X.P0028 TSG-X (PSN/PDS) China: CCSA

advertisement
X.P0028
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
3GPP2
China: CCSA
xx-xxxx-xxx
(to be published as xxxxxx)
Contact: Rajesh Bhalla - ZTE
+1-858-554-0387 rabhalla@ztesandiego.com
Japan: TTC
xx-xxxx-xxx
TSG-X (PSN/PDS)
(to be published as xxxxxx)
Contact: Toru Owai - NEC Corporation
X.P0028
+81-3-3798-8551
t-owai@ah.jp.nec.com
Korea: TTA
xx-xxxx-xxx
(to be published as 3GPP2 X.S0028)
(to be published as xxxxxx)
Chair: Serge Manning
Sprint PCS
Address + phone number (TBD)
smanni05@sprintspectrum.com
Chair: Jin Sung Choi – LG Electronics
+82-31-450-2062
jinsungc@lge.com
North America: TIA TR-45.6
PN-3-0174
(to be published as TIA-1050)
Chair: Parviz Yagani – Cisco
Phone nb? pyegani@cisco.com
3GPP2 system to Wireless Local Area Network Interworking
i
3GPP2 TSG-X/TIA TR-45.6
X.P0028
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
3GPP2
Revision History
REVISION HISTORY
Version Content changes.
0.1
Accepted skeleton document
X31-20031208-007
Added Architecture:
X31-20031208-010R2
Incorporated RADIUS attribute table from:
X31-20040112-013
0.2
Incorporated:
X31-20040419-021-Nortel-USC-Sprint-WLAN_auth_EAP_TLS_sharedkeys.pdf
i
Date
March 15, 2004
June 7, 2004
3GPP2 TSG-X/TIA TR-45.6
X.P0028
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
3GPP2
Table of Contents
Revision History .............................................................................................................................................................i
Table of Contents.......................................................................................................................................................... ii
List of Figures.............................................................................................................................................................. iii
List of Tables ................................................................................................................................................................iv
1
Introduction .......................................................................................................................................5
1.1
Scope ...................................................................................................................................5
References .........................................................................................................................................6
2.1
Normative References .........................................................................................................6
2.2
Informative References .......................................................................................................6
2.3
3GPP2 Specifications and SDO Standards .........................................................................6
Definitions, Symbols and Abbreviations ..........................................................................................7
3.1
Definitions...........................................................................................................................7
3.2
Symbols and Abbreviations ................................................................................................7
Interworking Architecture .................................................................................................................8
4.1
Reference Model .................................................................................................................8
4.2
Network Entities .................................................................................................................9
4.3
Interfaces .............................................................................................................................9
Service description .......................................................................................................................... 10
WLAN Interworking Access........................................................................................................... 11
6.1
6.1.1
6.1.2
Network Advertisement and Selection ..............................................................................11
Functional Element x Requirements ............................................................................................... 11
MS Requirements ............................................................................................................................ 11
6.2
6.2.1
6.2.2
Service Authorization ....................................................... Error! Bookmark not defined.
Functional Element x Requirements ............................................... Error! Bookmark not defined.
MS Requirements ............................................................................ Error! Bookmark not defined.
Authentication Methods .................................................................................................................. 12
7.1
7.1.1
7.1.2
EAP-TLS with Shared Key ...............................................................................................12
Assumptions .................................................................................................................................... 12
EAP-TLS with Shared key Message flow....................................................................................... 12
7.2
MS Requirements ..............................................................................................................15
IP Connectivity ............................................................................................................................... 15
8.1
Functional Element x Requirements .................................................................................15
8.2
MS Requirements ..............................................................................................................15
Session continuity ........................................................................................................................... 15
9.1
Functional Element x Requirements .................................................................................15
9.2
MS Requirements ..............................................................................................................15
Accounting ...................................................................................................................................... 16
RADIUS attributes .......................................................................................................................... 17
2
3
4
5
6
7
8
9
10
11
ii
3GPP2 TSG-X/TIA TR-45.6
X.P0028
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
3GPP2
List of Figures
iii
3GPP2 TSG-X/TIA TR-45.6
X.P0028
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
3GPP2
List of Tables
iv
3GPP2 TSG-X/TIA TR-45.6
X.P0028
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
1
3GPP2
Introduction
The purpose of this section is to introduce the readers to the contents of the whole document.
1.1
Scope
The scope statement defines the objectives to be accomplished by the document that is being
produced.
5
3GPP2 TSG-X/TIA TR-45.6
X.P0028
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
3GPP2
2
References
2.1
Normative References
This section provides references to other specifications and standards that are necessary to implement
this document
[EDITOR: add references to: 2865,2866, ,3580]
[TLS]
[EAP-TLS]
[EAP]
[EAP-RADIUS]
[SKEYTLS]
[TLSPSK]
2.2
"The TLS Protocol", RFC 2246.
“PPP EAP-TLS Authentication protocol”, RFC 2716
“Extensible Authentication Protocol (EAP)”, RFC 2284bis-09
RFC 3579, RADIUS support for EAP
Use of Shared Keys in the TLS Protocol, draft-ietf-tls-sharedkeys-02.
Pre-Shared Key Ciphersuites for TLS, draft-eronen-tls-psk-00.txt
Informative References
This section provides references to other documents that may be useful for the reader of this
document.
2.3
3GPP2 Specifications and SDO Standards
Number of
specifications
SDO Project Number
Document Title
3GPP2:
ARIB:
CWTS:
TIA:
TTA:
6
3GPP2 TSG-X/TIA TR-45.6
X.P0028
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
3
3GPP2
Definitions, Symbols and Abbreviations
This section contains definitions, symbols and abbreviations that are used throughout the document.
3.1
Definitions
[EDITOR INSERTED DEFINITIONS:]
EAP Server
[END OF EDITOR INSERTED DEFINITIONS]
3.2
Symbols and Abbreviations
[EDITOR INSERTED ITEMS]
AP
EAP
EAPoL
MS
NAI
PMK
PRF
RADIUS
TLS
WLAN
[END OF EDITOR INSERTED ITEMS]
EAP over LAN
Pseudo random function
7
3GPP2 TSG-X/TIA TR-45.6
X.P0028
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
4
3GPP2
Interworking Architecture
[EDITOR NOTE: THE FOLLOWING INTRO SECTION NEEDS TO BE CLEANED UP]
The Phase-1 3GPP2-WLAN Interworking architecture along with its network functional entities and interfaces
supports Scenarios 1 and 2 of the four (4) Scenarios described in the stage 1 document as follows:

Scenario 1: Common billing and customer care

Scenario 2: 3GPP2 System based Access Control and Charging and Access to the Internet via the
WLAN system


Scenario 3: Access to the 3GPP2 Packet Data Services via the WLAN system
Scenario 4: Session continuity
Phase-1 3GPP2-WLAN Interworking architecture and its associated functionality will be supported in the same
timeframe as the X.P0011-D release. The support for Scenarios 3 and 4 may be provided in a later release.
4.1
Reference Model
Figure 1 shows a high-level network architecture for the support of the 3GPP2-WLAN interworking for scenario 2.
The WLAN is connected to the 3GPP2 home network either directly or via one or more intermediate broker
network(s). In this architecture model, either a cdma2000 operator or a Wireless ISP may own the WLAN. The
Mobile Station (MS) gains access to the Internet via the WLAN after it is successfully authenticated by the 3GPP2
home system. The network (functional) entities and interfaces are described in the following sections.
Figure 1 3GPP2-WLAN Interworking Architecture for Scenario 2
8
3GPP2 TSG-X/TIA TR-45.6
X.P0028
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
4.2
3GPP2
Network Entities

H-AAA: AAA in a home 3GPP2 network - The home AAA server (H-AAA) is the AAA server managed
by the 3GPP2 home operator. The AAA server authenticates and authorizes the MS for access to the
3GPP2-WLAN interworking service.

B-AAA: AAA in a broker network - A broker AAA (B-AAA) resides in a broker network. The broker
network is an intermediate network between the WLAN and 3GPP2 home network. There may be zero,
one, or more broker networks between the WLAN and the 3GPP2 Home network.

W-AAA: The AAA in the WLAN, if available, interacts with the MS’s H-AAA server, possibly through
one or more broker networks, to authenticate and authorize the MS for WLAN access.

Database - The database is in the MS’s 3GPP2 home network where authentication and subscriber service
profile information is stored.

WLAN: The Wireless Local Area Network supports 802.11 types of accesses. It may support 802.1x and/or
802.11i. The topology of the WLAN is outside the scope of this specification.
4.3
Interfaces

Interface 1 between MS and WLAN - The interface between MS and WLAN specifies the physical and link
layers protocols. The 802.11 specifications should not be affected by the 3GPP2 specifications. 3GPP2WLAN interworking may designate IEEE standards as preferred interfaces, e.g. 802.1x and 802.11i for
security mechanisms.

Interface 2 between AAA in WLAN and H-AAA - This interface is used to authenticate the MS from the
3GPP2 home system and forward requests and responses between the W-AAA and the H-AAA. The
interface should follow IETF specifications. This interface may consist of the following two interfaces in
case a broker network(s) is present.
o
An interface between W-AAA and B-AAA - This interface is used to proxy requests/responses
between W-AAA and B-AAA.
o
An interface between B-AAA and H-AAA - This interface is used to proxy requests/responses
between B-AAA and H-AAA.
9
3GPP2 TSG-X/TIA TR-45.6
X.P0028
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
5
3GPP2
Service description
[ Editor’s Note: This section contains an overview of Scenario 2
Action: Serge]
10
3GPP2 TSG-X/TIA TR-45.6
X.P0028
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
3GPP2
6
WLAN Interworking Access
6.1
Network Advertisement and Selection
6.1.1
Functional Element x Requirements
6.1.2
MS Requirements
11
3GPP2 TSG-X/TIA TR-45.6
X.P0028
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
3GPP2
7
Authentication Methods
7.1
EAP-TLS with Shared Key
The EAP-TLS [EAP-TLS] specifies how the TLS tunnel [TLS] is established using EAP [EAP]. If client
authentication is required, EAP-TLS method requires a client certificate to be available in the WLAN client. This
requirement is considered to be a major disadvantage of TLS, since public key cryptography is considered complex.
As an alternative EAP-TLS with Shared Keys[SKEYTLS] uses pre-configured or pre-existing shared secret in order
to establish the TLS tunnel. While this method does not require the management of client-side certificates, for
operators that already has PKI available, EAP-TLS with Shared Key method shall not disallow the use of EAP-TLS
with server and client certificates.
7.1.1
Assumptions
EAP-TLS with Shared key assumes the following:
 That the shared secret (SS) is available and is stored in a secure memory of the MS or in the WLAN access
client.
 The WLAN access client has the capability to communicate with the cdma2000 MS, if the shared secret is
not configured in the WLAN access client. (e.g., for reusing MN-AAA key).
 Both EAP Server and the WLAN client must be configured to use same TLS cipher suites (i.e., there is no
negotiation of TLS cipher suites). This assumption is relaxed if EAP-TLS is used with [TLSPSK].
7.1.2
EAP-TLS with Shared key Message flow
EAP-TLS with Shared key method involves elimination of public key operations during the TLS handshake, while
providing equivalent level of security using shared symmetric keys. After the initial handshake phase, the TLS uses
the symmetric keying material (referred to as TLS master secret) derived from the information exchanged during the
initial handshake. The shared key TLS method involves explicitly deriving TLS master secret from the Shared
Secret (SS). Once the TLS master secret is derived, it utilizes the built-in session caching mechanism, in the TLS
protocol. Session caching allows a TLS session to be resumed without requiring full TLS handshake. In order to
resume the “phantom” TLS session, it needs to be seeded with session ID and TLS master secret, both at the EAP
server and at the EAP client termination points.
The following diagram shows the message flows:
12
3GPP2 TSG-X/TIA TR-45.6
X.P0028
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
3GPP2
MS
WLAN
client
(R)UIM
EAP Server
(AAA)
AP
Shared Secret (SS)
available
Shared Secret (SS)
available
a
b
WLAN Access Association
EAP-Request / Identity
c
EAP-Response / Identity(NAI)
EAP-Request/
EAP-Type=EAP-TLS (TLS Start)
Access-Request
EAP-Response/Identity (NAI)
Access-Challenge
EAP-Request/EAP-Type=EAP-TLS
(TLS Start)
Seed Session ID with NAI
Derive and Seed TLS master
secret from SS
Seed Session ID with NAI
Derive and Seed TLS master
secret from SS
EAP-Response/EAP-Type=EAP-TLS
(TLS Client Hello)
d
e
f
g
Access-Request
EAP-Response/EAP-Type=EAP-TLS
(TLS Client Hello)
h
EAP-Request/EAP-Type=EAP-TLS
(TLS Server Hello, TLS change cipher
spec, TLS finished)
EAP-Response/EAP-Type=EAP-TLS
(TLS change cipher spec, TLS finished)
Access-Challenge
EAP-Request/EAP-Type=EAP-TLS
(TLS Server Hello, TLS change cipher
spec, TLS finished)
i
Access Request
EAP-Response/EAP-Type=EAP-TLS
(TLS change cipher spec, TLS finished)
j
Derive keys for WLAN access (e.g.
PMK) from TLS master secret
Derive keys for WLAN access (e.g.
PMK) from TLS master secret
Access-Accept
EAP-Success +keys
EAP-Success
Figure 2 WLAN access authentication using EAP-TLS with shared keys
13
3GPP2 TSG-X/TIA TR-45.6
k
l
X.P0028
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
3GPP2
a) Both the WLAN client and the EAP Server have access to the shared secret used for the WLAN
access service authentication. This can be one of the existing cdma2000 credential, such as MNHAAA key or separate shared secret used only for WLAN access authentication
b) MS wishing to access WLAN access service establishes an 802.11association with the WLAN
AP.
c) The WLAN AP issues an EAP Identity Request to request the user’s identity using EAP over LAN
(EAPoL)
d) The WLAN client replies with the NAI as the user’s identity (e.g., username@realm.com). The
AP encapsulates the EAP Response with the identity in a Access-Request message (RADIUS
support for EAP is specified in [EAP-RADIUS]) and forwards it to the back-end authentication
server (EAP Server) responsible for the authenticating subscribers belonging to that realm
e) The EAP Server verifies that the NAI is valid for WLAN access service and determines that EAPTLS is to be used for authentication. Otherwise, Access-Reject will be sent.
f) The EAP Server sends the EAP Request with EAP-Type as EAP-TLS in an Access-Challenge
message. The AP forwards the EAP request to the WLAN client. This starts the TLS tunnel
establishment process.
g) Upon receiving the TLS Start indication, EAP peer shall behave as though it is resuming a preexisting TLS session as specified in [SKEYTLS]. This implies that the TLS record: “TLS client
hello”, must be initialized as follows:
 session ID (32 bytes) = NAI (right-truncate if more than 32 bytes or else zero-padded to
form 32 bytes)
 random = client generated random number (32 bytes)
 cipher spec = client supported cipher suite (Note: this must pre-configured).
Furthermore, the TLS master secret is also derived as specified in [SKEYTLS] using the TLS
pseudo random function (PRF): master_secret = PRF (shared_secret, “shared secret”, seed).
The “seed” can be any value (including an empty string “”) except that it should not contain
anything computed from the shared secret)
Similarly, the EAP server also initializes the TLS record: “TLS server hello” and derives the TLS
master secret. This initialization contains a server generated 32 byte random number.
Note 1: The shared_secret takes the place of TLS standard pre-master secret that is normally
derived from the public-keys. It is filled using Shared Secret (SS) as specified in [SKEYTLS] to
result in a 48 bytes standard TLS pre-master secret.
Note 2: Initialization of the TLS records can use, previously derived master secret, if it is available
and is allowed by the operator policy.
h) Once the session cache seeding process is complete, the TLS session resumption process is
started as specified in the [EAP-TLS]. The EAP peer sends the EAP-Response with “TLS Client
Hello” handshake message. Note that the session ID is initialized to the NAI, indicating that the
TLS session resumption process is to be used. The AP forwards this message to the EAP server
using Access-Request message.
i) The EAP Server responds with an Access-Challenge containing EAP-Response with TLS server
hello, TLS change cipher spec and TLS Finished handshake TLS records, which is forwarded to
the MS by the AP.
j) The MS responds with an EAP-Response with TLS change cipher spec and TLS finished
handshake TLS records to the AP, which is forwarded to the EAP Server using Access-Request
message.
k) This completes the mutual authentication of both EAP server and the EAP peer. In case, the
client authentication fails, TLS Alert message is send to the client and the user is disconnected. In
case, the server authentication fails, the EAP peer will respond with the TLS Alert message and
the user is disconnected. Handling of various failure scenarios are specified in [EAP-TLS]. If the
mutual authentication succeeds, the server derives the needed WLAN session key (PMK).
14
3GPP2 TSG-X/TIA TR-45.6
X.P0028
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
l)
7.2
3GPP2
Similarly, the EAP peer also derives the needed WLAN session keys. The session key derivation
procedures for both EAP peer and EAP server are specified in [EAP-TLS]
After deriving the needed WLAN session key (PMK), the EAP server sends Access-Accept
message (along with the PMK in the MS-MPPE-Recv-Key attribute of RADIUS) to the AP with the
PMK and EAP success indication. The AP forwards the EAP Success indication to the EAP peer.
This completes the WLAN access authentication.
MS Requirements
[EDITOR’s note Action Kuntal to provide text]
15
3GPP2 TSG-X/TIA TR-45.6
X.P0028
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
8
3GPP2
Accounting
[Editor’s note: Lila to bring text]
16
3GPP2 TSG-X/TIA TR-45.6
X.P0028
9
1
2
3
4
5
6
Attribute
7
User Name
8
User Password
9
10
NAS-IP Address
11
12
NAS-Port
13
14
Service Type
15
16
17
Framed
IP Address
18
19
20
Framed-IP-Netmask
21
22Message
Reply
State23
24
25 Timeout
Session
26
27
Idle 28
Timeout
29
30
Termination
Action
31
Called
32 Station ID
33
Calling
34 Station ID
NAS35Identifier
36
Acct37
Status Type
Acct38
Input Octets
Acct39
Output Octets
Acct40
Session ID
41
42
Acct43
Session Time
Acct44
Input Packets
Acct45
Output Packets
Acct46
Termination
Cause
47
48
49
50
51
Acct-Input-Gigawords
52
53
Acct-Ouput54
Gigawords
55
Event Time Stamp
56
NAS Port Type
57
EAP-Message
58
3GPP2
RADIUS attributes
#
Type
Access
Req
Access
Resp
1
2
String
String
X
X
X
4
5
IP
Addr
Integer
6
Integer
X
8
IP
Addr
9
Integer
X
X
18
24
String
String
X
X
X
27
Integer
X
28
Integer
X
29
Integer
X
30
String
31
32
String
String
40
42
43
44
Integer
Integer
Integer
String
46
47
48
49
Acct
Start
Acct
Intrm
Acct
Stop
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
Integer
Integer
Integer
Integer
X
X
X
X
X
X
X
52
Integer
X
X
53
Integer
X
X
55
61
79
Integer
Integer
String
X
X
X
X
X
X
X
X
X
X
X
X
X
17
Comments
User's NAI, Case Sensitive
Must only be used if client authenticating via
UAM
IP Addr of RADIUS client
Is the Association ID between client & AP
per RFC 3580
Various Service Types used for UAM are
described in RFC 2865. Service types for
use with 1x are described in RFC 3580.
Client's IP Address. See RFC 3580 - Not
used for L2 Authenticators with 802.1x.
Attribute required for TAP & IPDR
Netmask of the user; For local use. See RFC
3580 (not used for L2 Authenticators)
Text to display to user
Opaque string from AAA in Access
Challenge
Seconds until forced session termination and
re-authentication required (may be used for
prepaid subs); See Termination-Action
Seconds of idle time before auto-termination
of session
0-Default (end of session) 1-RADIUS reauthentication
Per RFC 3580=MAC Address of NAS +
SSID (if known)
Per RFC 3580=Client's MAC Address
Alternative to NAS-IP_Address to identify
NAS
1=Start 2=Stop 3=Interim update
NAS unique ID to correlate all accounting
records in a session; May be used to correlate
with Auth Records
Session duration in seconds
1=User Request 2=Lost Carrier/Link 4=idle
timeout 5=session timeout 6=admin reset
9=NAS error 10=NAS request 11=NAS
reboot 19=Supplicant (Client) Restart
20=Re-Auth Failure; See RFC 3580 for more
info
Number of times the Acct-Input-Octets
counter has wrapped around
Number of times the Acct-Output-Octets
counter has wrapped around
Seconds since Jan 1 1970 UTC
15=Ethernet 19=802.11
Required per RFC 3579
3GPP2 TSG-X/TIA TR-45.6
X.P0028
1
Attribute
2
Message Authenticator
3
Acct Interim Interval
4
MS-MPPE-Recv-Key
5
MS-MPPE-Send-Key
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
3GPP2
#
Type
80
85
String
Integer
String
String
Access
Req
X
Access
Resp
X
X
X
X
Acct
Start
X
18
Acct
Intrm
X
Acct
Stop
X
Comments
Required per RFC 3579
Interval in seconds between Acct updates
.1x Encryption Key
.1x Encryption Key
3GPP2 TSG-X/TIA TR-45.6
Download