Mobile IP Working Group Charles E. Perkins
INTERNET DRAFT Nokia Research Center
2 March 2001 Pat R. Calhoun
Sun Microsystems Laboratories
AAA Registration Keys for Mobile IP
draft-ietf-mobileip-aaa-key-04.txt
Status of This Memo
This document is a submission by the mobile-ip Working Group of the
Internet Engineering Task Force (IETF). Comments should be submitted
to the MOBILE-IP@STANDARDS.NORTELNETWORKS.COM mailing list.
Distribution of this memo is unlimited.
This document is an Internet-Draft and is in full conformance with
all provisions of Section 10 of RFC2026. Internet-Drafts are working
documents of the Internet Engineering Task Force (IETF), its areas,
and its working groups. Note that other groups may also distribute
working documents as Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at
any time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at:
http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at:
http://www.ietf.org/shadow.html.
Abstract
AAA servers, such as RADIUS and DIAMETER, are in use within the
Internet today to provide authentication and authorization services
for dial-up computers. Mobile IP requires strong authentication
between the mobile node and its home agent. When the mobile node
shares a security association with its home AAA server, however, it
is possible to use that security association to create derivative
security associations between the mobile node and its home agent,
and again between the mobile node and the foreign agent currently
offering a care-of address to the mobile node. This document
specifies extensions to the Mobile IP Registration Reply packet that
can be used to distribute such security information to the mobile
node.
Perkins, Calhoun Expires 2 September 2001 [Page 1]
Internet Draft AAA Keys for Mobile IP 2 March 2001
1. Introduction
AAA servers, such as RADIUS [10] and DIAMETER [3], are in use within
the Internet today to provide authentication and authorization
services for dial-up computers. Such services are likely to be
equally valuable for mobile nodes using Mobile IP when the nodes are
attempting to connect to foreign domains with AAA servers. Mobile
IP [7] requires strong authentication between the mobile node and its
home agent. When the mobile node shares a security association with
its home AAA server, however, it is possible to use that security
association to create derivative security associations between the
mobile node and its home agent, and again between the mobile node
and the foreign agent currently offering a care-of address to the
mobile node. This document specifies extensions to the Mobile
IP Registration Reply packet that can be used to distribute such
security information to the mobile node.
AAA servers typically use the Network Access Identifier (NAI) [1] to
uniquely identify the mobile node; the mobile node's home address
is not always necessary to provide that function. Thus, it is
possible for a mobile node to authenticate itself, and be authorized
for connection to the foreign domain, without even having a home
address. However, for Mobile IP to work, the mobile node is required
to have a security association with its home agent. When the
Mobile IP Registration Reply packet is authenticated by the MN-AAA
Authentication Extension [2], the mobile node can verify that the
keys contained in the extensions were produced by the AAA server, and
thus may be reliably used to create security associations with the
home agent, or alternatively with the foreign agent.
The following operations are envisioned between the mobile node, AAA
server, home agent, and foreign agent.
1. When a mobile node travels away from home, it may not have a
security association with its home agent, perhaps because it does
not yet have a home address.
2. When the mobile node first registers away from home, it includes
a MN-AAA Authentication extension if it does not yet have a
Mobility Security Association with a home agent.
3. At the time the information within the MN-AAA Authentication
extension is verified by the AAA server, the AAA server also
generates keys for the mobile node, encodes the keys according
to its own security association with the mobile node, and causes
insertion of the new key or keys along with the Registration
Reply.
Perkins, Calhoun Expires 2 September 2001 [Page 2]
Internet Draft AAA Keys for Mobile IP 2 March 2001
4. If the Reply passes authentication and contains the Unsolicited
MN-HA Key From AAA extension (see section 5), the mobile node
decodes the key according to its security association with
the AAA. The resulting key is used to establish the mobile
node's security association with its home agent, and is used to
authenticate the MN-HA authentication extension.
5. Similarly, if the Reply passes authentication and contains the
Unsolicited MN-FA Key From AAA extension (see section 4), the
mobile node decodes the key according to its security association
with the AAA. The resulting key is used to establish the mobile
node's security association with its new foreign agent, and
is used to compute the authentication data used in the MN-FA
authentication extension.
Any registration reply containing the Unsolicited MN-HA Key
From AAA extension MUST also contain a subsequent Mobile Home
Authentication Extension, created using the decrypted version of the
MN-HA key. Similarly, a reply containing the Unsolicited MN-FA Key
From AAA extension MUST also contain a subsequent Mobile Foreign
Authentication Extension, created using the decrypted version of the
MN-FA key.
2. Security Algorithms
Mobility Security Associations between Mobile IP entities
(mobile nodes, home agents, foreign agents) contain both the
necessary cryptographic key information, and a way to identify
the cryptographic algorithm which uses the key to produce the
authentication information typically included in the Mobile Home
Authentication extension or the Mobile Foreign Authentication
extension. In order for the mobile node to make use of key
information sent to it by the AAA server, the mobile node also has to
be able to select the appropriate cryptographic algorithm that uses
the key to produce the authentication.
For use with the key extensions specified in this document, the
supported security algorithms are also specified. In order for a
mobile node to be able to decode the keys defined in this document,
it MUST share a security association with its' Home AAA server.
The security association is the one by which the mobile node is
instructed to decode the keying material in the the Unsolicited MN-FA
or MN-HA Key From AAA extensions.
Reserved SPI number Name Reference
--------------------- ------------------ ------------
3 MD5/prefix+suffix RFC 2002 [7]
4 HMAC MD5 RFC 2104 [4]
Perkins, Calhoun Expires 2 September 2001 [Page 3]
Internet Draft AAA Keys for Mobile IP 2 March 2001
New algorithms will be allocated as indicated by practical experience
using the extensions defined in this document. See section 3 for
specific information about using Algorithm MD5/prefix+suffix. The
HMAC MD5 algorithm is used in exactly the same way, except that the
specific computation used with MD5 follows RFC 2104 instead of RFC
2002.
3. Using the MD5/prefix+suffix Algorithm
As with Mobile IP, all mobile nodes MUST be able to verify the
authenticator within a MN-HA Authentication extension by using MD5 in
prefix+suffix mode, signified by selection at a SPI of any arbitrary
32-bit value. Therefore, it is economical to use the MD5 algorithm
in prefix+suffix mode to encode the key within the particular key
extension, as follows.
1. The AAA server identifies the mobile node's IP address, call it
``node-address''.
2. The AAA server calculates
(key XOR (MD5(AAA-key | node-address | AAA-key)))
3. The AAA server inserts this result into the Key extension in the
``Encoded Key'' field.
4. The mobile node calculates
temp = MD5(AAA-key | node-address | AAA-key)
5. The mobile node extracts the Security_Information of the key
extension and calculates
key = Encoded Key XOR temp
Perkins, Calhoun Expires 2 September 2001 [Page 4]
Internet Draft AAA Keys for Mobile IP 2 March 2001
4. Unsolicited MN-FA Key From AAA Subtype
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Lifetime |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| AAA SPI |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| FA SPI |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| MN-FA Encoded Key data ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 1: The Unsolicited MN-FA Key From AAA
Subtype-Specific Data
lifetime This field indicates the duration of time (in seconds)
for which the MN-FA key is valid.
AAA SPI A 32-bit opaque value, indicating the SPI that the
mobile node must use to determine the algorithm to use
for recovering the FA security information.
FA SPI A 32-bit opaque value, which the mobile node MUST use
to index all the necessary information recovered from
the FA security information after it is decoded.
MN-FA Encoded Key data
The necessary information (including the key) required
by the mobile node to create a Mobility Security
Assocation between itself and the foreign agent.
The Unsolicited MN-FA Key From AAA extension, shown in figure 1, uses
subtype 7 of the Generalized MN-FA Key Reply Extension [9]. The key
is encoded by the home domain AAA server (AAAH) for use by the mobile
node to secure future Mobile IP registrations with the same foreign
agent. The Unsolicited MN-FA Key From AAA extension MUST appear in
the Registration Reply before the MN-FA Authentication extension.
Once the mobile node decodes the FA Security Information, by using
the algorithm indexed by the AAA SPI, it stores the FA Security
Information indexed by the FA SPI in its list of Mobile Security
Associations.
Perkins, Calhoun Expires 2 September 2001 [Page 5]
Internet Draft AAA Keys for Mobile IP 2 March 2001
If the foreign agent receives a Registration Reply that does not
have a Unsolicited MN-FA Key From AAA extension, and thus does not
have a way to establish a Mobility Security Association with the
mobile node, the foreign agent SHOULD change the Code value of the
Registration Reply to MISSING_MN_FA (see section 8), effectively
causing the registration to fail.
Perkins, Calhoun Expires 2 September 2001 [Page 6]
Internet Draft AAA Keys for Mobile IP 2 March 2001
5. Unsolicited MN-HA Key From AAA Subtype
The Unsolicited MN-HA Key From AAA is subtype 1 of the Generalized
MN-HA Key Reply Extension [8].
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| AAA SPI |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| HA SPI |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| MN-HA Encoded Key data ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 2: The Unsolicited MN-HA Key From AAA
Subtype-Specific Data
AAA SPI A 32-bit opaque value, indicating the SPI that the
mobile node must use to determine the algorithm to use
for recovering the HA security information.
HA SPI A 32-bit opaque value, which the mobile node MUST use
to index all the necessary information recovered from
the HA security information after it is decoded.
MN-HA Encoded Key data
The necessary information (including the key) required
by the mobile node to create a Mobility Security
Assocation between itself and the home agent.
The Unsolicited MN-HA Key From AAA subtype-specific data is shown
in figure 2. The Mobile Node Encoded Key data is to be decoded
according to the given SPI between the mobile node and the home
domain AAA server (AAAH). The key is intended for use the mobile node
to secure future Mobile IP registrations with its home agent. The
MN-HA Key Reply MUST appear in the Registration Reply before the
MN-HA Authentication extension.
Once the mobile node decodes the MN-HA Encoded Key data, by using
the algorithm indexed by the AAA SPI, it stores the HA Security
Information indexed by the HA SPI in its list of Mobile Security
Associations. The mobile node uses the Identification field data
from the Registration Request as its initial synchronization data
with the home agent.
Perkins, Calhoun Expires 2 September 2001 [Page 7]
Internet Draft AAA Keys for Mobile IP 2 March 2001
6. MN-FA Key Request From AAA Subtype
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| AAA SPI |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| FA SPI |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 3: The MN-FA Key Request From AAA Subtype-Specific Data
AAA SPI A 32-bit opaque value, indicating the SPI that the
mobile node must use to determine the algorithm to use
for recovering the FA security information.
FA SPI A 32-bit opaque value, which the mobile node proposes
for use with the foreign agent to identify the security
association determined by the granted key, and to index
all the necessary information to be used as part of the
security association.
The MN-FA Key Request From AAA subtype data, shown in figure 3,
uses subtype 7 of the Generalized MN-FA Key Request Extension [8].
The key is encoded by the home domain AAA server (AAAH) for use by
the mobile node to secure future Mobile IP registrations with the
same foreign agent. The MN-FA Key Request From AAA extension MUST
appear in the Registration Request before the MN-AAA Authentication
extension.
Perkins, Calhoun Expires 2 September 2001 [Page 8]
Internet Draft AAA Keys for Mobile IP 2 March 2001
7. MN-HA Key Request From AAA Subtype
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| AAA SPI |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| HA SPI |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 4: The MN-HA Key Request From AAA Subtype-Specific Data
AAA SPI A 32-bit opaque value, indicating the SPI that the
mobile node must use to determine the algorithm to use
for recovering the HA security information.
HA SPI A 32-bit opaque value, which the mobile node proposes
for use with the foreign agent to identify the security
association determined by the granted key, and to index
all the necessary information to be used as part of the
security association.
The MN-HA Key Request From AAA subtype data, shown in figure 4,
uses subtype 7 of the Generalized MN-HA Key Request Extension [8].
The key is encoded by the home domain AAA server (AAAH) for use by
the mobile node to secure future Mobile IP registrations with the
same foreign agent. The MN-HA Key Request From AAA extension MUST
appear in the Registration Request before the MN-AAA Authentication
extension.
8. Error Values
Each entry in the following table contains the name of Code [7] to
be returned in a Registration Reply, the value for the Code, and the
section in which the error is first mentioned in this specification.
Error Name Value Section
---------------------- ----- ---------
MISSING_MN_FA 107 4
Perkins, Calhoun Expires 2 September 2001 [Page 9]
Internet Draft AAA Keys for Mobile IP 2 March 2001
9. IANA Considerations
The number for the Generalized MN-HA Key Reply Extension is
taken from the numbering space defined for Mobile IP registration
extensions defined in RFC 2002 [7] as extended in RFC 2356 [6].
The subtype address space for the Generalized MN-HA Key Reply
extension is defined in this document. From this space, subtype
value 1 is assigned to the Unsolicited MN-HA Key From AAA Subtype
extension.
The number assigned to the MN-FA Key Request From AAA Subtype
extension was taken from the numbering space defined for the
Generalized MN-FA Key Request Extension, defined in [9].
The number assigned to the Unsolicited MN-FA Key From AAA Subtype
extension was taken from the numbering space defined for the
Generalized MN-FA Key Reply Extension, defined in [9].
The number assigned to the MN-HA Key Request From AAA Subtype
extension was taken from the numbering space defined for the
Generalized MN-HA Key Request Extension, defined in [9].
The Code values specified for errors, listed in section 8, MUST NOT
conflict with any other code values listed in RFC 2002, RFC 2344 [5],
or RFC 2356 [6]. They are to be taken from the space of error values
conventionally associated with rejection by the foreign agent (i.e.,
64-127).
SPI values 3 and 4 are taken from the reserved space of SPI numbers
(0-255) created for special Mobile IP algorithm identifiers.
10. Security Considerations
The extensions in this document are intended to provide the
appropriate level of security for Mobile IP entities (mobile node,
foreign agent, and home agent) to operate Mobile IP registration
protocol. The security associations resulting from use of these
extensions do not offer any higher level of security than what is
already implicit in use of the security association between the
mobile node and the AAA.
Perkins, Calhoun Expires 2 September 2001 [Page 10]
Internet Draft AAA Keys for Mobile IP 2 March 2001
References
[1] B. Aboba and M. Beadles. The Network Access Identifier.
Request for Comments (Proposed Standard) 2486, Internet
Engineering Task Force, January 1999.
[2] P. Calhoun and C. E. Perkins. Mobile IP Foreign Agent
Challenge/Response Extension (work in progress).
draft-ietf-mobileip-challenge-13.txt, June 2000.
[3] P. Calhoun, A. Rubens, H. Akhtar, and E. Guttman. DIAMETER
Base Protocol (work in progress). Internet Draft, Internet
Engineering Task Force.
draft-calhoun-diameter-12.txt, December 1999.
[4] H. Krawczyk, M. Bellare, and R. Canetti. HMAC: Keyed-Hashing
for Message Authentication. Request for Comments
(Informational) 2104, Internet Engineering Task Force,
February 1997.
[5] G. Montenegro. Reverse Tunneling for Mobile IP. Request for
Comments (Proposed Standard) 2344, Internet Engineering Task
Force, May 1998.
[6] G. Montenegro and V. Gupta. Sun's SKIP Firewall Traversal for
Mobile IP. Request for Comments (Informational) 2356, Internet
Engineering Task Force, June 1998.
[7] C. Perkins. IP Mobility Support. Request for Comments
(Proposed Standard) 2002, Internet Engineering Task Force,
October 1996.
[8] C. Perkins and P. Calhoun. Generalized Key Distribution
Extensions for Mobile IP (work in progress).
draft-ietf-mobileip-gen-key-02.txt, July 2000.
[9] C. Perkins and D. Johnson. Registration Keys for Route
Optimization (work in progress). Internet Draft, Internet
Engineering Task Force, December 1997.
[10] C. Rigney, A. Rubens, W. Simpson, and S. Willens. Remote
Authentication Dial In User Service (RADIUS). Request for
Comments (Proposed Standard) 2138, Internet Engineering Task
Force, April 1997.
Perkins, Calhoun Expires 2 September 2001 [Page 11]
Internet Draft AAA Keys for Mobile IP 2 March 2001
Addresses
The working group can be contacted via the current chairs:
Basavaraj Patil Phil Roberts
Nortel Networks Inc. Motorola
2201 Lakeside Blvd. 1501 West Shure Drive
Richardson, TX. 75082-4399 Arlington Heights, IL 60004
USA USA
Phone: +1 972-684-1489 Phone: +1 847-632-3148
EMail: bpatil@nortelnetworks.com EMail: QA3445@email.mot.com
Questions about this memo can also be directed to the authors:
Charles E. Perkins Pat R. Calhoun
Communications Systems Lab Network & Security Center
Nokia Research Center Sun Microsystems Laboratories
313 Fairchild Drive 15 Network Circle
Mountain View, California 94043 Menlo Park, California 94025
USA USA
Phone: +1-650 625-2986 Phone: +1 650-786-7733
EMail: charliep@iprg.nokia.com EMail: pcalhoun@eng.sun.com
Fax: +1 650 625-2502 Fax: +1 650-786-6445
Perkins, Calhoun Expires 2 September 2001 [Page 12]