Internet DRAFT - draft-nakhjiri-radius-mip4

draft-nakhjiri-radius-mip4




                    RADIUS Mobile IPv4 extensions        October 2005 
 
 
                                                                        
   Internet Draft                                       Madjid Nakhjiri 
   draft-nakhjiri-radius-mip4-02.txt                      Motorola Labs 
   Category: Internet draft                            Kuntal Chowdhury 
   Expires: May 2006                                   Starent Networks 
                                                               Avi Lior 
                                                    Bridgewater systems 
                                                             Kent Leung 
                                                          Cisco Systems 
                                                           October 2005 
    
    
                       RADIUS Mobile IPv4 extensions 
                                      
 
Status of this Memo 
    
   This document is an Internet-Draft and is subject to all provisions 
   of Section 3 of RFC 3667.  By submitting this Internet-Draft, each 
   author represents that any applicable patent or other IPR claims of 
   which he or she is aware have been or will be disclosed, and any of 
   which he or she become aware will be disclosed, in accordance with 
   section 6 of BCP 79. 
 
   Internet-Drafts are working documents of the Internet Engineering 
   Task Force (IETF), its areas, and its working groups.  Note that      
   other groups may also distribute working documents as Internet-
   Drafts. 
    
   Internet-Drafts are draft documents valid for a maximum of six months 
   and may be updated, replaced, or obsoleted by other documents at any 
   time.  It is inappropriate to use Internet-Drafts as reference 
   material or to cite them other than as "work in progress." 
    
   The list of current Internet-Drafts can be accessed at 
        http://www.ietf.org/ietf/1id-abstracts.txt 
   The list of Internet-Draft Shadow Directories can be accessed at 
        http://www.ietf.org/shadow.html. 
    
   This document is an Internet-Draft and is subject to all provisions
   of Section 3 of RFC 3667. This Internet-Draft will expire in May, 2006. 
    
   Copyright Notice 
    
      Copyright (C) The Internet Society (2005). 
    
Abstract 
    
   Mobile IPv4 specifies mechanisms that need assistance from a AAA 
   server and a AAA infrastructure. Examples of such mechanisms are 
 
 
Nakhjiri et. al.          Expires - May 2006                  [Page 1] 
                                  
                    RADIUS Mobile IPv4 extensions        October 2005 
 
 
   those providing key management and authentication services during a 
   registration process of the mobile node with MN-AAA authentication 
   extension. Although Diameter Mobile IP application is being specified 
   to support the needs of Mobile IPv4 from the point of view of the AAA 
   infrastructure, such support does not exist within RADIUS framework. 
   This document defines the RADIUS attributes that provide support for 
   Mobile IPv4 operation. 
    
    
Conventions used in this document 
    
    
   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", 
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this 
   document are to be interpreted as described in RFC-2119. 
 
    
Table of Contents 
    
   1. Introduction...................................................2 
   2. Terminology and Assumptions....................................3 
   3. Protocol Overview..............................................4 
      3.1 Direct registration to Home Agent..........................5 
      3.2 Registration through a Foreign Agent.......................9 
   4. RADIUS entity requirements....................................14 
      4.1 RADIUS client requirements................................14 
      4.2 RADIUS server and routing requirements....................15 
      4.3 Mobile IP agent requirements..............................16 
   5. Attributes....................................................18 
      5.1 Use of existing attributes................................18 
      5.2 Suggested attributes for RADIUS-Mobile support............19 
      5.3 Attribute List............................................31 
   6. Diameter compatibility considerations.........................32 
   7. IANA considerations...........................................33 
   8. Security considerations.......................................33 
   9. References....................................................34 
   Acknowledgments..................................................35 
   Author's Addresses...............................................35 
    
    
  1. Introduction
     
    
   Mobile IP provides routing services to the nodes that need to change 
   their IP address due to mobility [MIPv4]. To help setting up such 
   routing services, the mobile node (MN) needs to engage in an 
   authenticated registration message exchange with the Mobile IP 
   agents. Message authentication is performed by inclusion of specific 
   authentication extensions to the mobility registration messages and 
   relies on existence of trust relationships between the mobile node 
 
 
Nakhjiri et. al.          Expires - May 2006                  [Page 2] 
                                  
                    RADIUS Mobile IPv4 extensions        October 2005 
 
 
   and its mobility agents. These trust relationships include, among 
   other things, keys that are shared between the mobile node and these 
   agents. 
    
   Many times such trust does not exist in advance and hence there is a 
   need for dynamic key management methods in conjunction with Mobile IP 
   signaling.  
    
   Mobile IPv4 working group has developed extensions for the 
   registration process to allow the MN and mobility agents to request 
   assistance from the AAA server in authentication [MIP4CHAL] and 
   creation of the key material [MIPKEYS], all based on the pre-
   established trust relationship between the MN and its home AAA 
   server. 
    
   However, on the AAA side, currently only Diameter provides 
   specification for interaction with Mobile IP agents [DIAMIP]. The 
   available RADIUS support for Mobile IP is mostly vendor proprietary 
   and lacks support for interoperability between vendors. The goal of 
   this document is to provide a specification for IETF RADIUS 
   attributes supporting Mobile IPv4. 
    
  2. Terminology and Assumptions 
    
    
   The scope of this draft is to introduce RADIUS functionality and 
   attributes, designed to support Mobile IP registration for roaming 
   within or beyond the administrative domain of the mobile node. The 
   design in this document also serves inter-domain scenarios in which 
   both a foreign AAA server (AAAF) and the home AAA server (AAAH) are 
   involved. However, to keep the scenario discussions simple we treat 
   the entire AAA infrastructure as consisting of a AAAF and a AAAH, but 
   note that in the multi-domain scenario, the operation may involve a 
   number of AAA proxies (AAA nodes operating between AAAF and AAAH) to 
   provide Mobile IP-RADIUS interaction for a roaming mobile node. 
    
   A critical assumption in this draft is that the MN shares a key, 
   called MN-AAA key with its home RADIUS server (AAAH). 
    
   MN-AAA key 
     The MN-AAA key is the basis for the creation of all the keys that 
     are created dynamically between MN and its mobility agents.  
    
   Mobility Security Association (MSA) 
     The security associations that are created as a result of Mobile 
     IP-AAA signaling are called mobility security association 
     (MSA)[MIPKEYS]. 
    
   Home agent (HA) 

 
 
Nakhjiri et. al.          Expires - May 2006                  [Page 3] 
                                  
                    RADIUS Mobile IPv4 extensions        October 2005 
 
 
     A Mobile IP Home Agent that is responsible for generating and 
     keeping a binding between mobile node home address and its care of 
     address. 
    
   Foreign Agent (FA) 
     A Mobile IP Foreign agent that is responsible for serving the 
     mobile node in foreign networks. 
      
   Mobile IP Agent (MA) 
     Mobile IP Agent: Refers to HA or FA or both. 
      
   Home AAA server (AAAH) 
     The AAAH is a RADIUS server that operates in the home network.  
     The home network is the network that holds the user record. 
      
   Foreign AAA server (AAAF) 
     The AAAF is a RADIUS server that acts as a "forwarding server", 
     forwarding RADIUS packets to the AAAH. The AAAF resides in the 
     same domain that hosts the FA in the foreign network or hosts the 
     HA when the HA is also in the foreign network. Other Broker AAA 
     ‘‘proxy servers’’ may exist between the AAAF and the AAAH.  The role 
     of these "proxy servers" is not germane to this document and will 
     not be discussed henceforth. 
      
   ALL_ZEROs_OR_ONES: 
      This means an IP address set to either 0.0.0.0 or 255.255.255.255. 
      
     In this document the terms AAAF and AAAH refer to RADIUS servers. 
      
    
  3. Protocol Overview 
    
    
   In this section we will provide an overview of a preferred method on 
   how a mobility agent and a RADIUS server can interact during a mobile 
   node registration process, to perform registration, authentication 
   and key distribution. Different standard developing organizations 
   (such as 3GPP2 and WiMAX) may have alternative signaling procedures 
   to implement Mobile IP-RADIUS interaction, depending on their 
   architecture or trust assumptions. Our main objective is to 
   standardize a set of RADIUS attributes to provide support for such 
   activities. Depending on the type of Care-of Address and the mobility 
   agents used during Mobile IPv4 registration there are two possible 
   cases to consider: 
    
     1) When the MN acquires a co-located CoA (CCoA), it performs a 
     direct registration with the HA without the interaction of a 
     Mobile IP foreign agent.  
     2a) When the MN acquires a CoA from a Mobile IP foreign agent (FA) 
     on the foreign network, the MN must register through the FA and 
 
 
Nakhjiri et. al.          Expires - May 2006                  [Page 4] 
                                  
                    RADIUS Mobile IPv4 extensions        October 2005 
 
 
     use the FA based CoA for Mobile IP registration. The FA forwards 
     the registration to the HA for processing. b) When the MN acquires 
     a CCoA but the FA requires the MN to register via the FA (R-bit 
     set in Agent Advertisement), the MN must send the registration 
     request to the FA. The FA forwards the registration messages 
     to/from the HA. 
      
    
  3.1 Direct registration to Home Agent 
      
    
   In the case where the MN acquires a co-located CoA (CCoA), the MN 
   registers its CCoA with the HA directly. When the MN has a mobility 
   security association (MSA) with the HA, the HA can authenticate MN 
   registration directly. However, when this MSA does not exist, the HA 
   needs to outsource the authentication to the AAA infrastructure. Note 
   that, this outsourcing requires a pre-established security 
   association between MN and the AAA server (MN-AAA key).  
     
   The HA may reside in the home domain of the mobile node. In such 
   cases, the HA can reach the AAAH directly or the HA may reside in a 
   foreign domain, which means the HA must reach the AAAH via the AAA 
   infrastructure. In the following picture we do not show the AAA 
   infrastructure (AAAF) that routes this messaging to the AAAH, since 
   it does not impact the discussion in this draft. The HA in this model 
   acts as a conversion point, turning Mobile IP registration messages 
   into RADIUS messages and vice versa.  
 
                                             +--------+  
                                             |  AAAH  |  
                                             |        |  
                                             | server |  
                                             +--------+  
                                               ^  |  
                                        Access |  | Access 
                                       Request |  | Response 
                                               |  v  
                   +--------+       RRQ      +---------+  
                   | Mobile | -------------> |  Home   |  
                   | Node   |      RRP       |  Agent  |  
                   +--------+ <------------  +---------+  
                             
                        Figure 1a: Direct registration with HA 
    
 
 
 
 
    
    
 
 
Nakhjiri et. al.          Expires - May 2006                  [Page 5] 
                                  
                    RADIUS Mobile IPv4 extensions        October 2005 
 
 
               MN          HA                   AAAH Server    
               |  Reg Req. |                           | 
               |---------> |                           | 
               |           |  Access Request           | 
               |           | ------------------------> |   
               |           |   Access Accept (key mtrl)| 
               |           | <-------------------------| 
               |Reg Rep.   |                           |  
               | <---------|                           | 
         
   Figure 1b: Mobile IP and RADIUS messaging for direct registration. 
    
   The operation is as follows: 
     . The Mobile Node creates a registration request (RRQ) that 
        includes MN-AAA Authentication extension and various key 
        generation nonce request extensions [MIPKEY]. The latter 
        extensions are included by the MN to request key material that 
        is needed for establishment of MSA between the MN and the Mobile 
        IP HA. The former extension is included to help the AAAH to 
        authenticate the MN on behalf of the HA as 
      
         Authenticator = MD5( 0 || Key ||  
         MD5(Preceding Mobile IP data || 
         Type, Subtype (if present), Length, SPI) ||  
         237 octets of zeros) 
    
         (Note: the 0 octets in the authenticator for the co-located 
         case are inserted instead of the octets used from the challenge 
         in the FA-based CoA case [MIP4CHAL] to preserve 
         interoperability). The use of challenge in co-located case is 
         not required.). 
    
     . Upon receiving a registration request (RRQ), the home agent (HA) 
        examines the contents of the RRQ. If the HA finds the 
        construction of RRQ acceptable, and is acting as a RADIUS NAS, 
        it builds a RADIUS Access Request message and deals with the 
        information within the RRQ as described in section for generic 
        consideration for Mobile IP agents (section 4.3). The following 
        shows the complete list of attributes included in the RADIUS 
        Access Request formed by the HA. When forming the MIP-feature-
        vector attribute for co-located MNs, the HA shall set the ‘‘Co-
        located Mobile Node’’ flag as well as other appropriate flags to 
        indicate the request from MN for keying material. The values 
        insides parentheses following the attributes represent 
        recommended attribute values. For more details on the 
        recommendations, the reader is referred to section on Mobile IP 
        agent requirements (4.2). Attributes included inside ‘‘<>’’ are 
        optional. However, note that at least one of User-Name or MIP-
        MN-HoA MUST be present. 
 
 
Nakhjiri et. al.          Expires - May 2006                  [Page 6] 
                                  
                    RADIUS Mobile IPv4 extensions        October 2005 
 
 
                  RADIUS-Access Request { 
                  <User-Name>, (1) (MN NAI, when available in RRQ) 
                  <MIP-MN-HoA>, (from RRQ, when not ALL_ZEROs_OR_ONES) 
                  <MIP-HA-IP address> (from RRQ, when available) 
                  NAS-ID (32, as per RADIUS specifications) 
                  MIP-MA-Type (1 to indicate client as HA) 
                  MIP-HASH-RRQ,   
                  (see section 6 on Diameter compatibility) 
                  MIP-MN-AAA-SPI, 
                  MIP-MN-AAA-Authenticator, 
                  MIP-feature-vector (with co-located MN flag set) 
                  Message-Authenticator (80)} 
 
                                      
     . The AAAH verifies the authentication data, by computing the MN-
        AAA-Authenticator value (as described in section 4.2) and 
        comparing to what received in MIP-MN-AAA-Authenticator 
        attribute. After successful authentication, the AAAH prepares 
        the RADIUS Access Accept to be sent to the HA as follows 
            -The User-Name or MIP-HA-HoA attribute (depending on 
            presence) copied from the Access-Request. 
            -If the ‘‘MN-HA-Key-Nonce-Request’’ flag was set in the MIP-
            feature-vector attribute in the RADIUS Access Request, the 
            AAAH looks up the SPI value in the MIP-MN-AAA-SPI attribute 
            to index the key generation method to derive the MN-HA key 
            in accordance to RFC 3957.  The following attributes are 
            included in the Access Accept to convey the information in 
            the MSA: MIP-MN-AAA-SPI, MIP-MN-to-HA-SPI, MIP-HA-to-MN-SPI, 
            MIP-MN-HA-key (for the HA), MIP-MN-HA-Nonce (for the MN), 
            MIP-MN-HA-ALGORITHMID, MIP-MN-HA-REPLAY, MIP-MN-HA-MSA-
            LIFETIME.  
            -If the ‘‘Mobile-Node-Home-Address-Requested’’ flag in MIP-
            feature-vector attribute in RADIUS Access Request was set, 
            the AAAH includes the MIP-MN-HoA attribute for the assigned 
            Home Address, which may not be the same as the hint in the 
            MIP-MN-HoA attribute of the Access Request message. 
            -If the ‘‘Home-Agent-Requested’’ flag in MIP-feature-vector 
            attribute in RADIUS Access Request was set, the AAAH 
            includes the MIP-HA-IP attribute for the assigned Home 
            Agent. 
            -Policy set on the AAAH may dictate that value for the flags 
            (e.g. ‘‘Home Agent in Foreign network’’) in the attribute. 
             
         The AAAH then sends a RADIUS Access Accept message to the home 
         agent. The Access Accept message includes the attributes listed 
         below ([] indicates need for specific security protection): 
       
                  RADIUS Access Accept { 
                  <User-Name> 
 
 
Nakhjiri et. al.          Expires -- May 2006                  [Page 7] 
                                  
                    RADIUS Mobile IPv4 extensions        October 2005 
 
 
                  <MIP-MN-HoA> 
                  MIP-MA-Type (1 to indicate client is an HA) 
                   
                  MIP-MN-AAA-SPI 
                  MIP-MN-to-HA SPI, 
                  MIP-HA-to-MN-SPI, 
                  [MIP-MN-HA-key], 
                  MIP-MN-HA-Nonce, 
                  MIP-MN-HA-ALGORITHMID, 
                  MIP-MN-HA-REPLAY, 
                  MIP-MN-HA-MSA-LIFETIME 
                  Message-Authenticator (80) 
                  } 
     . In case of authentication failure or failure to identify the MN 
        based on the provided User-Name or MN-HoA attributes, the AAAH 
        generates a RADIUS Access-Reject packet. 
    
     . Reception of RADIUS Access Accept is an indication of successful 
        MN authentication. Thus, the HA processes the Mobile IP RRQ and 
        generates a Mobile IP registration reply (RRP). The following 
        describes how the RADIUS attributes are used in preparation of 
        the RRP:  
            -The value of the User-Name attribute is included in the MN-
            NAI Extension. 
            -If the MIP-MN-HoA attribute exists, Home Address field in 
            the RRP is set to the Address field value. 
            -If the MIP-HA-IP attribute exists, the HA checks if it owns 
            the IP address in the Address field.  If so, the value is 
            placed into the Home Agent field of the RRP.  Otherwise, HA 
            puts its IP address in the Home Agent field and the HA 
            address from the RADIUS server in the Redirected HA 
            Extension as specified in [MIPDYNHA]. 
            -The values in the MIP-MN-to-HA SPI, MIP-MN-AAA-SPI, MIP-MN-
            HA-ALGORITHMID, MIP-MN-HA-REPLAY and MIP-MN-HA-MSA-LIFETIME 
            provide the information in the ‘‘MN-HA Key Generation Nonce 
            Reply Extension’’. Specifically, the String field in the MIP-
            MN-HA-Nonce attribute is extracted and put the MN-HA Key 
            Generation Nonce Reply Extension. 
            -The values in the MIP-HA-to-MN SPI, MIP-MN-to-HA SPI, MIP 
            MN-HA-key, MIP-MN-HA-ALGORITHMID, MIP-MN-HA-REPLAY and MIP-
            MN-HA-MSA-LIFETIME are used to create the MSA for MN on the 
            Home Agent.  
         The home agent also calculates an MN-HA Authentication 
         extension based on the HA-to-MN SPI and received MN-HA key and 
         includes in the RRP destined towards the MN. 
     
     . If the MN-HA Key Generation Nonce Reply Extension is in the 
        Registration Reply, the MN extracts the necessary information 
        from the extension to derive the MN-HA key [MIPKEYS] and verify 
 
 
Nakhjiri et. al.          Expires -- May 2006                  [Page 8] 
                                  
                    RADIUS Mobile IPv4 extensions        October 2005 
 
 
        the MN-HA authentication extension. If successful, the MN builds 
        the MSA with the HA. 
    
  3.2 Registration through a Foreign Agent 
     
    
   When the MN uses FA based CoAs, it needs to send its registration 
   request to the FA. The block and message diagrams are shown in 
   Figures 2a and 2b. 
 
                       +--------+    Access Request(2a) +--------+ 
                       |  AAAF  |---------------------->| AAAH   | 
                       |        |                       |        | 
                       | server |< ---------------------|server  | 
                       +--------+    Access Accept (3a) +--------+ 
                      (2)  ^  |  (3)                   (5)  ^  |  (6) 
                    Access |  | Access               Access |  | Access 
                   Request |  | Accept              Request |  | Accept 
                           |  V                             |  V 
   +--------+RRQ (1)  +---------+         RRQ (4)     +----------+ 
   | Mobile | ------->| Foreign | ------------------->|  Home    | 
   | Node   | RRP (8) |  Agent  |         RRP (7)     |  Agent   | 
   |        |<--------|         |<--------------------|          | 
   +--------+         +---------+                     +----------+ 
   Figure 2a. Mobile IP and RADIUS entities when registration takes 
   place through the FA (FA-based CoA or CcoA with R-bit set).  
 
   The operation is as follows: 
    
    
        MN            FA          HA      AAAF       AAAH  
        --            ---        ----     ---        ---- 
        |              |          |        |          | 
        |Ad+Challenge  |          |        |          | 
        | <---------   |          |        |          | 
        | RRQ-----.   | 
                                  |        |          | 
        |              |Access Request(RRQ)| Access   | 
        |              | ----------------> | Req (RRQ)| 
        |              |          |        |-------. | 
        |              |          |        |Acc. Accpt| 
        |              |          |        |(key mtrl | 
        |              |          |        | for FA   | 
        |              |          |        |< --------| 
        |              | Access Accept     |          | 
        |              | <-----------------|          |  
        |              |  RRQ     |        |          | 
        |              | -------->|        |          | 
        |              |          | Acc. Request(RRQ) | 
        |              |          |  ----------->     | 

 
 
Nakhjiri et. al.          Expires -- May 2006                  [Page 9] 
                                  
                    RADIUS Mobile IPv4 extensions        October 2005 
 
 
        |              |          | Acc. Accept       | 
        |              |          |(key mtrl for HA)  | 
        |              |(RRP)     |< -----------------| 
        |     RRP      |<-------  |        |          | 
        | < --------   |          |        |          | 
         
   Figure 2b- Mobile IP and RADIUS messaging when registration takes 
   place through the FA (FA-based CoA or CcoA with R-bit set). 
 
     . An MN being served by an FA, with whom the MN does not have an 
        MSA, forms a registration request (RRQ) including MN-HA-key-
        generation-nonce-request, MN-FA-key-generation-nonce-request 
        [MIPKEYS], challenge extensions [MIP4CHAL] and MN-AAA 
        authentication extension and sends this message to FA. The MN 
        calculates the MN-AAA-Authenticator as follows 
          
         Authenticator = MD5( 
         High-order byte from Challenge || Key || 
         MD5(Preceding Mobile IP data || 
         Type, Subtype (if present), Length, SPI) || 
         Least-order 237 bytes from Challenge) 
          
     . The FA checks the challenge [MIP4CHAL] and process the necessary 
        information from the RRQ to form the attributes to be included 
        in a RADIUS Access Request message as described in section 4.3. 
        When creating the Access Request and forming the MIP-feature-
        vector attribute, the FA may set the appropriate flags within 
        MIP-feature vector to indicate to the AAAH that it requires keys 
        for FA-MN-MSA and FA-HA-MSA and perform the operation described 
        by [MIPKEYS]. If the HA IP address field within the RRQ is not 
        available, the FA inserts the HA NAI (if available) from the RRQ 
        inside the MIP-HA-ID attribute. The FA includes its own 
        identifier (e.g. NAI) inside the NAS-ID. The FA forms a RADIUS 
        Access Request towards the AAA infrastructure(either AAAF or to 
        AAAH directly) as follows 
                   
                  RADIUS-Access Request { 
                  <User-Name>, (1) (MN NAI, when available in RRQ) 
                  <MIP-MN-HoA>, (from RRQ, when not ALL_ZEROs_OR_ONES) 
                  <MIP-HA-IP address> (from RRQ, when available) 
                  <MIP-HA-ID>    
                  MIP-MA-Type (0 to indicate client is an FA) 
                  NAS-ID ((32, as per RADIUS specification)  
                  <MIP-MN-CoA> (from RRQ) 
                  MIP-MN-FA_Challenge, 
                  MIP-HASH-RRQ, 
                  MIP-MN-AAA-SPI, 
                  MIP-MN-AAA-Authenticator, 

 
 
Nakhjiri et. al.          Expires -- May 2006                 [Page 10]
                                   
                    RADIUS Mobile IPv4 extensions        October 2005 
 
 
                  MIP-feature-vector (with co-located MN flag cleared) 
                  Message-Authenticator(80)} 
                         
     . The RADIUS Access request will eventually arrive at the AAAH 
        through the AAA infrastructure. The AAAH server computes its own 
        copy of the MN-AAA authenticator as follows (described in 
        section 4.2): 
    
         Authenticator = MD5( 
         High-order byte from Challenge || Key || 
         Value of MIP-HASH-RRQ || 
         Least-order 237 bytes from Challenge) 
    
         The challenge is the value within the MIP-MN-FA-Challenge. 
    
     . The AAAH compares this value with what it has received in MIP-
        MN-AAA-Authenticator attribute from FA. After successful 
        authentication, the AAAH prepares the RADIUS Access Accept as 
        follows 
            -The User-Name or MIP-HA-HoA attribute (depending on 
            presence) copied from the Access-Request. 
            -If the ‘‘MN-FA-Key-Nonce-Request’’ flag was set in the MIP-
            feature-vector attribute in the RADIUS Access Request, the 
            AAAH looks up the SPI value in the MIP-MN-AAA-SPI attribute 
            to index the key generation method to derive the MN-HA key 
            in accordance to RFC 3957.  The following attributes are 
            included in the Access Accept to convey the information in 
            the MSA: MIP-MN-AAA-SPI, MIP-MN-to-FA-SPI, MIP-FA-to-MN-SPI, 
            MIP-MN-FA-key (for the FA), MIP-MN-FA-Nonce (for the MN), 
            MIP-MN-FA-ALGORITHMID, MIP-MN-FA-REPLAY, MIP-MN-FA-MSA-
            LIFETIME.  
            -If the ‘‘FA-HA-Key-Request’’ flag was set in the MIP-feature-
            vector attribute in the RADIUS Access Request, the following 
            attributes are included in the Access Accept to convey the 
            information in the MSA: MIP-MN-AAA-SPI, MIP-FA-to-HA-SPI, 
            MIP-HA-to-FA-SPI, MIP-MN-FA-key (for the FA), MIP-MN-FA-
            Nonce (for the MN), MIP-FA-HA-ALGORITHMID, MIP-FA-HA-MSA-
            LIFETIME.  
            -Policy set on the AAAH may dictate that value for the flags 
            (e.g. ‘‘Home Agent in Foreign network’’) in the attribute. 
             
         The AAA server sends a RADIUS Access-Accept message including 
         the following attributes to the FA ([] indicates need for 
         specific security protection): 
      
                   
                  RADIUS Access Accept { 
                  <User-Name>   
 
 
Nakhjiri et. al.          Expires -- May 2006                 [Page 11] 
                                  
                    RADIUS Mobile IPv4 extensions        October 2005 
 
 
                  <MIP-MN-HoA> 
                  MIP-MA-Type (0 to indicate client is an FA)  
                  <MIP-HA-IP address> (If HA is being delivered by AAA) 
                  <MIP-HA-ID>    
                  [MIP-FA-HA key], 
                  MIP-MN-AAA-SPI 
                  MIP-FA-to-HA-SPI, 
                  MIP-HA-to-FA-SPI, 
                  MIP-FA-HA-ALGORITHMID, 
                  MIP-FA-HA-MSA-LIFETIME, 
                  Encrypted [MIP-MN-FA key], 
                  MIP-MN-to-FA-SPI, 
                  MIP-FA-to-MN-SPI, 
                  MIP-MN-FA-Nonce, 
                  MIP-MN-FA-MSA-LIFETIME, 
                  MIP-MN-FA-ALGORITHMID, 
                  Message-Authenticator (80) 
                  } 
     . Reception of RADIUS Access Accept by the FA is an indication of 
        successful MN authentication. The FA needs to at this point 
        extract the information regarding the MSAs with the MN and HA, 
        build the SAs and follow the Mobile IP processing as defined in 
        [MIPv4] and other specifications (such [MIPCHAL], [MIPKEYS], 
        [MIPDYNHA], as set by policies). Processing of the attributes in 
        the RADIUS Access Accept is as follows  
          -If the MIP-HA-IP or MIP-HA-ID attributes exist, the FA uses 
          the information for routing of the RRQ, while leaving the 
          initial RRQ in tact (otherwise the MN-AAA-AE will not be 
          computed by the AAA properly later)   
          -If the MIP-MN-HoA attribute exists, the FA checks to see if 
          there is a match with the MIP-MN-HoA received in RRQ (what if 
          it is not?). 
            -The values in the MIP-MN-to-FA SPI, MIP-MN-AAA-SPI, MIP-MN-
            HA-ALGORITHMID, MIP-MN-HA-REPLAY and MIP-MN-HA-MSA-LIFETIME 
            provide the information in the ‘‘MN-HA Key Generation Nonce 
            Reply Extension’’. Specifically, the String field in the MIP-
            MN-HA-Nonce attribute is extracted and put the MN-HA Key 
            Generation Nonce Reply Extension. 
            - The values of MIP-MN-to-FA-SPI, MIP-FA-to-MN-SPI, MIP-MN-
            FA-key (for the FA), MIP-MN-FA-Nonce (for the MN), MIP-MN-
            FA-ALGORITHMID, MIP-MN-FA-REPLAY, MIP-MN-FA-MSA-LIFETIME.  
            are used to create the MSA for MN and for HA at the Foreign 
            Agent.  
     . After building the MSA with the HA, the relays the initial 
        registration request including the MN-AAA Authentication 
        extension to the HA. The FA May append the FA-HA Authentication 
        extension with the authenticator computed using the received FA-
        HA key. The FA-HA authentication extension also includes the SPI 
        that is copied from the received MIP-FA-to-HA-SPI attribute. 
 
 
Nakhjiri et. al.          Expires - - May 2006                 [Page 12] 
                                 
                    RADIUS Mobile IPv4 extensions        October 2005 
 
 
    
     . Upon receiving the registration request from the FA, The HA 
        creates a new RADIUS Access Request for the AAAH and includes 
        the attributes shown below. The HA follows the guidelines in 
        processing the RRQ fields as described in section 4.3 (including 
        building hash from RRQ). The HA sets the appropriate flags 
        within the MIP-feature-vector attribute to request keys and 
        nonces from the AAAH for the HA-MN-MSA and HA-FA-MSA and clears 
        the ‘‘co-located Mobile Node’’ flag. Note, if an HA-FA-MSA exists, 
        the HA can simply verify the authenticator within FA-HA-
        Authenticator, without requesting the key for this MSA from the 
        AAA server. This would mean the feature vector needs to be 
        configured accordingly. Otherwise, the HA will store the FA-HA-
        Authentication extension for future verification. 
  
                  RADIUS-Access Request { 
                  <User-Name> (1) (MN NAI, when available in RRQ) 
                  <MIP-MN-HoA>, (from RRQ, when not ALL_ZEROs_OR_ONES) 
                  NAS-ID (HA ID as per RADIUS specification) 
                  MIP-MA-Type (1 to indicate client is an HA) 
                  <MIP-HA-IP address>, 
                  <MIP-FA-IP address>, 
                  <MIP-FA-ID>   (FA ID as per RADIUS specification) 
                  MIP-MN-FA challenge, 
                  MIP-MN-AAA-SPI, 
                  MIP-MN-AAA-Authenticator, 
                  MIP-FA-to-HA-SPI, 
                  MIP-HASH-RRQ, 
                  MIP-feature-vector, 
                  Message_Authenticator (80)} 
                   
     . The AAAH finds the FA-HA MSA based on the included MIP-FA-to-HA-
        SPI and/or MIP-MN-AAA-SPI. The AAAH verifies the MN-AAA 
        Authenticator in the same manner as explained in section 4.2. If 
        successful, the AAAH creates the MN-HA key and the corresponding 
        nonces for MN-HA MSAs and sends a RADIUS Access Accept to the HA 
        including the following attributes. Notes that both the all 
        nonces for the MN (including those for MN-FA MSAs) are sent 
        through this message to help the HA with one stop processing of 
        the registration reply. The HA-FA and the MN-HA keys must be 
        encrypted with the security association shared by the AAAH and 
        HA ([] indicates need for specific security protection). 
                         
                  RADIUS Access Accept { 
                  <User-Name> 
                  <MIP-MN-HoA> 
                  MIP-MA-Type (1 to indicate client is an HA) 
                  <MIP-HA-IP address> (If HA is being delivered by AAA) 

 
 
Nakhjiri et. al.          Expires -- May 2006                 [Page 13]
                                   
                    RADIUS Mobile IPv4 extensions        October 2005 
 
 
                  <MIP-HA-ID>    
                  [MIP-FA-HA key], 
                  MIP-FA-to-HA-SPI, 
                  MIP-HA-to-FA-SPI, 
                  MIP-FA-HA-ALGORITHMID, 
                  MIP-FA-HA-MSA-LIFETIME, 
                  [MIP-MN-HA key], 
                  MIP-MN-to-HA SPI, 
                  MIP-HA-to-MN-SPI, 
                  MIP-MN-HA-Nonce, 
                  MIP-MN-HA-ALGORITHMID, 
                  MIP-MN-HA-REPLAY, 
                  MIP-MN-HA-MSA-LIFETIME 
                  MIP-MN-FA-Nonce, 
                  MIP-MN-FA-ALGORITHMID, 
                  MIP-MN-FA-REPLAY, 
                  MIP-MN-FA-MSA-LIFETIME, 
                  Message-Authenticator (80) 
                  } 
     . Reception of RADIUS Access Accept by the HA is an indication of 
        successful MN authentication. The HA retrieves the key materials 
        and the keys from the attributes included in the RADIUS access 
        Accept message from the AAAH. If the HA had received material 
        regarding an MSA with the FA and had earlier received at FA-HA 
        Authentication extension within the RRQ from FA, the AF 
        validates the authenticator at this point [MIPKEYS]. The HA 
        processes the RRQ and builds a Mobile IP registration reply for 
        the mobile node. The HA includes MIP-MN-FA-Nonce and MIP-MN-HA-
        Nonce and related information into specified nonce reply 
        extensions [MIPKEYS], builds MN-HA authentication extension and 
        FA-HA Authentication extension (computed with received MN-HA key 
        and FA-HA key, respectively) and sends the RRP to the FA. 
    
     . The FA relays the RRP back to the MN as described in [RFC 3344] 
        and [MIPKEYS] after building the MN-FA authentication extension 
        when required. 
    
  4. RADIUS entity requirements 
    
    
  4.1 RADIUS client requirements 
     
    
   User-Password (2), CHAP-Password(3), CHAP challenge(60), and ARAP-
   Password(70) MUST not be present in an Access-Request packet 
   containing the attributes discussed in this document. 
    
   As per RFC2869, packets that do not contain the above attribute MUST 
   contain the Message-Authenticator (80).   
    

 
 
Nakhjiri et. al.          Expires -- May 2006                 [Page 14] 
                                  
                    RADIUS Mobile IPv4 extensions        October 2005 
 
 
   As mentioned in section 8 and [MIPKEYS], the AAA server needs the MN 
   identifier from the RADIUS Access Request sent by the RADIUS client. 
   The MN identifier is either the MN's NAI, if present in the 
   Registration Request, or the Home Address from the Registration 
   Request otherwise. Hence the RADIUS Access Request MUST include at 
   least one of the User-Name or MIP-MN-HoA attributes in the RADIUS 
   Access Request.  
    
   The NAS ID used in RADIUS Access Request packets SHALL be an 
   identifier that complies with the RADIUS infrastructure (it may be 
   the IP address that the HA uses towards the RADIUS server and 
   different from the IP address included in MIP-HA_IP address). 
    
   When the HA acts as a RADIUS NAS, the HA IP address included inside 
   the optional MIP-HA-IP address attribute is retrieved from the 
   initial RRQ (if included), while the NAS ID SHALL be an identifier 
   that complies with the RADIUS infrastructure (it may or may not be 
   the IP address that the HA uses towards the RADIUS server and 
   different from the IP address included in MIP-HA-IP address). 
 
   Besides, the attributes listed in this specification, the Access 
   Request may include other RADIUS attributes such as NAS-IP-Address 
   (4), Service-Type(6),etc required for RADIUS messaging.  
    
  4.2 RADIUS server and routing requirements 
     
    
   The RADIUS servers are required to be able to understand and process 
   the attributes described in this specification. The RADIUS server is 
   also required to be able to support the authentication, key and nonce 
   generation procedures described in this document.  
 
   Upon receiving the Access-Request messages that contain Message-
   Authenticator (80) attribute, the RADIUS server MUST validate the 
   value of the Message-Authenticator (80) as described in [RFC2869].  
   If the authenticator fails to validate, the RADIUS server MUST 
   silently discard the Access-Request.  An Access-Request which does 
   not contain a Message-Authenticator (80) MUST be silently discarded. 
 
   Message-Authenticator (80) SHOULD also be included in the Access-
   Accept message.  The Message-Authenticator (80) calculation is 
   described in RFC2869. 
    
   In addition to the processing defined in this document after 
   successful authentication the RADIUS server MAY include other 
   authorization attributes in the Access-Accept packets that correspond 
   to other features that are supported by the mobility agents. 
 
   If a RADIUS forwarding server does not have enough information to 
   route the packet, it shall send an Access Reject towards the NAS. 
 
 
Nakhjiri et. al.          Expires -
                                  - May 2006                 [Page 15] 
                    RADIUS Mobile IPv4 extensions        October 2005 
 
 
    
   If a RADIUS server does not have enough information to identify the 
   user for authentication purposes, the server MUST send an Access 
   Reject. 
 
  4.3 Mobile IP agent requirements 
      
    
   In this document both the FA and HA operate as RADIUS clients.  They 
   are responsible for passing user information to designated RADIUS 
   servers, and acting on the responses received thereafter.  In the 
   context of RFC-2865 the FA and HA are NASes. This also means when 
   sending RADIUS Access Requests, the HA and FA need to use their 
   RADIUS-infrastructure-compatible identifier (can be an IP address) 
   inside NAS-ID attribute. On the other hand, HA or FA need to 
   specifically use the IP addresses that they use when interacting with 
   the MN during MIP signaling inside MIP-HA-IP-address and MIP-FA-IP-
   address attributes. Since both FA and HA can act as NASes during the 
   registration process, it is especially important for the NAS to 
   include its IP address towards the MN (used for MIP signaling) in the 
   RADIUS Access Requests, especially in cases where the MIP agent is 
   using different IP interfaces towards the MN and towards the RADIUS 
   server. This way, the server will know that it is receiving Access 
   Requests from a Mobile IP capable NAS and it knows whether it is 
   creating keys for an MN-FA or an MN-HA MSA. However, when the Access 
   Request is sent from the FA to the AAAH, the IP address or NAI of the 
   HA needs to be included to the message for authentication and key 
   generation purposes. The use of MIP-HA-NAI and MIP-FA-NAI may be 
   required for Mobile IP signaling.  
   When receiving an RRQ from the MN, the Mobile IP agents (MA: HA or 
   FA) and creating a RADIUS Access Request towards the AAA server, the 
   MA will perform the following operations: 
            -NAI-extension: If the HA finds a MN-NAI extension inside 
            the RRQ with a NAI value, the HA includes the NAI value 
            inside the User-Name attribute.  
            -Home Address If the HA finds a routable HoA (other than 
            ALL_ZEROs_OR_ONES) for the MN, the HA includes the value 
            inside the MIP-MN-HoA. 
            -Home Agent address field: If the HA finds a IP address 
            other than ‘‘ALL_ZEROS_OR_ONES’’ inside the HA IP address 
            field of the RRQ, the HA will include that inside the MIP-
            HA-IP address attribute. However, if the HA field is set to 
            ‘‘ALL_ZEROS_OR_ONES’’ inside the RRQ from the MN, the HA SHALL 
            set the value of ‘‘Home-Agent-Requested’’ inside MIP-feature-
            vector to indicate to the AAA server that MN has requested 
            an HA assignment.   
            -Requested HA extension: If an Requested HA Extension 
            [MIPDYNHA] exists in the RRQ, the HA SHALL set the value of 
            ‘‘Home-Agent-Requested’’ inside MIP-feature-vector to indicate 
            to the AAA server that MN has requested an HA assignment. 
 
 
Nakhjiri et. al.          Expires -- May 2006                 [Page 16]
                                   
                    RADIUS Mobile IPv4 extensions        October 2005 
 
 
             - If the MN-HA Key Generation Nonce Request Extension is in 
            the RRQ, then the HA sets the value of ‘‘MN-HA-Key-Nonce-
            Request’’ inside MIP-feature-vector attribute.  Also, the HA 
            includes the SPI value in the MN-AAA Authentication 
            Extension to the MIP-MN-AAA-SPI attribute. 
            -Registration Request: The Mobile IP registration request 
            can include a large number of extensions, especially when 
            key generation material is requested and authentication 
            extensions including lengthy authenticators are present. To 
            avoid the upper size limit for RADIUS attributes, the HA 
            will create a hash of RRQ and inserts it in MIP-hash-RRQ 
            attribute. 
             
   A Foreign Agent that is forwarding an RRQ to the HA after having 
   received a RADIUS Access Accept from the AAAH, will forward the 
   initial RRQ to the HA as is, even though the Access Accept provides 
   updated information (e.g. when the RRQ was missing HoA, while the 
   AAAH has provided this information). This is to preserve the validity 
   of the MN-AAA-AE added to the RRQ by the MN.  
     
   Furthermore, note that creating a RADIUS Access Request based on a 
   RRQ is within the discretion of HA or FA. If the MIP agent deems the 
   RRQ or its contents (such as the HoA or HA-IP included in the RRQ) or 
   lack thereof (such as NAI) inappropriate for processing, it MAY 
   reject the RRQ without creating a RADIUS Access Request. For 
   instance, in cases the RRQ does not include a routable HoA and lack 
   MN-NAI extension, the HA may simply reject the RRQ. The details are 
   outside the scope of this document. 
 
   In roaming situations, RADIUS proxies typically route the Access-
   Request using the User-Name(1) attribute that contains an NAI [RFC 
   2486bis].  Therefore, Mobile IP Agents SHOULD populate the User-
   Name(1) attribute with the NAI value received in the RRQ when the MN-
   NAI extension is provided. 
    
   When the MN-NAI extension is not provided, the User-Name (1) should 
   be constructed using the MN HoA IP address. 
    
   User-Password(2), CHAP-Password(3), CHAP challenge(60), and ARAP-
   Password(70) MUST not be present in an Access-Request packet 
   containing the attributes discussed in this document.  In these 
   cases, the Mobile IP agent must include the Message-Authenticator 
   (80) in the Access-Accept packet.  The Message-Authenticator (80) is 
   to be computed as per RFC2869. 
    
   If the Access-Accept packet contains a Message-Authenticator (80) 
   then the Mobile IP agent MUST validate the contents by computing the 
   authenticator as describe in RFC2869.  If the authenticator is not 
   valid then the Mobile IP agent MUST silently discard the Access-
 
 
Nakhjiri et. al.          Expires -- May 2006                 [Page 17] 
                                  
                    RADIUS Mobile IPv4 extensions        October 2005 
 
 
   Accept packet.  If the Mobile IP agent receives an Access-Accept 
   packet that does not contain the Message-Authenticator it MUST 
   silently discard the Access-Accept. 
    
   Once the Message-Authenticator (80) attribute has been validated, the 
   Mobile-IP agent decrypts the protected attributes as per RFC2868. 
    
   In order to verify the value of authenticator within the MN-AAA-
   Authentication extension, the AAA server must follow the following 
   expression:  
    
   Authenticator = MD5( 
         High-order byte from Challenge || Key || 
         Value from MIP-Hash-RRQ attribute || 
         Least-order 237 bytes from Challenge) 
       
   Since the MIP-Hash-RRQ includes  
         MD5(Preceding Mobile IP data || 
         Type, Subtype (if present), Length, SPI) 
   The AAA server will in a sense follows the same calculation performed 
   by the RADIUS clients (HA or FA): 
    
   Authenticator = MD5( 
         High-order byte from Challenge || Key || 
         MD5(Preceding Mobile IP data || 
         Type, Subtype (if present), Length, SPI) || 
         Least-order 237 bytes from Challenge) 
 
   The challenge value is from MIP-FA-Challenge if present in the RADIUS 
   Access Request or 0 octets, otherwise. 
 
   This document does not address RADIUS accounting from the Mobile-IP 
   agent and therefore whether RADIUS accounting packet are sent is not 
   within scope of this document. 
 
 
  5. 
    Attributes 
   This section describes the full set of attributes required for 
   RADIUS-Mobile IP interaction. Some of the attributes listed are 
   already standardized (as noted by the attribute type value), while 
   others will require standardization and IANA type assignments.  
    
  5.1 Use of existing attributes 
      
    
   This subsection describes the use of those RADIUS attributes that are 
   already standardized (e.g. by RFC 2865 and 3579). 
    
    
     . User-Name (1)(per RFC 2865) 
 
 
Nakhjiri et. al.          Expires -- May 2006                 [Page 18] 
                                  
                    RADIUS Mobile IPv4 extensions        October 2005 
 
 
   This is the same as User-Name attribute defined in RFC 2865. When an 
   MN-NAI extension is available with Mobile IP RRQ, the NAI value is 
   inserted into the value field of User-Name attribute.  
   It should be noted that Mobile IP signaling does not mandate the use 
   of MN-NAI extension when the MN has an HoA.  
 
     . NAS_IP (4)  (per RFC 2865) 
     The IPv4 address of the mobility agent, acting as the RADIUS NAS. 
    
    
     . NAS_ID (32) (per RFC 2865) 
     The identifier (such as NAI) of the mobility agent, acting as the 
     RADIUS NAS. In case the MN supports AAA NAI processing [RFC 3846] 
     the MN may add the MIP-HA-NAI. 
    
  5.2 Suggested attributes for RADIUS-Mobile support 
      
    
   This section describes a proposal for a set of new attributes for 
   RADIUS-Mobile IP support. 
    
     . MIP-MA-Type 
   0                   1                   2                   3 
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
   |     Type      |    Length     |           Unsigned8  
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
    
   Name  
     Mobility Agent Type 
   Type 
     To be assigned by IANA 
   Length 
     3 
   Unsigned value 
      1 if the Mobile IP agent is an HA 
      0 if the Mobile IP agent is an FA 
      Note: An alternative to creation of a new MIP-MA-Type is to extend 
   the existing value set for attribute NAS-Port-Type (61) to include a 
   value for HA and for FA as new NAS port values. TBD during RADIUS 
   expert review. 
      
     . MIP-MN-HoA 
    0                   1                   2                   3 
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
   |     Type      |    Length     |            Address 
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
   |           Address (cont)      | 
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
 
 
Nakhjiri et. al.          Expires -- May 2006                 [Page 19] 
                                  
                    RADIUS Mobile IPv4 extensions        October 2005 
 
 
    
   Name  
     Mobile Node Home IPv4 address 
   Type 
     To be assigned by IANA 
   Length 
     6 
   Address  
     Mobile Node Home IPv4 address  
   When NAI extension is not added to the registration requests, MN HoA 
   IP address is used to identify the MN (key management draft [MIPKEYS, 
   section 5]). The AAAH should be able to use HoA for identifying the 
   MN, when NAI is not provided. 
    
     . MIP-MN-CoA 
 
    0                   1                   2                   3 
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
   |     Type      |    Length     |            Address 
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
   |           Address (cont)      | 
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
    
   Name  
     Mobile Node IPv4 care of address 
   Type 
     To be assigned by IANA 
   Length 
     6 
   Address  
     Mobile Node IPv4 care of address  
    
    
     . MIP-HA-IP address 
    
    0                   1                   2                   3 
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
   |     Type      |    Length     |            Address 
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
            Address (cont)         | 
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
    
   Name  
     Home Agent Ipv4 Address 
   Type 
     To be assigned by IANA 
   Length 
 
 
Nakhjiri et. al.          Expires -- May 2006                 [Page 20] 
                                  
                    RADIUS Mobile IPv4 extensions        October 2005 
 
 
     6 
   Address  
        Home Agent Ipv4 Address 
    
   If the MN is assigned an HA and has included the IP address of the HA 
   in its registration request (HA address other than 
   ALL_ZEROS_OR_ONES), then this attribute is used in RADIUS access 
   request. The Address field MUST be populated with the destination 
   address of the received RRQ at the HA. This attribute is required 
   when FA-HA AE is needed (the FA is requesting FA-HA-MSA keying 
   material). For dynamic HA assignments via RADIUS, this field MAY be 
   set to ALL_ZEROS_OR_ONES at the FA to indicate to the RADIUS server 
   that the MN is requesting a dynamic HA assignment. It is however 
   preferred that the FA uses the appropriate bit within the MIP-
   feature-vector attribute for that purpose. 
    
     . MIP-HA-IP address 
    
    0                   1                   2                   3 
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
   |     Type      |    Length     |            Address 
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
               Address (cont)         | 
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
    
   Name  
     Home Agent IPv4 Address 
   Type 
     To be assigned by IANA 
   Length 
     6 
   Address  
                Home Agent Ipv4 Address 
    
     . MIP-FA-IP address 
    
    0                   1                   2                   3 
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
   |     Type      |    Length     |            Address 
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
   |        Address (cont)       
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
    
   Name  
     Foreign Agent IPv4 Address 
   Type 
     To be assigned by IANA 
 
 
Nakhjiri et. al.          Expires -- May 2006                 [Page 21] 
                                  
                    RADIUS Mobile IPv4 extensions        October 2005 
 
 
   Length 
     6 
   Address  
                Foreign Agent IPv4 Address 
    
     . MIP-HASH-RRQ  
    
    0                   1                   2                   3 
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
   |     Type      |    Length     |            String ...  
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
    
   Name  
     Mobile IPv4 hashed Registration Request  
   Type 
     To be assigned by IANA 
   Length 
     >3  
   String 
   MD5(Preceding Mobile IP data from MN-AAA AE|| Type, Subtype (if 
   present), Length, SPI) 
    
   This attribute includes an MD5 hash version of Mobile IP registration 
   request (similar to RFC 3012 section 8). This attribute is carried by 
   the Access request. 
   The Mobile IP registration request can include a large number of 
   extensions, especially when key generation material is requested and 
   authentication extensions including lengthy authenticators are 
   present. To avoid the upper size limit for RADIUS attributes, the HA 
   or FA will create a hash of RRQ and insert it in MIP-hash-RRQ 
   attribute. 
   The AAA server uses the value of MIP-HASH_RRQ to calculate the 
   authenticator in MN-AAA Authenticator as follows. 
   Authenticator = MD5( 
         High-order byte from Challenge || Key || 
         Value of MIP-HASH-RRQ || 
         Least-order 237 bytes from Challenge) 
    
      The challenge is the value within the MIP-MN-FA-Challenge or 0. 
    
    
     . MIP-FA challenge 
    
    0                   1                   2                   3 
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
   |     Type      |    Length     |            String ...  
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
 
 
Nakhjiri et. al.          Expires -- May 2006                 [Page 22] 
                                  
                    RADIUS Mobile IPv4 extensions        October 2005 
 
 
    
   Name  
     Mobile IPv4 Foreign Agent Challenge 
   Type 
     To be assigned by IANA 
   Length 
     > 3 
   String  
      Mobile IPv4 Foreign Agent Challenge 
   There is a Challenge Extension defined in RFC 3012 section 4.  
   This attribute can be included in Access Request from FA to AAA and 
   from the HA to the AAA, since it is used in the MN-AAA authentication 
   extension. 
    
     . MIP-MN-AAA SPI 
    0                   1                   2                   3 
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
   |     Type      |    Length     |            Unsigned32          
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
 
   Name  
     Mobile IPv4 Node SPI 
   Type 
     To be assigned by IANA 
   Length 
     6 
   Unsigned32  
          AAA SPI [MIPKEYS]. 
    
   The AAA server uses this SPI to locate the security context needed to 
   verify the MN-AAA authenticator calculated by the MN over the 
   registration request data. The security context includes the MN-AAA 
   key, and key related information and the algorithm used for 
   calculation of authenticator fields.  
 
     . MIP-MN-AAA-Authenticator 
    0                   1                   2                   3 
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
   |     Type      |    Length     |            String ...  
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
    
   Name  
     Mobile IPv4 Mobile Node-AAA Authenticator value 
   Type 
     To be assigned by IANA 
   Length 
     > 3 
 
 
Nakhjiri et. al.          Expires -- May 2006                 [Page 23] 
                                  
                    RADIUS Mobile IPv4 extensions        October 2005 
 
 
   String  
      MN-AAA authenticator value 
    
   This attribute carries the value of MN-AAA-authenticator within the 
   MN-AAA Authentication extension.  
   The value is calculated based on a hash of RRQ and other information. 
   The general expression (used for FA-based mobile nodes) is as follows 
   Authenticator = MD5( 
         High-order byte from Challenge || Key || 
         MD5(Preceding Mobile IP data || 
         Type, Subtype (if present), Length, SPI) || 
         Least-order 237 bytes from Challenge) 
   For co-located mobile nodes, which register directly with the HA, no 
   challenge value exists and therefore the values related to challenge 
   are replaced with zero octets in the expression above. 
 
    
     . MIP feature vector  
    
    0                   1                   2                   3 
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
   |     Type      |    Length     |            Unsigned32  
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
    
   Name  
      Mobile IPv4 feature vector 
   Type 
     To be assigned by IANA 
   Length 
      6 
   Unsigned32  
      Mobile IPv4 feature vector 
    
   This a flag vector of type Unsigned32, where each set flag represents 
   a condition, such keys requested for FA or HA and so on. The flag 
   values are as provided by Diameter, in order to facilitate 
   interoperability between RADIUS and Diameter: 
               1   Mobile-Node-Home-Address-Requested  
                   (When MN does not have an HoA) 
               2   Home-Address-Allocatable-Only-in-Home-Realm 
               4   Home-Agent-Requested (when MN not allocated an HA)      
               8   Foreign-Home-Agent-Available  
    
               16 MN-HA-Key-Nonce-Request (key material for MN-HA MSA is 
   requested) 
               32 MN-FA-Key-Nonce-Request  
               64 FA-HA-Key-Request  
               128 Home Agent in Foreign network 
 
 
Nakhjiri et. al.          Expires -- May 2006                 [Page 24] 
                                  
                    RADIUS Mobile IPv4 extensions        October 2005 
 
 
               256 Co-located-Mobile-Node  
    
   This attribute is added to the RADIUS Access Request message. 
   For instance, when the MN has included a nonce generation request 
   extension for MN-HA SA, the mobility agent (FA in FA CoA case and HA 
   in CcoA case) sets the MN-HA key request flag in the MIP feature 
   vector attribute included in the RADIUS Access Request message to 
   indicate to the AAA that the MN requires nonces for MN-HA SA. 
   The same goes for MN-FA nonce generation request extension from MN. 
   When an FA is being used and FA requires keying material from the AAA 
   server, the FA sets the FA-HA-key request flag.  
    
     . MIP-MN-to-HA SPI 
    
    0                   1                   2                   3 
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
   |     Type      |    Length     |            Unsigned32  
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
    
   Name  
     Mobile Node to Home Agent SPI 
   Type 
     To be assigned by IANA 
   Length 
     6 
   Unsigned32  
      Mobile node to Home Agent SPI 
    
   This attribute can be included in the Access Request (from HA to 
   AAAH) and Access Accept message (from AAAH to HA) and points to the 
   MN-to-HA MSA that includes security context material (MN-HA Key 
   Generation nonce, AAA SPI, Replay Method, Lifetime, and Algorithm 
   Identifier) for the MN. This SPI is allocated by the HA. 
    
     . MIP-HA-to-MN SPI 
    0                   1                   2                   3 
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
   |     Type      |    Length     |            Unsigned32  
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
    
   Name  
     Home agent to Mobile Node SPI 
   Type 
     To be assigned by IANA 
   Length 
     6 
   Unsiged32  
 
 
Nakhjiri et. al.          Expires -- May 2006                 [Page 25] 
                                  
                    RADIUS Mobile IPv4 extensions        October 2005 
 
 
      Home Agent to Mobile Node SPI 
    
   This attribute can be included in the Access Request (from HA to 
   AAAH) and Access Accept message (from AAAH to HA) and points to the 
   HA-to-MN MSA that includes security context material (MN-HA Key, 
   Replay Method, Lifetime, and Algorithm Identifier??) for the HA. This 
   SPI is allocated by the MN and is included in the initial Mobile-
   Home-Key generation nonce request extension within the RRQ generated 
   by the MN. 
    
     . MIP-MN-HA-key 
    
    0                   1                   2                   3 
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
   |     Type      |    Length     |            String ...  
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
    
   Name  
     Home Agent-Mobile Node MSA key 
   Type 
     To be assigned by IANA 
   Length 
     > 3 
   String  
      MN-HA key 
    
   This attribute can be included in the Access Accept message from the 
   AAAH to HA and includes MN-HA key for the HA to use when interacting 
   with the MN. This attribute MUST be encrypted using procedures 
   defined in RFC 2868 [RADTUNN]. 
    
     . MIP-MN-HA-Nonce 
     
    0                   1                   2                   3 
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
   |     Type      |    Length     |            String ...  
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
    
   Name  
     Home Agent-Mobile Node MSA nonce 
   Type 
     To be assigned by IANA 
   Length 
     > 3 
   String  
      MN-HA nonce 
    
 
 
Nakhjiri et. al.          Expires -- May 2006                 [Page 26] 
                                  
                    RADIUS Mobile IPv4 extensions        October 2005 
 
 
   This attribute can be included in the Access Accept message from the 
   AAAH to HA and includes MN-HA nonce for the MN to use for calculating 
   the MN-HA key used when interacting with the MN. 
    
     . MIP-MN-HA-ALGORITHMID 
    
    0                   1                   2                   3 
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
   |     Type      |    Length     |           Unsigned8  
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
    
   Name  
     Home Agent-Mobile Node MSA Algorithm identifier 
   Type 
     To be assigned by IANA 
   Length 
     3 
   Unsigned8  
      MN-HA MSA algorithm identifier 
    
   This attribute can be included in any message that includes the MIP-
   MN-to-HA SPI or MIP-HA-to-MN SPI and identifies the algorithm that is 
   used for MSA between MN and HA. Suggested values: 
      1 MD5 
      2 HMAC-MD5 
      3 SHA1  
    
     . MIP-MN-HA-REPLAY 
    
    0                   1                   2                   3 
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
   |     Type      |    Length     |            Unsigned8 
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
    
    
    Name  
     Home Agent-Mobile Node MSA replay mode 
   Type 
     To be assigned by IANA 
   Length 
     3 
   String  
      MN-HA MSA replay mode identifier 
    
   This attribute can be included in any message that includes the MIP-
   MN-to-HA SPI or MIP-HA-to-MN SPI and identifies the replay mode that 
   is used for MSA between MN and HA. Suggested values: 
 
 
Nakhjiri et. al.          Expires -- May 2006                 [Page 27]
                                   
                    RADIUS Mobile IPv4 extensions        October 2005 
 
 
    
   1  timestamp 
   2  nonce 
    
     . MIP-MN-HA-MSA-LIFETIME 
     
    0                   1                   2                   3 
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
   |     Type      |    Length     |            Unsigned32  
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
 
   Name  
     Home Agent-Mobile Node MSA life time 
   Type 
     To be assigned by IANA 
   Length 
     6 
   Unsigned32 
      MN-HA MSA life time 
    
   This attribute can be included in any message that includes the MIP-
   MN-to-HA SPI or MIP-HA-to-MN SPI and identifies the life time value 
   for MSA between MN and HA. 
    
     . MIP-MN-to-FA SPI 
   Similar to MN-to-HA SPI. 
    
     . MIP-FA-to-MN SPI 
   Similar to HA-to-MN SPI. 
    
     . MIP-MN-FA-key  
   Similar to MIP-MN-HA-key. 
    
     . MIP-MN-FA-Nonce 
   Similar to MIP-MN-HA-Nonce 
    
     . MIP-MN-FA-MSA-LIFETIME 
   Similar to MIP-MN-HA-MSA-LIFETIME 
    
     . MIP-MN-FA-ALGORITHMID 
   Similar to MIP-MN-HA-ALGORITHMID 
     . MIP-FA-to-HA-SPI 
    
    0                   1                   2                   3 
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
   |     Type      |    Length     |            Unsigned32             
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
 
 
Nakhjiri et. al.          Expires -- May 2006                 [Page 28] 
                                  
                    RADIUS Mobile IPv4 extensions        October 2005 
 
 
 
   Name  
     Foreign agent to Home agent SPI 
   Type 
     To be assigned by IANA 
   Length 
     6 
   Unsigned32  
      Foreign agent to Home Agent SPI 
   This attribute carries the SPI pointing to the security context 
   between the FA and the HA for the HA. The SPI is allocated by the HA. 
   The signaling in this draft does not require this attribute, since 
   the SPI can be carried in Mobile IP extensions. 
    
     . MIP-HA-to-FA SPI 
    
    0                   1                   2                   3 
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
   |     Type      |    Length     |            Unsigned32  
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
    
   Name  
     Home agent to Foreign agent SPI 
   Type 
     To be assigned by IANA 
   Length 
     6 
   Unsigned32  
      Home agent to Foreign agent SPI 
   This attribute carries the SPI pointing to the security context 
   between the FA and the HA for the FA. The SPI is allocated by the FA. 
   This attribute is included in the access request from FA to AAAH and 
   later in access accept from AAAH to HA. 
    
     . MIP-FA-HA-key  
    
    0                   1                   2                   3 
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
   |     Type      |    Length     |            String ...  
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
    
   Name  
     Foreign agent to Home Agent to key 
   Type 
     To be assigned by IANA 
   Length 
     > 3 
 
 
Nakhjiri et. al.          Expires -- May 2006                 [Page 29] 
                                  
                    RADIUS Mobile IPv4 extensions        October 2005 
 
 
   String  
      FA-HA key 
    
   This attribute is sent to FA and to HA in an Access Accept messages 
   from the AAAH to these agents. The key is used by FA and HA for 
   integrity protection. This attribute MUST be encrypted using 
   procedures defined in RFC 2868 [RADTUNN]. 
    
     . MIP-FA-HA-ALGORITHMID 
    0                   1                   2                   3 
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
   |     Type      |    Length     |            String ...  
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
    
   Name  
     Foreign Agent-Home Agent MSA Algorithm identifier 
   Type 
     To be assigned by IANA 
   Length 
     > 3 
   String  
      FA-HA MSA algorithm identifier 
    
   This attribute can be included in any message that includes the MIP-
   FA-to-HA SPI or MIP-HA-to-FA SPI and identifies the algorithm that is 
   used for MSA between MN and HA. 
    
     . MIP-FA-HA-MSA-LIFETIME 
   0                   1                   2                   3 
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
   |     Type      |    Length     |            Unsigned32 
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
 
    
   Name  
     Foreign Agent-Home Agent MSA life time 
   Type 
     To be assigned by IANA 
   Length 
     6 
   Unsigned32 
      FA-HA MSA life time 
    
   This attribute can be included in any message that includes the MIP-
   FA-to-HA SPI or MIP-HA-to-FA SPI and identifies the life time value 
   for MSAs between FA and HA. 
 
 
 
Nakhjiri et. al.          Expires -- May 2006                 [Page 30] 
                                  
                    RADIUS Mobile IPv4 extensions        October 2005 
 
 
    
     . MIP-FA-HA-Authenticator 
   0                   1                   2                   3 
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
   |     Type      |    Length     |            String ...  
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
             string (cont)         | 
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
    
   Name  
     Foreign Agent-Home Agent Authenticator value 
   Type 
     To be assigned by IANA 
   Length 
     > 3 (2+128) 
   String  
      FA-HA Authenticator 
    
   This attribute is included in message from HA to AAAH for 
   verification of authenticator added the FA for HA, when HA is not 
   aware of the MSAs it shares with the FA. 
    
  5.3 Attribute List 
     
    
   This list will be completed as an attribute table that includes 
   information on the messages that are allowed to carry each attribute 
   and whether each attribute must be protected in the next version of 
   the draft. 
    
   Request  Accept   Reject   Challenge   #  Attribute 
   0-1      0-1      0        0           1  User-Name, 
   0-1      0        0        0           4  NAS-IP, 
   0-1      0        0        0           32 NAS-ID, 
   0-1      0-1      0        0           NA MIP-MA-Type 
   0-1      0-1      0        0           NA MIP-MN-HoA, 
   0-1      0-1      0        0           NA MIP-MN-CoA, 
   0-1      0        0        0           NA MIP-HA-ID, 
   0-1      0        0        0           NA MIP-FA-ID,   
   0-1      0        0        0           NA MIP-HA-IP address, 
   0-1      0        0        0           NA MIP-FA-IP address, 
   0-1      0        0        0           NA MIP-HASH-RRQ, 
   0-1      0        0        0           NA MIP-MN-FA challenge, 
   0-1      0        0        0           NA MIP-MN-AAA-Authenticator, 
   0-1      0        0        0           NA MIP-feature-vector 
   1        1        1        1           80 Message Authenticator 
   0-1      0-1      0        0           NA MIP-MN-AAA-SPI, 
   0        0-1      0        0           NA MIP-MN-to-HA SPI, 
   0        0-1      0        0           NA MIP-HA-to-MN-SPI, 
 
 
Nakhjiri et. al.          Expires - - May 2006                 [Page 31] 
                                 
                    RADIUS Mobile IPv4 extensions        October 2005 
 
 
   0-1      0-1      0        0           NA MIP-FA-to-HA-SPI, 
   0        0-1      0        0           NA MIP-HA-to-FA-SPI, 
   0        0-1      0        0           NA MIP-MN-to-FA SPI, 
   0        0-1      0        0           NA MIP-FA-to-MN-SPI, 
   0        0-1      0        0           NA MIP-MN-HA-key, 
   0        0-1      0        0           NA MIP-MN-FA-key, 
   0        0-1      0        0           NA MIP-FA-HA key, 
   0        0-1      0        0           NA MIP-MN-HA-Nonce, 
   0        0-1      0        0           NA MIP-MN-FA-Nonce, 
   0        0-1      0        0           NA MIP-MN-HA-ALGORITHMID, 
   0        0-1      0        0           NA MIP-FA-HA-ALGORITHMID, 
   0        0-1      0        0           NA MIP-MN-FA-ALGORITHMID, 
   0        0-1      0        0           NA MIP-MN-HA-REPLAY, 
   0        0-1      0        0           NA MIP-MN-FA-REPLAY, 
   0        0-1      0        0           NA MIP-MN-HA-MSA-LIFETIME 
   0        0-1      0        0           NA MIP-FA-HA-MSA-LIFETIME, 
   0        0-1      0        0           NA MIP-MN-FA-MSA-LIFETIME 
    
 
  6. Diameter compatibility considerations 
    
 
   Diameter Mobile IP application has defined new command codes for 
   support of Mobile IP signaling such as, AA-Mobile node request (AMR), 
   AA-Mobile Node answer (AMA), Home agent MIP-request (HMR), Home agent 
   MIP-answer (HMA). RADIUS currently does not have any messages that 
   correspond to these Diameter commands. However RADIUS provides the 
   flexibility of defining new command codes. The solution in this draft 
   is designed based on the assumption that the RADIUS community (and 
   RADEXT) is not interested in defining new RADIUS messages hence we 
   will be using RADIUS access request and RADIUS access accept for 
   providing messaging from mobility agents to RADIUS server and vice 
   versa. The following pictures show the Diameter messaging to support 
   Mobile IP signaling as described in [DIAMIP]. 
    
 
                                  +--------+                          
                                  |Diameter|  
                                  | server |                           
                                  +--------+   
                           Diameter ^  |Diameter 
                            AMR     |  | AMA 
                                    |  | 
                           RRQ      |  V 
                     +--- + -----> +----+  
                     | MN |    RRP | HA |  
                     +----+ <----- +----+      
    
            Figure 3a Diameter messaging for co-located MNs 
    
 
 
Nakhjiri et. al.          Expires -- May 2006                 [Page 32] 
                                  
                    RADIUS Mobile IPv4 extensions        October 2005 
 
 
    
                      +-----+    Diameter HAR     +--------+ 
                      | HA  |-------------------->|Diameter| 
                      |     |< -------------------|server  | 
                      +-----+    Diameter HAA     +--------+ 
                                                      ^  |   
                                             Diameter |  |Diameter 
                                                AMR   |  |   AMA 
                                                      |  V 
                                      +----+ RRQ     +----+  
                                      | MN | ------->| FA | 
                                      |    | RRP (8) |    | 
                                      +----+<--------+----+ 
    
            Figure 3b Diameter messaging for FA-based MNs 
    
   Comparing the Diameter messaging (figure 2) with our suggestion for 
   RADIUS messaging (figure 3), the following simple rules apply to 
   Diameter to RADIUS translation, as long as the new MIP-MA-Type 
   identifying the type the Mobile IP agent (FA or HA) is used. 
    
      Diameter HAR <-> RADIUS Access Request 
      Diameter HAA <-> RADIUS Access Accept/Reject (MIP-MA-Type=1) 
      Diameter AMR <-> RADIUS Access Request 
      Diameter AMA <-> RADIUS Access Accept/Reject (MIP-MA-Type=0) 
    
   The attributes defined in this specification follow the Diameter AVP 
   definition to the extent possible for RADIUS. Exceptions are cases 
   where a Diameter AVP is of grouped type or potentially has a size 
   that exceeds the RADIUS attribute size limit (253 byte).  
   For grouped type Diameter AVPs, we simply convert each data field of 
   the Diameter AVP into a separate RADIUS attribute. This is 
   implemented for all the MSA-related AVP/ attributes. 
   One specific such case is the use of Diameter MIP-Reg-Request AVP.  
     For RADIUS we suggest hashing all the data in RRQ up to the MN-
     AAA-Authentication extension and including the hash inside MIP-
     HASH-RRQ to adhere to RADIUS attribute size limitation (253 
     bytes). This is explained in the attributes section as well as in 
     the section dealing with RADIUS server considerations. 
 
    
  7. IANA considerations 
    
    
   This draft introduces new RADIUS attributes. Therefore there is need 
   for defining new attribute type numbers by IANA. 
    
  8. Security considerations 
    
    

 
 
Nakhjiri et. al.          Expires -- May 2006                 [Page 33] 
                                  
                    RADIUS Mobile IPv4 extensions        October 2005 
 
 
   We recommend the use of the optional Mobile IP (RFC 3344) Foreign-
   Home authentication extension for protecting the integrity of 
   messaging between FA and HA to protect the HA from DoS attacks 
   launched by the FA.  
   Another possible attack is DoS attacks by MNs using large numbers of 
   Mobile IP RRQs. Therefore, we require that the FA implements the 
   challenge response mechanism in RFC 3012 and forwards the challenge 
   inside RRQ to the HA. 
    
   Another security concern is on the distribution of keys from the AAA 
   server to mobility agents. The AAAH creates and distributes keys for 
   the Mobile IP agents and nonces for mobile nodes. The key transfer 
   must happen in a secure manner. This means, the MSA-attributes 
   including HA and FA keys must be encrypted with the security 
   associations between the AAAH and the mobility agents. Such security 
   association may be based on RADIUS shared secrets (hop by hop) or 
   methods similar to those defined in [KEYWRAP] based on end-to-end SAs 
   (possibly IPsec) between the AAAH and the mobility agents. For 
   foreign agents, other trusted AAA servers (such as AAAF and AAAF-AAAH 
   keys) may have to be involved. Also, it is important that the keys 
   for each mobility agent are kept hidden from other mobility agents. 
   For instance keys for FA must be kept secret from HA. This means the 
   AAA server must have separate keys with each of the HA and FAs.  On 
   the other hand, the nonces generated by the AAA server, destined to 
   the mobile can be transmitted in the clear. The MN-FA and MN-HA 
   nonces are protected by the FA and HA authentications to the MN. 
   However, to prevent man-in-the-middle tampering with the nonces in 
   transit from AAAH to the HA and to FA to the MN, We recommend that 
   the AAAH also authenticates the nonce-reply-extensions with the AAA 
   SA it shares with the MN. 
    
   Finally, we assume the following formula [MIPKEYS] is used by the MN 
   for generating the key out of the nonce: 
    
   Key = HMAC-SHA1 (AAA-key, {Key Generation Nonce || MN identifier}) 
    
   ,which means the AAA server needs the MN identifier from the RADIUS 
   Access Request to generate the keys corresponding the nonces.  
    
   For RADIUS threats and vulnerabilities please refer to the Security 
   Section in RFC3579. 
    
    
  9. References
     
    
   [MIPv4]     C. Perkins, IP Mobility Support, IETF, RFC 3344, August 
   2002. 
    

 
 
Nakhjiri et. al.          Expires -- May 2006                 [Page 34] 
                                  
                    RADIUS Mobile IPv4 extensions        October 2005 
 
 
   [MIP4CHAL]  C. Perkins, P. Calhoun, Mobile IP Challenge/Response 
   Extensions, draft-ietf-mip4-rfc3012bis-04.txt., June 2005.    
      
   [MIPKEYS]   C. Perkins, P. Calhoun, AAA Registration Keys for Mobile 
   IP, IETF, RFC 3957, March 2005. 
    
   [MIPDYNHA]   M. Kulkarni, A. Patel, K. Leung, ‘‘Mobile IPv4 Dynamic 
   Home Agent Assignment’’, draft-ietf-mip4-dynamic-assignment-06.txt 
   August 2005. 
    
   [DIAMIP] P. Calhoun, C. Perkins, Diameter Mobile IP application, 
   IETF, RFC 4004, May 2004. 
    
   [RADTUNN], G. Zorn, Et. Al., RADIUS Attributes for Tunnel Protocol 
   Support, IETF, RFC 2868, June 2000. 
    
   [KEYWRAP], G. Zorn, Et. Al., RADIUS Attributes for Key Delivery, 
   draft-zorn-radius-keywrap-08.txt. 
    
Acknowledgments 
    
   The authors would like to give special thanks to Farid Adrangi for 
   the initial discussions and recommendations on the attribute design 
   work. The authors would also like to thank Charlie Perkins for 
   consultation on the use of RFC 3012 procedures. 
    
Author's Addresses 
    
   Madjid Nakhjiri 
   Motorola Inc. 
   Contact Email: Madjid.Nakhjiri@motorola.com 
    
   Kuntal Chowdhury 
   Starent Networks 
   Contact Email: kchowdhury@starentnetworks.com 
    
   Avi Lior 
   Bridgewater systems 
   Contact Email: avi@bridgewatersystems.com 
    
   Kent Leung 
   Cisco Systems 
   Contact Email: kleung@cisco.com 
 
 
Intellectual Property Statement 
    
   The IETF takes no position regarding the validity or scope of any 
   Intellectual Property Rights or other rights that might be claimed to 
 
 
Nakhjiri et. al.          Expires -- May 2006                 [Page 35] 
                                  
                    RADIUS Mobile IPv4 extensions        October 2005 
 
 
   pertain to the implementation or use of the technology described in 
   this document or the extent to which any license under such rights 
   might or might not be available; nor does it represent that it has 
   made any independent effort to identify any such rights.  Information 
   on the procedures with respect to rights in RFC documents can be 
   found in BCP 78 and BCP 79. 
    
   Copies of IPR disclosures made to the IETF Secretariat and any 
   assurances of licenses to be made available, or the result of an 
   attempt made to obtain a general license or permission for the use of 
   such proprietary rights by implementers or users of this 
   specification can be obtained from the IETF on-line IPR repository at 
   http://www.ietf.org/ipr. 
    
   The IETF invites any interested party to bring to its attention any 
   copyrights, patents or patent applications, or other proprietary 
   rights that may cover technology that may be required to implement 
   this standard.  Please address the information to the IETF at ietf-
   ipr@ietf.org. 
 
Disclaimer of Validity 
    
   This document and the information contained herein are provided on an 
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS 
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET 
   ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, 
   INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE 
   INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED 
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. 
 
Copyright Statement 
 
   Copyright (C) The Internet Society (2005).  This document is subject 
   to the rights, licenses and restrictions contained in BCP 78, and 
   except as set forth therein, the authors retain all their rights. 
 
Acknowledgment 
 
   Funding for the RFC Editor function is currently provided by the 
   Internet Society. 
    
   This Internet-Draft will expire on January 14, 2006. 
    






 
 
Nakhjiri et. al.          Expires -- May 2006                 [Page 36]