Internet DRAFT - draft-cao-capwap-eap
draft-cao-capwap-eap
Internet Engineering Task Force R. Zhang
Internet-Draft China Telecom
Intended status: Informational Z. Cao
Expires: April 18, 2013 H. Luo
China Mobile
October 15, 2012
Encapsulation of EAP Messages in CAPWAP Control Plane
draft-cao-capwap-eap-00
Abstract
This document describes the scenario and requirement of encapsulating
Extensible Authnetication Protocol (EAP) in the CAPWAP control plane.
After the analysis and description, this document proposes the design
of the new message types to encapsulate EAP messages.
Status of this Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on April 18, 2013.
Copyright Notice
Copyright (c) 2012 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
Zhang, et al. Expires April 18, 2013 [Page 1]
Internet-Draft CAPWAP EAP October 2012
described in the Simplified BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1. Conventions used in this document . . . . . . . . . . . . . 3
1.2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Scenario and Analysis . . . . . . . . . . . . . . . . . . . . . 4
3. Encapsulation of EAP in CAPWAP-CTL Plane . . . . . . . . . . . 4
3.1. Control Message Type for EAP . . . . . . . . . . . . . . . 5
3.2. Message Element of the EAP . . . . . . . . . . . . . . . . 5
4. IANA Considerations . . . . . . . . . . . . . . . . . . . . . . 6
5. Security Considerations . . . . . . . . . . . . . . . . . . . . 6
6. Contributors . . . . . . . . . . . . . . . . . . . . . . . . . 6
7. References . . . . . . . . . . . . . . . . . . . . . . . . . . 7
7.1. Normative References . . . . . . . . . . . . . . . . . . . 7
7.2. Informative References . . . . . . . . . . . . . . . . . . 7
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 7
Zhang, et al. Expires April 18, 2013 [Page 2]
Internet-Draft CAPWAP EAP October 2012
1. Introduction
Control and Provisioning of Wireless Access Points (CAPWAP) was
designed as an interoperable protocol between the wireless access
point and the access controller. This architecture makes it possible
for the access controller to manage a huge number of wireless access
points. With the goals and requirements established in[RFC4564] ,
CAPWAP protocols were specified in [RFC5415] , [RFC5416]and
[RFC5417].
The specificaitons mentioned above mainly design the different
control message types used by the AC to control multiple APs. The
EAP messages, as key protocol exchange elements in the WLAN
architecture also need to be encapsulated in the CAPWAP. However,
the CAPWAP protocol does not specifies how to encapsulate the EAP
message in its control plane. This situation makes it default to
encapsulate the EAP messages in the CAPWAP-DATA plane.
We found issues of encapsulating EAP in the CAPWAP-DATA plane in the
scenario where there is a split betweent the CAPWAP-DATA and CAPWAP-
CTL plane. This document describes such scenario and proposes a
resolution to the problem.
1.1. Conventions used in this document
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL","SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119]
1.2. Terminology
Access Controller (AP): The network entity that provides AP access to
the network infrastructure in the data plane, control plane,
management plane, or a combination therein.
Access Point (AP): the same with Wireless Termination Point, The
physical or network entity that contains an RF antenna and wireless
Physical Layer (PHY) to transmit and receive station traffic for
wireless access networks.
CAPWAP Control Plane: A bi-directional flow over which CAPWAP Control
packets are sent and received.
CAPWAP Data Plane: A bi-directional flow over which CAPWAP Data
packets are sent and received.
EAP: Extensible Authentication Protocol, the EAP framework is
specified in [RFC3748].
Zhang, et al. Expires April 18, 2013 [Page 3]
Internet-Draft CAPWAP EAP October 2012
2. Scenario and Analysis
The following figure shows where and how the problem arises. In many
operators' network, the Access Controller is placed remotely at the
central data center. In order to avoid the traffic aggregation at
the AC, the data traffic from the AP is directed to the Access Router
(AR). In this scenario, the CAPWAP-CTL plane and CAPWAP-DATA plane
are separated from each other.
Note: a powerful AC that aggregates the data flows is not a long-term
solution to the problem. Because operators always plan the network
capacity at a certain level, but with the air interface bandwidth
increasing (e.g., from 11g to 11n and 11ac), and the increasing
number of access requests on each AP, the powerful AC could not be
"powerful" enough in the long run.
CAPWAP-CTL +--------+
++============+ AC |
// +--------+
//
+-----+// CAPWAP-DATA +--------------+
| AP |===========================| Access Router|
+-----+ +--------------+
Figure 1: Split between CAPWAP-CTL and CAPWAP-DATA Plane
Because there are no explict message types to support the
encapsulation of EAP packets in the CAPWAP-CTL plane, the EAP
messages are tunneled via the CAPWAP-DATA plane to the AR. AR acts
as authenticator in the EAP framework. After authentication, the AR
receives the EAP keying message for the session. But AC is supposed
to delieve these keying messages to the AP, and AR has no standard
interface to ship them to the AP or the AC. This is unacceptable in
the scenario of EAP-based auto-authentication.
3. Encapsulation of EAP in CAPWAP-CTL Plane
In order to encapsulate EAP message in CAPWAP-CTL plane, we can reuse
the control message header defined in RFC5415 and extend the message
type to accommodate EAP messages.
The CAPWAP Control message header is shown in Figure 2. Only 26
message types have been defined in Section 4.5.5.1 of RFC5415. We
can extend the message type here to encapsulate EAP messages.
Zhang, et al. Expires April 18, 2013 [Page 4]
Internet-Draft CAPWAP EAP October 2012
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Message Type |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Seq Num | Msg Element Length | Flags |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Msg Element [0..N] ...
+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 2: The CAPWAP Control Message Header
3.1. Control Message Type for EAP
This document defines a new control message type for EAP,
i.e."AUTHENTICATION CONTROL". The message type value is to be
defined by IANA.
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Message Type = AUTHENTICATION CONTROL |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Seq Num | Msg Element Length | Flags |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Msg Element [0..N] ...
+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 3: The CAPWAP-EAP Control Message Header
The Seq Num is design to match the response with the request for
other control messages like "Discovery Request" and "Discovery
Response". But this field is not useful for authentication control,
because the EAP message encapsulated between the AP and AC is not
handled in a request-response way. For AUTHENTICATION CONTROL
messages, the AP and AC do not need to handle the 'Seq Num' field.
Msg Element Length field indicates the number of bytes following the
Sequence Number field.
Flags field is left for future definition.
3.2. Message Element of the EAP
The message element(s) carry the information pertinent to each of the
control message types. Every control message in this specification
specifies which message elements are permitted.
Zhang, et al. Expires April 18, 2013 [Page 5]
Internet-Draft CAPWAP EAP October 2012
We define the message element of EAP message in the following figure.
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type=Authentication Payload | Length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Value ... |
+-+-+-+-+-+-+-+-+
Message Element for EAP
Section 4.6 of RFC5415 defines the semantics of Message Element
Types. Type values from 1-49 have been used. An extended message
element type is requested by this document to carry the EAP
authentication payload.
4. IANA Considerations
This document has the following requests to the IANA.
CAPWAP Control Message Type Value for the EAP-AUTHENTICATION-CONTROL,
as defined in Section. 3.1 of this document.
CAPWAP Control Message Element Type Value for the EAP-AUTHENTICATION-
PAYLOAD, as defined in Section. 3.2 of this document.
5. Security Considerations
Security considerations for the CAPWAP protocol has been analyzed in
Section 12 of RFC5415. This document extends the CAPWAP CONTROL
Message Type and Control Message Element Type, and it does not
introduce other security issues besides what has been analyzed in
RFC5415.
6. Contributors
This document stems from the joint work of Hui Deng, Hong Liu, Yifan
Chen, Chunju Shao from China Mobile Research. Thank all the
contributors of this document.
7. References
Zhang, et al. Expires April 18, 2013 [Page 6]
Internet-Draft CAPWAP EAP October 2012
7.1. Normative References
[RFC5415] Calhoun, P., Montemurro, M., and D. Stanley, "Control And
Provisioning of Wireless Access Points (CAPWAP) Protocol
Specification", RFC 5415, March 2009.
7.2. Informative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC3118] Droms, R. and W. Arbaugh, "Authentication for DHCP
Messages", RFC 3118, June 2001.
[RFC3748] Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., and H.
Levkowetz, "Extensible Authentication Protocol (EAP)",
RFC 3748, June 2004.
[RFC4564] Govindan, S., Cheng, H., Yao, ZH., Zhou, WH., and L. Yang,
"Objectives for Control and Provisioning of Wireless
Access Points (CAPWAP)", RFC 4564, July 2006.
[RFC5416] Calhoun, P., Montemurro, M., and D. Stanley, "Control and
Provisioning of Wireless Access Points (CAPWAP) Protocol
Binding for IEEE 802.11", RFC 5416, March 2009.
[RFC5417] Calhoun, P., "Control And Provisioning of Wireless Access
Points (CAPWAP) Access Controller DHCP Option", RFC 5417,
March 2009.
Authors' Addresses
Rong Zhang
China Telecom
No.109 Zhongshandadao avenue
Guangzhou, 510630
China
Phone:
Fax:
Email: zhangr@gsta.com
URI:
Zhang, et al. Expires April 18, 2013 [Page 7]
Internet-Draft CAPWAP EAP October 2012
Zhen Cao
China Mobile
Xuanwumenxi Ave. No. 32
Beijing, 100871
China
Phone: +86-10-52686688
Email: zehn.cao@gmail.com, caozhen@chinamobile.com
Haiyun Luo
China Mobile
United States
Phone:
Fax:
Email: haiyunluo@chinamobile.com
URI:
Zhang, et al. Expires April 18, 2013 [Page 8]