Authentication Extenstions for DHCP - IETF

6
Authentication Extensions for the Dynamic Host Configuration Protocol draft-pruss-dhcp-auth-dsl-00.txt Ric Pruss ([email protected])

Transcript of Authentication Extenstions for DHCP - IETF

Page 1: Authentication Extenstions for DHCP - IETF

Authentication Extensions forthe Dynamic Host Configuration

Protocoldraft-pruss-dhcp-auth-dsl-00.txt

Ric Pruss ([email protected])

Page 2: Authentication Extenstions for DHCP - IETF

Problem spaceIncremental PPP to IP migration in DSL

Gradual migration from ATM toEthernet, and from PPPoE andPPPoA to “IP Sessions”.

In order to simplify migration,protocol changes arenecessary only where the PPPendpoints reside (NAS andHGW)

Gradual

Migration

Page 3: Authentication Extenstions for DHCP - IETF

“DHCP Proxy” to AAA*

Host configurationprovided bycentralized AAAsystems

RADIUS subscriberattributes aremapped to DHCPOptions

Driven by the need toprotect massiveinvestments incustom AAA systemsand back-endinfrastructure

* This function is availablefrom a number of NASvendors today

NASAccessNodeHGW

DHCP Discover

DHCP Offer(w/yiaddr)

DHCP Request

DHCP ACK

AAA

RADIUS Access Request

RADIUS Access Accept

Adds subscriber line info In DHCP Option 82

Uses Option 82to authorizesubscriber line

Relying on option 82 marking may not be sufficient insome cases:

• Migration existing Username/Password systems• End user controlled retail ISP selection (@domain)• Subscriber nomadicity• Line information at the Access Node may not

always be reliable

RADIUS Accounting Start

Page 4: Authentication Extenstions for DHCP - IETF

Authentication Extensions for DHCP(Option 1 - No new DHCP Messages)

• Same architecture as“DHCP Proxy toAAA” but withcredentials from theHGW rather than onlythe Access Node

• Uses existing DHCPmessage set

• Defined only forCHAP authentication(for greatestcompatibility withPPP-based AAA)

AAANASAccessNodeHGW

DHCP Discover(with AUTH OPTION)

DHCP Offer(w/ CHAP Challenge, Name)

RADIUS Access-Request(w/ CHAP Name, ID,

Challenge, Response)

RADIUS Access-Accept(w/ Profile, IP-Addr)

DHCP Offer(w/ yiaddr)

DHCP Request

DHCP ACK

Normal DHCP operation from here on Client Configincluded in DHCP Offer(could be proxy from an external DHCP-Server

DHCP Discover(w/ CHAP Name, Response, ID)

Client computeschallenge-responsewith user’s password

NAS passeschallenge & responseto AAA (no password

stored on NAS)

Page 5: Authentication Extenstions for DHCP - IETF

Authentication Extensions for DHCP(Option 2* - EAP in new DHCPAUTH Message)

DHCP Discover (EAP Capability Option)

DHCP Auth (EAP Request / ID)

DHCP Auth (EAP Response / ID)

Client, waits for aDHCP AUTHmessage carryingEAP payload

Radius Access Request (EAP Response / ID)

Radius Access Accept (EAP Request )

DHCP Offer

DHCP Request

DHCP AckRadius Accounting Start

DHCPAUTH Auth (EAP Request)

DHCPAUTH Auth (EAP Response )Radius Access Request (EAP Response )

Radius Access Accept (EAP Success )DHCPAUTH (EAP Success )

AAAAccessNodeHGW NAS

Normal DHCP operation from here on Possibly theEAP Success is better sent

In an DHCP Offer to improvereliability

Precise EAP exchange dependent on EAP method,

DHCPAUTH message is simply a wrapper

“EAP passthrough” shown Here. Could be terminated at NAS for

“PPP CHAP” interface to AAA

* Details are still verymuch a work inprogress, but this isthe main idea

Page 6: Authentication Extenstions for DHCP - IETF

Questions