rfc5998.txt 33 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899
  1. Internet Engineering Task Force (IETF) P. Eronen
  2. Request for Comments: 5998 Independent
  3. Updates: 5996 H. Tschofenig
  4. Category: Standards Track Nokia Siemens Networks
  5. ISSN: 2070-1721 Y. Sheffer
  6. Independent
  7. September 2010
  8. An Extension for EAP-Only Authentication in IKEv2
  9. Abstract
  10. IKEv2 specifies that Extensible Authentication Protocol (EAP)
  11. authentication must be used together with responder authentication
  12. based on public key signatures. This is necessary with old EAP
  13. methods that provide only unilateral authentication using, e.g., one-
  14. time passwords or token cards.
  15. This document specifies how EAP methods that provide mutual
  16. authentication and key agreement can be used to provide extensible
  17. responder authentication for IKEv2 based on methods other than public
  18. key signatures.
  19. Status of This Memo
  20. This is an Internet Standards Track document.
  21. This document is a product of the Internet Engineering Task Force
  22. (IETF). It represents the consensus of the IETF community. It has
  23. received public review and has been approved for publication by the
  24. Internet Engineering Steering Group (IESG). Further information on
  25. Internet Standards is available in Section 2 of RFC 5741.
  26. Information about the current status of this document, any errata,
  27. and how to provide feedback on it may be obtained at
  28. http://www.rfc-editor.org/info/rfc5998.
  29. Eronen, et al. Standards Track [Page 1]
  30. RFC 5998 Extension for EAP in IKEv2 September 2010
  31. Copyright Notice
  32. Copyright (c) 2010 IETF Trust and the persons identified as the
  33. document authors. All rights reserved.
  34. This document is subject to BCP 78 and the IETF Trust's Legal
  35. Provisions Relating to IETF Documents
  36. (http://trustee.ietf.org/license-info) in effect on the date of
  37. publication of this document. Please review these documents
  38. carefully, as they describe your rights and restrictions with respect
  39. to this document. Code Components extracted from this document must
  40. include Simplified BSD License text as described in Section 4.e of
  41. the Trust Legal Provisions and are provided without warranty as
  42. described in the Simplified BSD License.
  43. This document may contain material from IETF Documents or IETF
  44. Contributions published or made publicly available before November
  45. 10, 2008. The person(s) controlling the copyright in some of this
  46. material may not have granted the IETF Trust the right to allow
  47. modifications of such material outside the IETF Standards Process.
  48. Without obtaining an adequate license from the person(s) controlling
  49. the copyright in such materials, this document may not be modified
  50. outside the IETF Standards Process, and derivative works of it may
  51. not be created outside the IETF Standards Process, except to format
  52. it for publication as an RFC or to translate it into languages other
  53. than English.
  54. 1. Introduction
  55. The Extensible Authentication Protocol (EAP), defined in [RFC3748],
  56. is an authentication framework that supports multiple authentication
  57. mechanisms. Today, EAP has been implemented at end hosts and routers
  58. that connect via switched circuits or dial-up lines using PPP
  59. [RFC1661], IEEE 802 wired switches [IEEE8021X], and IEEE 802.11
  60. wireless access points [IEEE80211i].
  61. One of the advantages of the EAP architecture is its flexibility.
  62. EAP is used to select a specific authentication mechanism, typically
  63. after the authenticator requests more information in order to
  64. determine the specific authentication method to be used. Rather than
  65. requiring the authenticator (e.g., wireless LAN access point) to be
  66. updated to support each new authentication method, EAP permits the
  67. use of a backend authentication server that may implement some or all
  68. authentication methods.
  69. Eronen, et al. Standards Track [Page 2]
  70. RFC 5998 Extension for EAP in IKEv2 September 2010
  71. IKEv2 ([RFC4306] and [RFC5996]) is a component of IPsec used for
  72. performing mutual authentication and establishing and maintaining
  73. Security Associations (SAs) for IPsec ESP and Authentication Header
  74. (AH). In addition to supporting authentication using public key
  75. signatures and shared secrets, IKEv2 also supports EAP
  76. authentication.
  77. IKEv2 provides EAP authentication since it was recognized that public
  78. key signatures and shared secrets are not flexible enough to meet the
  79. requirements of many deployment scenarios. By using EAP, IKEv2 can
  80. leverage existing authentication infrastructure and credential
  81. databases, since EAP allows users to choose a method suitable for
  82. existing credentials, and also makes separation of the IKEv2
  83. responder (VPN gateway) from the EAP authentication endpoint (backend
  84. Authentication, Authorization, and Accounting (AAA) server) easier.
  85. Some older EAP methods are designed for unilateral authentication
  86. only (that is, EAP peer to EAP server). These methods are used in
  87. conjunction with IKEv2 public-key-based authentication of the
  88. responder to the initiator. It is expected that this approach is
  89. especially useful for "road warrior" VPN gateways that use, for
  90. instance, one-time passwords or token cards to authenticate the
  91. clients.
  92. However, most newer EAP methods, such as those typically used with
  93. IEEE 802.11i wireless LANs, provide mutual authentication and key
  94. agreement. Currently, IKEv2 specifies that these EAP methods must
  95. also be used together with responder authentication based on public
  96. key signatures.
  97. In order for the public key signature authentication of the gateway
  98. to be effective, a deployment of Public Key Infrastructure (PKI) is
  99. required, which has to include management of trust anchors on all
  100. supplicants. In many environments, this is not realistic, and the
  101. security of the gateway public key is the same as the security of a
  102. self-signed certificate. Mutually authenticating EAP methods alone
  103. can provide a sufficient level of security in many circumstances, and
  104. in fact, in some deployments, IEEE 802.11i uses EAP without any PKI
  105. for authenticating the Wireless Local Area Network (WLAN) access
  106. points.
  107. This document specifies how EAP methods that offer mutual
  108. authentication and key agreement can be used to provide responder
  109. authentication in IKEv2 completely based on EAP.
  110. Eronen, et al. Standards Track [Page 3]
  111. RFC 5998 Extension for EAP in IKEv2 September 2010
  112. 1.1. Terminology
  113. All notation in this protocol extension is taken from [RFC4306].
  114. Numbered messages refer to the IKEv2 message sequence when using EAP.
  115. Thus:
  116. o Message 1 is the request message of IKE_SA_INIT.
  117. o Message 2 is the response message of IKE_SA_INIT.
  118. o Message 3 is the first request of IKE_AUTH.
  119. o Message 4 is the first response of IKE_AUTH.
  120. The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
  121. "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
  122. document are to be interpreted as described in [RFC2119].
  123. 2. Scenarios
  124. In this section, we describe two scenarios for extensible
  125. authentication within IKEv2. These scenarios are intended to be
  126. illustrative examples rather than specifying how things should be
  127. done.
  128. Figure 1 shows a configuration where the EAP and the IKEv2 endpoints
  129. are co-located. Authenticating the IKEv2 responder using both EAP
  130. and public key signatures is redundant. Offering EAP-based
  131. authentication has the advantage that multiple different
  132. authentication and key exchange protocols are available with EAP with
  133. different security properties (such as strong password-based
  134. protocols, protocols offering user identity confidentiality, and many
  135. more).
  136. +------+-----+ +------------+
  137. O | IKEv2 | | IKEv2 |
  138. /|\ | Initiator |<---////////////////////--->| Responder |
  139. / \ +------------+ IKEv2 +------------+
  140. User | EAP Peer | Exchange | EAP Server |
  141. +------------+ +------------+
  142. Figure 1: EAP and IKEv2 Endpoints Are Co-Located
  143. Figure 2 shows a typical corporate network access scenario. The
  144. initiator (client) interacts with the responder (VPN gateway) in the
  145. corporate network. The EAP exchange within IKE runs between the
  146. Eronen, et al. Standards Track [Page 4]
  147. RFC 5998 Extension for EAP in IKEv2 September 2010
  148. client and the home AAA server. As a result of a successful EAP
  149. authentication protocol run, session keys are established and sent
  150. from the AAA server to the VPN gateway, and then used to authenticate
  151. the IKEv2 SA with AUTH payloads.
  152. The protocol used between the VPN gateway and AAA server could be,
  153. for instance, Diameter [RFC4072] or RADIUS [RFC3579]. See Section 6
  154. for related security considerations.
  155. +-------------------------------+
  156. | Corporate network |
  157. | |
  158. +-----------+ +--------+ |
  159. | IKEv2 | AAA | Home | |
  160. IKEv2 +////----->+ Responder +<---------->+ AAA | |
  161. Exchange / | (VPN GW) | (RADIUS/ | Server | |
  162. / +-----------+ Diameter) +--------+ |
  163. / | carrying EAP |
  164. | | |
  165. | +-------------------------------+
  166. v
  167. +------+-----+
  168. o | IKEv2 |
  169. /|\ | Initiator |
  170. / \ | VPN client |
  171. User +------------+
  172. Figure 2: Corporate Network Access
  173. 3. Solution
  174. IKEv2 specifies that when the EAP method establishes a shared secret
  175. key, that key is used by both the initiator and responder to generate
  176. an AUTH payload (thus authenticating the IKEv2 SA set up by messages
  177. 1 and 2).
  178. When used together with public key responder authentication, the
  179. responder is, in effect, authenticated using two different methods:
  180. the public key signature AUTH payload in message 4, and the EAP-based
  181. AUTH payload later.
  182. If the initiator does not wish to use public-key-based responder
  183. authentication, it includes an EAP_ONLY_AUTHENTICATION notification
  184. payload (16417) in message 3. The Protocol ID and Security Parameter
  185. Index (SPI) size fields are set to zero, and there is no additional
  186. data associated with this notification.
  187. Eronen, et al. Standards Track [Page 5]
  188. RFC 5998 Extension for EAP in IKEv2 September 2010
  189. If the responder supports this notification and chooses to use it, it
  190. omits the public-key-based AUTH payload and CERT payloads from
  191. message 4.
  192. If the responder does not support the EAP_ONLY_AUTHENTICATION
  193. notification or does not wish to use it, it ignores the notification
  194. payload, and includes the AUTH payload in message 4. In this case,
  195. the initiator MUST verify that payload and any associated
  196. certificates, as per [RFC4306].
  197. When receiving message 4, the initiator MUST verify that the proposed
  198. EAP method is allowed by this specification, and MUST abort the
  199. protocol immediately otherwise.
  200. Both the initiator and responder MUST verify that the EAP method
  201. actually used provided mutual authentication and established a shared
  202. secret key. The AUTH payloads sent after EAP Success MUST use the
  203. EAP-generated key, and MUST NOT use SK_pi or SK_pr (see Section 2.15
  204. of [RFC5996]).
  205. Eronen, et al. Standards Track [Page 6]
  206. RFC 5998 Extension for EAP in IKEv2 September 2010
  207. An IKEv2 message exchange with this modification is shown below:
  208. Initiator Responder
  209. ----------- -----------
  210. HDR, SAi1, KEi, Ni,
  211. [N(NAT_DETECTION_SOURCE_IP),
  212. N(NAT_DETECTION_DESTINATION_IP)] -->
  213. <-- HDR, SAr1, KEr, Nr, [CERTREQ],
  214. [N(NAT_DETECTION_SOURCE_IP),
  215. N(NAT_DETECTION_DESTINATION_IP)]
  216. HDR, SK { IDi, [IDr], SAi2, TSi, TSr,
  217. N(EAP_ONLY_AUTHENTICATION),
  218. [CP(CFG_REQUEST)] } -->
  219. <-- HDR, SK { IDr, EAP(Request) }
  220. HDR, SK { EAP(Response) } -->
  221. <-- HDR, SK { EAP(Request) }
  222. HDR, SK { EAP(Response) } -->
  223. <-- HDR, SK { EAP(Success) }
  224. HDR, SK { AUTH } -->
  225. <-- HDR, SK { AUTH, SAr2, TSi, TSr,
  226. [CP(CFG_REPLY] }
  227. Note: all notation in the above protocol sequence and elsewhere in
  228. this specification is as defined in [RFC4306], and see in particular
  229. Sec. 1.2 of [RFC4306] for payload types.
  230. The NAT detection and Configuration payloads are shown for
  231. informative purposes only; they do not change how EAP authentication
  232. works.
  233. An IKE SA that was set up with this extension can be resumed using
  234. the mechanism described in [RFC5723]. However, session resumption
  235. does not change the authentication method. Therefore, during the
  236. IKE_AUTH exchange of the resumed session, this extension MUST NOT be
  237. sent by the initiator.
  238. Eronen, et al. Standards Track [Page 7]
  239. RFC 5998 Extension for EAP in IKEv2 September 2010
  240. 4. Safe EAP Methods
  241. EAP methods to be used with this extension MUST have the following
  242. properties:
  243. 1. The method provides mutual authentication of the peers.
  244. 2. The method is key-generating.
  245. 3. The method is resistant to dictionary attacks.
  246. The authors believe that the following EAP methods are secure when
  247. used with the current extension. The list is not inclusive, and
  248. there are likely other safe methods that have not been listed here.
  249. +-------------------------------+-------------------+---------------+
  250. | Method Name | Allows Channel | Reference |
  251. | | Binding? | |
  252. +-------------------------------+-------------------+---------------+
  253. | EAP-SIM | No | [RFC4186] |
  254. | EAP-AKA | Yes | [RFC4187] |
  255. | EAP-AKA' | Yes | [RFC5448] |
  256. | EAP-GPSK | Yes | [RFC5433] |
  257. | EAP-pwd | No | [RFC5931] |
  258. | EAP-EKE | Yes | [EMU-EAP-EKE] |
  259. | EAP-PAX | Yes | [RFC4746] |
  260. | EAP-SAKE | No | [RFC4763] |
  261. | EAP-SRP | No | [EAP-SRP] |
  262. | EAP-POTP (mutual | Yes | [RFC4793] |
  263. | authentication variant) | | |
  264. | EAP-TLS | No | [RFC5216] |
  265. | EAP-FAST | No | [RFC4851] |
  266. | EAP-TTLS | No | [RFC5281] |
  267. +-------------------------------+-------------------+---------------+
  268. The "Allows channel binding?" column denotes protocols where
  269. protected identity information may be sent between the EAP endpoints.
  270. This third, optional property of the method provides protection
  271. against certain types of attacks (see Section 6.2 for an
  272. explanation), and therefore in some scenarios, methods that allow for
  273. channel binding are to be preferred. It is noted that at the time of
  274. writing, even when such capabilities are provided, they are not fully
  275. specified in an interoperable manner. In particular, no RFC
  276. specifies what identities should be sent under the protection of the
  277. channel binding mechanism, or what policy is to be used to correlate
  278. identities at the different layers.
  279. Eronen, et al. Standards Track [Page 8]
  280. RFC 5998 Extension for EAP in IKEv2 September 2010
  281. 5. IANA Considerations
  282. This document defines a new IKEv2 Notification Payload type,
  283. EAP_ONLY_AUTHENTICATION, described in Section 3. This payload has
  284. been assigned the type number 16417 from the "Status Types" range.
  285. 6. Security Considerations
  286. Security considerations applicable to all EAP methods are discussed
  287. in [RFC3748]. The EAP Key Management Framework [RFC5247] deals with
  288. issues that arise when EAP is used as a part of a larger system.
  289. 6.1. Authentication of IKEv2 SA
  290. It is important to note that the IKEv2 SA is not authenticated by
  291. just running an EAP conversation: the crucial step is the AUTH
  292. payload based on the EAP-generated key. Thus, EAP methods that do
  293. not provide mutual authentication or establish a shared secret key
  294. MUST NOT be used with the modifications presented in this document.
  295. 6.2. Authentication with Separated IKEv2 Responder / EAP Server
  296. As described in Section 2, the EAP conversation can terminate either
  297. at the IKEv2 responder or at a backend AAA server.
  298. If the EAP method is terminated at the IKEv2 responder, then no key
  299. transport via the AAA infrastructure is required. Pre-shared secret
  300. and public-key-based authentication offered by IKEv2 is then replaced
  301. by a wider range of authentication and key exchange methods.
  302. However, typically EAP will be used with a backend AAA server. See
  303. [RFC5247] for a more complete discussion of the related security
  304. issues; here we provide only a short summary.
  305. When a backend server is used, there are actually two authentication
  306. exchanges: the EAP method between the client and the AAA server, and
  307. another authentication between the AAA server and IKEv2 gateway. The
  308. AAA server authenticates the client using the selected EAP method,
  309. and they establish a session key. The AAA server then sends this key
  310. to the IKEv2 gateway over a connection authenticated using, e.g.,
  311. IPsec or Transport Layer Security (TLS).
  312. Some EAP methods do not have any concept of pass-through
  313. authenticator (e.g., Network Access Server (NAS) or IKEv2 gateway)
  314. identity, and these two authentications remain quite independent of
  315. each other. That is, after the client has verified the AUTH payload
  316. sent by the IKEv2 gateway, it knows that it is talking to SOME
  317. gateway trusted by the home AAA server, but not which one. The
  318. Eronen, et al. Standards Track [Page 9]
  319. RFC 5998 Extension for EAP in IKEv2 September 2010
  320. situation is somewhat similar if a single cryptographic hardware
  321. accelerator, containing a single private key, would be shared between
  322. multiple IKEv2 gateways (perhaps in some kind of cluster
  323. configuration). In particular, if one of the gateways is
  324. compromised, it can impersonate any of the other gateways towards the
  325. user (until the compromise is discovered and access rights revoked).
  326. In some environments it is not desirable to trust the IKEv2 gateways
  327. this much (also known as the "Lying NAS Problem"). EAP methods that
  328. provide what is called "connection binding" or "channel binding"
  329. transport some identity or identities of the gateway (or WLAN access
  330. point / NAS) inside the EAP method. Then the AAA server can check
  331. that it is indeed sending the key to the gateway expected by the
  332. client. A potential solution is described in [EAP-SERVICE], see also
  333. [EMU-AAAPAY].
  334. In some deployment configurations, AAA proxies may be present between
  335. the IKEv2 gateway and the backend AAA server. These AAA proxies MUST
  336. be trusted for secure operation, and therefore SHOULD be avoided when
  337. possible; see Section 2.3.4 of [RFC4072] and Section 4.3.7 of
  338. [RFC3579] for more discussion.
  339. 6.3. Protection of EAP Payloads
  340. Although the EAP payloads are encrypted and integrity protected with
  341. SK_e/SK_a, this does not provide any protection against active
  342. attackers. Until the AUTH payload has been received and verified, a
  343. man-in-the-middle can change the KEi/KEr payloads and eavesdrop or
  344. modify the EAP payloads.
  345. In IEEE 802.11i wireless LANs, the EAP payloads are neither encrypted
  346. nor integrity protected (by the link layer), so EAP methods are
  347. typically designed to take that into account.
  348. In particular, EAP methods that are vulnerable to dictionary attacks
  349. when used in WLANs are still vulnerable (to active attackers) when
  350. run inside IKEv2.
  351. The rules in Section 4 are designed to avoid this potential
  352. vulnerability.
  353. Eronen, et al. Standards Track [Page 10]
  354. RFC 5998 Extension for EAP in IKEv2 September 2010
  355. 6.4. Identities and Authenticated Identities
  356. When using this protocol, each of the peers sends two identity
  357. values:
  358. 1. An identity contained in the IKE ID payload.
  359. 2. An identity transferred within the specific EAP method's
  360. messages.
  361. (IKEv2 omits the EAP Identity request/response pair, see Section 3.16
  362. of [RFC5996].) The first identity value can be used by the recipient
  363. to route AAA messages and/or to select authentication and EAP types.
  364. But it is only the second identity that is directly authenticated by
  365. the EAP method. The reader is referred to Section 2.16 of [RFC5996]
  366. regarding the need to base IPsec policy decisions on the
  367. authenticated identity. In the context of the extension described
  368. here, this guidance on IPsec policy applies both to the
  369. authentication of the client by the gateway and vice versa.
  370. 6.5. User Identity Confidentiality
  371. IKEv2 provides confidentiality for the initiator identity against
  372. passive eavesdroppers, but not against active attackers. The
  373. initiator announces its identity first (in message 3), before the
  374. responder has been authenticated. The usage of EAP in IKEv2 does not
  375. change this situation, since the ID payload in message 3 is used
  376. instead of the EAP Identity Request/Response exchange. This is
  377. somewhat unfortunate since when EAP is used with public key
  378. authentication of the responder, it would be possible to provide
  379. active user identity confidentiality for the initiator.
  380. IKEv2 protects the responder's identity even against active attacks.
  381. This property cannot be provided when using EAP. If public key
  382. responder authentication is used in addition to EAP, the responder
  383. reveals its identity before authenticating the initiator. If only
  384. EAP is used (as proposed in this document), the situation depends on
  385. the EAP method used (in some EAP methods, the server reveals its
  386. identity first).
  387. Hence, if active user identity confidentiality for the responder is
  388. required then EAP methods that offer this functionality have to be
  389. used (see [RFC3748], Section 7.3).
  390. Eronen, et al. Standards Track [Page 11]
  391. RFC 5998 Extension for EAP in IKEv2 September 2010
  392. 7. Acknowledgments
  393. This document borrows some text from [RFC3748], [RFC4306], and
  394. [RFC4072]. We would also like to thank Hugo Krawczyk for interesting
  395. discussions about this topic, Dan Harkins, and David Harrington for
  396. their comments.
  397. 8. References
  398. 8.1. Normative References
  399. [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
  400. Requirement Levels", BCP 14, RFC 2119, March 1997.
  401. [RFC3748] Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., and
  402. H. Levkowetz, "Extensible Authentication Protocol
  403. (EAP)", RFC 3748, June 2004.
  404. [RFC4306] Kaufman, C., "Internet Key Exchange (IKEv2) Protocol",
  405. RFC 4306, December 2005.
  406. [RFC5723] Sheffer, Y. and H. Tschofenig, "Internet Key Exchange
  407. Protocol Version 2 (IKEv2) Session Resumption",
  408. RFC 5723, January 2010.
  409. [RFC5996] Kaufman, C., Hoffman, P., Nir, Y., and P. Eronen,
  410. "Internet Key Exchange Protocol Version 2 (IKEv2)",
  411. RFC 5996, September 2010.
  412. 8.2. Informative References
  413. [EAP-SERVICE] Arkko, J. and P. Eronen, "Authenticated Service
  414. Information for the Extensible Authentication Protocol
  415. (EAP)", Work in Progress, October 2005.
  416. [EAP-SRP] Carlson, J., Aboba, B., and H. Haverinen, "EAP SRP-
  417. SHA1 Authentication Protocol", Work in Progress,
  418. July 2001.
  419. [EMU-AAAPAY] Clancy, C., Lior, A., Zorn, G., and K. Hoeper, "EAP
  420. Method Support for Transporting AAA Payloads", Work
  421. in Progress, May 2010.
  422. [EMU-EAP-EKE] Sheffer, Y., Zorn, G., Tschofenig, H., and S. Fluhrer,
  423. "An EAP Authentication Method Based on the EKE
  424. Protocol", Work in Progress, August 2010.
  425. Eronen, et al. Standards Track [Page 12]
  426. RFC 5998 Extension for EAP in IKEv2 September 2010
  427. [IEEE80211i] Institute of Electrical and Electronics Engineers,
  428. "IEEE Standard for Information technology -
  429. Telecommunications and information exchange between
  430. systems - Local and metropolitan area networks -
  431. Specific requirements - Part 11: Wireless Medium
  432. Access Control (MAC) and Physical Layer (PHY)
  433. specifications: Amendment 6: Medium Access Control
  434. (MAC) Security Enhancements", IEEE Standard 802.11i-
  435. 2004, July 2004.
  436. [IEEE8021X] Institute of Electrical and Electronics Engineers,
  437. "Local and Metropolitan Area Networks: Port-Based
  438. Network Access Control", IEEE Standard 802.1X-2001,
  439. 2001.
  440. [RFC1661] Simpson, W., "The Point-to-Point Protocol (PPP)",
  441. STD 51, RFC 1661, July 1994.
  442. [RFC3579] Aboba, B. and P. Calhoun, "RADIUS (Remote
  443. Authentication Dial In User Service) Support For
  444. Extensible Authentication Protocol (EAP)", RFC 3579,
  445. September 2003.
  446. [RFC4072] Eronen, P., Hiller, T., and G. Zorn, "Diameter
  447. Extensible Authentication Protocol (EAP) Application",
  448. RFC 4072, August 2005.
  449. [RFC4186] Haverinen, H. and J. Salowey, "Extensible
  450. Authentication Protocol Method for Global System for
  451. Mobile Communications (GSM) Subscriber Identity
  452. Modules (EAP-SIM)", RFC 4186, January 2006.
  453. [RFC4187] Arkko, J. and H. Haverinen, "Extensible Authentication
  454. Protocol Method for 3rd Generation Authentication and
  455. Key Agreement (EAP-AKA)", RFC 4187, January 2006.
  456. [RFC4746] Clancy, T. and W. Arbaugh, "Extensible Authentication
  457. Protocol (EAP) Password Authenticated Exchange",
  458. RFC 4746, November 2006.
  459. [RFC4763] Vanderveen, M. and H. Soliman, "Extensible
  460. Authentication Protocol Method for Shared-secret
  461. Authentication and Key Establishment (EAP-SAKE)",
  462. RFC 4763, November 2006.
  463. [RFC4793] Nystroem, M., "The EAP Protected One-Time Password
  464. Protocol (EAP-POTP)", RFC 4793, February 2007.
  465. Eronen, et al. Standards Track [Page 13]
  466. RFC 5998 Extension for EAP in IKEv2 September 2010
  467. [RFC4851] Cam-Winget, N., McGrew, D., Salowey, J., and H. Zhou,
  468. "The Flexible Authentication via Secure Tunneling
  469. Extensible Authentication Protocol Method (EAP-FAST)",
  470. RFC 4851, May 2007.
  471. [RFC5216] Simon, D., Aboba, B., and R. Hurst, "The EAP-TLS
  472. Authentication Protocol", RFC 5216, March 2008.
  473. [RFC5247] Aboba, B., Simon, D., and P. Eronen, "Extensible
  474. Authentication Protocol (EAP) Key Management
  475. Framework", RFC 5247, August 2008.
  476. [RFC5281] Funk, P. and S. Blake-Wilson, "Extensible
  477. Authentication Protocol Tunneled Transport Layer
  478. Security Authenticated Protocol Version 0 (EAP-
  479. TTLSv0)", RFC 5281, August 2008.
  480. [RFC5433] Clancy, T. and H. Tschofenig, "Extensible
  481. Authentication Protocol - Generalized Pre-Shared Key
  482. (EAP-GPSK) Method", RFC 5433, February 2009.
  483. [RFC5448] Arkko, J., Lehtovirta, V., and P. Eronen, "Improved
  484. Extensible Authentication Protocol Method for 3rd
  485. Generation Authentication and Key Agreement (EAP-
  486. AKA')", RFC 5448, May 2009.
  487. [RFC5931] Harkins, D. and G. Zorn, "Extensible Authentication
  488. Protocol (EAP) Authentication Using Only A Password",
  489. RFC 5931, August 2010.
  490. Eronen, et al. Standards Track [Page 14]
  491. RFC 5998 Extension for EAP in IKEv2 September 2010
  492. Appendix A. Alternative Approaches
  493. In this section, we list alternatives that have been considered
  494. during the work on this document. We concluded that the solution
  495. presented in Section 3 seems to fit better into IKEv2.
  496. A.1. Ignore AUTH Payload at the Initiator
  497. With this approach, the initiator simply ignores the AUTH payload in
  498. message 4 (but obviously must check the second AUTH payload later!).
  499. The main advantage of this approach is that no protocol modifications
  500. are required and no signature verification is required. A
  501. significant disadvantage is that the EAP method to be used cannot be
  502. selected to take this behavior into account.
  503. The initiator could signal to the responder (using a notification
  504. payload) that it did not verify the first AUTH payload.
  505. A.2. Unauthenticated Public Keys in AUTH Payload (Message 4)
  506. Another solution approach suggests the use of unauthenticated public
  507. keys in the public key signature AUTH payload (for message 4).
  508. That is, the initiator verifies the signature in the AUTH payload,
  509. but does not verify that the public key indeed belongs to the
  510. intended party (using certificates) -- since it doesn't have a PKI
  511. that would allow this. This could be used with X.509 certificates
  512. (the initiator ignores all other fields of the certificate except the
  513. public key), or "Raw RSA Key" CERT payloads.
  514. This approach has the advantage that initiators that wish to perform
  515. certificate-based responder authentication (in addition to EAP) may
  516. do so, without requiring the responder to handle these cases
  517. separately. A disadvantage here, again, is that the EAP method
  518. selection cannot take into account the incomplete validation of the
  519. responder's certificate.
  520. If using RSA, the overhead of signature verification is quite small,
  521. compared to the g^xy calculation required by the Diffie-Hellman
  522. exchange.
  523. A.3. Using EAP Derived Session Keys for IKEv2
  524. It has been proposed that when using an EAP method that provides
  525. mutual authentication and key agreement, the IKEv2 Diffie-Hellman
  526. exchange could also be omitted. This would mean that the session
  527. keys for IPsec SAs established later would rely only on EAP-provided
  528. keys.
  529. Eronen, et al. Standards Track [Page 15]
  530. RFC 5998 Extension for EAP in IKEv2 September 2010
  531. It seems the only benefit of this approach is saving some computation
  532. time (g^xy calculation). This approach requires designing a
  533. completely new protocol (which would not resemble IKEv2 anymore); we
  534. do not believe that it should be considered. Nevertheless, we
  535. include it for completeness.
  536. Authors' Addresses
  537. Pasi Eronen
  538. Independent
  539. EMail: pe@iki.fi
  540. Hannes Tschofenig
  541. Nokia Siemens Networks
  542. Linnoitustie 6
  543. Espoo 02600
  544. Finland
  545. Phone: +358 (50) 4871445
  546. EMail: Hannes.Tschofenig@gmx.net
  547. URI: http://www.tschofenig.priv.at
  548. Yaron Sheffer
  549. Independent
  550. EMail: yaronf.ietf@gmail.com
  551. Eronen, et al. Standards Track [Page 16]