6
   6.  IANA Considerations  . . . . . . . . . . . . . . . . . . . . .  7
   7.  Acknowledgments  . . . . . . . . . . . . . . . . . . . . . . .  7
   8.  References . . . . . . . . . . . . . . . . . . . . . . . . . .  8
     8.1.  Normative References . . . . . . . . . . . . . . . . . . .  8
     8.2.  Informative References . . . . . . . . . . . . . . . . . .  8
   Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . .  8
   Intellectual Property and Copyright Statements . . . . . . . . . . 10

































Gaonkar, et al.           Expires June 15, 2008                 [Page 2]


Internet-Draft       RADIUS Key Request and Response       December 2007


1.  Introduction

   This document specifies two new RADIUS [1] attributes for the purpose
   of a user's visited domain entity to request a cryptographic key from
   the home RADIUS server, and for the home RADIUS server to deliver the
   key to the visited domain entity that sent the request.  The request
   and response may be piggy-backed on EAP authentication [5] or EAP Re-
   authentication bootstrapping exchanges [6] between the user and the
   user's home RADIUS server or may be part of a separate exchange.

   The Extended Master Session Key (EMSK) hierarchy specified in [2]
   contains Domain-Specific Root Keys (DSRK) specific to an
   administrative domain.  It is plausible for a visited domain entity
   to request the home domain for a DSRK from the user's home RADIUS
   server during EAP authentication or EAP Re-authentication
   bootstrapping protocol exchange.  There is also proposed work on
   specifying a generic DSRK request protocol.  When RADIUS is used as
   the AAA protocol, the Key-Request attribute specified in this
   document is used for requesting a key and the Key-Response attribute
   is used to deliver the key.

   The key-request attribute contains the requesting entity's identity
   and the type of the key being requested.

   The key-response attribute contains the requesting entity's identity,
   the type of the key, the key itself, its length, name and lifetime.


2.  Terminology

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC 2119 [3].


3.  RADIUS Key-Request Attribute

   Description

      The RADIUS Key-Request attribute provides a means for a visited
      domain server to request a key from the home domain of the user.
      This attribute MAY be used in Access-Request messages by a visited
      domain server and MUST NOT be used in Access-Challenge, Access-
      Accept or Access-Reject messages.







Gaonkar, et al.           Expires June 15, 2008                 [Page 3]


Internet-Draft       RADIUS Key Request and Response       December 2007


      Other than the 1-octet Type and Length fields, this attribute has
      a 1-octet field to indicate the type of the key being requested
      and a variable length field to carry the Requesting Entity's
      Identity.

      The Requesting Entity's Identity is to be copied in the
      corresponding Key-Response attribute.


        0                   1                   2                   3
        0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |     Type      |     Length    |    Key Type   | Requesting    ~
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       ~     Entity's Identity (String)    ...
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+


                      Figure 1: Key-Request Attribute

   Type

      IANA-TBD for Key-Request

   Length

      >= 4

   Key Type

      This 1-octet field indicates the type of the key being requested:

         0 .......  Reserved

         1 .......  Domain-Specific Root Key (DSRK)

   Requesting Entity's Identity  The Requesting Entity's Identity is a
      string, and typically takes the form of a fully qualified domain
      name (FQDN).


4.  RADIUS Key-Response Attribute

   Description







Gaonkar, et al.           Expires June 15, 2008                 [Page 4]


Internet-Draft       RADIUS Key Request and Response       December 2007


      The RADIUS Key-Response attribute MAY be included in the Access-
      Accept message by the user's home RADIUS server to send the
      requested key type, key, its name, length, and lifetime.  In
      addition, the requesting entity's identity MAY be included.  This
      attribute MUST NOT be used in Access-Request, Access-Challenge or
      Access-Reject messages.

      Other than the 1-octet Type and Length fields, this attribute has
      a 1-octet field to indicate the type of the key being included, a
      1-octet key length field, a 4-octet key lifetime field, an 8-octet
      key name field, a variable length field to carry the key and
      optionally a variable length field to carry the Requesting
      Entity's Identity.

      The Requesting Entity's Identity is to be copied from the
      corresponding Key-Request attribute.


        0                   1                   2                   3
        0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |     Type      |     Length    |    Key Type   |  Key Length   ~
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |   Key Lifetime (4 Octets)...                                  ~
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |   Key Name (8 Octets)...                                      ~
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |   Key (Variable)                                              ~
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |  Requesting Entity's Identity (String, Variable) Optional ... ~
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+


                     Figure 2: Key-Response Attribute

   Type

      IANA-TBD for Key-Response

   Length

      >= 80

   Key Type







Gaonkar, et al.           Expires June 15, 2008                 [Page 5]


Internet-Draft       RADIUS Key Request and Response       December 2007


      This 1-octet field indicates the type of the key being requested.
      This value is copied from the corresponding Key-Request attribute.

   Key Length

      This 1-octet field indicates the length of the key in octets.
      Since the length of the entire message is also included with a
      1-octet field, key length cannot be larger than 240 octets.  If
      the optional attribute "Requesting Entity's Identity" is included
      in the message, the key length is smaller.  Key length MUST be at
      least 64 octets.

   Key Lifetime

      The key lifetime in seconds is indicated within a 4-octet field.

   Key Name

      The key name field in 8 octets in size.

   Key

      The key of type Key Type is included in this field.  This is a
      variable length field.

      A stricter version of RFC 3756 requirements apply for RADIUS
      messages carrying Key-Response Attribute(s).  Implementations of
      this specification MUST support IPsec along with IKEv2 for key
      management.  IPsec ESP with a non-null transform MUST be
      supported, and IPsec ESP with a non-null encryption transform and
      authentication support is necessary to provide per-packet
      confidentiality, authentication, integrity and replay protection.

   Requesting Entity's Identity  The Requesting Entity's Identity is a
      string, and typically takes the form of a fully qualified domain
      name (FQDN).  This field is optional.  Given that the Key Length
      must be at least 64 octets, this field can at most be 192 octets
      in length.


5.  Security Considerations

   A stricter version of RFC 3756 requirements apply for RADIUS messages
   carrying Key-Response Attribute(s).  Implementations of this
   specification MUST support IPsec along with IKEv2 for key management.
   IPsec ESP with a non-null transform MUST be supported, and IPsec ESP
   with a non-null encryption transform and authentication support is
   necessary to provide per-packet confidentiality, authentication,



Gaonkar, et al.           Expires June 15, 2008                 [Page 6]


Internet-Draft       RADIUS Key Request and Response       December 2007


   integrity and replay protection.

   EAP Channel bindings may be necessary to ensure that the RADIUS user
   and the server are in synchronization regarding the key Requesting
   Entity's Identity.  Specifically, the Requesting Entity advertises
   its identity through the EAP lower layer and the user or the EAP peer
   communicates that identity to the EAP server (and the EAP server
   communicates that identity to the RADIUS server) via the EAP method
   for user/peer to server verification of the Requesting Entity's
   Identity.


6.  IANA Considerations

   This document specifies the following IANA registrations in the
   RADIUS Attribute Types Registry at
   http://www.iana.org/assignments/radius-types

      Key-Request

      Key-Response

   Within the attributes Key-Request and Key-Response, a Key Type field
   is being specified with the following assignments and rules:

      0 .......  Reserved

      1 .......  Domain-Specific Root Key (DSRK)

      2-191 .....  IANA-managed (Expert Review)

      192-223 .......  Experimental Use

      224-255 ......  Private Use


7.  Acknowledgments

   This work originated from Kedar's work as an intern at QUALCOMM;
   Kedar wants to thank QUALCOMM for their support.  Thanks to Vidya
   Narayanan, Raymond Hsu, Jun Wang, Fatih Ulupinar for their review and
   comments.


8.  References






Gaonkar, et al.           Expires June 15, 2008                 [Page 7]


Internet-Draft       RADIUS Key Request and Response       December 2007


8.1.  Normative References

   [1]  Rigney, C., Willens, S., Rubens, A., and W. Simpson, "Remote
        Authentication Dial In User Service (RADIUS)", RFC 2865,
        June 2000.

   [2]  Salowey, J., Dondeti, L., Narayanan, V., and M. Nakhjiri,
        "Specification for the Derivation of Root Keys from an Extended
        Master  Session Key (EMSK)", draft-ietf-hokey-emsk-hierarchy-02
        (work in progress), November 2007.

   [3]  Bradner, S., "Key words for use in RFCs to Indicate Requirement
        Levels", BCP 14, RFC 2119, March 1997.

   [4]  Narten, T. and H. Alvestrand, "Guidelines for Writing an IANA
        Considerations Section in RFCs",
        draft-narten-iana-considerations-rfc2434bis-08 (work in
        progress), October 2007.

8.2.  Informative References

   [5]  Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., and H.
        Levkowetz, "Extensible Authentication Protocol (EAP)", RFC 3748,
        June 2004.

   [6]  Narayanan, V. and L. Dondeti, "EAP Extensions for EAP Re-
        authentication Protocol (ERP)", draft-ietf-hokey-erx-08 (work in
        progress), November 2007.

   [7]  Housley, R. and B. Aboba, "Guidance for AAA Key Management",
        draft-housley-aaa-key-mgmt-09 (work in progress), February 2007.

   [8]  Arkko, J. and H. Haverinen, "Extensible Authentication Protocol
        Method for 3rd Generation Authentication and Key Agreement (EAP-
        AKA)", RFC 4187, January 2006.

   [9]  Clancy, C., Nakhjiri, M., Narayanan, V., and L. Dondeti,
        "Handover Key Management and Re-authentication Problem
        Statement", draft-ietf-hokey-reauth-ps-07 (work in progress),
        November 2007.











Gaonkar, et al.           Expires June 15, 2008                 [Page 8]


Internet-Draft       RADIUS Key Request and Response       December 2007


Authors' Addresses

   Kedar Gaonkar
   Georgia Institute of Technology
   Atlanta, GA
   USA

   Phone: +1 404-201-0432
   Email: kgaonkar3@gatech.edu


   Lakshminath Dondeti
   QUALCOMM, Inc.
   5775 Morehouse Dr
   San Diego, CA
   USA

   Phone: +1 858-845-1267
   Email: ldondeti@qualcomm.com


   Vidya Narayanan
   QUALCOMM, Inc.
   5775 Morehouse Dr
   San Diego, CA
   USA

   Phone: +1 858-845-2483
   Email: vidyan@qualcomm.com






















Gaonkar, et al.           Expires June 15, 2008                 [Page 9]


Internet-Draft       RADIUS Key Request and Response       December 2007


Full Copyright Statement

   Copyright (C) The IETF Trust (2007).

   This document is subject to the rights, licenses and restrictions
   contained in BCP 78, and except as set forth therein, the authors
   retain all their rights.

   This document and the information contained herein are provided on an
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
   THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
   OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
   THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.


Intellectual Property

   The IETF takes no position regarding the validity or scope of any
   Intellectual Property Rights or other rights that might be claimed to
   pertain to the implementation or use of the technology described in
   this document or the extent to which any license under such rights
   might or might not be available; nor does it represent that it has
   made any independent effort to identify any such rights.  Information
   on the procedures with respect to rights in RFC documents can be
   found in BCP 78 and BCP 79.

   Copies of IPR disclosures made to the IETF Secretariat and any
   assurances of licenses to be made available, or the result of an
   attempt made to obtain a general license or permission for the use of
   such proprietary rights by implementers or users of this
   specification can be obtained from the IETF on-line IPR repository at
   http://www.ietf.org/ipr.

   The IETF invites any interested party to bring to its attention any
   copyrights, patents or patent applications, or other proprietary
   rights that may cover technology that may be required to implement
   this standard.  Please address the information to the IETF at
   ietf-ipr@ietf.org.


Acknowledgment

   Funding for the RFC Editor function is provided by the IETF
   Administrative Support Activity (IASA).





Gaonkar, et al.           Expires June 15, 2008                [Page 10]