rfc4739.txt 22 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619
  1. Network Working Group P. Eronen
  2. Request for Comments: 4739 Nokia
  3. Category: Experimental J. Korhonen
  4. TeliaSonera
  5. November 2006
  6. Multiple Authentication Exchanges
  7. in the Internet Key Exchange (IKEv2) Protocol
  8. Status of This Memo
  9. This memo defines an Experimental Protocol for the Internet
  10. community. It does not specify an Internet standard of any kind.
  11. Discussion and suggestions for improvement are requested.
  12. Distribution of this memo is unlimited.
  13. Copyright Notice
  14. Copyright (C) The IETF Trust (2006).
  15. Abstract
  16. The Internet Key Exchange (IKEv2) protocol supports several
  17. mechanisms for authenticating the parties, including signatures with
  18. public-key certificates, shared secrets, and Extensible
  19. Authentication Protocol (EAP) methods. Currently, each endpoint uses
  20. only one of these mechanisms to authenticate itself. This document
  21. specifies an extension to IKEv2 that allows the use of multiple
  22. authentication exchanges, using either different mechanisms or the
  23. same mechanism. This extension allows, for instance, performing
  24. certificate-based authentication of the client host followed by an
  25. EAP authentication of the user. When backend authentication servers
  26. are used, they can belong to different administrative domains, such
  27. as the network access provider and the service provider.
  28. Eronen & Korhonen Experimental [Page 1]
  29. RFC 4739 Multiple Auth. Exchanges in IKEv2 November 2006
  30. Table of Contents
  31. 1. Introduction ....................................................3
  32. 1.1. Usage Scenarios ............................................4
  33. 1.2. Terminology ................................................5
  34. 2. Solution ........................................................5
  35. 2.1. Solution Overview ..........................................5
  36. 2.2. Example 1: Multiple EAP Authentications ....................6
  37. 2.3. Example 2: Mixed EAP and Certificate Authentications .......7
  38. 2.4. Example 3: Multiple Initiator Certificates .................8
  39. 2.5. Example 4: Multiple Responder Certificates .................8
  40. 3. Payload Formats .................................................9
  41. 3.1. MULTIPLE_AUTH_SUPPORTED Notify Payload .....................9
  42. 3.2. ANOTHER_AUTH_FOLLOWS Notify Payload ........................9
  43. 4. IANA Considerations .............................................9
  44. 5. Security Considerations .........................................9
  45. 6. Acknowledgments ................................................10
  46. 7. References .....................................................10
  47. 7.1. Normative References ......................................10
  48. 7.2. Informative References ....................................10
  49. Eronen & Korhonen Experimental [Page 2]
  50. RFC 4739 Multiple Auth. Exchanges in IKEv2 November 2006
  51. 1. Introduction
  52. IKEv2 [IKEv2] supports several mechanisms for parties involved in the
  53. IKE_SA (IKE security association). These include signatures with
  54. public-key certificates, shared secrets, and Extensible
  55. Authentication Protocol (EAP) methods.
  56. Currently, each endpoint uses only one of these mechanisms to
  57. authenticate itself. However, there are scenarios where making the
  58. authorization decision in IKEv2 (whether to allow access or not)
  59. requires using several of these methods.
  60. For instance, it may be necessary to authenticate both the host
  61. (machine) requesting access, and the user currently using the host.
  62. These two authentications would use two separate sets of credentials
  63. (such as certificates and associated private keys) and might even use
  64. different authentication mechanisms.
  65. To take another example, when an operator is hosting a Virtual
  66. Private Network (VPN) gateway service for a third party, it may be
  67. necessary to authenticate the client to both the operator (for
  68. billing purposes) and the third party's Authentication,
  69. Authorization, and Accounting (AAA) server (for authorizing access to
  70. the third party's internal network).
  71. This document specifies an extension to IKEv2 that allows the use of
  72. multiple authentication exchanges, using either different mechanisms
  73. or the same mechanism. This extension allows, for instance,
  74. performing certificate-based authentication of the client host
  75. followed by an EAP authentication of the user.
  76. Each authentication exchange requiring communication with backend AAA
  77. servers may be directed to different backend AAA servers, located
  78. even in different administrative domains. However, details of the
  79. communication between the IKEv2 gateway and the backend
  80. authentication servers are beyond the scope of this document. In
  81. particular, this document does not specify any changes to existing
  82. AAA protocols, and it does not require the use of any particular AAA
  83. protocol.
  84. In case of several EAP authentications, it is important to notice
  85. that they are not a "sequence" (as described in Section 2.1 of
  86. [EAP]), but separate independent EAP conversations, which are usually
  87. also terminated in different EAP servers. Multiple authentication
  88. methods within a single EAP conversation are still prohibited as
  89. described in Section 2.1 of [EAP]. Using multiple independent EAP
  90. conversations is similar to the separate Network Access Provider
  91. (NAP) and Internet Service Provider (ISP) authentication exchanges
  92. Eronen & Korhonen Experimental [Page 3]
  93. RFC 4739 Multiple Auth. Exchanges in IKEv2 November 2006
  94. planned for [PANA]. The discovery of the appropriate EAP server for
  95. each EAP authentication conversation is based on AAA routing.
  96. 1.1. Usage Scenarios
  97. Figure 1 shows an example architecture of an operator-hosted VPN
  98. scenario that could benefit from a two-phase authentication within
  99. the IKEv2 exchange. First, the client authenticates towards the
  100. Network Access Provider (NAP) and gets access to the NAP-hosted VPN
  101. gateway. The first-phase authentication involves the backend AAA
  102. server of the NAP. After the first authentication, the client
  103. initiates the second authentication round that also involves the
  104. Third Party's backend AAA server. If both authentications succeed,
  105. the required IPsec tunnels are set up and the client can access
  106. protected networks behind the Third Party.
  107. Client *Network Access Provider*
  108. +---------+ +---------+ +-----+
  109. | | | NAP's | | NAP |
  110. |Protected| IPsec SAs | Tunnel | AAA Protocol | AAA |
  111. |Endpoint |<------------------>|Endpoint |<------------>|Serv/|
  112. | | | | |Proxy|
  113. +---------+ +---------+ +-----+
  114. ^ ^
  115. IPsec or / AAA |
  116. Leased Line / Protocol |
  117. / |
  118. v |
  119. +---------+ *Third Party* v
  120. |3rd Party| +-----+
  121. Protected | Tunnel | | 3rd |
  122. Subnet <----|Endpoint | |Party|
  123. | | | AAA |
  124. +---------+ +-----+
  125. Figure 1: Two-phase authentication used to gain access to
  126. the Third Party network via Network Access Provider. AAA
  127. traffic goes through NAP's AAA server.
  128. The NAP's AAA server can be used to proxy the AAA traffic to the
  129. Third Party's backend AAA server. Alternatively, the AAA traffic
  130. from the NAP's tunnel endpoint could go directly to the Third Party's
  131. backend AAA servers. However, this is more or less an AAA routing
  132. issue.
  133. Eronen & Korhonen Experimental [Page 4]
  134. RFC 4739 Multiple Auth. Exchanges in IKEv2 November 2006
  135. 1.2. Terminology
  136. The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
  137. "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
  138. document are to be interpreted as described in [KEYWORDS].
  139. The terms and abbreviations "authenticator", "backend authentication
  140. server", "EAP server", and "peer" in this document are to be
  141. interpreted as described in [EAP].
  142. When messages containing IKEv2 payloads are described, optional
  143. payloads are shown in brackets (for instance, "[FOO]"), and a plus
  144. sign indicates that a payload can be repeated one or more times (for
  145. instance, "FOO+").
  146. 2. Solution
  147. 2.1. Solution Overview
  148. The peers announce support for this IKEv2 extension by including a
  149. MULTIPLE_AUTH_SUPPORTED notification in the IKE_SA_INIT response
  150. (responder) and the first IKE_AUTH request (initiator).
  151. If both peers support this extension, either of them can announce
  152. that it wishes to have a second authentication by including an
  153. ANOTHER_AUTH_FOLLOWS notification in any IKE_AUTH message that
  154. contains an AUTH payload. This indicates that the peer sending the
  155. ANOTHER_AUTH_FOLLOWS wishes to authenticate another set of
  156. credentials to the other peer. The next IKE_AUTH message sent by
  157. this peer will contain a second identity payload (IDi or IDr) and
  158. starts another authentication exchange. The IKE_AUTH phase is
  159. considered successful only if all the individual authentication
  160. exchanges complete successfully.
  161. It is assumed that both peers know what credentials they want to
  162. present; there is no negotiation about, for instance, what type of
  163. authentication is to be done. As in IKEv2, EAP-based authentication
  164. is always requested by the initiator (by omitting the AUTH payload).
  165. The AUTH payloads are calculated as specified in [IKEv2] Sections
  166. 2.15 and 2.16, where IDi' refers to the latest IDi payload sent by
  167. the initiator, and IDr' refers to the latest IDr payload sent by the
  168. responder. If EAP methods that do not generate shared keys are used,
  169. it is possible that several AUTH payloads with identical contents are
  170. sent. When such EAP methods are used, the purpose of the AUTH
  171. payload is simply to delimit the authentication exchanges, and ensure
  172. that the IKE_SA_INIT request/response messages were not modified.
  173. Eronen & Korhonen Experimental [Page 5]
  174. RFC 4739 Multiple Auth. Exchanges in IKEv2 November 2006
  175. 2.2. Example 1: Multiple EAP Authentications
  176. This example shows certificate-based authentication of the responder
  177. followed by an EAP authentication exchange (messages 1-10). When the
  178. first EAP exchange is ending (the initiator is sending its AUTH
  179. payload), the initiator announces that it wishes to have a second
  180. authentication exchange by including an ANOTHER_AUTH_FOLLOWS
  181. notification (message 9).
  182. After this, a second authentication exchange begins. The initiator
  183. sends a new IDi payload but no AUTH payload (message 11), indicating
  184. that EAP will be used. After that, another EAP authentication
  185. exchange follows (messages 12-18).
  186. Initiator Responder
  187. ----------- -----------
  188. 1. HDR, SA, KE, Ni -->
  189. <-- 2. HDR, SA, KE, Nr, [CERTREQ],
  190. N(MULTIPLE_AUTH_SUPPORTED)
  191. 3. HDR, SK { IDi, [CERTREQ+], [IDr],
  192. SA, TSi, TSr, N(MULTIPLE_AUTH_SUPPORTED) } -->
  193. <-- 4. HDR, SK { IDr, [CERT+], AUTH,
  194. EAP(Request) }
  195. 5. HDR, SK { EAP(Response) } -->
  196. <-- 6. HDR, SK { EAP(Request) }
  197. 7. HDR, SK { EAP(Response) } -->
  198. <-- 8. HDR, SK { EAP(Success) }
  199. 9. HDR, SK { AUTH,
  200. N(ANOTHER_AUTH_FOLLOWS) } -->
  201. <-- 10. HDR, SK { AUTH }
  202. 11. HDR, SK { IDi } -->
  203. <-- 12. HDR, SK { EAP(Request) }
  204. 13. HDR, SK { EAP(Response) } -->
  205. <-- 14. HDR, SK { EAP(Request) }
  206. 15. HDR, SK { EAP(Response) } -->
  207. <-- 16. HDR, SK { EAP(Success) }
  208. 17. HDR, SK { AUTH } -->
  209. <-- 18. HDR, SK { AUTH, SA, TSi, TSr }
  210. Example 1: Certificate-based authentication of the
  211. responder, followed by two EAP authentication exchanges.
  212. Eronen & Korhonen Experimental [Page 6]
  213. RFC 4739 Multiple Auth. Exchanges in IKEv2 November 2006
  214. 2.3. Example 2: Mixed EAP and Certificate Authentications
  215. Another example is shown below: here both the initiator and the
  216. responder are first authenticated using certificates (or shared
  217. secrets); this is followed by an EAP authentication exchange.
  218. Initiator Responder
  219. ----------- -----------
  220. 1. HDR, SA, KE, Ni -->
  221. <-- 2. HDR, SA, KE, Nr, [CERTREQ],
  222. N(MULTIPLE_AUTH_SUPPORTED)
  223. 3. HDR, SK { IDi, [CERT+], [CERTREQ+], [IDr], AUTH,
  224. SA, TSi, TSr, N(MULTIPLE_AUTH_SUPPORTED),
  225. N(ANOTHER_AUTH_FOLLOWS) } -->
  226. <-- 4. HDR, SK { IDr, [CERT+], AUTH }
  227. 5. HDR, SK { IDi } -->
  228. <-- 6. HDR, SK { EAP(Request) }
  229. 7. HDR, SK { EAP(Response) } -->
  230. <-- 8. HDR, SK { EAP(Request) }
  231. 9. HDR, SK { EAP(Response) } -->
  232. <-- 10. HDR, SK { EAP(Success) }
  233. 11. HDR, SK { AUTH } -->
  234. <-- 12. HDR, SK { AUTH, SA, TSi, TSr }
  235. Example 2: Certificate-based (or shared-secret-based)
  236. authentication of the initiator and the responder,
  237. followed by an EAP authentication exchange.
  238. Eronen & Korhonen Experimental [Page 7]
  239. RFC 4739 Multiple Auth. Exchanges in IKEv2 November 2006
  240. 2.4. Example 3: Multiple Initiator Certificates
  241. This example shows yet another possibility: the initiator has two
  242. different certificates (and associated private keys), and
  243. authenticates both of them to the responder.
  244. Initiator Responder
  245. ----------- -----------
  246. 1. HDR, SA, KE, Ni -->
  247. <-- 2. HDR, SA, KE, Nr, [CERTREQ],
  248. N(MULTIPLE_AUTH_SUPPORTED)
  249. 3. HDR, SK { IDi, [CERT+], [CERTREQ+], [IDr], AUTH,
  250. SA, TSi, TSr, N(MULTIPLE_AUTH_SUPPORTED),
  251. N(ANOTHER_AUTH_FOLLOWS) } -->
  252. <-- 4. HDR, SK { IDr, [CERT+], AUTH }
  253. 5. HDR, SK { IDi, [CERT+], AUTH } -->
  254. <-- 6. HDR, SK { SA, TSi, TSr }
  255. Example 3: Two certificate-based authentications of the
  256. initiator, and one certificate-based authentication
  257. of the responder.
  258. 2.5. Example 4: Multiple Responder Certificates
  259. This example shows yet another possibility: the responder has two
  260. different certificates (and associated private keys), and
  261. authenticates both of them to the initiator.
  262. Initiator Responder
  263. ----------- -----------
  264. 1. HDR, SA, KE, Ni -->
  265. <-- 2. HDR, SA, KE, Nr, [CERTREQ],
  266. N(MULTIPLE_AUTH_SUPPORTED)
  267. 3. HDR, SK { IDi, [CERT+], [CERTREQ+], [IDr], AUTH,
  268. SA, TSi, TSr, N(MULTIPLE_AUTH_SUPPORTED) } -->
  269. <-- 4. HDR, SK { IDr, [CERT+], AUTH,
  270. N(ANOTHER_AUTH_FOLLOWS) }
  271. 5. HDR, SK { } -->
  272. <-- 6. HDR, SK { IDr, [CERT+], AUTH,
  273. SA, TSi, TSr }
  274. Example 4: Two certificate-based authentications of the
  275. responder, and one certificate-based authentication
  276. of the initiator.
  277. Eronen & Korhonen Experimental [Page 8]
  278. RFC 4739 Multiple Auth. Exchanges in IKEv2 November 2006
  279. 3. Payload Formats
  280. 3.1. MULTIPLE_AUTH_SUPPORTED Notify Payload
  281. The MULTIPLE_AUTH_SUPPORTED notification is included in the
  282. IKE_SA_INIT response or the first IKE_AUTH request to indicate that
  283. the peer supports this specification. The Notify Message Type is
  284. MULTIPLE_AUTH_SUPPORTED (16404). The Protocol ID and SPI Size fields
  285. MUST be set to zero, and there is no data associated with this Notify
  286. type.
  287. 3.2. ANOTHER_AUTH_FOLLOWS Notify Payload
  288. The ANOTHER_AUTH_FOLLOWS notification payload is included in an
  289. IKE_AUTH message containing an AUTH payload to indicate that the peer
  290. wants to continue with another authentication exchange. The Notify
  291. Message Type is ANOTHER_AUTH_FOLLOWS (16405). The Protocol ID and
  292. SPI Size fields MUST be set to zero, and there is no data associated
  293. with this Notify type.
  294. 4. IANA Considerations
  295. This document defines two new IKEv2 notifications,
  296. MULTIPLE_AUTH_SUPPORTED and ANOTHER_AUTH_FOLLOWS, whose values are
  297. allocated from the "IKEv2 Notify Message Types" namespace defined in
  298. [IKEv2].
  299. This document does not define any new namespaces to be managed by
  300. IANA.
  301. 5. Security Considerations
  302. Security considerations for IKEv2 are discussed in [IKEv2]. The
  303. reader is encouraged to pay special attention to considerations
  304. relating to the use of EAP methods that do not generate shared keys.
  305. However, the use of multiple authentication exchanges results in at
  306. least one new security consideration.
  307. In normal IKEv2, the responder authenticates the initiator before
  308. revealing its identity (except when EAP is used). When multiple
  309. authentication exchanges are used to authenticate the initiator, the
  310. responder has to reveal its identity before all of the initiator
  311. authentication exchanges have been completed.
  312. Eronen & Korhonen Experimental [Page 9]
  313. RFC 4739 Multiple Auth. Exchanges in IKEv2 November 2006
  314. 6. Acknowledgments
  315. The authors would like to thank Bernard Aboba, Jari Arkko, Spencer
  316. Dawkins, Lakshminath Dondeti, Henry Haverinen, Russ Housley, Mika
  317. Joutsenvirta, Charlie Kaufman, Tero Kivinen, Yoav Nir, Magnus
  318. Nystrom, Mohan Parthasarathy, and Juha Savolainen for their valuable
  319. comments.
  320. 7. References
  321. 7.1. Normative References
  322. [IKEv2] Kaufman, C., "Internet Key Exchange (IKEv2) Protocol",
  323. RFC 4306, December 2005.
  324. [KEYWORDS] Bradner, S., "Key words for use in RFCs to Indicate
  325. Requirement Levels", RFC 2119, March 1997.
  326. 7.2. Informative References
  327. [EAP] Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., and H.
  328. Levkowetz, "Extensible Authentication Protocol (EAP)",
  329. RFC 3748, June 2004.
  330. [PANA] Yegin, A., Ohba, Y., Penno, R., Tsirtsis, G., and C.
  331. Wang, "Protocol for Carrying Authentication for Network
  332. Access (PANA) Requirements", RFC 4058, May 2005.
  333. Authors' Addresses
  334. Pasi Eronen
  335. Nokia Research Center
  336. P.O. Box 407
  337. FIN-00045 Nokia Group
  338. Finland
  339. EMail: pasi.eronen@nokia.com
  340. Jouni Korhonen
  341. TeliaSonera
  342. P.O. Box 970
  343. FIN-00051 Sonera
  344. Finland
  345. EMail: jouni.korhonen@teliasonera.com
  346. Eronen & Korhonen Experimental [Page 10]
  347. RFC 4739 Multiple Auth. Exchanges in IKEv2 November 2006
  348. Full Copyright Statement
  349. Copyright (C) The IETF Trust (2006).
  350. This document is subject to the rights, licenses and restrictions
  351. contained in BCP 78, and except as set forth therein, the authors
  352. retain all their rights.
  353. This document and the information contained herein are provided on an
  354. "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
  355. OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST,
  356. AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES,
  357. EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT
  358. THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY
  359. IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR
  360. PURPOSE.
  361. Intellectual Property
  362. The IETF takes no position regarding the validity or scope of any
  363. Intellectual Property Rights or other rights that might be claimed to
  364. pertain to the implementation or use of the technology described in
  365. this document or the extent to which any license under such rights
  366. might or might not be available; nor does it represent that it has
  367. made any independent effort to identify any such rights. Information
  368. on the procedures with respect to rights in RFC documents can be
  369. found in BCP 78 and BCP 79.
  370. Copies of IPR disclosures made to the IETF Secretariat and any
  371. assurances of licenses to be made available, or the result of an
  372. attempt made to obtain a general license or permission for the use of
  373. such proprietary rights by implementers or users of this
  374. specification can be obtained from the IETF on-line IPR repository at
  375. http://www.ietf.org/ipr.
  376. The IETF invites any interested party to bring to its attention any
  377. copyrights, patents or patent applications, or other proprietary
  378. rights that may cover technology that may be required to implement
  379. this standard. Please address the information to the IETF at
  380. ietf-ipr@ietf.org.
  381. Acknowledgement
  382. Funding for the RFC Editor function is currently provided by the
  383. Internet Society.
  384. Eronen & Korhonen Experimental [Page 11]