123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899 |
- Internet Engineering Task Force (IETF) P. Eronen
- Request for Comments: 5998 Independent
- Updates: 5996 H. Tschofenig
- Category: Standards Track Nokia Siemens Networks
- ISSN: 2070-1721 Y. Sheffer
- Independent
- September 2010
- An Extension for EAP-Only Authentication in IKEv2
- Abstract
- IKEv2 specifies that Extensible Authentication Protocol (EAP)
- authentication must be used together with responder authentication
- based on public key signatures. This is necessary with old EAP
- methods that provide only unilateral authentication using, e.g., one-
- time passwords or token cards.
- This document specifies how EAP methods that provide mutual
- authentication and key agreement can be used to provide extensible
- responder authentication for IKEv2 based on methods other than public
- key signatures.
- Status of This Memo
- This is an Internet Standards Track document.
- This document is a product of the Internet Engineering Task Force
- (IETF). It represents the consensus of the IETF community. It has
- received public review and has been approved for publication by the
- Internet Engineering Steering Group (IESG). Further information on
- Internet Standards is available in Section 2 of RFC 5741.
- Information about the current status of this document, any errata,
- and how to provide feedback on it may be obtained at
- http://www.rfc-editor.org/info/rfc5998.
- Eronen, et al. Standards Track [Page 1]
- RFC 5998 Extension for EAP in IKEv2 September 2010
- Copyright Notice
- Copyright (c) 2010 IETF Trust and the persons identified as the
- document authors. All rights reserved.
- This document is subject to BCP 78 and the IETF Trust's Legal
- Provisions Relating to IETF Documents
- (http://trustee.ietf.org/license-info) in effect on the date of
- publication of this document. Please review these documents
- carefully, as they describe your rights and restrictions with respect
- to this document. Code Components extracted from this document must
- include Simplified BSD License text as described in Section 4.e of
- the Trust Legal Provisions and are provided without warranty as
- described in the Simplified BSD License.
- This document may contain material from IETF Documents or IETF
- Contributions published or made publicly available before November
- 10, 2008. The person(s) controlling the copyright in some of this
- material may not have granted the IETF Trust the right to allow
- modifications of such material outside the IETF Standards Process.
- Without obtaining an adequate license from the person(s) controlling
- the copyright in such materials, this document may not be modified
- outside the IETF Standards Process, and derivative works of it may
- not be created outside the IETF Standards Process, except to format
- it for publication as an RFC or to translate it into languages other
- than English.
- 1. Introduction
- The Extensible Authentication Protocol (EAP), defined in [RFC3748],
- is an authentication framework that supports multiple authentication
- mechanisms. Today, EAP has been implemented at end hosts and routers
- that connect via switched circuits or dial-up lines using PPP
- [RFC1661], IEEE 802 wired switches [IEEE8021X], and IEEE 802.11
- wireless access points [IEEE80211i].
- One of the advantages of the EAP architecture is its flexibility.
- EAP is used to select a specific authentication mechanism, typically
- after the authenticator requests more information in order to
- determine the specific authentication method to be used. Rather than
- requiring the authenticator (e.g., wireless LAN access point) to be
- updated to support each new authentication method, EAP permits the
- use of a backend authentication server that may implement some or all
- authentication methods.
- Eronen, et al. Standards Track [Page 2]
- RFC 5998 Extension for EAP in IKEv2 September 2010
- IKEv2 ([RFC4306] and [RFC5996]) is a component of IPsec used for
- performing mutual authentication and establishing and maintaining
- Security Associations (SAs) for IPsec ESP and Authentication Header
- (AH). In addition to supporting authentication using public key
- signatures and shared secrets, IKEv2 also supports EAP
- authentication.
- IKEv2 provides EAP authentication since it was recognized that public
- key signatures and shared secrets are not flexible enough to meet the
- requirements of many deployment scenarios. By using EAP, IKEv2 can
- leverage existing authentication infrastructure and credential
- databases, since EAP allows users to choose a method suitable for
- existing credentials, and also makes separation of the IKEv2
- responder (VPN gateway) from the EAP authentication endpoint (backend
- Authentication, Authorization, and Accounting (AAA) server) easier.
- Some older EAP methods are designed for unilateral authentication
- only (that is, EAP peer to EAP server). These methods are used in
- conjunction with IKEv2 public-key-based authentication of the
- responder to the initiator. It is expected that this approach is
- especially useful for "road warrior" VPN gateways that use, for
- instance, one-time passwords or token cards to authenticate the
- clients.
- However, most newer EAP methods, such as those typically used with
- IEEE 802.11i wireless LANs, provide mutual authentication and key
- agreement. Currently, IKEv2 specifies that these EAP methods must
- also be used together with responder authentication based on public
- key signatures.
- In order for the public key signature authentication of the gateway
- to be effective, a deployment of Public Key Infrastructure (PKI) is
- required, which has to include management of trust anchors on all
- supplicants. In many environments, this is not realistic, and the
- security of the gateway public key is the same as the security of a
- self-signed certificate. Mutually authenticating EAP methods alone
- can provide a sufficient level of security in many circumstances, and
- in fact, in some deployments, IEEE 802.11i uses EAP without any PKI
- for authenticating the Wireless Local Area Network (WLAN) access
- points.
- This document specifies how EAP methods that offer mutual
- authentication and key agreement can be used to provide responder
- authentication in IKEv2 completely based on EAP.
- Eronen, et al. Standards Track [Page 3]
- RFC 5998 Extension for EAP in IKEv2 September 2010
- 1.1. Terminology
- All notation in this protocol extension is taken from [RFC4306].
- Numbered messages refer to the IKEv2 message sequence when using EAP.
- Thus:
- o Message 1 is the request message of IKE_SA_INIT.
- o Message 2 is the response message of IKE_SA_INIT.
- o Message 3 is the first request of IKE_AUTH.
- o Message 4 is the first response of IKE_AUTH.
- The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
- "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
- document are to be interpreted as described in [RFC2119].
- 2. Scenarios
- In this section, we describe two scenarios for extensible
- authentication within IKEv2. These scenarios are intended to be
- illustrative examples rather than specifying how things should be
- done.
- Figure 1 shows a configuration where the EAP and the IKEv2 endpoints
- are co-located. Authenticating the IKEv2 responder using both EAP
- and public key signatures is redundant. Offering EAP-based
- authentication has the advantage that multiple different
- authentication and key exchange protocols are available with EAP with
- different security properties (such as strong password-based
- protocols, protocols offering user identity confidentiality, and many
- more).
- +------+-----+ +------------+
- O | IKEv2 | | IKEv2 |
- /|\ | Initiator |<---////////////////////--->| Responder |
- / \ +------------+ IKEv2 +------------+
- User | EAP Peer | Exchange | EAP Server |
- +------------+ +------------+
- Figure 1: EAP and IKEv2 Endpoints Are Co-Located
- Figure 2 shows a typical corporate network access scenario. The
- initiator (client) interacts with the responder (VPN gateway) in the
- corporate network. The EAP exchange within IKE runs between the
- Eronen, et al. Standards Track [Page 4]
- RFC 5998 Extension for EAP in IKEv2 September 2010
- client and the home AAA server. As a result of a successful EAP
- authentication protocol run, session keys are established and sent
- from the AAA server to the VPN gateway, and then used to authenticate
- the IKEv2 SA with AUTH payloads.
- The protocol used between the VPN gateway and AAA server could be,
- for instance, Diameter [RFC4072] or RADIUS [RFC3579]. See Section 6
- for related security considerations.
- +-------------------------------+
- | Corporate network |
- | |
- +-----------+ +--------+ |
- | IKEv2 | AAA | Home | |
- IKEv2 +////----->+ Responder +<---------->+ AAA | |
- Exchange / | (VPN GW) | (RADIUS/ | Server | |
- / +-----------+ Diameter) +--------+ |
- / | carrying EAP |
- | | |
- | +-------------------------------+
- v
- +------+-----+
- o | IKEv2 |
- /|\ | Initiator |
- / \ | VPN client |
- User +------------+
- Figure 2: Corporate Network Access
- 3. Solution
- IKEv2 specifies that when the EAP method establishes a shared secret
- key, that key is used by both the initiator and responder to generate
- an AUTH payload (thus authenticating the IKEv2 SA set up by messages
- 1 and 2).
- When used together with public key responder authentication, the
- responder is, in effect, authenticated using two different methods:
- the public key signature AUTH payload in message 4, and the EAP-based
- AUTH payload later.
- If the initiator does not wish to use public-key-based responder
- authentication, it includes an EAP_ONLY_AUTHENTICATION notification
- payload (16417) in message 3. The Protocol ID and Security Parameter
- Index (SPI) size fields are set to zero, and there is no additional
- data associated with this notification.
- Eronen, et al. Standards Track [Page 5]
- RFC 5998 Extension for EAP in IKEv2 September 2010
- If the responder supports this notification and chooses to use it, it
- omits the public-key-based AUTH payload and CERT payloads from
- message 4.
- If the responder does not support the EAP_ONLY_AUTHENTICATION
- notification or does not wish to use it, it ignores the notification
- payload, and includes the AUTH payload in message 4. In this case,
- the initiator MUST verify that payload and any associated
- certificates, as per [RFC4306].
- When receiving message 4, the initiator MUST verify that the proposed
- EAP method is allowed by this specification, and MUST abort the
- protocol immediately otherwise.
- Both the initiator and responder MUST verify that the EAP method
- actually used provided mutual authentication and established a shared
- secret key. The AUTH payloads sent after EAP Success MUST use the
- EAP-generated key, and MUST NOT use SK_pi or SK_pr (see Section 2.15
- of [RFC5996]).
- Eronen, et al. Standards Track [Page 6]
- RFC 5998 Extension for EAP in IKEv2 September 2010
- An IKEv2 message exchange with this modification is shown below:
- Initiator Responder
- ----------- -----------
- HDR, SAi1, KEi, Ni,
- [N(NAT_DETECTION_SOURCE_IP),
- N(NAT_DETECTION_DESTINATION_IP)] -->
- <-- HDR, SAr1, KEr, Nr, [CERTREQ],
- [N(NAT_DETECTION_SOURCE_IP),
- N(NAT_DETECTION_DESTINATION_IP)]
- HDR, SK { IDi, [IDr], SAi2, TSi, TSr,
- N(EAP_ONLY_AUTHENTICATION),
- [CP(CFG_REQUEST)] } -->
- <-- HDR, SK { IDr, EAP(Request) }
- HDR, SK { EAP(Response) } -->
- <-- HDR, SK { EAP(Request) }
- HDR, SK { EAP(Response) } -->
- <-- HDR, SK { EAP(Success) }
- HDR, SK { AUTH } -->
- <-- HDR, SK { AUTH, SAr2, TSi, TSr,
- [CP(CFG_REPLY] }
- Note: all notation in the above protocol sequence and elsewhere in
- this specification is as defined in [RFC4306], and see in particular
- Sec. 1.2 of [RFC4306] for payload types.
- The NAT detection and Configuration payloads are shown for
- informative purposes only; they do not change how EAP authentication
- works.
- An IKE SA that was set up with this extension can be resumed using
- the mechanism described in [RFC5723]. However, session resumption
- does not change the authentication method. Therefore, during the
- IKE_AUTH exchange of the resumed session, this extension MUST NOT be
- sent by the initiator.
- Eronen, et al. Standards Track [Page 7]
- RFC 5998 Extension for EAP in IKEv2 September 2010
- 4. Safe EAP Methods
- EAP methods to be used with this extension MUST have the following
- properties:
- 1. The method provides mutual authentication of the peers.
- 2. The method is key-generating.
- 3. The method is resistant to dictionary attacks.
- The authors believe that the following EAP methods are secure when
- used with the current extension. The list is not inclusive, and
- there are likely other safe methods that have not been listed here.
- +-------------------------------+-------------------+---------------+
- | Method Name | Allows Channel | Reference |
- | | Binding? | |
- +-------------------------------+-------------------+---------------+
- | EAP-SIM | No | [RFC4186] |
- | EAP-AKA | Yes | [RFC4187] |
- | EAP-AKA' | Yes | [RFC5448] |
- | EAP-GPSK | Yes | [RFC5433] |
- | EAP-pwd | No | [RFC5931] |
- | EAP-EKE | Yes | [EMU-EAP-EKE] |
- | EAP-PAX | Yes | [RFC4746] |
- | EAP-SAKE | No | [RFC4763] |
- | EAP-SRP | No | [EAP-SRP] |
- | EAP-POTP (mutual | Yes | [RFC4793] |
- | authentication variant) | | |
- | EAP-TLS | No | [RFC5216] |
- | EAP-FAST | No | [RFC4851] |
- | EAP-TTLS | No | [RFC5281] |
- +-------------------------------+-------------------+---------------+
- The "Allows channel binding?" column denotes protocols where
- protected identity information may be sent between the EAP endpoints.
- This third, optional property of the method provides protection
- against certain types of attacks (see Section 6.2 for an
- explanation), and therefore in some scenarios, methods that allow for
- channel binding are to be preferred. It is noted that at the time of
- writing, even when such capabilities are provided, they are not fully
- specified in an interoperable manner. In particular, no RFC
- specifies what identities should be sent under the protection of the
- channel binding mechanism, or what policy is to be used to correlate
- identities at the different layers.
- Eronen, et al. Standards Track [Page 8]
- RFC 5998 Extension for EAP in IKEv2 September 2010
- 5. IANA Considerations
- This document defines a new IKEv2 Notification Payload type,
- EAP_ONLY_AUTHENTICATION, described in Section 3. This payload has
- been assigned the type number 16417 from the "Status Types" range.
- 6. Security Considerations
- Security considerations applicable to all EAP methods are discussed
- in [RFC3748]. The EAP Key Management Framework [RFC5247] deals with
- issues that arise when EAP is used as a part of a larger system.
- 6.1. Authentication of IKEv2 SA
- It is important to note that the IKEv2 SA is not authenticated by
- just running an EAP conversation: the crucial step is the AUTH
- payload based on the EAP-generated key. Thus, EAP methods that do
- not provide mutual authentication or establish a shared secret key
- MUST NOT be used with the modifications presented in this document.
- 6.2. Authentication with Separated IKEv2 Responder / EAP Server
- As described in Section 2, the EAP conversation can terminate either
- at the IKEv2 responder or at a backend AAA server.
- If the EAP method is terminated at the IKEv2 responder, then no key
- transport via the AAA infrastructure is required. Pre-shared secret
- and public-key-based authentication offered by IKEv2 is then replaced
- by a wider range of authentication and key exchange methods.
- However, typically EAP will be used with a backend AAA server. See
- [RFC5247] for a more complete discussion of the related security
- issues; here we provide only a short summary.
- When a backend server is used, there are actually two authentication
- exchanges: the EAP method between the client and the AAA server, and
- another authentication between the AAA server and IKEv2 gateway. The
- AAA server authenticates the client using the selected EAP method,
- and they establish a session key. The AAA server then sends this key
- to the IKEv2 gateway over a connection authenticated using, e.g.,
- IPsec or Transport Layer Security (TLS).
- Some EAP methods do not have any concept of pass-through
- authenticator (e.g., Network Access Server (NAS) or IKEv2 gateway)
- identity, and these two authentications remain quite independent of
- each other. That is, after the client has verified the AUTH payload
- sent by the IKEv2 gateway, it knows that it is talking to SOME
- gateway trusted by the home AAA server, but not which one. The
- Eronen, et al. Standards Track [Page 9]
- RFC 5998 Extension for EAP in IKEv2 September 2010
- situation is somewhat similar if a single cryptographic hardware
- accelerator, containing a single private key, would be shared between
- multiple IKEv2 gateways (perhaps in some kind of cluster
- configuration). In particular, if one of the gateways is
- compromised, it can impersonate any of the other gateways towards the
- user (until the compromise is discovered and access rights revoked).
- In some environments it is not desirable to trust the IKEv2 gateways
- this much (also known as the "Lying NAS Problem"). EAP methods that
- provide what is called "connection binding" or "channel binding"
- transport some identity or identities of the gateway (or WLAN access
- point / NAS) inside the EAP method. Then the AAA server can check
- that it is indeed sending the key to the gateway expected by the
- client. A potential solution is described in [EAP-SERVICE], see also
- [EMU-AAAPAY].
- In some deployment configurations, AAA proxies may be present between
- the IKEv2 gateway and the backend AAA server. These AAA proxies MUST
- be trusted for secure operation, and therefore SHOULD be avoided when
- possible; see Section 2.3.4 of [RFC4072] and Section 4.3.7 of
- [RFC3579] for more discussion.
- 6.3. Protection of EAP Payloads
- Although the EAP payloads are encrypted and integrity protected with
- SK_e/SK_a, this does not provide any protection against active
- attackers. Until the AUTH payload has been received and verified, a
- man-in-the-middle can change the KEi/KEr payloads and eavesdrop or
- modify the EAP payloads.
- In IEEE 802.11i wireless LANs, the EAP payloads are neither encrypted
- nor integrity protected (by the link layer), so EAP methods are
- typically designed to take that into account.
- In particular, EAP methods that are vulnerable to dictionary attacks
- when used in WLANs are still vulnerable (to active attackers) when
- run inside IKEv2.
- The rules in Section 4 are designed to avoid this potential
- vulnerability.
- Eronen, et al. Standards Track [Page 10]
- RFC 5998 Extension for EAP in IKEv2 September 2010
- 6.4. Identities and Authenticated Identities
- When using this protocol, each of the peers sends two identity
- values:
- 1. An identity contained in the IKE ID payload.
- 2. An identity transferred within the specific EAP method's
- messages.
- (IKEv2 omits the EAP Identity request/response pair, see Section 3.16
- of [RFC5996].) The first identity value can be used by the recipient
- to route AAA messages and/or to select authentication and EAP types.
- But it is only the second identity that is directly authenticated by
- the EAP method. The reader is referred to Section 2.16 of [RFC5996]
- regarding the need to base IPsec policy decisions on the
- authenticated identity. In the context of the extension described
- here, this guidance on IPsec policy applies both to the
- authentication of the client by the gateway and vice versa.
- 6.5. User Identity Confidentiality
- IKEv2 provides confidentiality for the initiator identity against
- passive eavesdroppers, but not against active attackers. The
- initiator announces its identity first (in message 3), before the
- responder has been authenticated. The usage of EAP in IKEv2 does not
- change this situation, since the ID payload in message 3 is used
- instead of the EAP Identity Request/Response exchange. This is
- somewhat unfortunate since when EAP is used with public key
- authentication of the responder, it would be possible to provide
- active user identity confidentiality for the initiator.
- IKEv2 protects the responder's identity even against active attacks.
- This property cannot be provided when using EAP. If public key
- responder authentication is used in addition to EAP, the responder
- reveals its identity before authenticating the initiator. If only
- EAP is used (as proposed in this document), the situation depends on
- the EAP method used (in some EAP methods, the server reveals its
- identity first).
- Hence, if active user identity confidentiality for the responder is
- required then EAP methods that offer this functionality have to be
- used (see [RFC3748], Section 7.3).
- Eronen, et al. Standards Track [Page 11]
- RFC 5998 Extension for EAP in IKEv2 September 2010
- 7. Acknowledgments
- This document borrows some text from [RFC3748], [RFC4306], and
- [RFC4072]. We would also like to thank Hugo Krawczyk for interesting
- discussions about this topic, Dan Harkins, and David Harrington for
- their comments.
- 8. References
- 8.1. Normative References
- [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
- Requirement Levels", BCP 14, RFC 2119, March 1997.
- [RFC3748] Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., and
- H. Levkowetz, "Extensible Authentication Protocol
- (EAP)", RFC 3748, June 2004.
- [RFC4306] Kaufman, C., "Internet Key Exchange (IKEv2) Protocol",
- RFC 4306, December 2005.
- [RFC5723] Sheffer, Y. and H. Tschofenig, "Internet Key Exchange
- Protocol Version 2 (IKEv2) Session Resumption",
- RFC 5723, January 2010.
- [RFC5996] Kaufman, C., Hoffman, P., Nir, Y., and P. Eronen,
- "Internet Key Exchange Protocol Version 2 (IKEv2)",
- RFC 5996, September 2010.
- 8.2. Informative References
- [EAP-SERVICE] Arkko, J. and P. Eronen, "Authenticated Service
- Information for the Extensible Authentication Protocol
- (EAP)", Work in Progress, October 2005.
- [EAP-SRP] Carlson, J., Aboba, B., and H. Haverinen, "EAP SRP-
- SHA1 Authentication Protocol", Work in Progress,
- July 2001.
- [EMU-AAAPAY] Clancy, C., Lior, A., Zorn, G., and K. Hoeper, "EAP
- Method Support for Transporting AAA Payloads", Work
- in Progress, May 2010.
- [EMU-EAP-EKE] Sheffer, Y., Zorn, G., Tschofenig, H., and S. Fluhrer,
- "An EAP Authentication Method Based on the EKE
- Protocol", Work in Progress, August 2010.
- Eronen, et al. Standards Track [Page 12]
- RFC 5998 Extension for EAP in IKEv2 September 2010
- [IEEE80211i] Institute of Electrical and Electronics Engineers,
- "IEEE Standard for Information technology -
- Telecommunications and information exchange between
- systems - Local and metropolitan area networks -
- Specific requirements - Part 11: Wireless Medium
- Access Control (MAC) and Physical Layer (PHY)
- specifications: Amendment 6: Medium Access Control
- (MAC) Security Enhancements", IEEE Standard 802.11i-
- 2004, July 2004.
- [IEEE8021X] Institute of Electrical and Electronics Engineers,
- "Local and Metropolitan Area Networks: Port-Based
- Network Access Control", IEEE Standard 802.1X-2001,
- 2001.
- [RFC1661] Simpson, W., "The Point-to-Point Protocol (PPP)",
- STD 51, RFC 1661, July 1994.
- [RFC3579] Aboba, B. and P. Calhoun, "RADIUS (Remote
- Authentication Dial In User Service) Support For
- Extensible Authentication Protocol (EAP)", RFC 3579,
- September 2003.
- [RFC4072] Eronen, P., Hiller, T., and G. Zorn, "Diameter
- Extensible Authentication Protocol (EAP) Application",
- RFC 4072, August 2005.
- [RFC4186] Haverinen, H. and J. Salowey, "Extensible
- Authentication Protocol Method for Global System for
- Mobile Communications (GSM) Subscriber Identity
- Modules (EAP-SIM)", RFC 4186, January 2006.
- [RFC4187] Arkko, J. and H. Haverinen, "Extensible Authentication
- Protocol Method for 3rd Generation Authentication and
- Key Agreement (EAP-AKA)", RFC 4187, January 2006.
- [RFC4746] Clancy, T. and W. Arbaugh, "Extensible Authentication
- Protocol (EAP) Password Authenticated Exchange",
- RFC 4746, November 2006.
- [RFC4763] Vanderveen, M. and H. Soliman, "Extensible
- Authentication Protocol Method for Shared-secret
- Authentication and Key Establishment (EAP-SAKE)",
- RFC 4763, November 2006.
- [RFC4793] Nystroem, M., "The EAP Protected One-Time Password
- Protocol (EAP-POTP)", RFC 4793, February 2007.
- Eronen, et al. Standards Track [Page 13]
- RFC 5998 Extension for EAP in IKEv2 September 2010
- [RFC4851] Cam-Winget, N., McGrew, D., Salowey, J., and H. Zhou,
- "The Flexible Authentication via Secure Tunneling
- Extensible Authentication Protocol Method (EAP-FAST)",
- RFC 4851, May 2007.
- [RFC5216] Simon, D., Aboba, B., and R. Hurst, "The EAP-TLS
- Authentication Protocol", RFC 5216, March 2008.
- [RFC5247] Aboba, B., Simon, D., and P. Eronen, "Extensible
- Authentication Protocol (EAP) Key Management
- Framework", RFC 5247, August 2008.
- [RFC5281] Funk, P. and S. Blake-Wilson, "Extensible
- Authentication Protocol Tunneled Transport Layer
- Security Authenticated Protocol Version 0 (EAP-
- TTLSv0)", RFC 5281, August 2008.
- [RFC5433] Clancy, T. and H. Tschofenig, "Extensible
- Authentication Protocol - Generalized Pre-Shared Key
- (EAP-GPSK) Method", RFC 5433, February 2009.
- [RFC5448] Arkko, J., Lehtovirta, V., and P. Eronen, "Improved
- Extensible Authentication Protocol Method for 3rd
- Generation Authentication and Key Agreement (EAP-
- AKA')", RFC 5448, May 2009.
- [RFC5931] Harkins, D. and G. Zorn, "Extensible Authentication
- Protocol (EAP) Authentication Using Only A Password",
- RFC 5931, August 2010.
- Eronen, et al. Standards Track [Page 14]
- RFC 5998 Extension for EAP in IKEv2 September 2010
- Appendix A. Alternative Approaches
- In this section, we list alternatives that have been considered
- during the work on this document. We concluded that the solution
- presented in Section 3 seems to fit better into IKEv2.
- A.1. Ignore AUTH Payload at the Initiator
- With this approach, the initiator simply ignores the AUTH payload in
- message 4 (but obviously must check the second AUTH payload later!).
- The main advantage of this approach is that no protocol modifications
- are required and no signature verification is required. A
- significant disadvantage is that the EAP method to be used cannot be
- selected to take this behavior into account.
- The initiator could signal to the responder (using a notification
- payload) that it did not verify the first AUTH payload.
- A.2. Unauthenticated Public Keys in AUTH Payload (Message 4)
- Another solution approach suggests the use of unauthenticated public
- keys in the public key signature AUTH payload (for message 4).
- That is, the initiator verifies the signature in the AUTH payload,
- but does not verify that the public key indeed belongs to the
- intended party (using certificates) -- since it doesn't have a PKI
- that would allow this. This could be used with X.509 certificates
- (the initiator ignores all other fields of the certificate except the
- public key), or "Raw RSA Key" CERT payloads.
- This approach has the advantage that initiators that wish to perform
- certificate-based responder authentication (in addition to EAP) may
- do so, without requiring the responder to handle these cases
- separately. A disadvantage here, again, is that the EAP method
- selection cannot take into account the incomplete validation of the
- responder's certificate.
- If using RSA, the overhead of signature verification is quite small,
- compared to the g^xy calculation required by the Diffie-Hellman
- exchange.
- A.3. Using EAP Derived Session Keys for IKEv2
- It has been proposed that when using an EAP method that provides
- mutual authentication and key agreement, the IKEv2 Diffie-Hellman
- exchange could also be omitted. This would mean that the session
- keys for IPsec SAs established later would rely only on EAP-provided
- keys.
- Eronen, et al. Standards Track [Page 15]
- RFC 5998 Extension for EAP in IKEv2 September 2010
- It seems the only benefit of this approach is saving some computation
- time (g^xy calculation). This approach requires designing a
- completely new protocol (which would not resemble IKEv2 anymore); we
- do not believe that it should be considered. Nevertheless, we
- include it for completeness.
- Authors' Addresses
- Pasi Eronen
- Independent
- EMail: pe@iki.fi
- Hannes Tschofenig
- Nokia Siemens Networks
- Linnoitustie 6
- Espoo 02600
- Finland
- Phone: +358 (50) 4871445
- EMail: Hannes.Tschofenig@gmx.net
- URI: http://www.tschofenig.priv.at
- Yaron Sheffer
- Independent
- EMail: yaronf.ietf@gmail.com
- Eronen, et al. Standards Track [Page 16]
|