Internet DRAFT - draft-bournelle-pana-mip6
draft-bournelle-pana-mip6
Network Working Group J. Bournelle (Ed.)
Internet-Draft M. Laurent-Maknavicius
Expires: December 28, 2006 GET/INT
J-M. Combes
France Telecom R&D
June 26, 2006
Using PANA in the Mobile IPv6 Integrated Case
draft-bournelle-pana-mip6-01
Status of this Memo
By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on December 28, 2006.
Copyright Notice
Copyright (C) The Internet Society (2006).
Abstract
A Mobile IPv6 node needs a home address, a home agent address and a
security association with its home agent. One of the current
challenge is to dynamically provide these information to the Mobile
Node. This problem is known as the Mobile IPv6 Bootstrapping
problem. A solution for this is to rely on the AAA infrastructure to
provide the Home Agent Information to the Network Access server
Bournelle (Ed.), et al. Expires December 28, 2006 [Page 1]
Internet-Draft PANA for Mobile IPv6 June 2006
(NAS). Then the Mobile Node uses DHCPv6 to get this information.
This document provides a way for the Mobile Node to get the Home
Agent information by using the PANA protocol instead of DHCPv6.
Before the authentication phase, the PANA Authentication Agent (PAA)
indicates to the PANA Client (PaC) that it can provide him with the
Home Agent Information. According to the PANA client's response,
after the authentication and authorization phase with the AAA
infrastructure, the PAA will send this information to the PaC.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Terminology and Definitions . . . . . . . . . . . . . . . . . 3
3. PANA overview . . . . . . . . . . . . . . . . . . . . . . . . 4
4. The Mobile IPv6 Bootstrapping Integrated scenario . . . . . . 4
5. Using PANA instead of DHCPv6 . . . . . . . . . . . . . . . . . 5
6. Advantages of using PANA instead of DHCPv6 . . . . . . . . . . 6
7. New AVPs . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
7.1. Mobility-Capability AVP . . . . . . . . . . . . . . . . . 6
7.2. Home Agent related AVPs . . . . . . . . . . . . . . . . . 6
7.2.1. MIP6-Home-Agent-Address AVP . . . . . . . . . . . . . 6
7.2.2. MIP6-Home-Agent-FQDN AVP . . . . . . . . . . . . . . . 7
8. Security Considerations . . . . . . . . . . . . . . . . . . . 7
9. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 7
10. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 7
11. References . . . . . . . . . . . . . . . . . . . . . . . . . . 7
11.1. Normative References . . . . . . . . . . . . . . . . . . . 7
11.2. Informative References . . . . . . . . . . . . . . . . . . 8
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 9
Intellectual Property and Copyright Statements . . . . . . . . . . 10
Bournelle (Ed.), et al. Expires December 28, 2006 [Page 2]
Internet-Draft PANA for Mobile IPv6 June 2006
1. Introduction
One of the major issue of Mobile IPv6 [1] is currently the
bootstrapping problem. Indeed, a mobile node needs a home address, a
home agent address and a security association with its home agent to
register. The problem is to find a way for the mobile to get those
information.
The document [5] describes various deployment scenarios. In
particular, it makes a clear distinction between the Access Service
Provider (ASP) and the Mobility Service Provider (MSP). Both can be
integrated in a Integrated Access Service Provider (IASP).
In the integrated scenario [2], the home AAA server is in charge of
allocating a Home Agent to the MN. This Home Agent information is
carried in the AAA protocol from the AAA server to the NAS. Then the
Mobile Node uses DHCPv6 to get the HA information.
In this document, we propose to use the Protocol for carrying
Authentication Network Access (PANA) insted of DHCPv6. For this, we
describe what should be added to the current PANA specification and
the related operations. This solution suppose that we are in the
IASP scenario.
2. Terminology and Definitions
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 [3].
The MIPv6 bootstrapping terminology is taken from [5].
This document also uses the following terms or abbreviations:
PANA Protocol for Carrying Network Authentication for Network Access.
PANA Client (PaC) A mobile node (MN) using a PANA protocol
implementation to authenticate itself to the network.
PAA The PANA Authentication Agent (PAA) is the entity responsible to
verify the credentials provided by the PANA client. It is also
responsible of granting network access.
HA The home agent is a Mobile IPv6 device. It is a router in charge
of delivering IPv6 packets addressed to the home address of the
mobile node.
Bournelle (Ed.), et al. Expires December 28, 2006 [Page 3]
Internet-Draft PANA for Mobile IPv6 June 2006
3. PANA overview
PANA [4]is a protocol that carries EAP over IP/UDP to authenticate
users. The PAA (PANA Authentication Agent) is the endpoint of the
PANA protocol at the access network. The PAA itself might not be
able to authenticate the user by terminating the EAP protocol.
Instead the PAA might forward the EAP payloads to the backend AAA
infrastructure.
The Enforcement Point (EP) is an entity which enforces the result of
the PANA protocol exchange. The EP might be co-located with the PAA
or separated as a stand-alone device.
A successful EAP authentication exchange results in a PANA security
association (PANA SA) if the EAP method was able to derive session
keys. In this case, all further PANA messages between PaC and PAA
will be authenticated, replay and integrity protected thanks to the
MAC AVP.
4. The Mobile IPv6 Bootstrapping Integrated scenario
This section is extracted from [6].
In the integrated scenario [2], the assumption is that the IPv6
mobility service is authorized by the same authorizer than network
access service. Basically Mobility Service Authorizer (MSA) and the
Access Service Authorizer (ASA) are the same entity. The scenario
considers two cases:
1. Mobile Node requests a home agent to its home domain (ASA/MSA).
2. Mobile Node requests a home agent to the Access Service Provider
(ASP)
In the first case, Home Agent is allocated by user's home domain. In
the second case it is allocated by user's visited domain. In both
cases, it is assumed that the AAA server in the home domain (AAAH)
authorizes both network access service and mobility service.
In this scenario, Mobile Node discovers the Home Agent Address using
DHCPv6. During network access service authentication and
authorization, AAAH also verifies if authenticating user is
authorized to use mobility service. In affirmative case, AAAH sends
to the Network Access Server (NAS) where the Mobile Node is attached,
the information about the assigned home agent. Then NAS stores that
information. To request home agent data, Mobile Node sends a DHCPv6
Information Request to the All_DHCP_Relay_Agents_and_Servers
Bournelle (Ed.), et al. Expires December 28, 2006 [Page 4]
Internet-Draft PANA for Mobile IPv6 June 2006
multicast address. With this request, Mobile Node can specify if it
wants a home agent provided by the visited domain (ASP) or by the
home domain (ASA). In both cases, the NAS acts a DHCPv6 relay. When
the NAS receives DHCPv6 Information Request then it attaches home
agent information received from AAAH in a new DHC Relay Agent Option.
In case Mobile Node cannot acquire home agent information via DHCPv6,
it can try the default mechanism based on DNS described in [7].
After the Mobile Node has acquired home agent information, the
mechanism used to bootstrap the HoA, IPsec Security Association, and
Authentication and Authorization with the MSA is the same described
in the bootstrapping solution for split scenario [7].
5. Using PANA instead of DHCPv6
The goal of this document is to provide a way for the MN to acquire
the Home Agent Information through PANA messages instead of relying
on DHCPv6.
For this purpose, the PAA indicates to the PaC/MN that it can provide
him with a Home Agent. This is realized during the PANA-Start
exchange. The PAA adds a Mobility-Capability AVP (To Be Allocated)
in the PANA-Start-Request message which indicates what type of
Mobility Agents it can provide. The PaC replies with a PSA message
which will contain its answer to this proposal in the Mobility-
Capability AVP. If the PaC requires a Home Agent, the PAA adds the
Home Agent information in the PANA-Bind exchange. This Home-Agent
information is received by the PAA from the AAA infrastructure (cf.
[8] and [9]). After this negotiation, the MN/PaC falls back in the
split scenario case [7].
PaC PAA AAA
--- --- ---
PSR[Mobility-Capability=Mobile IPv6]
<---------------
PSA[Mobility-Capability=Mobile IPv6]
--------------->
Authentication/authorization phase
<----------------><------------------------->
PANA-Bind-Exchange[HA-Information]
<--------------->
Figure 1: PANA for Mobile IPv6 bootstrapping
If the PaC/MN does not support this specification or does not need a
Home Agent, it simply ignore the Mobility-Capability AVP. In this
Bournelle (Ed.), et al. Expires December 28, 2006 [Page 5]
Internet-Draft PANA for Mobile IPv6 June 2006
case, the PAA should not provide the Home Agent Information in the
PANA-Bind-Exchange.
6. Advantages of using PANA instead of DHCPv6
One of the advantage of this proposal is that in a PANA-Based network
access, this proposal avoids to use DHCPv6 to get the HA information.
The other advantage is that the HA-Information is naturally Integrity
protected thanks to the AUTH AVP.
7. New AVPs
7.1. Mobility-Capability AVP
The Mobility-Capability AVP (AVP Code TBD) is of type Unsigned 32 and
contains the type of Mobility Agent that the PAA can provide to the
PaC/MN. This AVP is also used by the PaC/MN to indicates its need.
Below is a list of valid data values and associated Mobility Agent:
1. IPv6 Home Agent
The support of this AVP is not required. For this reason, the 'M'
bit MUST NOT be set.
[Editor's Note: it is left for further study if other mobility agents
could be provided by this proposal (e.g. IPv4 HA, HIP rendez-vous
server)]
7.2. Home Agent related AVPs
The two AVPs presented below are extracted from [8]. These AVPs can
be reused by the PAA to provide HA information to the PaC. These
AVPs must be included in the PANA-Bind-Request message.
7.2.1. MIP6-Home-Agent-Address AVP
The MIP6-Home-Agent-Address AVP (AVP Code TBD) is of type OctetString
and contains the Mobile IPv6 home agent address and the prefix length
of the said address. The AVP is a discriminated union, representing
IPv6 address in network byte order. The first two octets of this AVP
represents the home link prefix length followed by 16 octets of the
IPv6 address.
The Diameter server MAY decide to assign a MIPv6 home agent to the MN
that is in close proximity to the point of attachment (e.g.
Bournelle (Ed.), et al. Expires December 28, 2006 [Page 6]
Internet-Draft PANA for Mobile IPv6 June 2006
determined by the NAS-Identifier). There may be other reasons for
dynamically assigning home agents to the MN, for example to share the
traffic load. The AVP also contains the prefix length so that the MN
can easily infer one of the possible Home Link prefixes from the home
agent address.
7.2.2. MIP6-Home-Agent-FQDN AVP
The MIP6-Home-Agent-FQDN AVP (AVP Code TBD) is of type UTF8String and
contains the FQDN of a Mobile IPv6 home agent.
8. Security Considerations
The Home Agent Information may be a sensitive information from an
operator's perspective. This proposal permits to provide integrity
to the Home Agent Information since the PANA-Bind exchange can be
protected by the AUTH AVP.
9. IANA Considerations
This document defines a new AVP:
Mobility-Capability is set to TBD
10. Acknowledgements
The authors would like to thanks Junghoon Jee, Sondes Larafa and
Hannes Tschofenig for useful discussion on this topic.
The authors would also like to thanks France Telecom R&D for partly
funding this work.
11. References
11.1. Normative References
[1] Johnson, D., Perkins, C., and J. Arkko, "Mobility Support in
IPv6", RFC 3775, June 2004.
[2] Chowdhury, K. and A. Yegin, "MIP6-bootstrapping via DHCPv6 for
the Integrated Scenario",
draft-ietf-mip6-bootstrapping-integrated-dhc-01 (work in
progress), June 2006.
Bournelle (Ed.), et al. Expires December 28, 2006 [Page 7]
Internet-Draft PANA for Mobile IPv6 June 2006
[3] Bradner, S., "Key words for use in RFCs to Indicate Requirement
Levels", BCP 14, RFC 2119, March 1997.
[4] Forsberg, D., "Protocol for Carrying Authentication for Network
Access (PANA)", draft-ietf-pana-pana-11 (work in progress),
March 2006.
11.2. Informative References
[5] Giaretta, G. and A. Patel, "Problem Statement for bootstrapping
Mobile IPv6", draft-ietf-mip6-bootstrap-ps-05 (work in
progress), May 2006.
[6] Giaretta, G., "Goals for AAA-HA interface",
draft-ietf-mip6-aaa-ha-goals-01 (work in progress),
January 2006.
[7] Giaretta, G., "Mobile IPv6 bootstrapping in split scenario",
draft-ietf-mip6-bootstrapping-split-02 (work in progress),
March 2006.
[8] Korhonen, J., "Diameter MIPv6 Bootstrapping for the Integrated
Scenario", draft-ietf-dime-mip6-integrated-00 (work in
progress), June 2006.
[9] Chowdhury, K., "RADIUS Mobile IPv6 Support",
draft-chowdhury-mip6-radius-01 (work in progress), March 2006.
Bournelle (Ed.), et al. Expires December 28, 2006 [Page 8]
Internet-Draft PANA for Mobile IPv6 June 2006
Authors' Addresses
Julien Bournelle
GET/INT
9 rue Charles Fourier
Evry 91011
France
Email: julien.bournelle@int-evry.fr
Maryline Laurent-Maknavicius
GET/INT
9 rue Charles Fourier
Evry 91011
France
Email: maryline.maknavicius@int-evry.fr
Jean-Michel Combes
France Telecom R&D
38/40 rue du General Leclerc
Issy-les-Moulineaux 92794
France
Email: jeanmichel.combes@orange-ft.com
Bournelle (Ed.), et al. Expires December 28, 2006 [Page 9]
Internet-Draft PANA for Mobile IPv6 June 2006
Intellectual Property Statement
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Disclaimer of Validity
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Copyright Statement
Copyright (C) The Internet Society (2006). This document is subject
to the rights, licenses and restrictions contained in BCP 78, and
except as set forth therein, the authors retain all their rights.
Acknowledgment
Funding for the RFC Editor function is currently provided by the
Internet Society.
Bournelle (Ed.), et al. Expires December 28, 2006 [Page 10]