Protocol for Carrying Authentication for Network Access (PANA

Protocol for Carrying Authentication for Network Access (PANA
Protocol for Carrying Authentication
for Network Access (PANA)
Requirements
Michael Schneider
Protocol for Carrying Authentication for Network Access (PANA)
Requirements
Table of Contents
! "
# $ %
! &% %" ' ($ " ! $)
% & #
$)
% #
$ % )
#
#*+)! 5
# 5
#%) 5
##,,-
G
#&G
#. ( #/ 0% 0
!) 0
1
%" 2
#
List of Figures
,
- " !) * ,
* " !) - .
# ,
- * /
" !) - * /
List of Tables
0
% Foreword
$ ! 3 )" " ! %
)
! &%
%" 4 3 ) &%
%" ) ! ! ! +) )
% ! $ !
! ! ! 56 !
! ! ! "
"! 7 )3 ! ! &% %"8 %
3 !
)
%
% )
! 6 ! " " " ! )3 +) !
$ +) !6 -$ ,! 9
! 0%
! & :; *+)9 ) !) 7 # ! "3 ) ! +) ! ! & "
3 & ! &% %" ) " ! "%
Chapter 1. Introduction to PANA
1.1. Nowadays situation
! % %
! %% &
3 & ! %
) 6 ! & ! 3 !) & $ % )3 56 ! ---5 &3 "!
& "
%3 ! ",," & 0)" ! "
&,
3 !%3 ,
& !% & * % 3 !!,
& !% $ % + & ! <
= &
'
& &
>
?$$, )
*+ (
! ",," &
56
(
! 5,!)
&
1.2. Motivation for a new protocol
&% + , )
! %%
") &3 ) % @ $ "
3 " ) !) "
! &,
! 1 ! !
))3 & "
! @ &,
3 , ""
) % !
13 ""
,
) :% , %; &,
&,
3 % 6% &,
8 "
!
! )% "
! ,
&,
"
! ) "
! % &,
3 !
!
&,
!% ) 6" +) @ ! & " & 3 ! "
+ & " ! ") &
1.3. The goal and solutions of PANA working group
&% %"8 %
! ! " " ! "
$ "
6% "
) +) ! & $ &% %" &
! "
) ! "
! % "
)
& % & 3 % &8 & 3 @ % :; ! &% "
% &,
"! )) "" )
,
",," &3 ) ) ! 3 ) " )% 1% &,
"
3 " & ! & "
%3 % "
)
& 3 " $ " ! ! 3 " "
& ! & 1.4. What is NOT in the scope of PANA
! ! ! ") ! 3 %
&% %" &% !3 ) " ! &% %" ! " "
% %% "
3
& @ )) -6% ) 3 -6
:-;3 ! & & ) 3 - ) 6 !
!
+) !
1 6 " ! $ "
3 3
!, ! "
"
& ! ! ! 6% "
))
Chapter 2. Terminology and how PANA works
2.1. Terminology and short cuts
$ ! +) ! ! 3 " ! % )
3 ) 6"
)" + $ ! )"3 03 03 =3 -3 & A
0 , B
" ! & @ $ 0
% & ! ! !
A
0 , !B
$ ! 0 ! 0 ! & A
= , = !B
" 3 & "
& =" ! & ! %3 = 3 ! 6)"
3 3
&,
" )
A
, %B
$ ! " 0 % 3 ! 0 ! = $ " 0 &
A
- , -!) "B
& ","& !
% ! &
!! ! )"
) % !) ! =3 " :0; !
2.2. The PANA usage model
! ! )" ! 3 & % !
! % #
$)
% &
& )& "
! )
3 3 % & $ $ )
:0; ) ! ! ! ) ! = % $ 0 " & C& 6% *=D )3 " )) ! )&% !
%
"
3 )) "3 6% % !, ,! "
& ! ) 6)"
3 '&% %" ! " ! % % "
! 3 ! ! ) ! "3 ! !! % )
! !! & % "
"
) ! )"
A
,
- " !) *
$ " "
%3 -!) :-;3 3 % :; % $ 03
% !! 3 )) $ 4 !
%
"
% !) 0 3 "
! &% 3 %% % & 0 % " % )% & :0; ! ! ! : ; "
! " ! ) ! )3 ! ! !
!" #
$)
% &
A
,
* " !) -
$ 3 !% 3 !,"
% 1 " !) -3 )
0 ?3 ) 3
& 3 !) 0 13 ! ! )" ! !
3 ") ! 3 % 03 "% -3 % & 3 0
3 ! )3
! "
" ") ! -
# !" A
,
- *
$ !% -3 3 " % 3 %
$ )% 0
) ! C& 3 .
$)
% &
$ #
A
" !) - *
-3 * $ " 3 3 ) % )
!3 0 6% )% ! !
! 0 3 ") 3 " "
3 "% -3
)
3 4 ! % !" #
/
$)
% &
E
Chapter 3. Requirements of PANA
! 6 ! "% % )
3 " ! ) +) ! 6" !)
3.1. Authentication
! 0 % 3 " 3 &3 ) !! & ) % 3 ! =3 & 3 &,
"
) ! C& = ! ! % &3 0 ! ! 0 % $ !3 = 03 ) %@ "% 3 ! 6)"
)) )
% "
6%3 ! $ 4 ! ) ! ! "
3 ) ! "
! "
& -6
:-; - %
! % 3 3 +) - )" 3
) ! % " F 3 4 ! 3 ! &,
&,
3 ) " "
3 % - $ )) "
3 !
&3 & !3 ) " !) % ' 3 :0; ) , *, " 0 ( ! 0 )% !!3 ! "
" & $ = ) 6% 0 ))@ & !
),,,)
&
! !
! 3 ) @ ! % & "& $3 !)% @ ! 03 ) )" ! ?% " ! 0 !) &
4 ! 3 ! 6" !) 3.2. IP address assignment
:0; + !% ! %
3 ! $ )"
6 ! %
3 )"
%% 0 &
& & "
3 "
) " ! 3 )" /3 ))% 0
5
*+) ! 3.3. PAA-to-EP Protocol
" 3 %3 -!) :-;
% 3 " ) !
" - ! ! 3 )& "
@ ! "& & $!3 &% %" "! 6% "
@ !) ) " -3 "
!
% "
% & ! 0 13 "
)
" )
3 % ! )) -3 ) $ "
)
% - ! ,,- ))B " )
)) )"3 -3 !! ) % @ 03 !
% 3 )) ! - ! 0
3.4. Network
% & 3 +) ! % ! 3
! 0 & ! 0
3 ! +) % ) ! &
! ! 03 ) ) ! ) " !
! ) & )
, &
! ",," &
)3 ! " ))3 0 ! &3 ! !) ":;3 0 % $ 0 !)% 3 3 ! 0 )%3
!) " ! 0 %
% + $ ,!, &3 % )% ) 3 !) & $ 3 0 & % $ % !
"
,!, & 4 )" ) +) +
% )"
! +) ! 0 ) $ ) " !) 3 ) $ " !! ) "
0 ! !% ! 3 ! 8 & 3 & )
3 )) 0 & ! & & ""% "!% $ " G
*+) ! ) 6% 3
""
% - !
!% ) ! )
3 &
! ! -3 ) ! )
3.5. Interaction with Other Protocols
)" +) ! ,6 6 "
&
/ $ )
)%) "
) !
3 & " "
3 /
3.6. Congestion Control and Performance
&" 0 & !) % % ) )3
% ! 4 % " ! " &3 !! )) %
) ! ! !! $ ),),," "
) @3 !% :0; ) ) ! % + 3 !! "!) @ "% ) % 0
Chapter 4. Conclusion
)3 ! %% & $!3 "
3 !! & 3 !%3 % "
@ ! , + , 3 " ))3 & ! & Bibliography
IETF internet drafts
HI J (3 *
3 2% $3 0
!! '% 0"% © #
$ " - J% HI C 1
&3 &3 3 7 K
3 K
0
% CC03 1 3
!3 7 0
3 0"% © $ ?
C &@ Internet Documents
H#I J * =%) ) !"#$%& '
0)"
* =)
HI -$ ( ) * H.I &3 F %3 K
)3 & * 0 0"% © #
0)% '&" +,,,** %*
H/I " - J% 0"% © =0 D C - HEI J -
%@
,., % , -$ .5 "
H5I J -
%@
, / * % , -$ .E K
HGI J (3 *
3 2% $3 0
!! '%3 " - J% * % -$.#
Glossary
A
3 @ %
$ !+
) & -6)"
! 3 ))3 "%3
*
@
& ! %3 6
! %" ! )" - *3
) :
; % / % "&3 ) %@ 2"" 2L :@1 =, *; @))! &
- !% )) *3 )
)" &% % "
3 *
) ! !% 8
- :0; !) $ * "& % !
! : ) ; &
- - ) ! % * " ! - & ! "" * ! *0 5/ $ " ! !% 3 ) " )3 !) @ 3 " ! % %
) 4 )
) 3 % % ! $ " ! %% % &
#
2
)" ) ," " $ ! % 3 ) $ % @3 8 D
= !
" 3 & "
& E
-!) - ""%
& ","&
!
% ! & !! ! )"
)
- ""% % ! I
-%% $& -%% $& 3 ) %@ ! $ -$ % "
)) ! & %3 "3
3 ! ) " ! " ---5
$ --- 5 CM 0)) :C0; )) --- " &
)"
& $ )
! - !)
3 $& *%3
'
C3 1%% K
1% C '&% 2" " ! ! 2
/
! :; !
! "
3 !) ! : ! ; =,)
?8 6)"
< E #, 3 )% 3G3G/E3G/ + 3 ) ! & $ ) " )
"
/3 % !
"
)3 6" "
/ / ! / "
" 3 3 "" " : N G; 3 / "" "
# N #5 / ! "
3 6" : !
; !) ! ! 6" ! #3 [email protected] ) : 0-$ !!3
#; " 7"3 03 F ) ) )
) ) %
%3 "
& !) ! 4
"% /3 )"
"% /
% .
M
$ ) %
)% %" ! " )"
6)"
! )
% % ,)
)% )
% $
!% !% )
%3 + ) "
&
% " "" )
% $0M & $ 3 3 4 )
%"
P
! 0% ! & .
2
%
0
0
!
$ ! " 0 %
& " ! & @
$ ! 0 ! 0 ! & ,, 3 ) ! % )" ) C "
" &% ! '&% &
! ( )
3 )"8 $0M
"& " ) R
*=D
* :*) =
D ; 3 @ % , "
:& ; @ * * " "
$ "
D=
" "
S
"!%
+ % @ )"3
)% )" % )% )% !) $ %% "!%3 & ) ! ! + ! ! )! "& "" "& )% !) /
Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF

advertisement