[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: New Radius/Diameter authentication and key delivery for FMIP application
Vidya,
>
>>Some background on why this is needed particularly for a
>>protocol such as FMIP
>>
Thanks for the background!
>>>First of all, I don't want to take on work if it runs into
>>>
>>>
>>significant
>>
>>
>>>problems in parts that MIPSHOP does not own.
>>>
>>>
>>>
>>I am missing something here. AAA-based support is seen as
>>needed - just like how MIP6 (and many other WGs) come up with
>>AAA protocol needs and address it via the respective AAA WGs,
>>we would have to do that. Why is the situation different for MIPSHOP?
>>
>>
I hope we can get the AAA support -- but I want to get
a prior agreement from the relevant folks that this
is indeed possible even in this case. I worry that there
*might* be a problem if the Zorn keyreq stuff has been
stuck for years, too.
>>>Secondly, I worry about the practical impacts to AAA
>>>
>>>
>>infrastructures.
>>
>>
>>>Having a new "transaction"
>>>or application implies that additional support may be needed before
>>>this can actually be used.
>>>
>>>
>>>
>>I'm not really sure why this is a concern. Saying that
>>support for "secure" FMIP requires additional AAA attributes
>>- but then, we have a need for new AAA features any time a
>>new protocol impacting authentication/authorization is
>>introduced in a system that relies on AAA for those things.
>>Especially, I don't understand the alternative - clearly, the
>>alternative of making SeND and SeND-based handover keys a
>>requirement for FMIP deployment seems to be too restrictive.
>>Or, are we talking about some other option that has not yet
>>been discussed?
>>
>>
I believe AAA-based FMIP security is a useful goal for
us -- I don't want to back down on that. What I'd like
to get feedback on from the AAA doctors group is if
they see issues or other design alternatives, still
assuming a AAA-based model.
For instance, the design makes a tradeoff where
a fair amount of AAA support, possibly even new
credentials, are needed but it provides a simple
and efficient result for FMIP. Is this the only design,
and is there something that the AAA doctors would
rather recommend? And Vidya, can you elaborate
on why IKEv2-based mechanism would be insufficient
(I think you indicated that the exchange is not
on the critical path. But I may not understand all
the scenarios this may get used in.)
>>>Thirdly, I worry about doing only Diameter work for this
>>>
>>>
>>function. It
>>
>>
>>>seems likely that some potential users of FMIP technology
>>>
>>>
>>run a RADIUS
>>
>>
>>>infrastructure, and adopting this particular FMIP authentication
>>>scheme may therefore in practise imply adopting a RADIUS
>>>
>>>
>>extension for
>>
>>
>>>this.
>>>
>>>
>>>
>>Actually, this seems equivalent to saying that developing a
>>protocol for IPv6 alone will make it useless to IPv4
>>infrastructures :)
>>
>>Ideally, there would be both RADIUS and Diameter support for
>>this - but, I don't think it is bad to work with Dimateter
>>support for this, at least initially. RFC4004 is an example
>>where this kind of work happened first for Diameter. Not to
>>mention, a lot of next generation architectures are starting
>>to embrace Diameter.
>>
>>
Yeah. But realistically, if we know we are going to develop
the same stuff for both, shouldn't we allocate just one set
of attributes?
But the answer to that depends a lot also on the plans
for RADIUS - Diameter interoperation and RADIUS
attribute space extension.
--Jari