AAA Working Group                                    Mark Beadles, UUNET
INTERNET-DRAFT                                             Bernard Aboba
Category: Informational                                        Glen Zorn
<draft-ietf-aaa-na-reqts-00.txt>                               Microsoft
20 October 1999                                               Tom Hiller
                                                             Pete McCann
                                                           Hajime Shiino
                                                                  Lucent
                                      Gopal Dommety, Cisco Systems, Inc.
                                                         Steven M. Glass
                                                         Charles Perkins
                                                Nokia Telecommunications
                                         Stuart Jacobs, GTE Laboratories
                                                         Basavaraj Patil
                                                           Serge Manning
                                                         Nortel Networks
                                                    Pat Walsh, Ameritech
                                                      Xing Chen, Alcatel
                                               Mark Munson, GTE Wireless
                                                   Sanjeevan Sivalingham
                                        Ericsson Wireless Communications
                    Byng-Keun Lim, LG Information & Communications, Ltd.
                                               Brent Hirschman, Motorola
                                                 Ray Hsu, Qualcomm, Inc.
                     Haeng Koo, Samsung Telecommunications America, Inc.
                                                Mark Lipford, Sprint PCS
                                           Pat Calhoun, Sun Microsystems
                                         Eric Jaques, Vodaphone Airtouch
                                           Yingchun Xu, 3Com Corporation
                            Shinich Baba, Toshiba America Research, Inc.
                                         Takahiro Ayaki, DDI Corporation
                                             Takuo Seki, IDO Corporation
                                                    Alan Hameed, Fujitsu

        Criteria for Evaluating AAA Protocols for Network Access

This document is an Internet-Draft and is in full conformance with all
provisions of Section 10 of RFC2026.

Internet-Drafts are working documents of the Internet Engineering Task
Force (IETF), its areas, and its working groups.  Note that other groups
may also distribute working documents as Internet-Drafts.  Internet-
Drafts are draft documents valid for a maximum of six months and may be
updated, replaced, or obsoleted by other documents at any time.  It is
inappropriate to use Internet-Drafts as reference material or to cite
them other than as "work in progress."

     The list of current Internet-Drafts can be accessed at
     http://www.ietf.org/ietf/1id-abstracts.txt

     The list of Internet-Draft Shadow Directories can be accessed at
     http://www.ietf.org/shadow.html.

To view the list Internet-Draft Shadow Directories, see

Beadles, et al.               Informational                     [Page 1]


INTERNET-DRAFT   Network Access AAA Evaluation Criteria  20 October 1999

http://www.ietf.org/shadow.html.

The distribution of this memo is unlimited.  It is filed as <draft-ietf-
aaa-na-reqts-00.txt>, and expires May 1, 2000. Please send comments to
the authors.

1.  Copyright Notice

Copyright (C) The Internet Society (1999).  All Rights Reserved.

2.  Abstract

This document represents a summary of AAA protocol requirements for
network access. In creating this documents, inputs were taken from
documents produced by the NASREQ, ROAMOPS, and MOBILEIP working groups,
as well as from TIA 45.6. This document summarizes the requirements
collected from those sources, separating requirements for
authentication, authorization and accounting.  Details on the
requirements are available in the original documents.

3.  Introduction

This document represents a summary of AAA protocol requirements for
network access. In creating this documents, inputs were taken from
documents produced by the NASREQ, ROAMOPS, and MOBILEIP working groups,
as well as from TIA 45.6. This document summarizes the requirements
collected from those sources, separating requirements for
authentication, authorization and accounting.  Details on the
requirements are available in the original documents.

3.1.  Requirements language

In this document, the key words "MAY", "MUST,  "MUST  NOT",  "optional",
"recommended",  "SHOULD",  and  "SHOULD  NOT",  are to be interpreted as
described in [1].

Please note that the requirements specified in this document are to be
used in evaluating AAA protocol submissions.  As such, the requirements
language refers to capabilities of these protocols; the protocol
documents will specify whether these features are required, recommended,
or optional.  For example, requiring that a protocol support
confidentiality is NOT the same thing as requiring that all protocol
traffic be encrypted.

A protocol submission is not compliant if it fails to satisfy one or
more of the MUST or MUST NOT requirements for the capabilities that it
implements.  A protocol submission that satisfies all the MUST, MUST
NOT, SHOULD and SHOULD NOT requirements for its capabilities is said to

Beadles, et al.               Informational                     [Page 2]


INTERNET-DRAFT   Network Access AAA Evaluation Criteria  20 October 1999

be "unconditionally compliant"; one that satisfies all the MUST and MUST
NOT requirements but not all the SHOULD or SHOULD NOT requirements for
its protocols is said to be "conditionally compliant."

4.  Requirements Summary

The criteria for evaluation of AAA protocols for network access are
summarized below. Details of the requirements are available from the
references described in the footnotes.

4.1.  Authentication Requirements

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
| Authentication            | NASREQ  | ROAMOPS | MOBILE  |  TIA    |
| Reqts.                    |         |         |   IP    |  45.6   |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|   PPP Support             |    M    |   M     |    O    |    M    |
|                           |    8    |   1     |   29    |    42   |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|   SLIP Support            |         |   O     |    O    |         |
|                           |         |   1     |         |         |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|   Scripting Support       |         |   B     |    O    |         |
|                           |         |   1     |         |         |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|   NAI Support             |    M    |   M     |    S    |    M    |
|                           |    9    |   2     |   30    |    43   |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|   CHAP Support            |    M    |   M     |    O    |    M    |
|                           |   10    |   3     |         |    44   |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|   EAP Support             |    M    |   S     |    O    |         |
|                           |   10    |   3     |         |         |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Beadles, et al.               Informational                     [Page 3]


INTERNET-DRAFT   Network Access AAA Evaluation Criteria  20 October 1999

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|   PAP Support             |    M    |   B     |    O    |         |
|                           |   10    |   3     |         |         |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|   Scalability             |         |   M     |    M    |    M    |
|                           |         |   3     |         |    44   |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|   Bi-directional Auth     |    M    |         |         |         |
|                           |   16    |         |         |         |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|   Dynamic Authentication  |    M    |         |         |         |
|                           |   17    |         |         |         |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|   Indentification Only    |    M    |         |         |    S    |
|   without Authentication  |    9    |         |         |         |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|  End-to-End per-attribute |    M    |   M     |    S    |         |
|   confidentiality         |   26    |   6     |    31   |         |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|  End-to-End per-attribute |         |   M     |    S    |         |
|  integrity                |         |   6     |    31   |         |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|  Certificate validation   |         |         |   S     |    S    |
|                           |         |         |   38    |    45   |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|  Trust establishment via  |         |         |   M     |         |
|  brokers                  |         |         |   31    |         |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Beadles, et al.               Informational                     [Page 4]


INTERNET-DRAFT   Network Access AAA Evaluation Criteria  20 October 1999

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|  Anonymous access by local|         |         |   M     |         |
|  AAA server               |         |         |   36    |         |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|  Reliable AAA transport   |         |         |   M     |    M    |
|  mechanism                |         |         |   36    |    43   |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|  Support Proxy and Non-   |         |         |         |    M    |
|  Proxy Brokers            |         |         |         |    43   |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Key
M = MUST
S = SHOULD
O = MAY
N = MUST NOT
B = SHOULD NOT

Beadles, et al.               Informational                     [Page 5]


INTERNET-DRAFT   Network Access AAA Evaluation Criteria  20 October 1999

4.2.  Authorization Requirements

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
| Authorization             | NASREQ  | ROAMOPS | MOBILE  |  TIA    |
| Reqts.                    |         |         |   IP    |  45.6   |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|   IPv4  Support           |    M    |   M     |   M     |    M    |
|                           |   11    |   1     |   32    |         |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|   IPv6  Support           |    M    |         |   S     |         |
|                           |   11    |   1     |  33     |         |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|   non-IP  Support         |         |   O     |   O     |         |
|                           |         |   1     |         |         |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|   RADIUS gateway          |    S    |   M     |   O     |    M    |
|   capability              |   12    |   3     |         |    46   |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|   Policy                  |         |   M     |         |         |
|   compatibility           |         |   4     |         |         |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|   Dynamic address         |    M    |   M     |   M     |    M    |
|   assignment              |   11    |   5     |   34    |         |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|   Static address          |         |   O     |   M     |         |
|   assignment              |         |   5     |   32    |         |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|   Precludes layer 2       |    N    |   N     |   O     |         |
|   tunneling               |   11    |   5     |         |         |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Beadles, et al.               Informational                     [Page 6]


INTERNET-DRAFT   Network Access AAA Evaluation Criteria  20 October 1999

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|   Precludes Mobile IP     |         |   N     |   N     |    N    |
|                           |         |   5     |         |         |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|   Non-repudiation         |         |         |   O     |    M    |
|                           |         |   6     |   35    |    43   |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|   Fraud prevention and    |         |   M     |   O     |    S    |
|   detection               |         |   6     |         |         |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|   Hop-by-hop security     |         |   M     |   S     |    M    |
|   (privacy, integrity)    |         |   6     |   35    |    43   |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|   IPSEC compatibility     |    S    |   O     |    O    |    M    |
|                           |   28    |   6     |         |    43   |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|  End-to-End per-attribute |    M    |   M     |   O     |    M    |
|   confidentiality         | 13, 27  |   6     |         |    43   |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|  End-to-End per-attribute |         |   M     |   O     |    M    |
|  integrity                |         |   6     |   31    |    43   |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|  Dynamic Authorization    |    M    |         |   S     |         |
|                           |   18    |         |         |         |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|  Support for Access Rules,|    M    |         |   O     |         |
|  Restrictions, Filters    | 11, 19  |         |         |         |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Beadles, et al.               Informational                     [Page 7]


INTERNET-DRAFT   Network Access AAA Evaluation Criteria  20 October 1999

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|  Resource Management      |    M    |         |         |         |
|                           |   20    |         |         |         |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|  Ability to obtain QoS    |         |         |   S     |    M    |
|  info from AAA            |         |         |   36    |    47   |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|  Certificate validation   |         |         |   S     |    M    |
|                           |         |         |   38    |    45   |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|  Trust establishment via  |         |         |   M     |         |
|  brokers                  |         |         |   31    |         |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|  Allocation or coordinate |         |         |   S     |    S    |
|  IP address assignment    |         |         |   37    |    47   |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|  Reliable AAA transport   |         |         |   M     |    M    |
|  mechanism                |         |         |   36    |    43   |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|  Support Proxy and Non-   |         |         |         |    M    |
|  Proxy Brokers            |         |         |         |    43   |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Key
M = MUST
S = SHOULD
O = MAY
N = MUST NOT
B = SHOULD NOT

Beadles, et al.               Informational                     [Page 8]


INTERNET-DRAFT   Network Access AAA Evaluation Criteria  20 October 1999

4.3.  Accounting Requirements

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
| Accounting                | NASREQ  | ROAMOPS | MOBILE  |  TIA    |
| Reqts.                    |         |         |   IP    |  45.6   |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|   Real-time accounting    |    M    |    M    |   O     |    M    |
|                           |   14    |    7    |   35    |    43   |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|   Standard Accounting     |         |    M    |   M     |    M    |
|      Record               |         |    7    |         |         |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|   Compact  Accounting     |         |    M    |   O     |    O    |
|      Record               |         |    7    |         |         |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|   Accounting Record       |    M    |    M    |   O     |    M    |
|    Extensibility          |   15    |    7    |         |         |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|   Batch Accounting        |    S    |         |         |    O    |
|                           |   21    |         |         |         |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|   Guaranteed Delivery     |    M    |         |    M    |    M    |
|                           |   22    |         |    35   |    43   |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|   Accounting Time Stamps  |    M    |         |         |    M    |
|                           |   23    |         |         |    43   |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|  End-to-End per-attribute |    M    |   M     |    M    |    O    |
|  integrity                |   24    |   6     |    31   |         |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Beadles, et al.               Informational                     [Page 9]


INTERNET-DRAFT   Network Access AAA Evaluation Criteria  20 October 1999

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|  End-to-End per-attribute |    S    |   M     |    M    |    O    |
|   confidentiality         |   24    |   6     |    31   |         |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|  Non-repudiation          |    S    |         |   S     |    M    |
|                           |   25    |         |   35    |    43   |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|  Trust establishment via  |         |         |   M     |         |
|  brokers                  |         |         |   31    |         |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|  Reliable AAA transport   |         |         |   M     |    M    |
|  mechanism                |         |         |   36    |    43   |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|  Support Proxy and Non-   |         |         |         |    M    |
|  Proxy Brokers            |         |         |         |    43   |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Key
M = MUST
S = SHOULD
O = MAY
N = MUST NOT
B = SHOULD NOT

Beadles, et al.               Informational                    [Page 10]


INTERNET-DRAFT   Network Access AAA Evaluation Criteria  20 October 1999

4.4.  Unique Mobile IP requirements

In addition Mobile IP also has the following requirements:

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|  Dynamic Setup of security|         |         |   S     |    S    |
|  assoc. between local AAA |         |         |   36    |    43   |
|  and external authority   |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|  Security Assoc. between  |         |         |   S     |    M    |
|  attendant and local AAA  |         |         |   36    |    43   |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|  Local AAA  capability to |         |         |   N     |         |
|  gather (secret) info     |         |         |   36    |         |
|  about a MN               |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|  AAA protocol extensions  |         |         |   M     |    S    |
|  for including Mobile IP  |         |         |   38    |    48   |
|  registration messages    |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|  Enable key distribution  |         |         |   M     |    S    |
|  for setting up security  |         |         |   38    |    49   |
|  assoc between mip agents |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|  Firewall traversal       |         |         |   M     |         |
|  capability               |         |         |   39    |         |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|  Allocation of local Home |         |         |   S     |    M    |
|  agent                    |         |         |   40    |    50   |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|  Act as a KDC for fast    |         |         |   S     |    S    |
|  handoffs                 |         |         |   41    |    51   |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Beadles, et al.               Informational                    [Page 11]


INTERNET-DRAFT   Network Access AAA Evaluation Criteria  20 October 1999

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           |         |         |         |         |
|  Perform pre-shared key   |         |         |   S     |    S    |
|  distribution for IKE     |         |         |         |    52   |
|                           |         |         |         |         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Key
M = MUST
S = SHOULD
O = MAY
N = MUST NOT
B = SHOULD NOT

Footnotes

[1] Section 4.2.1 of [2]
[2] Section 4.2.2 of [2]. Also see [8].
[3] Section 4.2.3 of [2]. Also see [14].
[4] Section 4.2.4 of [2].
[5] Section 4.2.5 of [2].
[6] Section 4.2.6 of [2].
[7] Section 4.3 of [2].
[8] Section 6 of [3].  Also see [6].
[9] Section 8.2.2.2 of [3].  Also see [14].
[10] Section 8.2.2.1 of [3].  Also see [14].
[11] Section 8.3.2.2 of [3].  Also see [7].
[12] Section 8.1.1 of [3].
[13] Section 8.1.4.4 of [3].
[14] Section 8.4.1.2 of [3].
[15] Section 8.4.2 of [3].
[16] Section 8.2.1.1 of [3].
[17] Section 8.2.1.2 of [3].
[18] Section 8.3.1.1 of [3].
[19] Section 8.3.2.1 of [3].  Also see [7].
[20] Section 8.3.2.3 of [3].  Also see [6], [7].
[21] Section 8.4.1.3 of [3].
[22] Section 8.4.1.1 of [3].
[23] Section 8.4.1.4 of [3].
[24] Section 8.4.3.1 of [3].
[25] Section 8.4.3.2 of [3].
[26] Section 8.2.3.1 of [3].
[27] Section 8.3.3.1 of [3].
[28] Section 8.1.4.1 of [3].
[29] Refer [15]
[30] Refer [16]
[31] Section 6 and 3.1 of [5]
[32] Refer [17]

Beadles, et al.               Informational                    [Page 12]


INTERNET-DRAFT   Network Access AAA Evaluation Criteria  20 October 1999

[33] Refer [18]
[34] Section 5.1 of [5]
[35] Section 3.1 of [5]
[36] Section 3 of [5]
[37] Section 4 of [5]
[38] Section 5 of [5]
[39] Section 5.2 of [5]
[40] Section 5.3 of [5]
[41] Section 5.5 of [5]
[42] Section 1.1 of [4]
[43] Section 3.1 of [4]
[44] Section 3.2 of [4]
[45] Section 4 of [4]
[46] Section 3.4 of [4]
[47] Section 2.2 of [4]
[48] Section 3.2.1 of [4]
[49] Section 3.2.2,3.2.4 and 3.2.5 of [4]
[50] Section 3.2.2 of [4]
[51] Section 3.2.3 and 3.2.5 of [4]
[52] Section 3.3 of [4]

5.  References

[1]  Bradner, S., "Key words for use in RFCs to Indicate Requirement
     Levels", BCP 14, RFC 2119, March 1997.

[2]  Aboba, B., and G. Zorn, "Criteria for Evaluating Roaming
     Protocols",  RFC 2477, January 1999.

[3]  Beadles, M., "Criteria for Evaluating Network Access Server
     Protocols", Internet draft (work in progress), draft-ietf-nasreq-
     criteria-03.txt, October 1999.

[4]  Hiller, T., et al., "Cdma2000 Wireless Data Requirements for AAA",
     Internet draft (work in progress), draft-hiller-
     cdma2000-AAA-00.txt, October 1999.

[5]  Glass, S., Jacobs, S., Perkins, C., "Mobile IP Authentication,
     Authorization, and Accounting Requirements", Internet draft (work
     in progress), draft-ietf-mobileip-aaa-reqs-01.txt, October 1999.

[6]  Mitton, D., Beadles, M., "Network Access Server Requirements Next
     Generation (NASREQNG) NAS Model", Internet draft (work in
     progress), draft-ietf-nasreq-nasmodel-01.txt, October 1999.

[7]  Mitton, D., "Network Access Server Requirements: Extended RADIUS
     Practices", Internet draft (work in progress), draft-ietf-nasreq-

Beadles, et al.               Informational                    [Page 13]


INTERNET-DRAFT   Network Access AAA Evaluation Criteria  20 October 1999

     ext-radiuspract-01.txt, October 1999.

[8]  Aboba,  B.,  and  M.  Beadles,  "The Network Access Identifier",
     RFC 2486, January 1999.

[9]  Rigney, C., Rubens, A., Simpson, W., Willens, S., "Remote
     Authentication Dial In User Service (RADIUS)", RFC  2138, April,
     1997.

[10] Rigney, C., "RADIUS  Accounting", RFC 2139, April 1997.

[11] Simpson, W., Editor, "The Point-to-Point Protocol (PPP)", STD 51,
     RFC 1661, July 1994.

[12] Sklower, K., Lloyd, B., McGregor, G., Carr, D., and T. Coradetti,
     "The PPP Multilink Protocol (MP)", RFC 1990, August 1996.

[13] Simpson, W., Editor, "PPP LCP Extensions", RFC 1570, January 1994.

[14] Blunk, L., Vollbrecht, J., "PPP Extensible Authentication Protocol
     (EAP)", RFC 2284, March 1998.

[15] Solomon, J., Glass, S., "Mobile-IPv4 Configuration Option for PPP
     IPCP" RFC 2290, Feb 1998

[16] Calhoun, P., Perkins, C. "Mobile IP Network Access Identifier
     Extension", draft-ietf-mobileip-mn-nai-05.txt, Oct 1999

[17] Perkins, C., "IP Mobility Support", RFC 2002, Oct 1996

[18] Johnson, D., Perkins, C., "Mobility Support in IPv6", draft-ietf-
     mobileip-ipv6-08.txt, June 1999

6.  Security Considerations

This document, being a requirements document, does not have any security
concerns.  The security requirements on protocols to be evaluated using
this document are described in the referenced documents.

7.  IANA Considerations

This draft does not create any new number spaces for IANA
administration.

8.  Acknowledgements

Thanks to the members of the Mobile IP, AAA, and NASREQ working groups
who have discussed and commented on these requirements.

Beadles, et al.               Informational                    [Page 14]


INTERNET-DRAFT   Network Access AAA Evaluation Criteria  20 October 1999

9.  Authors' Addresses

Mark Anthony Beadles
UUNET, an MCI WorldCom Company
5000 Britton Rd.
Hilliard, OH 43026

Phone: +1 (614) 723-1941
EMail: mbeadles@wcom.net

Tom Hiller
Wireless Data Standards & Architectures
Lucent Technologies
263 Shuman Drive
Room 1HP2F-218
Naperville, IL 60563

Phone: +1 (630) 976-7673
Email: tom.hiller@lucent.com

Bernard Aboba
Microsoft Corporation
One Microsoft Way
Redmond, WA 98052

Phone: +1 (425) 936-6605
Fax:   +1 (425) 936-7329
EMail: bernarda@microsoft.com

Glen Zorn
Microsoft Corporation
One Microsoft Way
Redmond, WA 98052

Phone: +1 (425) 703-1559
Fax:   +1 (425) 936-7329
EMail: glennz@microsoft.com

Gopal Dommety
IOS Network Protocols
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706

Phone: +1 (408) 525-1404
Fax: +1 (408) 526-4952
Email: gdommety@cisco.com

Beadles, et al.               Informational                    [Page 15]


INTERNET-DRAFT   Network Access AAA Evaluation Criteria  20 October 1999

Steven M. Glass
Sun Microsystems
1 Network Drive
Burlington, MA. 01845

Phone: +1 (781) 442-0504
Fax: +1 (781) 442-1677
Email: steven.glass@sun.com

Stuart Jacobs
Secure Systems Department
GTE Laboratories
40 Sylvan Road,
Waltham, MA 02451-1128

Phone: +1 (781) 466-3076
Fax: +1 (781)466-2838
Email: sjacobs@gte.com

Basavaraj Patil
Wireless Technology Labs
Nortel Networks
2221 Lakeside Blvd.
Richardson, TX 75082-4399

Phone: +1 (972) 684-1489
Fax: +1 (972) 685-3207
Email: bpatil@nortelnetworks.com

Charles E. Perkins
Communications Systems Lab
Nokia Research Center
313 Fairchild Drive
Mountain View, California

Phone: +1 (650) 625-2986
Fax: +1 (650) 691-2170
EMail: charliep@iprg.nokia.com

Pat R. Calhoun
Network and Security Research Center, Sun Labs
Sun Microsystems, Inc.
15 Network Circle
Menlo Park, CA 94025

Phone: +1 (650) 786-7733
EMail: pcalhoun@eng.sun.com

Beadles, et al.               Informational                    [Page 16]


INTERNET-DRAFT   Network Access AAA Evaluation Criteria  20 October 1999

Ed Campbell
3Com Corporation
1800 W. Central Rd.
Mount Prospect, IL 60056

Phone: +1 (847) 342-6769
EMail: ed_campbell@3com.com

Raymond T. Hsu
Qualcomm Inc.
6455 Lusk Blvd.
San Diego, CA 92121

Phone: +1 (619) 651-3623
EMail: rhsu@qualcomm.com

Mark A. Lipford
Sprint PCS
8001 College Blvd.; Suite 210
Overland Park, KS  66210

Phone: +1 (913) 664-8335
EMail: mlipfo01@sprintspectrum.com

Serge Manning
Nortel Networks
2201 Lakeside Blvd
Richardson, TX  75082-4399

Phone: +1 (972) 684-7277
EMail: smanning@nortelnetworks.com

Peter J. McCann
Lucent Technologies
Rm 2Z-305
263 Shuman Blvd
Naperville, IL  60566

Phone: +1 (630) 713 9359
EMail: mccap@lucent.com

Mark Munson
GTE Wireless
One GTE Place
Alpharetta, GA  30004

Phone: +1 (678) 339-4439
EMail: mmunson@mobilnet.gte.com

Beadles, et al.               Informational                    [Page 17]


INTERNET-DRAFT   Network Access AAA Evaluation Criteria  20 October 1999

Haeng Koo
Samsung Telecommunications America, Inc.
1130 E. Arapaho Road
Richardson, TX, USA  75025

Phone: +1 (972) 761-7735
EMail: hkoo@telecom.sna.samsung.com

Pat Walsh
Ameritech
2000 W. Ameritech Ctr. Dr.
Hoffman Estates, IL  60195

Phone: +1 (847) 765-5845
EMail: pwalsh@ameritechcell.com

Yingchun Xu
3Com Corporation
1800 W. Central Rd.
Mount Prospect, IL 60056

Phone: +1 (847) 342-6814
EMail: Yingchun_Xu@3com.com

Brent Hirschman
1501 Shure Dr.
Arlington Hieghts, IL 60006

Phone: +1 (847) 632-1563
EMail: qa4053@email.mot.com

Eric Jaques
Vodafone AirTouch
2999 Oak Road, MS-750
Walnut Creek, CA 94596

Phone: +1 (925) 279-6142
EMail: ejaques@akamail.com

Sanjeevan Sivalingham
Ericsson Wireless Communications Inc.,
Rm Q-356C
6455 Lusk Blvd
San Diego, CA 92126

Phone: +1 (858) 332-5670
EMail:  s.sivalingham@ericsson.com

Beadles, et al.               Informational                    [Page 18]


INTERNET-DRAFT   Network Access AAA Evaluation Criteria  20 October 1999

Xing Chen
Alcatel USA
1000 Coit Road
Plano, TX 75075, USA

Phone: +1 (972) 519-4142
Fax: +1 (972) 519-4843
Email: xing.chen@usa.alcatel.com

Byng-Keun Lim
LG Information & Communications, Ltd.
533, Hogye-dong, Dongan-ku, Anyang-shi,
Kyungki-do,431-080, Korea

Phone: +82-343-450-7199
Fax: +82-343-450-7050
EMail: bklim@lgic.co.kr

Hajime Shiino
Lucent Technologies Japan Ltd.
25 Mori Bldg. 1-4-30 Roppongi,
Minato-ku Tokyo

Phone:+81-3-5561-3695
EMail: hshiino@lucent.com

Shinich Baba
Toshiba America Research, Inc.
PO Box 136,
Convent Station, NJ 07961-0136

Phone: +1 (973) 829-4795
EMail: sbaba@tari.toshiba.com

Takahiro Ayaki
DDI corporation
Ichibancho FS Bldg.
8, Ichibancho, Chiyoda-ku Tokyo

Phone: +81-3-3221-9682
EMail: ayaki@ddi.co.jp

Alan Hameed
Fujitsu
2801 Telecom Parkway
Richardson, Texas 75082

Phone: +1 (972) 479-2089

Beadles, et al.               Informational                    [Page 19]


INTERNET-DRAFT   Network Access AAA Evaluation Criteria  20 October 1999

Takuo Seki
IDO Corporation
Gobancho YS Bldg.
12-3, Gobancho, Chiyoda-ku Tokyo

Phone: +81-3-3263-9660
EMail: t-seli@ido.co.jp

10.  Intellectual Property Statement

The IETF takes no position regarding the validity or scope of any
intellectual property or other rights that might be claimed to  pertain
to the implementation or use of the technology described in this
document or the extent to which any license under such rights might or
might not be available; neither does it represent that it has made any
effort to identify any such rights.  Information on the IETF's
procedures with respect to rights in standards-track and standards-
related documentation can be found in BCP-11.  Copies of claims of
rights made available for publication and any assurances of licenses to
be made available, or the result of an attempt made to obtain a general
license or permission for the use of such proprietary rights by
implementors or users of this specification can be obtained from the
IETF Secretariat.

The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary rights
which may cover technology that may be required to practice this
standard.  Please address the information to the IETF Executive
Director.

11.  Full Copyright Statement

Copyright (C) The Internet Society (1999).  All Rights Reserved.
This document and translations of it may be copied and furnished to
others, and derivative works that comment on or otherwise explain it or
assist in its implmentation may be prepared, copied, published and
distributed, in whole or in part, without restriction of any kind,
provided that the above copyright notice and this paragraph are included
on all such copies and derivative works.  However, this document itself
may not be modified in any way, such as by removing the copyright notice
or references to the Internet Society or other Internet organizations,
except as needed for the purpose of developing Internet standards in
which case the procedures for copyrights defined in the Internet
Standards process must be followed, or as required to translate it into
languages other than English.  The limited permissions granted above are
perpetual and will not be revoked by the Internet Society or its
successors or assigns.  This document and the information contained
herein is provided on an "AS IS" basis and THE INTERNET SOCIETY AND THE

Beadles, et al.               Informational                    [Page 20]


INTERNET-DRAFT   Network Access AAA Evaluation Criteria  20 October 1999

INTERNET ENGINEERING TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE."

12.  Expiration Date

This memo is filed as <draft-ietf-aaa-na-reqts-00.txt>,  and  expires
May 1, 2000.

Beadles, et al.               Informational                    [Page 21]