Extended QoS Authorization for the QoS NSLP - PowerPoint PPT Presentation

1 / 14
About This Presentation
Title:

Extended QoS Authorization for the QoS NSLP

Description:

Network access authentication reused for QoS authorization. QoS Request ... Authentication, Authorization and Accounting Infrastructure ... – PowerPoint PPT presentation

Number of Views:36
Avg rating:3.0/5.0
Slides: 15
Provided by: hannests
Category:

less

Transcript and Presenter's Notes

Title: Extended QoS Authorization for the QoS NSLP


1
Extended QoS Authorization for the QoS NSLP
  • ltdraft-tschofenig-nsis-qos-ext-authz-00.txtgt
  • Hannes Tschofenig, Joachim Kross

2
Overview
  • Current status of the QoS NSLP
  • Two party approach (reuses properties of GIMPS)
  • Token-based three party (based on token concept
    defined for SIP/RSVP)
  • Generic three party approach discussed but no
    solution provided
  • Draft addresses two approaches for the generic
    three party model
  • Challenge/Response based Scheme
  • Extensible Authentication Protocol Approach

3
Two-Party Approach
QoS Request
Entity requesting resource
Entity authorizing resource request
granted/rejected
End Node
Node within the attached network
  • Properties
  • Strong trust relationship between "Entity
    authorizing resource request" and "Entity
    performing QoS reservation"
  • Typically Data-origin authentication sufficient
  • Financial establishment pre-established based on
    previous protocol execution
  • Examples
  • Network access authentication reused for QoS
    authorization

4
Three-Party ApproachToken based Mechanism
Entity authorizing resource request (TTP)
Authz Token Request
Authz Token
QoS Request Token
Entity requesting resource
Entity performing QoS reservations
granted/rejected
  • Financial establishment created between "Entity
    authorizing resource request" and "Entity
    performing QoS reservation"
  • Example
  • Session Authorization Policy Element RFC3520
  • Framework for Session Set-up with Media
    Authorization RFC3521

5
Three-Party ApproachEntity Authentication
Entity authorizing resource request
QoS Authz Request
QoS Authz Response
QoS Request
Entity requesting resource
Entity performing QoS reservations
granted/rejected
  • Financial establishment created between "Entity
    authorizing resource request" and "Entity
    performing QoS reservation"
  • Properties
  • AAA-type authorization - splitting functional
    components
  • Dynamic re-authorization based on new incoming
    requests.
  • Typically entity authentication between "Entity
    requesting resource" and "Entity authorizing
    resource requests"

6
Generic Three Party ApproachComparison with
Token-based Approach
  • Features
  • End host must actively participate in the
    protocol exchange
  • True authentication between the end host (user)
    and the AAA server.
  • Session key establishment is provided
  • Provides better security properties
  • Difference between EAP and C/R based approach is
    mainly flexibility
  • With C/R based scheme a specific family of
    authentication and key exchange protocol is
    chosen
  • If this does not fit into an architecture then
    there is a problem.
  • With EAP this type of flexibility is provided
    since EAP acts as a container for many EAP
    methods
  • EAP is heavily used in other areas (e.g., network
    access)

7
Challenge/Response-based Authentication
Entity requesting resource
Entity performing QoS reservations
Entity authorizing resource request



QoS Request (Identity)
AAA-QoS (Identity)
Unauthorized (challenge)
AAA-QoS (challenge)
QoS RequestResponse
AAA-QoS (response)
Success/Failure
AAA-QoS (success/failure)
  • Challenge/Response based authentication protocol
    extensions to the QoS NSLP
  • Could be reused by some architectures (3GPP,
    3GPP2) with their C/R based authentication and
    key exchange protocol variant

8
EAP-based Approach
Entity requesting resource
Entity performing QoS reservations
Entity authorizing resource request



QoS Request (EAP-Request/Identity)
AAA-QoS (EAP-Request/Identity)
Unauthorized (EAP-Request/AKA-Challenge)
AAA-QoS (EAP-Request/AKA-Challenge)
QoS Request (EAP-Response/AKA-Response)
AAA-QoS (EAP-Response/AKA-Response)
NSIS (EAP-Success/Failure)
AAA-QoS (EAP-Success/Failure)
Legend AKA-Challenge (AT_RAND, AT_AUTN,
AT_MAC) AKA-Response (AT_RES, AT_MAC)
  • Advantage More flexible due to the concept of
    EAP methods
  • Disadvantage Overhead by EAP

9
Technical IssuesC/R and EAP
  • Channel binding might be necessary to prevent
    Man-in-the-Middle attacks.
  • Binding NSLP and NTLP security mechanisms
    together.
  • Session keys need to be established and used in
    subsequent messages in order to bind signaling
    messages to the authentication/authorization step
  • Interworking with NTLP security needs to be
    studied
  • Unilateral authentication at the NTLP layer
  • Client authentication at the upper layer
  • 'Lying NAS' problem needs to be addressed.
  • A lot of security specific issues need to be
    addressed

10
Next Steps
  • For the QoS NSLP to make progress it is necessary
    to decide which approach to use
  • Challenge/Response based approach
  • EAP-based approach

11
Questions?
12
Backup
13
Trust Model New Jersey Turnpike Model
Network A
Network C
Network B
Data Sender
Data Receiver
Node B
Node A
  • Peering relationship is used to provide charging
    between neighboring networks - similar to edge
    pricing proposed by Schenker et. al.
  • David Clark "We know how to route packets, what
    we don't know how to do is route dollars."

14
Authentication, Authorization and Accounting
Infrastructure
  • Authorization might not always happen at an NSIS
    element itself (see roaming scenarios)
  • Information which is exchanged between the end
    host (e.g., NI) needs to be forwarded to a
    backend server (e.g., PDP or AAA server)
  • NSIS and AAA protocols need to aligned



Authentication and Authorization Credentials



Back
-
end

NSIS

COPS / Diameter

NSIS Initiatior

Network Entity

AAA

Server

AAA Client

AAA Server
  • See also related activities in AAA working
    group.
Write a Comment
User Comments (0)
About PowerShow.com