1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
|
Network Working Group M. Nakhjiri, Ed.
Request for Comments: 5030 Motorola
Category: Informational K. Chowdhury
Starent Networks
A. Lior
Bridgewater Systems
K. Leung
Cisco Systems
October 2007
Mobile IPv4 RADIUS Requirements
Status of This Memo
This memo provides information for the Internet community. It does
not specify an Internet standard of any kind. Distribution of this
memo is unlimited.
Abstract
This document provides an applicability statement as well as a scope
definition for specifying Remote Authentication Dial-In User Service
(RADIUS) extensions to support Mobile IPv4. The goal is to allow
specification of RADIUS attributes to assist the Mobile IPv4
signaling procedures.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 2
2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . 3
3. Goals and Non-Goals . . . . . . . . . . . . . . . . . . . . . . 3
3.1. Goals . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
3.2. Non-Goals . . . . . . . . . . . . . . . . . . . . . . . . . 4
4. Attributes . . . . . . . . . . . . . . . . . . . . . . . . . . 5
5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . . 5
6. Security Considerations . . . . . . . . . . . . . . . . . . . . 5
7. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 6
8. References . . . . . . . . . . . . . . . . . . . . . . . . . . 6
8.1. Normative References . . . . . . . . . . . . . . . . . . . 6
8.2. Informative References . . . . . . . . . . . . . . . . . . 7
Nakhjiri, et al. Informational [Page 1]
^L
RFC 5030 Mobile IPv4 RADIUS Requirements October 2007
1. Introduction
To kick start the Mobile IPv4 [RFC3344] processing of its packets by
Mobile IP agents, a mobile node (MN) needs to be able to acquire a
pair of home and care of addresses (HoA and CoA, respectively), find
a willing agent to act as a Home Agent (HA) for the MN and perform a
registration process with the HA. The registration process consists
of an exchange of a registration request and a registration reply
message between the MN and the HA. The specification in [RFC3344]
allows an MN to start the registration process prior to having
acquired its home address or the address of its HA. Acquiring those
parameters by the MN is typically part of a process referred to as
bootstrapping.
Successful processing of registration request and reply messages,
among other things, depends on successful creation and verification
of a number of authentication extensions developed specifically to
protect the integrity and security of these messages and the entities
processing them, i.e., MN, HA and some times, Foreign Agents (FAs)
[RFC3344]. Creation as well as verification of these extensions
requires existence of trust relationships and shared keys between MN
and each of the mobility agents. However, creation of these trust
relationships, typically referred to as mobility security
associations (MSAs), is considered outside the scope of the base
Mobile IPv4 specification defined in [RFC3344]. Avoiding the
scalability issues arising from creating static security associations
between an MN and all possible mobility agents is desired. Thus,
establishing the associations dynamically, using the pre-existing
relationship between the MN and the AAA server, is preferred.
To allow for utilization of an existing AAA infrastructure in the
bootstrapping of the Mobile IPv4 parameters and security
relationships, the Mobile IPv4 working group has developed Mobile
IPv4 extensions to allow the MN to authenticate to the home AAA
server [RFC4721]. The extensions also allow the MN to request
assistance from the AAA server in creation of mobility security
associations [RFC3957] with the mobility agents, using the pre-
established trust relationship between the MN and its home AAA
server.
While Mobile IPv4 extensions are necessary for implementing a
utilization of the AAA infrastructure for Mobile IPv4 purposes, they
are not sufficient. The interaction between the MN and the mobility
agents (HA and FA) is based on Mobile IP signaling. However, the
signaling beyond the mobility agents to the AAA server is typically
based on AAA protocols. Around the time, when the specification of
the aforementioned Mobile IP extensions was being developed, the AAA
community was in the process of designing a successor to RADIUS.
Nakhjiri, et al. Informational [Page 2]
^L
RFC 5030 Mobile IPv4 RADIUS Requirements October 2007
Thus, the Mobile IP group developed a set of guidelines and
requirements from the Mobile IP standpoint [RFC2977] specifically for
such a successor (which turned out to be Diameter). These
requirements led to the development of a specification for using
Diameter in Mobile IPv4 bootstrapping [RFC4004]. The requirements
for Mobile IP Authentication, Authorization, and Accounting [RFC2977]
were standardized after the standardization of RADIUS [RFC2865].
Thus, it is obvious that RADIUS does not and cannot meet all the
requirements listed in [RFC2977] without undergoing an extensive
design change. Consequently, within IETF no RADIUS attributes have
been standardized for Mobile IP support thus far. However, in the
absence of IETF standardized RADIUS attributes, different wireless
SDOs have taken the path of developing Vendor Specific Attributes
(VSAs) for providing Mobile IPv4 support. The use of different
vendor specific RADIUS attributes and procedures for the same purpose
of Mobile IPv4 bootstrapping at different SDOs is deemed to cause a
lack interoperability between these wireless standards, potentially
hindering mobility across these wireless networks.
To respond to the described issue, it is desired to standardize a set
of RADIUS attributes within IETF to allow a consistent and
interoperable interaction with RADIUS based AAA infrastructure during
the Mobile IPv4 Registration procedure. The bootstrapping attributes
can include configuration parameters as well as material used for
provisioning security of Mobile IPv4 messaging (authentication) as
defined by [RFC4721] and [RFC3957].
As it stands today, RADIUS cannot meet all the requirements in
[RFC2977]. The purpose of these requirements is to define a set of
goals and non-goals specifically for RADIUS when it comes to
assisting mobile nodes and mobility agents in bootstrapping Mobile
IPv4 operation.
2. Terminology
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 [RFC2119].
3. Goals and Non-Goals
Since this document serves as a requirement specification for RADIUS
extensions that support Mobile IPv4 interaction with RADIUS
infrastructure, the goals and non-goals refer to only those RADIUS
extensions that are required to support Mobile IPv4.
Nakhjiri, et al. Informational [Page 3]
^L
RFC 5030 Mobile IPv4 RADIUS Requirements October 2007
3.1. Goals
The scope of the work is to standardize RADIUS attributes and to
define the procedure by which the Mobile IPv4 agents (e.g., Home
agent (HA) and Foreign Agent (FA)) map the Mobile IP registration
message fields into the proposed RADIUS attributes, and vice versa.
o RADIUS servers are REQUIRED to be able to understand and process
the attributes to be defined for Mobile IPv4 support and to
perform verification of authentication extensions specified in
[RFC4721]. RADIUS proxies are expected to be able to forward
messages including the Mobile IPv4 related attributes as they
would with any other RADIUS messages and attributes.
o All RADIUS work MUST be backward compatible with existing RADIUS
RFCs, including RFCs the following: [RFC2865], [RFC2866],
[RFC2867], [RFC2868], [RFC2869], [RFC3576], [RFC3579], and
[RFC3580].
o Mobile IP agents (FA and HA) are REQUIRED to operate as RADIUS
clients (NASes in context of [RFC2865]) when translating RADIUS
signaling into Mobile IP signaling, and vice versa. Details on
the behavior of Mobile IP agents as RADIUS clients are to be
provided by the solution document describing the RADIUS extensions
for Mobile IP support.
3.2. Non-Goals
The scope of this work is to only standardize RADIUS attributes and
to define the procedure by which the Mobile IPv4 agents (e.g., Home
agent (HA) and Foreign Agent (FA)) map the Mobile IP registration
message fields into the proposed RADIUS attributes, and vice versa.
Extension of the functionality of the existing protocol or RADIUS
servers is not intended. More specifically, the following are NON-
GOALS:
o Enhancing RADIUS Security: Creating new security properties for
RADIUS, such as creating key transport capabilities is not the
goal. No new security mechanisms are to be defined for the
transport of RADIUS Access Requests in relation to the support of
Mobile IPv4 bootstrapping. Existing RADIUS authentication
procedures, e.g., Message-Authenticator (80) described in
[RFC2869], are used. The security considerations for using RADIUS
in bootstrapping Mobile IPv4 are described in a later section of
this document.
Nakhjiri, et al. Informational [Page 4]
^L
RFC 5030 Mobile IPv4 RADIUS Requirements October 2007
o Enhancing RADIUS transport reliability: The transport properties
of RADIUS remain intact. No new reliability mechanisms are
defined in the transport of such Access Requests.
o Extending RADIUS message set: RADIUS extensions for bootstrapping
Mobile IPv4 are not to define new RADIUS messages. The Diameter
Mobile IP application [RFC4004] has defined new command codes to
support Mobile IP signaling, depending on whether Diameter server
is dealing with a Mobile IP HA or an FA. RADIUS currently does
not have any messages that correspond to these Diameter commands.
Instead, RADIUS extensions for Mobile IPv4 bootstrapping need to
provide proposals for new RADIUS attributes that facilitate
Diameter-RADIUS messaging translation without defining any new
RADIUS messaging. At the same time, the RADIUS extensions for
Mobile IPv4 need to re-use Diameter AVPs to the fullest extent
possible.
o RFC 2977 compatibility: Extending RADIUS in a way that fulfills
the full list of requirements in [RFC2977] will not be attempted.
4. Attributes
A specification of the RADIUS extensions for Mobile IPv4 needs to
describe the full set of attributes required for RADIUS-Mobile IP
interaction. While some of the attributes may already be
standardized, others will require standardization and IANA type
assignments.
5. IANA Considerations
This requirement document does not allocate any numbers, so there are
no IANA considerations. On the other hand, future solution documents
for RADIUS support of Mobile IPv4 will likely introduce new RADIUS
attributes. Thus, those documents will need new attribute type
numbers assigned by IANA.
6. Security Considerations
Enhancing security properties of RADIUS are a specific non-goal for
the RADIUS extensions providing support for Mobile IP. Also, as this
is a requirements document and not a solution specification document,
no new security considerations are noted, aside from those that
already exist for RADIUS. As such, the existing RADIUS security
considerations described previously apply, and no additional security
considerations are added here. For instance, the assumption in
RADIUS is that intermediary nodes are trusted, while at the same time
there is a concern on using AAA protocols that use hop-by-hop
security to distribute keys. Use of hop-by-hop security for key
Nakhjiri, et al. Informational [Page 5]
^L
RFC 5030 Mobile IPv4 RADIUS Requirements October 2007
distribution can be in conflict with some of the requirements stated
in [RFC4962], such as the requirement on binding a key to its context
and the requirement on limitation of the key scope. The former for
instance states that a key MUST be bound to the parties that are
expected to have access to the keying material, while the latter
implies that parties that do not require access to a key to perform
their role MUST not have access to the key. Both of these
requirements rule against trusting intermediary nodes and proxies
with distribution of keys. Due to lack of end-to-end security
mechanisms for RADIUS, imposing a MUST requirement for not trusting
proxies is not possible. The RADIUS Extension working group is in
the process of specifying procedures for wrapping key materials
within RADIUS attributes. For the time being, support of Mobile IP
within RADIUS may need to be based on trust of intermediaries,
despite the security considerations described.
When it comes to protecting attributes in the Access Request,
[RFC2868], Section 3.5 provides a mechanism for encrypting RADIUS
attributes, such as passwords. There is also work under progress for
specifying wrapping of sensitive attributes, such as key material
within RADIUS Access Accept messages. This work is currently
considered part of RADIUS crypto-agility extensions and when
completed can be used in the process of distributing sensitive
attributes, such as keying material from RADIUS servers.
It is also possible to protect RADIUS transactions using IPsec (e.g.,
as in RFC3579).
7. Acknowledgements
The authors would like to thank Alan DeKok for review and feedback,
and Pete McCann and Jari Arkko for diligent shepherding of this
document.
8. References
8.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC2865] Rigney, C., Willens, S., Rubens, A., and W. Simpson,
"Remote Authentication Dial In User Service (RADIUS)",
RFC 2865, June 2000.
[RFC2866] Rigney, C., "RADIUS Accounting", RFC 2866, June 2000.
Nakhjiri, et al. Informational [Page 6]
^L
RFC 5030 Mobile IPv4 RADIUS Requirements October 2007
[RFC2867] Zorn, G., Aboba, B., and D. Mitton, "RADIUS Accounting
Modifications for Tunnel Protocol Support", RFC 2867,
June 2000.
[RFC2977] Glass, S., Hiller, T., Jacobs, S., and C. Perkins, "Mobile
IP Authentication, Authorization, and Accounting
Requirements", RFC 2977, October 2000.
[RFC3344] Perkins, C., "IP Mobility Support for IPv4", RFC 3344,
August 2002.
[RFC3957] Perkins, C. and P. Calhoun, "Authentication,
Authorization, and Accounting (AAA) Registration Keys for
Mobile IPv4", RFC 3957, March 2005.
[RFC4004] Calhoun, P., Johansson, T., Perkins, C., Hiller, T., and
P. McCann, "Diameter Mobile IPv4 Application", RFC 4004,
August 2005.
[RFC4721] Perkins, C., Calhoun, P., and J. Bharatia, "Mobile IPv4
Challenge/Response Extensions (Revised)", RFC 4721,
January 2007.
[RFC4962] Housley, R. and B. Aboba, "Guidance for Authentication,
Authorization, and Accounting (AAA) Key Management",
BCP 132, RFC 4962, July 2007.
8.2. Informative References
[RFC2868] Zorn, G., Leifer, D., Rubens, A., Shriver, J., Holdrege,
M., and I. Goyret, "RADIUS Attributes for Tunnel Protocol
Support", RFC 2868, June 2000.
[RFC2869] Rigney, C., Willats, W., and P. Calhoun, "RADIUS
Extensions", RFC 2869, June 2000.
[RFC3576] Chiba, M., Dommety, G., Eklund, M., Mitton, D., and B.
Aboba, "Dynamic Authorization Extensions to Remote
Authentication Dial In User Service (RADIUS)", RFC 3576,
July 2003.
[RFC3579] Aboba, B. and P. Calhoun, "RADIUS (Remote Authentication
Dial In User Service) Support For Extensible
Authentication Protocol (EAP)", RFC 3579, September 2003.
[RFC3580] Congdon, P., Aboba, B., Smith, A., Zorn, G., and J. Roese,
"IEEE 802.1X Remote Authentication Dial In User Service
(RADIUS) Usage Guidelines", RFC 3580, September 2003.
Nakhjiri, et al. Informational [Page 7]
^L
RFC 5030 Mobile IPv4 RADIUS Requirements October 2007
Authors' Addresses
Madjid Nakhjiri (editor)
Motorola
EMail: madjid.nakhjiri@motorola.com
Kuntal Chowdhury
Starent Networks
EMail: kchowdhury@starentnetworks.com
Avi Lior
Bridgewater Systems
EMail: avi@bridgewatersystems.com
Kent Leung
Cisco Systems
170 West Tasman Drive
San Jose, CA 95134
US
EMail: kleung@cisco.com
Nakhjiri, et al. Informational [Page 8]
^L
RFC 5030 Mobile IPv4 RADIUS Requirements October 2007
Full Copyright Statement
Copyright (C) The IETF Trust (2007).
This document is subject to the rights, licenses and restrictions
contained in BCP 78, and except as set forth therein, the authors
retain all their rights.
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Intellectual Property
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Nakhjiri, et al. Informational [Page 9]
^L
|