Internet DRAFT - draft-abid-eap-osfr
draft-abid-eap-osfr
Network Working Group M. Abid
Internet-Draft INRIA
Expires: Juanuary 12, 2006 H. Afifi
Int
F. Kamoun
CRISTAL
N. Golmie
NIST
July 11, 2005
OSFR (Optimized network Selection for Fast Roaming)
draft-abid-eap-osfr-00
Status of this Memo
This document is an Internet-Draft and is subject to all provisions
of section 3 of RFC 3667. By submitting this Internet-Draft, each
author represents that any applicable patent or other IPR claims of
which he or she is aware have been or will be disclosed, and any of
which he or she becomes aware will be disclosed, in accordance with
Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as
Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on Juanuary 12, 2006.
Copyright Notice
Copyright (C) The Internet Society (2005).
Abid, et al. Expires Juanuary 12, 2006 [Page 1]
Internet-Draft OSFR July 2005
Abstract
In a public WLAN hotspot, we need to have an easy and secure way to
authenticate users. We have to find also mobility solutions, given
by providers, to perform well the roaming. A roaming mobile terminal
MT may be within radio range of more than one access point AP.
Therefore, we need to make an intelligent network selection decision
after receiving some roaming information. Currently, the information
is typically provisioned on the MTs as static roaming tables. But,
this approach is not scalable when there is a large number of access
points.
In this draft, we propose our solution called OSFR, Optimized Network
Selection for Fast Roaming to improve association speed and
scalability.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1 Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.2 Applicability . . . . . . . . . . . . . . . . . . . . . . . . . 4
2. Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
3. Scenario . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
4. Packet Format . . . . . . . . . . . . . . . . . . . . . . . . . 8
4.1 Beacon . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
4.2 Probe Request . . . . . . . . . . . . . . . . . . . . . . . . . 9
4.3 Probe Response . . . . . . . . . . . . . . . . . . . . . . . 9
4.4 Authentication Request . . . . . . . . . . . . . . . . . . . . 9
4.5 Authentication Response or Challenge Text . . . . . . . . . . 10
4.6 (Re)Association Request . . . . . . . . . . . . . . . . . . . 10
5. Security Considerations . . . . . . . . . . . . . . . . . . . 12
6. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 13
References . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . 14
Intellectual Property and Copyright Statements . . . . . . . . 16
Abid, et al. Expires Juanuary 12, 2006 [Page 2]
Internet-Draft OSFR July 2005
1. Introduction
In a public WLAN hotspot, a roaming MT mobile terminal may be within
radio range of more than one access point (AP). Therefore, we need
to make an intelligent network selection decision after receiving
some roaming information. Currently, the information is typically
provisioned on the MTs as static roaming tables. But, this approach
is not scalable when there are a large number of access points.
In this draft, we propose our solution called OSFR, Optimized Network
Selection for Fast Roaming to improve association speed and
scalability. It consists in piggybacking the information in the 802.11
Authentication Request/Response. The main advantage of our system is
that we donÆt need to (re)associate each time with the new AP, rather
associate only with the appropriate one which speeds up the connection
procedure and results in a seamless handover.
1.1 Terminology
AAA
Authentication ,Authorization and Accounting
NAI
Network Address Identifier [rfc2486bis].
MT
Mobile Terminal
AP
The new Access Point that MT wants to associate with.
AAA Wlan Server
It is the Local Wireless LAN Server which has a list of vWISP virtual
WISP that it has agreements with them.
AAA Mediating Server
The mediating Server that is localized in the path between AAA Wlan
Server and AAA Home server.
Abid, et al. Expires Juanuary 12, 2006 [Page 3]
Internet-Draft OSFR July 2005
AAA Home Server
The server which provides service for mobile node (MT has an account
there).
For clarity, we will omit AAA from the terminology.
1.2 Applicability
Our solution is really helpful in these cases described in [ARK04]:
o There is more than one available network attachment point, and
the different points may have different characteristics.
o The user has multiple sets of credentials. For instance, the user
could have one set of credentials from a public service provider
and another set from his company.
o Providers share the same infrastructure, such as wireless access
points.
The mobile terminal will need to associate with the right network,
so that it can reach its home server. Especially, working in public
places can causes high latency, especially, when the place is full
of clients.
One of the problem that all people hate is the cut of receiving
services. If we can not avoid it, at least, we try to reduce this
time needed for network discovery and selection.
2. Design
One of the important characteristics of our solution is that we want
to know the roaming information before getting associated with AP. We
also need to send the information in a secure way because we work
before the association and the channel isnÆt secure. Our idea is
based on Diffie-Hellman Key exchange (D-H Key) [RFC2631] and optimized
to use the 802.11 Management Frames [WIR03].
First of all, in Beacon frame, we add the two parameters needed to
generate the D-H keys. Then, in Probe Request, MT sends its public key
YMT and in Probe Response, AP sends its public key YAP. Now the two
devices can send encrypted data with D-H keys. In IEEE 802.11
specification, we have two kinds of authentication algorithm (Open
System and Shared Key). In our solution, using one of the two will not
cause problems because we only use Auth Request and Auth Response for
Open System, Auth Request and Challenge Text for Shared Key.
Abid, et al. Expires Juanuary 12, 2006 [Page 4]
Internet-Draft OSFR July 2005
We aim to add roaming information which consists essentially in the
identity of the intermediary WISP needed for Network Selection. If MT
finds the WISP that it can reach its Home Server, it will send the
identity of this Mediating Server. In that case, we will use the path
passing by this Mediating Server in EAP session. We choose to send the
list of WISP in the body of Management frame because this method helps
us to use the maximum length for information.
In some solution like Adrangi, et all [ADR05], the length used will
be less than 1020 bytes. But when we use Management Frame body the
least possibility will be when we piggyback information after
Challenge Text and it will be 2048 bytes.
OSFR assumes also backward compatibility with devices that do not
support this technique. LetÆs give now more details about how OSFR
performs.
3. Scenario
In this scenario, we present all possible interactions between the
actors. In the fellowing, we see all the message in OSFR scenario.
MT AP AAA WLAN AAA Mediating AAA Home
server Server Server
| | | | |
| /-------------| | | |
|/ beacon | | | |
|\ (p, g) | | | |
| \-------------| | | |
| | | | |
| (1) | | | |
| Probe Request | | | |
| + YMN | | | |
|------------- >| | | |
| | | | |
| (2) | | | |
| Probe Response| | | |
| +YAP | | | |
|< ------------ | | | |
| | | | |
| (3) | | | |
| Auth Request | | | |
| + | | | |
|(user@realm)D-H| | | |
|------------- >| | | |
| | | | |
Abid, et al. Expires Juanuary 12, 2006 [Page 5]
Internet-Draft OSFR July 2005
MT AP AAA WLAN AAA Mediating AAA Home
server Server Server
| | | | |
| | EAP.Req | | |
| | (user@realm) | | |
| |------------- >| | |
| | (4) | | |
| | EAP.Resp | | |
| | (List vWISP) | | |
| |< ------------ | | |
| | | | |
| (5) | | | |
| Auth Response | | | |
| or | | | |
| Challenge Text| | | |
| + | | | |
|(List vWISP)D-H| | | |
|< ------------ | | | |
| | | | |
|Challenge Resp | | | |
|............. >| | | |
| | | | |
|Confirm Success| | | |
|< ............ | | | |
| | | | |
| (6a) | | | |
|(re)association| | | |
| Request | | | |
| + | | | |
|(NAI {Medaiting| | | |
| Server})D-H | | | |
|------------- >| | | |
| (7) | | | |
|(re)association| | | |
| Response | | | |
|< ------------ | | | |
| | | | |
| (8) | | | |
| EAP Id. Req. | | | |
|< -------------| | | |
| | | | |
| EAP Id. Resp. | | | |
|------------- >| | | |
| | Access Request| | |
| |(EAP Id. Resp.)| | |
| |------------- >| | |
| | | | |
Abid, et al. Expires Juanuary 12, 2006 [Page 6]
Internet-Draft OSFR July 2005
MT AP AAA WLAN AAA Mediating AAA Home
server Server Server
| | | Access Request| |
| | |(EAP Id. Resp.)| |
| | |------------- >| |
| | | | |
| | | |Access Request |
| | | |(EAP Id. Resp.)|
| | | |------------- >|
| ... | ... | ... | ... |
| < EAP Authentication Methods > |
| ... | ... | ... | ... |
| | | | |
| EAP Success | | | |
|< ------------ | | | |
| | | | |
AP sends Beacon to alert the users about its presence. In our
solution, AP is the one who chooses the parameters (prime number 'p'
and base 'g') needed to generate the D-H keys. Here are all possible
interactions in our scenario:
1 When MT sends to AP a Probe Request, it piggybacks its public key
YMT.
2 AP sends Probe Response to MT and piggybacks its public key YAP.
After exchanging the public keys, we can begin a secure session
using D-H keys. Our modification will not depend on the type of
IEEE 802.11 Authentication.
3 MT sends an Authentication Request including its identity
user@realm encrypted with D-H key.
4 AP will send the identity in an EAP Request to WLAN Server. This
later has a list of vWISP virtual WISP. WLAN Server will send the
list to AP within an EAP Response.
5 A can be the Authentication Response "Open System" or the
Challenge Text "Shared Key". AP piggybacks the list (encrypted
with D-H key). MT needs this list to choose the "right" Mediating
Server to reach its Home Server. If we choose Open System, we pass
directly to (re)association. Otherwise, if it is Shared Key, we
continue to send the Challenge Response and Success Access.
6 Now, all depends on the list received by MT:
Abid, et al. Expires Juanuary 12, 2006 [Page 7]
Internet-Draft OSFR July 2005
6a MT doesnÆt find the right Mediating Server in the list sent
by AP; it will not (re)associate with AP and will seek for
another one. For example, MT wants a French WISP but in the
list there is only American WISP.
6b In the other case, MT sends (re)Association Request and
piggybacks the NAI of the Mediating Server encrypted with
D-H key.
7 AP sends (re)Association response to MT.
8 Now, EAP session can begin and we are sure that WLAN Server will
reach the Home Server using a path including the chosen Mediating
Server.
4. Packet Format
In this section, we introduce all the changes that we need to do in
the body of some Management Frames. The maximum size of the frame
body is 2312 bytes. We will add some new Information Elements that
have 3 fields:
+---------------+----------+--------------------+
| Element ID(1) |Length(1) | Information(length)|
+---------------+----------+--------------------+
We found in the IEEE 802.11 specification some reserved element ID
(7-15, 32-255). We project to use some of this element ID to add our
new Information Elements. The length given between () is in bytes for
all fields.
4.1 Beacon
We piggyback the prime 'p' and base 'g'. The length of the parameters
'p' and 'g' will be 1024 bits (128 bytes). In the IEEE 802.11
specification, the maximum length free in Beacon frame body is 334
bytes. We just add after TIM (Traffic Indication Map) 2 new fields
one for parameter 'p' and the other for 'g'. The length of each field
is 128 bytes.
P: Information Elements
+-----------------+---------------+--------+
| Element ID(1)=7 | Length(1)=128 | p(128) |
+-----------------+---------------+--------+
Abid, et al. Expires Juanuary 12, 2006 [Page 8]
Internet-Draft OSFR July 2005
G: Information Elements
+-----------------+---------------+--------+
| Element ID(1)=8 | Length(1)=128 | g(128) |
+-----------------+---------------+--------+
The new beacon frame body seems like:
+----------------------+--------+--------+
| 802.11 Beacon Fields | P(130) | G(130) |
+----------------------+--------+--------+
4.2 Probe Request
In the probe request, we add the MTÆs public key YMT. The later will
be a new element information.
+-----------------+---------------+--------+
| Element ID(1)=9 | Length(1)=128 | y(128) |
+-----------------+---------------+--------+
The new Probe Request frame body seems like:
+----------+---------------------+--------+
| SSID(34) | Supported rates(10) | Y(128) |
+----------+---------------------+--------+
4.3 Probe Response
It is like Probe Request but source now is AP. We have the same
Information Element y (Element ID=9) called YAP. The new Probe Request
frame body seems like:
+------------------------------+--------+
| 802.11 Probe Response Fields | Y(128) |
+------------------------------+--------+
4.4 Authentication Request
Identity is a string which identifies user (ex mail address, login).
The new Element Information contains the identity encrypted by D-H
key. The max length of Identity will be 2304 bytes.
+------------------+-----------+------------------+
| Element ID(1)=10 | Length(1) | identity(Length) |
+------------------+-----------+------------------+
Abid, et al. Expires Juanuary 12, 2006 [Page 9]
Internet-Draft OSFR July 2005
The frame body will be:
+---------------------------+---------------------+
|802.11 Auth Request Fields | Identity(length +2) |
+---------------------------+---------------------+
4.5 Authentication Response or Challenge Text
We add a new Element Information called List (encrypted with D-H key).
+------------------+-----------+--------------+
| Element ID(1)=11 | Length(1) | list(Length) |
+------------------+-----------+--------------+
1 If Authentication algorithm number equals 0 (Open System), the
frame body will be:
+----------------------------+----------------+
|802.11 Auth Response Fields |List(length +2) |
+----------------------------+----------------+
Here the maximum length of List is 2304 bytes.
2 If Authentication algorithm number equals 1 (Shared Key), the
frame body will be:
+----------------------------+----------------+
|802.11 Challenge Text Fields|List(length +2) |
+----------------------------+----------------+
Here the maximum length of List is 2048 bytes. The 2 next frames
in Shared Key Authentication wonÆt be modified.
4.6 (Re)Association Request
Here we will add the last new Information Element NAI. It is the
identifier of the Mediating Server (encrypted with D-H key). The
maximum possible length for NAI is 2262 bytes.
+------------------+-----------+-------------+
| Element ID(1)=12 | Length(1) | nai(Length) |
+------------------+-----------+-------------+
1 If we have Association Request, the frame body will be:
+---------------------------------+----------------+
|802.11 Association Request Fields|NAI(length +2) |
+---------------------------------+----------------+
Abid, et al. Expires Juanuary 12, 2006 [Page 10]
Internet-Draft OSFR July 2005
2 If we have Re-association Request, the frame body will be:
+-----------------------------------+----------------+
|802.11 Reassociation Request Fields|NAI(length +2) |
+-----------------------------------+----------------+
The final (re)Association response will not be changed.
Abid, et al. Expires Juanuary 12, 2006 [Page 11]
Internet-Draft OSFR July 2005
5. Security Considerations
OSFR use Diffie Hellman to secure the exchange of encryted data in
the management level. All the security in this system is provided by
the secrecy of the private keying material. If either sender or
recipient private keys are disclosed, all messages sent or received
using that key are compromised. Similarly, loss of the private key
results in an inability to read messages sent using that key [RFC 2631].
Abid, et al. Expires Juanuary 12, 2006 [Page 12]
Internet-Draft OSFR July 2005
6. Acknowledgments
The authors would like to thank Walid Dabbous and our colleagues at
Planete team for their comments and suggestions. Also, we thank the
members of CRISTAL Laboratory.
Abid, et al. Expires Juanuary 12, 2006 [Page 13]
Internet-Draft OSFR July 2005
References
[ARK04] J. Arkko and B. Aboba, "Network Discovery and Selection
Problem", draft-ietf-eap-netsel-problem-02, October 2004.
[WIR03] ANSI/IEEE Std 802.11, 1999 Edition (R2003), Wireless LAN
Medium Access Control (MAC) and Physical Layer (PHY)
Specifications.
[ADR05] F. Adrangi, V. Lortz, F. Bari, P. Eronen. "Identity
selection hints for Extensible Authentication Protocol
(EAP)",
draft-adrangi-eap-network-discovery-and-selection-13.txt,
May 2005.
[RFC2631] E. Rescorla, "Diffie-Hellman Key Agreement Method",
RFC 2631,June 1999.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[rfc2486bis] Aboba, B., Beadles, M., Arkko, J., and P. Eronen, "The
Network Access Identifier",
draft-ietf-radext-rfc2486bis-05 (work in progress),
July 2004.
Authors' Addresses
Mohamed Abid
INRIA Sophia Antipolis
2004 route des lucioles
BP 93 06902 Sophia Antipolis
France
EMail: Mohamed.Abid@sophia.inria.fr
Hossam Afifi
INT
9 rue, Charles Fourier
Evry 91011
FRANCE
Phone: +33 1 60 76 47 08
EMail: Hossam.Afifi@int-evry.fr
Abid, et al. Expires Juanuary 12, 2006 [Page 14]
Internet-Draft OSFR July 2005
Farouk Kamoun
CRISTAL ENSI
Universit‰ de la Manouba
2010
Tunisia
Phone: +216 71 600 444 / +216 98 328 083
EMail: Farouk.kamoun@ensi.rnu.tn
Nada Golmie
NIST
100 Bureau Drive, Mail Stop 8920,
Gaithersburg, Maryland, U.S.A.
Phone: +1 301-975-4190
Mail: nada.golmie@nist.gov
Abid, et al. Expires Juanuary 12, 2006 [Page 15]
Internet-Draft OSFR July 2005
Intellectual Property Statement
The IETF takes no position regarding the validity or scope of any
intellectual property or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; neither does it represent that it
has made any effort to identify any such rights. Information on the
IETF's procedures with respect to rights in standards-track and
standards-related documentation can be found in BCP-11. Copies of
claims of rights made available for publication and any assurances of
licenses to be made available, or the result of an attempt made to
obtain a general license or permission for the use of such
proprietary rights by implementors or users of this specification can
be obtained from the IETF Secretariat.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights which may cover technology that may be required to practice
this standard. Please address the information to the IETF Executive
Director.
Full Copyright Statement
Copyright (C) The Internet Society (2005). This document is subject to
the rights, licenses and restrictions contained in BCP 78, and except
as set forth therein, the authors retain all their rights.
Disclaimer of Validity
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Abid, et al. Expires Juanuary 12, 2006 [Page 16]