80 likes | 191 Views
Application Keying Scope of the work item. Kuntal Chowdhury Julien Bournelle Gerardo Giaretta. Problem Statement draft-chowdhury-hokey-amsk-ps-00.txt. Network Operators may offer multiple services: (IP network Access) (MN – NAS) Mobile IPv4/IPv6 (MN – HA/FA) SIP (MN – xCSCF)
E N D
Application Keying Scope of the work item Kuntal Chowdhury Julien Bournelle Gerardo Giaretta AMSK PS - IETF 65
Problem Statementdraft-chowdhury-hokey-amsk-ps-00.txt • Network Operators may offer multiple services: • (IP network Access) (MN – NAS) • Mobile IPv4/IPv6 (MN – HA/FA) • SIP (MN – xCSCF) • PMIPv4/v6 (AR – HA) • Others ? (MN –Service Equipment) • Each of these services require Auth/Authz and SA setup (Node – Node) AMSK PS - IETF 65
Multiple EAP Scenario • EAP is used for Network Access Authentication in many networks today • Re-run of multiple authentication/ bootstrapping transactions (EAP/ non-EAP from scratch for each services • Increase network load • Increase Session set-up latency for each services AMSK PS - IETF 65
Multiple EAP TransactionsExample Scenario-1, Service Access MIP Home Agent AAA/EAP server Inet AR/FA Service Equipment MN/EAP Client AMSK PS - IETF 65
Multiple EAP TransactionsExample Scenario-2, Mip6 • Bootstrapping solution in integrated scenario • draft-ietf-mip6-bootstrapping-integrated-dhc-00 • two EAP runs are performed with the same EAP/AAA server EAP/AAA Server Home Agent NAS EAP AAA-HA (EAP) EAPoIKEv2 Bu BA AMSK PS - IETF 65
Rely on EAP Keying Framework • Goal: • Avoid multiple EAP transactions • How ? • Rely on keys derived during network access authentication (cf. EMSK) • Derive AMSK per application • Distribute AMSK on request by the specific application or push it down as pre-configuration for known services AMSK PS - IETF 65
What is needed? • Define how AMSKs are derived • Define how AMSKs are distributed and Cached • Push vs Pull Model ? • Keys sent in Service Equipment • Keys fetched by Service Equipment AMSK PS - IETF 65
Questions ? AMSK PS - IETF 65