rfc9048v6.txt | rfc9048.txt | |||
---|---|---|---|---|
Internet Engineering Task Force (IETF) J. Arkko | Internet Engineering Task Force (IETF) J. Arkko | |||
Request for Comments: 9048 V. Lehtovirta | Request for Comments: 9048 V. Lehtovirta | |||
Updates: 4187, 5448 V. Torvinen | Updates: 4187, 5448 V. Torvinen | |||
Category: Informational Ericsson | Category: Informational Ericsson | |||
ISSN: 2070-1721 P. Eronen | ISSN: 2070-1721 P. Eronen | |||
Independent | Independent | |||
July 2021 | October 2021 | |||
Improved Extensible Authentication Protocol Method for 3GPP Mobile | Improved Extensible Authentication Protocol Method for 3GPP Mobile | |||
Network Authentication and Key Agreement (EAP-AKA') | Network Authentication and Key Agreement (EAP-AKA') | |||
Abstract | Abstract | |||
The 3GPP mobile network Authentication and Key Agreement (AKA) is an | The 3GPP mobile network Authentication and Key Agreement (AKA) is an | |||
authentication mechanism for devices wishing to access mobile | authentication mechanism for devices wishing to access mobile | |||
networks. RFC 4187 (EAP-AKA) made the use of this mechanism possible | networks. RFC 4187 (EAP-AKA) made the use of this mechanism possible | |||
within the Extensible Authentication Protocol (EAP) framework. RFC | within the Extensible Authentication Protocol (EAP) framework. RFC | |||
skipping to change at line 229 ¶ | skipping to change at line 229 ¶ | |||
Section 8 describes the IANA considerations, and Appendix A and | Section 8 describes the IANA considerations, and Appendix A and | |||
Appendix B explain the updates to RFC 5448 (EAP-AKA') and RFC 4187 | Appendix B explain the updates to RFC 5448 (EAP-AKA') and RFC 4187 | |||
(EAP-AKA) that have been made in this specification. Appendix C | (EAP-AKA) that have been made in this specification. Appendix C | |||
explains some of the design rationale for creating EAP-AKA'. | explains some of the design rationale for creating EAP-AKA'. | |||
Finally, Appendix D provides test vectors. | Finally, Appendix D provides test vectors. | |||
2. Requirements Language | 2. Requirements Language | |||
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | |||
"OPTIONAL" in this document are to be interpreted as described in BCP | "OPTIONAL" in this document are to be interpreted as described in | |||
14 [RFC2119] [RFC8174] when, and only when, they appear in all | BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all | |||
capitals, as shown here. | capitals, as shown here. | |||
3. EAP-AKA' | 3. EAP-AKA' | |||
EAP-AKA' is an EAP method that follows the EAP-AKA specification | EAP-AKA' is an EAP method that follows the EAP-AKA specification | |||
[RFC4187] in all respects except the following: | [RFC4187] in all respects except the following: | |||
* It uses the Type code 0x32, not 0x17 (which is used by EAP-AKA). | * It uses the Type code 0x32, not 0x17 (which is used by EAP-AKA). | |||
* It carries the AT_KDF_INPUT attribute, as defined in Section 3.1, | * It carries the AT_KDF_INPUT attribute, as defined in Section 3.1, | |||
skipping to change at line 1589 ¶ | skipping to change at line 1589 ¶ | |||
| 1 | EAP-AKA' with CK'/IK' | RFC 9048 | | | 1 | EAP-AKA' with CK'/IK' | RFC 9048 | | |||
+-------+-----------------------+-----------+ | +-------+-----------------------+-----------+ | |||
Table 3: EAP-AKA' AT_KDF Key Derivation | Table 3: EAP-AKA' AT_KDF Key Derivation | |||
Function Values | Function Values | |||
9. References | 9. References | |||
9.1. Normative References | 9.1. Normative References | |||
[FIPS.180-4] | ||||
National Institute of Standards and Technology, "Secure | ||||
Hash Standard", FIPS PUB 180-4, | ||||
DOI 10.6028/NIST.FIPS.180-4, August 2015, | ||||
<https://nvlpubs.nist.gov/nistpubs/FIPS/ | ||||
NIST.FIPS.180-4.pdf>. | ||||
[RFC2104] Krawczyk, H., Bellare, M., and R. Canetti, "HMAC: Keyed- | ||||
Hashing for Message Authentication", RFC 2104, | ||||
DOI 10.17487/RFC2104, February 1997, | ||||
<https://www.rfc-editor.org/info/rfc2104>. | ||||
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | ||||
Requirement Levels", BCP 14, RFC 2119, | ||||
DOI 10.17487/RFC2119, March 1997, | ||||
<https://www.rfc-editor.org/info/rfc2119>. | ||||
[RFC3748] Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., and H. | ||||
Levkowetz, Ed., "Extensible Authentication Protocol | ||||
(EAP)", RFC 3748, DOI 10.17487/RFC3748, June 2004, | ||||
<https://www.rfc-editor.org/info/rfc3748>. | ||||
[RFC4187] Arkko, J. and H. Haverinen, "Extensible Authentication | ||||
Protocol Method for 3rd Generation Authentication and Key | ||||
Agreement (EAP-AKA)", RFC 4187, DOI 10.17487/RFC4187, | ||||
January 2006, <https://www.rfc-editor.org/info/rfc4187>. | ||||
[RFC7542] DeKok, A., "The Network Access Identifier", RFC 7542, | ||||
DOI 10.17487/RFC7542, May 2015, | ||||
<https://www.rfc-editor.org/info/rfc7542>. | ||||
[RFC8126] Cotton, M., Leiba, B., and T. Narten, "Guidelines for | ||||
Writing an IANA Considerations Section in RFCs", BCP 26, | ||||
RFC 8126, DOI 10.17487/RFC8126, June 2017, | ||||
<https://www.rfc-editor.org/info/rfc8126>. | ||||
[RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC | ||||
2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, | ||||
May 2017, <https://www.rfc-editor.org/info/rfc8174>. | ||||
[TS-3GPP.23.003] | [TS-3GPP.23.003] | |||
3GPP, "3rd Generation Partnership Project; Technical | 3GPP, "3rd Generation Partnership Project; Technical | |||
Specification Group Core Network and Terminals; Numbering, | Specification Group Core Network and Terminals; Numbering, | |||
addressing and identification (Release 16)", Version | addressing and identification (Release 16)", Version | |||
16.7.0, 3GPP Technical Specification 23.003, June 2021. | 16.7.0, 3GPP Technical Specification 23.003, June 2021. | |||
[TS-3GPP.23.501] | [TS-3GPP.23.501] | |||
3GPP, "3rd Generation Partnership Project; Technical | 3GPP, "3rd Generation Partnership Project; Technical | |||
Specification Group Services and System Aspects; System | Specification Group Services and System Aspects; System | |||
architecture for the 5G System (5GS); (Release 16)", | architecture for the 5G System (5GS); (Release 16)", | |||
skipping to change at line 1634 ¶ | skipping to change at line 1674 ¶ | |||
aspects of non-3GPP accesses (Release 16)", Version | aspects of non-3GPP accesses (Release 16)", Version | |||
16.0.0, 3GPP Technical Specification 33.402, July 2020. | 16.0.0, 3GPP Technical Specification 33.402, July 2020. | |||
[TS-3GPP.33.501] | [TS-3GPP.33.501] | |||
3GPP, "3rd Generation Partnership Project; Technical | 3GPP, "3rd Generation Partnership Project; Technical | |||
Specification Group Services and System Aspects; 3G | Specification Group Services and System Aspects; 3G | |||
Security; Security architecture and procedures for 5G | Security; Security architecture and procedures for 5G | |||
System (Release 16)", Version 16.7.1, 3GPP Technical | System (Release 16)", Version 16.7.1, 3GPP Technical | |||
Specification 33.501, July 2021. | Specification 33.501, July 2021. | |||
[FIPS.180-4] | 9.2. Informative References | |||
National Institute of Standards and Technology, "Secure | ||||
Hash Standard", FIPS PUB 180-4, | ||||
DOI 10.6028/NIST.FIPS.180-4, August 2015, | ||||
<https://nvlpubs.nist.gov/nistpubs/FIPS/ | ||||
NIST.FIPS.180-4.pdf>. | ||||
[RFC2104] Krawczyk, H., Bellare, M., and R. Canetti, "HMAC: Keyed- | ||||
Hashing for Message Authentication", RFC 2104, | ||||
DOI 10.17487/RFC2104, February 1997, | ||||
<https://www.rfc-editor.org/info/rfc2104>. | ||||
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | ||||
Requirement Levels", BCP 14, RFC 2119, | ||||
DOI 10.17487/RFC2119, March 1997, | ||||
<https://www.rfc-editor.org/info/rfc2119>. | ||||
[RFC3748] Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., and H. | ||||
Levkowetz, Ed., "Extensible Authentication Protocol | ||||
(EAP)", RFC 3748, DOI 10.17487/RFC3748, June 2004, | ||||
<https://www.rfc-editor.org/info/rfc3748>. | ||||
[RFC4187] Arkko, J. and H. Haverinen, "Extensible Authentication | ||||
Protocol Method for 3rd Generation Authentication and Key | ||||
Agreement (EAP-AKA)", RFC 4187, DOI 10.17487/RFC4187, | ||||
January 2006, <https://www.rfc-editor.org/info/rfc4187>. | ||||
[RFC7542] DeKok, A., "The Network Access Identifier", RFC 7542, | [Arapinis2012] | |||
DOI 10.17487/RFC7542, May 2015, | Arapinis, M., Mancini, L., Ritter, E., Ryan, M., Golde, | |||
<https://www.rfc-editor.org/info/rfc7542>. | N., Redon, R., and R. Borgaonkar, "New Privacy Issues in | |||
Mobile Telephony: Fix and Verification", in CCS '12: | ||||
Proceedings of the 2012 ACM Conference on Computer and | ||||
Communications Security, Raleigh, North Carolina, USA, | ||||
DOI 10.1145/2382196.2382221, October 2012, | ||||
<https://doi.org/10.1145/2382196.2382221>. | ||||
[RFC8126] Cotton, M., Leiba, B., and T. Narten, "Guidelines for | [Basin2018] | |||
Writing an IANA Considerations Section in RFCs", BCP 26, | Basin, D., Dreier, J., Hirschi, L., Radomirović, S., | |||
RFC 8126, DOI 10.17487/RFC8126, June 2017, | Sasse, R., and V. Stettler, "A Formal Analysis of 5G | |||
<https://www.rfc-editor.org/info/rfc8126>. | Authentication", arXiv:1806.10360, | |||
DOI 10.1145/3243734.3243846, August 2018, | ||||
<https://doi.org/10.1145/3243734.3243846>. | ||||
[RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC | [Borgaonkar2018] | |||
2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, | Borgaonkar, R., Hirschi, L., Park, S., and A. Shaik, "New | |||
May 2017, <https://www.rfc-editor.org/info/rfc8174>. | Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols", | |||
in IACR Cryptology ePrint Archive, 2018. | ||||
9.2. Informative References | [BT2013] Beekman, J. G. and C. Thompson, "Breaking Cell Phone | |||
Authentication: Vulnerabilities in AKA, IMS and Android", | ||||
in 7th USENIX Workshop on Offensive Technologies, WOOT | ||||
'13, August 2013. | ||||
[TS-3GPP.35.208] | [EMU-AKA-PFS] | |||
3GPP, "3rd Generation Partnership Project; Technical | Arkko, J., Norrman, K., and V. Torvinen, "Perfect-Forward | |||
Specification Group Services and System Aspects; 3G | Secrecy for the Extensible Authentication Protocol Method | |||
Security; Specification of the MILENAGE Algorithm Set: An | for Authentication and Key Agreement (EAP-AKA' PFS)", Work | |||
example algorithm set for the 3GPP authentication and key | in Progress, Internet-Draft, draft-ietf-emu-aka-pfs-05, 30 | |||
generation functions f1, f1*, f2, f3, f4, f5 and f5*; | October 2020, <https://datatracker.ietf.org/doc/html/ | |||
Document 4: Design Conformance Test Data (Release 14)", | draft-ietf-emu-aka-pfs-05>. | |||
Version 16.0.0, 3GPP Technical Specification 35.208, July | ||||
2020. | ||||
[FIPS.180-1] | [FIPS.180-1] | |||
National Institute of Standards and Technology, "Secure | National Institute of Standards and Technology, "Secure | |||
Hash Standard", FIPS PUB 180-1, | Hash Standard", FIPS PUB 180-1, | |||
DOI 10.6028/NIST.FIPS.180-1, April 1995, | DOI 10.6028/NIST.FIPS.180-1, April 1995, | |||
<https://csrc.nist.gov/publications/detail/fips/180/1/ | <https://csrc.nist.gov/publications/detail/fips/180/1/ | |||
archive/1995-04-17>. | archive/1995-04-17>. | |||
[FIPS.180-2] | [FIPS.180-2] | |||
National Institute of Standards and Technology, "Secure | National Institute of Standards and Technology, "Secure | |||
Hash Standard", FIPS PUB 180-2, August 2002, | Hash Standard", FIPS PUB 180-2, August 2002, | |||
<https://csrc.nist.gov/publications/detail/fips/180/2/ | <https://csrc.nist.gov/publications/detail/fips/180/2/ | |||
archive/2002-08-01>. | archive/2002-08-01>. | |||
[Heist2015] | ||||
Scahill, J. and J. Begley, "How Spies Stole the Keys to | ||||
the Encryption Castle", February 2015, | ||||
<https://firstlook.org/theintercept/2015/02/19/great-sim- | ||||
heist/>. | ||||
[Hussain2019] | ||||
Hussain, S., Echeverria, M., Chowdhury, O., Li, N., and E. | ||||
Bertino, "Privacy Attacks to the 4G and 5G Cellular Paging | ||||
Protocols Using Side Channel Information", in the | ||||
proceedings of NDSS '19, held 24-27 February, 2019, San | ||||
Diego, California, 2019. | ||||
[Kune2012] Kune, D., Koelndorfer, J., Hopper, N., and Y. Kim, | ||||
"Location Leaks on the GSM Air Interface", in the | ||||
proceedings of NDSS '12, held 5-8 February, 2012, San | ||||
Diego, California, 2012. | ||||
[MT2012] Mjølsnes, S. F. and J-K. Tsay, "A Vulnerability in the | ||||
UMTS and LTE Authentication and Key Agreement Protocols", | ||||
in Computer Network Security, Proceedings of the 6th | ||||
International Conference on Mathematical Methods, Models | ||||
and Architectures for Computer Network Security, Lecture | ||||
Notes in Computer Science, Vol. 7531, pp. 65-76, | ||||
DOI 10.1007/978-3-642-33704-8_6, October 2012, | ||||
<https://doi.org/10.1007/978-3-642-33704-8_6>. | ||||
[RFC3310] Niemi, A., Arkko, J., and V. Torvinen, "Hypertext Transfer | [RFC3310] Niemi, A., Arkko, J., and V. Torvinen, "Hypertext Transfer | |||
Protocol (HTTP) Digest Authentication Using Authentication | Protocol (HTTP) Digest Authentication Using Authentication | |||
and Key Agreement (AKA)", RFC 3310, DOI 10.17487/RFC3310, | and Key Agreement (AKA)", RFC 3310, DOI 10.17487/RFC3310, | |||
September 2002, <https://www.rfc-editor.org/info/rfc3310>. | September 2002, <https://www.rfc-editor.org/info/rfc3310>. | |||
[RFC4086] Eastlake 3rd, D., Schiller, J., and S. Crocker, | [RFC4086] Eastlake 3rd, D., Schiller, J., and S. Crocker, | |||
"Randomness Requirements for Security", BCP 106, RFC 4086, | "Randomness Requirements for Security", BCP 106, RFC 4086, | |||
DOI 10.17487/RFC4086, June 2005, | DOI 10.17487/RFC4086, June 2005, | |||
<https://www.rfc-editor.org/info/rfc4086>. | <https://www.rfc-editor.org/info/rfc4086>. | |||
skipping to change at line 1777 ¶ | skipping to change at line 1828 ¶ | |||
[RFC7258] Farrell, S. and H. Tschofenig, "Pervasive Monitoring Is an | [RFC7258] Farrell, S. and H. Tschofenig, "Pervasive Monitoring Is an | |||
Attack", BCP 188, RFC 7258, DOI 10.17487/RFC7258, May | Attack", BCP 188, RFC 7258, DOI 10.17487/RFC7258, May | |||
2014, <https://www.rfc-editor.org/info/rfc7258>. | 2014, <https://www.rfc-editor.org/info/rfc7258>. | |||
[RFC7296] Kaufman, C., Hoffman, P., Nir, Y., Eronen, P., and T. | [RFC7296] Kaufman, C., Hoffman, P., Nir, Y., Eronen, P., and T. | |||
Kivinen, "Internet Key Exchange Protocol Version 2 | Kivinen, "Internet Key Exchange Protocol Version 2 | |||
(IKEv2)", STD 79, RFC 7296, DOI 10.17487/RFC7296, October | (IKEv2)", STD 79, RFC 7296, DOI 10.17487/RFC7296, October | |||
2014, <https://www.rfc-editor.org/info/rfc7296>. | 2014, <https://www.rfc-editor.org/info/rfc7296>. | |||
[EMU-AKA-PFS] | ||||
Arkko, J., Norrman, K., and V. Torvinen, "Perfect-Forward | ||||
Secrecy for the Extensible Authentication Protocol Method | ||||
for Authentication and Key Agreement (EAP-AKA' PFS)", Work | ||||
in Progress, Internet-Draft, draft-ietf-emu-aka-pfs-05, 30 | ||||
October 2020, <https://datatracker.ietf.org/doc/html/ | ||||
draft-ietf-emu-aka-pfs-05>. | ||||
[Heist2015] | ||||
Scahill, J. and J. Begley, "How Spies Stole the Keys to | ||||
the Encryption Castle", February 2015, | ||||
<https://firstlook.org/theintercept/2015/02/19/great-sim- | ||||
heist/>. | ||||
[MT2012] Mjølsnes, S. F. and J-K. Tsay, "A Vulnerability in the | ||||
UMTS and LTE Authentication and Key Agreement Protocols", | ||||
in Computer Network Security, Proceedings of the 6th | ||||
International Conference on Mathematical Methods, Models | ||||
and Architectures for Computer Network Security, Lecture | ||||
Notes in Computer Science, Vol. 7531, pp. 65-76, | ||||
DOI 10.1007/978-3-642-33704-8_6, October 2012, | ||||
<https://doi.org/10.1007/978-3-642-33704-8_6>. | ||||
[BT2013] Beekman, J. G. and C. Thompson, "Breaking Cell Phone | ||||
Authentication: Vulnerabilities in AKA, IMS and Android", | ||||
in 7th USENIX Workshop on Offensive Technologies, WOOT | ||||
'13, August 2013. | ||||
[ZF2005] Zhang, M. and Y. Fang, "Security analysis and enhancements | ||||
of 3GPP authentication and key agreement protocol", IEEE | ||||
Transactions on Wireless Communications, Vol. 4, No. 2, | ||||
DOI 10.1109/TWC.2004.842941, March 2005, | ||||
<https://doi.org/10.1109/TWC.2004.842941>. | ||||
[Basin2018] | ||||
Basin, D., Dreier, J., Hirschi, L., Radomirović, S., | ||||
Sasse, R., and V. Stettler, "A Formal Analysis of 5G | ||||
Authentication", arXiv:1806.10360, | ||||
DOI 10.1145/3243734.3243846, August 2018, | ||||
<https://doi.org/10.1145/3243734.3243846>. | ||||
[Arapinis2012] | ||||
Arapinis, M., Mancini, L., Ritter, E., Ryan, M., Golde, | ||||
N., Redon, R., and R. Borgaonkar, "New Privacy Issues in | ||||
Mobile Telephony: Fix and Verification", in CCS '12: | ||||
Proceedings of the 2012 ACM Conference on Computer and | ||||
Communications Security, Raleigh, North Carolina, USA, | ||||
DOI 10.1145/2382196.2382221, October 2012, | ||||
<https://doi.org/10.1145/2382196.2382221>. | ||||
[Borgaonkar2018] | ||||
Borgaonkar, R., Hirschi, L., Park, S., and A. Shaik, "New | ||||
Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols", | ||||
in IACR Cryptology ePrint Archive, 2018. | ||||
[Kune2012] Kune, D., Koelndorfer, J., Hopper, N., and Y. Kim, | ||||
"Location Leaks on the GSM Air Interface", in the | ||||
proceedings of NDSS '12, held 5-8 February, 2012, San | ||||
Diego, California, 2012. | ||||
[Shaik2016] | [Shaik2016] | |||
Shaik, A., Seifert, J., Borgaonkar, R., Asokan, N., and V. | Shaik, A., Seifert, J., Borgaonkar, R., Asokan, N., and V. | |||
Niemi, "Practical attacks against Privacy and Availability | Niemi, "Practical attacks against Privacy and Availability | |||
in 4G/LTE Mobile Communication Systems", in the | in 4G/LTE Mobile Communication Systems", in the | |||
proceedings of NDSS '16 held 21-24 February, 2016, San | proceedings of NDSS '16 held 21-24 February, 2016, San | |||
Diego, California, 2012. | Diego, California, 2012. | |||
[Hussain2019] | [TS-3GPP.35.208] | |||
Hussain, S., Echeverria, M., Chowdhury, O., Li, N., and E. | 3GPP, "3rd Generation Partnership Project; Technical | |||
Bertino, "Privacy Attacks to the 4G and 5G Cellular Paging | Specification Group Services and System Aspects; 3G | |||
Protocols Using Side Channel Information", in the | Security; Specification of the MILENAGE Algorithm Set: An | |||
proceedings of NDSS '19, held 24-27 February, 2019, San | example algorithm set for the 3GPP authentication and key | |||
Diego, California, 2019. | generation functions f1, f1*, f2, f3, f4, f5 and f5*; | |||
Document 4: Design Conformance Test Data (Release 14)", | ||||
Version 16.0.0, 3GPP Technical Specification 35.208, July | ||||
2020. | ||||
[ZF2005] Zhang, M. and Y. Fang, "Security analysis and enhancements | ||||
of 3GPP authentication and key agreement protocol", IEEE | ||||
Transactions on Wireless Communications, Vol. 4, No. 2, | ||||
DOI 10.1109/TWC.2004.842941, March 2005, | ||||
<https://doi.org/10.1109/TWC.2004.842941>. | ||||
Appendix A. Changes from RFC 5448 | Appendix A. Changes from RFC 5448 | |||
The change from RFC 5448 was to refer to a newer version of | The change from RFC 5448 was to refer to a newer version of | |||
[TS-3GPP.24.302]. This RFC includes an updated definition of the | [TS-3GPP.24.302]. This RFC includes an updated definition of the | |||
Network Name field to include 5G. | Network Name field to include 5G. | |||
Identifier usage for 5G has been specified in Section 5.3. Also, the | Identifier usage for 5G has been specified in Section 5.3. Also, the | |||
requirements for generating pseudonym usernames and fast re- | requirements for generating pseudonym usernames and fast re- | |||
authentication identities have been updated from the original | authentication identities have been updated from the original | |||
End of changes. 12 change blocks. | ||||
115 lines changed or deleted | 115 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ |