changeset 55:4890fc91096d

Updates Seb.
author Sebastien Decugis <sdecugis@nict.go.jp>
date Fri, 22 Oct 2010 15:46:32 +0900
parents b817687af36c
children 067a0092bb64
files draft-ietf-dime-erp-05.xml
diffstat 1 files changed, 169 insertions(+), 211 deletions(-) [+]
line wrap: on
line diff
--- a/draft-ietf-dime-erp-05.xml	Thu Oct 21 16:22:23 2010 +0900
+++ b/draft-ietf-dime-erp-05.xml	Fri Oct 22 15:46:32 2010 +0900
@@ -207,10 +207,10 @@
       <t>This document assumes the existence of at most one logical ER server
       entity in a domain. If several physical servers are deployed for
       robustness, a replication mechanism must be deployed to synchronize the
-      ERP states (root keys<cref>FFS: authorization attributes</cref>) between
-      these servers. This replication mechanism is out of the scope of this
-      document. If multiple ER servers are deployed in the domain, we assume
-      that they can be used interchangeably.</t>
+      ERP states (root keys) between these servers. This replication mechanism
+      is out of the scope of this document. If multiple ER servers are
+      deployed in the domain, we assume that they can be used
+      interchangeably.</t>
     </section>
 
     <section anchor="Overview" title="Protocol Overview">
@@ -227,43 +227,31 @@
 ]]></artwork>
         </figure> The ER server is located either in the home domain (same as
       EAP server) or in the visited domain (same as authenticator, when it
-      differs from the home domain). <list style="hanging">
-          <t hangText="QUESTION:"><vspace blankLines="0" /> Can the ER server
-          be located in a third domain (ex: broker's) according to ERP
-          mechanism?</t>
-        </list> <vspace blankLines="1" /> When the peer initiates an ERP
-      exchange, the authenticator creates a Diameter-EAP-Request message <xref
-      target="RFC4072"></xref>. The Application Id of the message is set to
-      that of the Diameter ERP application (code: TBD) in the message. The
-      generation of the ERP/DER message is detailed in <xref
-      target="Re-authentication"></xref>. <vspace blankLines="1" /> If there
-      is an ER server in the same domain as the authenticator (local domain),
-      Diameter routing MUST <list style="hanging">
-          <t hangText="QUESTION:"><vspace blankLines="0" /> Should this say
-          "SHOULD: instead of "MUST"?</t>
-        </list> be configured so that this ERP/DER message reachs this server,
-      even if the Destination-Realm is not the local domain. <vspace
-      blankLines="1" /> If there is no local ER server, the message is routed
-      according to its Destination-Realm AVP content, extracted from the realm
-      component of the keyName-NAI attribute. As specified in <xref
-      target="RFC5296">RFC 5296</xref>, this realm is the home domain of the
-      peer in case of a bootstrapping exchange (the 'B' flag is set in the ERP
-      message) or the domain of the bootstrapped ER server otherwise. <list
-          style="hanging">
-          <t hangText="NOTE:"><vspace blankLines="0" /> This actually might
-          allow the ER server to be in a third party realm.</t>
-        </list> <vspace blankLines="1" /> If no ER server is available in the
-      home domain either, the ERP/DER message cannot be delivered, and an
-      error DIAMETER_UNABLE_TO_DELIVER is generated <xref
-      target="RFC3588"></xref> and returned to the authenticator. The
-      authenticator may cache this information (with limited duration) to
-      avoid further attempts for ERP with this realm. It may also fallback to
-      full EAP authentication to authenticate the peer. <vspace
-      blankLines="1" /> When an ER server receives the ERP/DER message, it
-      searches its local database for a root key <list style="hanging">
-          <t hangText="FFS:"><vspace blankLines="0" /> and authorization
-          state?</t>
-        </list> matching the keyName part of the User-Name AVP. If such key is
+      differs from the home domain). <vspace blankLines="1" /> When the peer
+      initiates an ERP exchange, the authenticator creates a
+      Diameter-EAP-Request message <xref target="RFC4072"></xref>. The
+      Application Id of the message is set to that of the Diameter ERP
+      application (code: TBD) in the message. The generation of the ERP/DER
+      message is detailed in <xref target="Re-authentication"></xref>. <vspace
+      blankLines="1" /> If there is an ER server in the same domain as the
+      authenticator (local domain), Diameter routing must be configured so
+      that this ERP/DER message reachs this server, even if the
+      Destination-Realm is not the local domain. <vspace blankLines="1" /> If
+      there is no local ER server, the message is routed according to its
+      Destination-Realm AVP content, extracted from the realm component of the
+      keyName-NAI attribute. As specified in <xref target="RFC5296">RFC
+      5296</xref>, this realm is the home domain of the peer in case of a
+      bootstrapping exchange (the 'B' flag is set in the ERP message) or the
+      domain of the bootstrapped ER server otherwise. <vspace
+      blankLines="1" /> If no ER server is available in the home domain
+      either, the ERP/DER message cannot be delivered, and an error
+      DIAMETER_UNABLE_TO_DELIVER is generated <xref target="RFC3588"></xref>
+      and returned to the authenticator. The authenticator may cache this
+      information (with limited duration) to avoid further attempts for ERP
+      with this realm. It may also fallback to full EAP authentication to
+      authenticate the peer. <vspace blankLines="1" /> When an ER server
+      receives the ERP/DER message, it searches its local database for a root
+      key matching the keyName part of the User-Name AVP. If such key is
       found, the ER server processes the ERP message as described in <xref
       target="RFC5296">RFC 5296</xref> then creates the ERP/DEA answer as
       described in <xref target="Re-authentication"></xref>. The rMSK is
@@ -273,13 +261,11 @@
       EAP-Payload AVP, the EAP-Finish/Re-Auth message, to the peer. <vspace
       blankLines="1" /> If the EAP-Initiate/Re-Auth message has its 'B' flag
       set (Bootstrapping exchange), the ER server should not possess the root
-      key in its local database <list style="hanging">
-          <t hangText="COMMENT:"><vspace blankLines="0" /> This may not be
-          true in future RFC5296bis?</t>
-        </list> In this case, the ER server acts as a proxy, and forwards the
-      message to the home EAP server after changing its Application Id to
-      Diameter EAP and adding an AVP to request the root key. See <xref
-      target="Bootstrapping"></xref> for more detail on this process.</t>
+      key in its local database. In this case, the ER server acts as a proxy,
+      and forwards the message to the home EAP server after changing its
+      Application Id to Diameter EAP and adding the ERP-RK-Request AVP to
+      request the root key. See <xref target="Bootstrapping"></xref> for more
+      detail on this process.</t>
     </section>
 
     <section anchor="Bootstrapping" title="Bootstrapping the ER Server">
@@ -305,13 +291,11 @@
         that only a small number of peers will use re-authentication in the
         visited domain. Deriving and caching key material for all the peers
         (for example, for the peers that do not support ERP) is a waste of
-        resources and SHOULD be avoided. <vspace blankLines="1" /> To achieve
-        implicit bootstrapping, the ER server must act as a Diameter EAP Proxy
-        as defined in the Diameter Base Protocol <xref
-        target="RFC3588"></xref>, and routing must be configured so that
-        Diameter messages of a full EAP authentication are routed through this
-        proxy. The figure bellow illustrates this mechanism. <figure
-            align="center" anchor="Implict"
+        resources and should be avoided. <vspace blankLines="1" /> To achieve
+        implicit bootstrapping, the ER server acts as a Diameter EAP Proxy,
+        and Diameter routing must be configured so that Diameter EAP
+        application messages are routed through this proxy. The figure bellow
+        illustrates this mechanism. <figure align="center" anchor="Implict"
             title="ERP Bootstrapping During Full EAP Authentication">
             <artwork><![CDATA[
                          ER server &
@@ -341,115 +325,93 @@
 ]]></artwork>
           </figure> The ER server proxies the first DER of the full EAP
         authentication and adds the ERP-RK-Request AVP inside, if this AVP is
-        not already in the message (which might happen if there are ER servers
-        in the visited and the home domains), then forwards the request.
-        <vspace blankLines="1" /> If the EAP server does not support the ERP
-        extensions, it will simply ignore this grouped AVP and continue as
+        not already in the message (which might happen if there are several ER
+        servers on the path), then forwards the request. <vspace
+        blankLines="1" /> If the EAP server does not support the ERP
+        extensions, it simply ignores the ERP-RK-Request AVP and continues as
         specified in <xref target="RFC4072">RFC 4072</xref>. If the server
-        supports the ERP extensions, it caches the ERP-Realm value with the
-        session data, and continues the EAP authentication. When the
-        authentication is complete, if it is successful and the EAP method
-        generated an EMSK, the server MUST derive the rRK as specified in
-        <xref target="RFC5296">RFC 5296</xref>, and include an instance of the
-        Key AVP <xref target="KAVP"></xref> in the Diameter-EAP-Answer
-        message. <vspace blankLines="1" /> When the ER server proxies a
-        Diameter-EAP-Answer message with a Session-Id corresponding to a
-        message to which it added an ERP-RK-Answer, and the Result-Code is
-        DIAMETER_SUCCESS, it MUST examine the message, extract and remove any
-        Key AVP <xref target="KAVP"></xref> from the message, and save its
-        content. If the message does not contain an ERP-RK-Answer AVP, the ER
-        server MAY cache this information to avoid possible subsequent
-        re-authentication attempts for this session. In any case, the
-        information stored SHOULD NOT have a lifetime greater than the EMSK
-        lifetime <list style="hanging">
-            <t hangText="QUESTION:"><vspace blankLines="0" /> How does the ER
-            server knows the EMSK lifetime, if there is no ERP-RK-Answer? What
-            is the lifetime of the MSK for example?</t>
-          </list> <vspace blankLines="1" /> If the ER server is successfully
-        bootstrapped, it MAY also add the ERP-Realm AVP after removing the
-        ERP-RK-Answer AVP in the EAP/DEA message. This could be used by the
-        authenticator to notify the peer that ERP is bootstrapped, with the ER
-        domain information. How this information can be transmitted to the
-        peer is outside the scope of this document. <list style="hanging">
-            <t hangText="QUESTION:"><vspace blankLines="0" /> Is this
-            possible? It might be useful...</t>
-          </list></t>
+        supports the ERP extensions, it saves the value of the ERP-Realm AVP
+        found inside the ERP-RK-Request AVP, and continues with the EAP
+        authentication. When the authentication completes, if it is successful
+        and the EAP method has generated an EMSK, the server MUST derive the
+        rRK as specified in <xref target="RFC5296">RFC 5296</xref>, using the
+        saved domain name. It then includes the rRK inside a Key AVP <xref
+        target="KAVP"></xref> with the Key-Type AVP set to rRK, before sending
+        the DEA as usual.<vspace blankLines="1" /> When the ER server proxies
+        a Diameter-EAP-Answer message with a Session-Id corresponding to a
+        message to which it added an ERP-RK-Request AVP, and the Result-Code
+        is DIAMETER_SUCCESS, it MUST examine the message and save and remove
+        any Key AVP <xref target="KAVP"></xref> with Key-Type AVP set to rRK.
+        If the message does not contain such Key AVP, the ER server may cache
+        the information that ERP is not possible for this session to avoid
+        possible subsequent attempts. In any case, the information stored in
+        ER server concerning a session should not have a lifetime greater than
+        the EMSK for this session. <vspace blankLines="1" /> If the ER server
+        is successfully bootstrapped, it should also add the ERP-Realm AVP
+        after removing the Key AVP with Key-Type of rRK in the EAP/DEA
+        message. This ERP-Realm information can be used by the authenticator
+        to notify the peer that ER server is bootstrapped, and for which
+        domain. How this information can be transmitted to the peer is outside
+        the scope of this document. This information needs to be sent to the
+        peer if both implicit and explicit bootstrapping mechanisms are
+        possible, because the ERP message and the root key used for protecting
+        this message are different in bootstrapping exchanges and
+        non-bootstrapping exchanges.</t>
       </section>
 
       <section title="Bootstrapping During the First Re-authentication">
         <t>Bootstrapping the ER server during the first re-authentication
-        (also known as explicit bootstrapping) offers several advantages: it
-        saves resources, since we generate and cache only root keys that we
-        actually need, and it can accomodate inter-domain handovers or ER
-        servers that lose their state (for example after reboot). <list
-            style="hanging">
-            <t hangText="COMMENT:"><vspace blankLines="0" /> This last point
-            might not be true currently, since the peer would not issue a
-            bootstrapping exchange... But this might change also with
-            RFC5296bis AFAIU</t>
-          </list> On the other hand, the first re-authentication with the ER
-        server requires a one-round-trip exchange with the home EAP server,
-        which adds some delay to the process (but it is more efficient than a
-        full EAP authentication in any case). It also requires some
-        synchronization between the peer and the visited domain: since the ERP
-        message used is different <list style="hanging">
-            <t hangText="QUESTION:"><vspace blankLines="0" /> and the root key
-            used also?</t>
-          </list> for the explicit bootstrapping exchange than for normal
-        re-authentication; explicit bootstrapping should not be used if
-        implicit bootstrapping was already performed. <list style="hanging">
-            <t hangText="QUESTION:"><vspace blankLines="0" /> What should we
-            do if the ER server receives an explicit bootstrapping request but
-            already possess the rDSRK? Can it answer without going to the home
-            server? That would be simpler -- planned in rfc5296bis ?</t>
-          </list> <vspace blankLines="1" /> The ER server receives the ERP/DER
-        message containing the EAP-Initiate/Re-Auth message with the 'B' flag
-        set. It proxies this message, and performs the following processing in
+        (also known as explicit bootstrapping) is less resource-consuming,
+        since root keys are generated and cached only when needed. On the
+        other hand, in that case first re-authentication requires a
+        one-round-trip exchange with the home EAP server, which is less
+        efficient than the implicit bootstrapping scenario. <vspace
+        blankLines="1" /> The ER server receives the ERP/DER message
+        containing the EAP-Initiate/Re-Auth message with the 'B' flag set. It
+        proxies this message, and performs the following processing in
         addition to standard proxy operations: <list>
             <t>Changes the Application Id in the header of the message to
             Diameter EAP Application (code 5).</t>
 
             <t>Change the content of Application-Auth-Id accordingly. <list
                 style="hanging">
-                <t hangText="QUESTION:"><vspace blankLines="0" /> Is t better
-                to leave it unmodified?</t>
+                <t hangText="QUESTION:"><vspace blankLines="0" /> Is it better
+                to leave it unmodified, so that the server can easily
+                differenciate between ERP and standard EAP message ?</t>
               </list></t>
 
             <t>Add the ERP-RK-Request AVP, which contains the name of the
             domain where the ER server is located.</t>
 
             <t><list style="hanging">
-                <t hangText="QUESTION:"><vspace blankLines="0" /> Add the
-                Destination-Host to reach the appropriate EAP server, the one
-                with the EMSK. How does the ER server know this
-                information?</t>
+                <t hangText="PROBLEM:"><vspace blankLines="0" /> Add the
+                Destination-Host AVP to reach the appropriate Diameter EAP
+                server in case there is more than one in destination domain,
+                the one with the EMSK. How does the ER server know this
+                information? Or can we require that all Diameter EAP servers
+                can be used interchangeably for this purpose?</t>
               </list></t>
-          </list> Then the server forwards the EAP/DER request, which is
-        routed to the home EAP server. <vspace blankLines="1" /> If the home
-        EAP server does not support the ERP extensions, it replies with an
-        error since the encapsulated EAP-Initiate/Re-auth command is not
-        understood. Otherwise, it processes the ERP request as described in
-        <xref target="RFC5296"></xref>. In particular, it includes the
-        Domain-Name TLV attribute with the content from the ERP-Realm AVP. It
-        creates the EAP/DEA reply message <xref target="RFC4072"></xref>.
-        including an instance of the Key AVP <xref target="KAVP"></xref>.
-        <list style="hanging">
-            <t hangText="QUESTION:"><vspace blankLines="0" /> What about
-            authorization AVPs?</t>
-          </list> <vspace blankLines="1" /> The ER server receives this
+          </list> Then the proxied EAP/DER request is sent and routed to the
+        home Diameter EAP server. <vspace blankLines="1" /> If the home EAP
+        server does not support the ERP extensions, it replies with an error
+        since the encapsulated EAP-Initiate/Re-auth command is not understood.
+        Otherwise, it processes the ERP request as described in <xref
+        target="RFC5296"></xref>. In particular, it includes the Domain-Name
+        TLV attribute with the content from the ERP-Realm AVP. It creates the
+        EAP/DEA reply message <xref target="RFC4072"></xref>. including an
+        instance of the Key AVP <xref target="KAVP"></xref> with Key-Type AVP
+        set to rRK. <vspace blankLines="1" /> The ER server receives this
         EAP/DEA and proxies it as follows, in addition to standard proxy
         operations: <list>
-            <t>Set the Application Id back to Diameter ERP (code TBD)</t>
+            <t>Set the Application Id back to Diameter ERP application Id
+            (code TBD)</t>
 
-            <t>Extract and cache the content of the Key AVP. <list
-                style="hanging">
-                <t hangText="QUESTION:"><vspace blankLines="0" /> And
-                authorization AVPs ?</t>
-              </list></t>
-          </list> The DEA is then forwarded to the authenticator, that can use
-        the rMSK as described in <xref target="RFC5296">RFC 5296</xref>.
-        <vspace blankLines="1" /> The figure below captures this proxy
-        behavior: <figure align="center" anchor="FigExplicit"
+            <t>Extract and cache the content of the Key AVP with Key-Type set
+            to rRK, as described in implicit scenario. </t>
+          </list> The ERP/DEA message is then forwarded to the authenticator,
+        that can use the rMSK as described in <xref target="RFC5296">RFC
+        5296</xref>. <vspace blankLines="1" /> The figure below captures this
+        proxy behavior: <figure align="center" anchor="FigExplicit"
             title="ERP Explicit Bootstrapping Message Flow">
             <artwork><![CDATA[
 Authenticator            ER server             Home EAP server
@@ -465,28 +427,29 @@
                               <------------------------
                                     Diameter EAP/DEA
                                       (EAP-Finish)
-                                       (Key AVP)
+                                    (Key AVP (rRK))
+                                    (Key AVP (rMSK))
       <----------------------
           Diameter ERP/DEA
             (EAP-Finish)
-             (Key AVP)
+          (Key AVP (rMSK))
 ]]></artwork>
           </figure></t>
       </section>
     </section>
 
     <section anchor="Re-authentication" title="Re-Authentication">
-      <t>This section describes in detail a re-authentication exchange with a
-      (bootstrapped) ER server. The following figure summarizes the
-      re-authentication exchange. <figure align="center" anchor="FigReauth"
-          title="Diameter ERP Re-authentication Exchange">
+      <t>This section describes in detail a re-authentication exchange with an
+      ER server that was previously bootstrapped. The following figure
+      summarizes the re-authentication exchange. <figure align="center"
+          anchor="FigReauth" title="Diameter ERP Re-authentication Exchange">
           <artwork><![CDATA[
-                                                     ER server
-                                                   (bootstrapped)
- Peer                 Authenticator            (local or home domain)
+                                                      ER server
+ Peer                 Authenticator                (bootstrapped)
  ====                 =============            ======================
- [ <------------------------         ]               
- [optional EAP-Initiate/Re-auth-start]               
+ [ <------------------------          ]               
+ [optional EAP-Initiate/Re-auth-start,] 
+ [  possibly with ERP domain name     ]
 
    ----------------------->
      EAP-Initiate/Re-auth
@@ -502,19 +465,19 @@
     <----------------------
       EAP-Finish/Re-auth
 ]]></artwork>
-        </figure> In ERP, the peer sends an EAP-Initiate/Re-auth message to
-      the ER server via the authenticator. Alternatively, the authenticator
-      may send an EAP-Initiate/Re-auth-Start message to the peer to trigger
-      the start of ERP. In this case, the peer responds with an
-      EAP-Initiate/Re-auth message. <vspace blankLines="1" /> If the
-      authenticator does not support ERP (pure <xref target="RFC4072"></xref>
-      support), it discards the EAP packets with an unknown ERP-specific code
-      (EAP-Initiate). The peer may fallback to full EAP authentication in this
-      case. <vspace blankLines="1" /> When the authenticator receives an
-      EAP-Initiate/Re-auth message from the peer, it process as described in
+        </figure> The peer sends an EAP-Initiate/Re-auth message to the ER
+      server via the authenticator. Alternatively, the authenticator may send
+      an EAP-Initiate/Re-auth-Start message to the peer to trigger the
+      mechanism. In this case, the peer responds with an EAP-Initiate/Re-auth
+      message. <vspace blankLines="1" /> If the authenticator does not support
+      ERP (pure <xref target="RFC4072">Diameter EAP</xref> support), it
+      discards the EAP packets with an unknown ERP-specific code
+      (EAP-Initiate). The peer should fallback to full EAP authentication in
+      this case. <vspace blankLines="1" /> When the authenticator receives an
+      EAP-Initiate/Re-auth message from the peer, it processes as described in
       <xref target="RFC5296"></xref> with regards to the EAP state machine. It
       creates a Diameter EAP Request message following the general process of
-      <xref target="RFC4072">DiameterEAP</xref>, with the following
+      <xref target="RFC4072">Diameter EAP</xref>, with the following
       differences: <list>
           <t>The Application Id in the header is set to Diameter ERP (code
           TBD).</t>
@@ -527,21 +490,14 @@
 
           <t><list style="hanging">
               <t hangText="FFS:"><vspace blankLines="0" /> What about
-              Session-ID AVP -- in case of re-auth at the same place, and in
-              case of handover?</t>
+              Session-ID AVP ?</t>
             </list></t>
 
-          <t>The Auth-Request-Type AVP content is set to [Editor's note: FFS].
-          <list style="hanging">
-              <t hangText="QUESTION:"><vspace blankLines="0" /> Do we really
-              do authorization with Diameter ERP ? -- need to pass the
-              authorization attrs to the ER server in that case. Idea FFS: we
-              do authorization only for explicit bootstrapping
-              exchanges...</t>
-            </list></t>
+          <t>The Auth-Request-Type AVP content is set to [Editor's note: FFS
+          -- cf. open issues]. </t>
 
-          <t>The EAP-Payload AVP contains the ERP message,
-          EAP-Initiate/Re-Auth.</t>
+          <t>The EAP-Payload AVP contains the EAP-Initiate/Re-Auth
+          message.</t>
         </list> Then this ERP/DER message is sent as described in <xref
       target="Overview"></xref>. <vspace blankLines="1" /> The ER server
       receives and processes this request as described in <xref
@@ -554,16 +510,11 @@
           <t>The value of the Auth-Application-Id AVP is also set to Diameter
           ERP Application.</t>
 
-          <t>The EAP-Payload AVP contains the ERP message,
-          EAP-Finish/Re-auth.</t>
+          <t>The EAP-Payload AVP contains the EAP-Finish/Re-auth message.</t>
 
           <t>In case of successful authentication, an instance of the Key AVP
           containing the Re-authentication Master Session Key (rMSK) derived
-          by ERP is included. <list style="hanging">
-              <t hangText="QUESTION:"><vspace blankLines="0" /> What about all
-              the authorization attributes? If we want to include them, they
-              have to be present on the ER server...</t>
-            </list></t>
+          by ERP is included.</t>
         </list> When the authenticator receives this ERP/DEA answer, it
       processes it as described in <xref target="RFC4072">Diameter EAP</xref>
       and <xref target="RFC5296">RFC 5296</xref>: the content of EAP-Payload
@@ -607,30 +558,26 @@
       <section title="ERP-Realm AVP">
         <t>The ERP-Realm AVP (AVP Code TBD) is of type DiameterIdentity. It
         contains the name of the realm in which the ER server is located.
-        <list style="hanging">
-            <t hangText="FFS:"><vspace blankLines="0" /> We may re-use
-            Origin-Realm here instead? On the other hand, ERP-Realm may be
-            useful if the ER server is in a third-party realm, if this is
-            possible.</t>
-          </list> <vspace blankLines="1" /> This AVP has the M and V bits
-        cleared.</t>
+        <vspace blankLines="1" /> This AVP has the M and V bits cleared.</t>
       </section>
 
       <section anchor="KAVP" title="Key AVP">
         <t>The Key AVP <xref target="I-D.ietf-dime-local-keytran"></xref> is
-        of type "Grouped" and is used to carry the rMSK and associated
+        of type "Grouped" and is used to carry the rRK or rMSK and associated
         attributes. The usage of the Key AVP and its constituent AVPs in this
         application is specified in the following sub-sections.</t>
 
         <section title="Key-Type AVP">
-          <t>The value of the Key-Type AVP MUST be set to 3 for rRK.</t>
+          <t>The value of the Key-Type AVP MUST be set to 2 for rRK or 3 for
+          rMSK.</t>
         </section>
 
         <section title="Keying-Material AVP">
           <t>The Keying-Material AVP contains rRK sent by the home EAP server
           to the ER server, in answer to a request containing an
-          ERP-RK-Request AVP. How this material is derived and used is
-          specified in <xref target="RFC5296">RFC 5296</xref>.</t>
+          ERP-RK-Request AVP, or the rMSK sent by ER server to authenticator.
+          How this material is derived and used is specified in <xref
+          target="RFC5296">RFC 5296</xref>.</t>
         </section>
 
         <section title="Key-Name AVP">
@@ -653,17 +600,24 @@
       them. <vspace blankLines="1" /> The main issue is the use of ERP for
       authentication after a handover of the peer to a new authenticator (or
       different authenticator port). Diameter ERP is not meant to be a
-      mobility protocol. A number of issues appear when we try to do handover
-      in Diameter ERP (alone): how to manage the Session-Id AVP; how does the
-      ER server provide the Authorization AVPs; how does the peer learn the
-      ERP domain of the new authenticator; how does the home server reachs the
-      peer to for example terminate the session; and so on... Therefore, the
-      management of the session for a mobile peer is not (yet) addressed in
-      this document. It must be studied how Diameter ERP can be for example
-      used in conjunction with a mobility application (Diameter MIP4, Diameter
-      MIP6) to support the optimized re-authentication in such situation.
-      <vspace blankLines="1" /> Another issue concerns the case where the home
-      realm contains several EAP servers. In multi rounds full EAP
+      mobility application. A number of issues appear when we try to do
+      handover while using Diameter ERP:<list>
+          <t>how to manage the Session-Id AVP -- is it a new session each
+          time, or do we try to reuse the same Diameter session?;</t>
+
+          <t>how does the ER authenticator acquire the Authorization AVPs? Is
+          it cached in the Diameter ER server (received during bootstrapping)
+          or do we use first Authenticate-Only with ER server, then
+          Authorize-Only with home domain (and in that case how does the ER
+          authenticator learn what the home domain is?)</t>
+
+          <t>how does the peer learn the ERP domain of the new authenticator
+          -- this is being addressed in HOKEY architecture draft; </t>
+
+          <t>how does the home server reachs the peer to for example terminate
+          the session if there is no notification sent to the home domain;</t>
+        </list><vspace blankLines="1" /> Another issue concerns the case where
+      the home realm contains several EAP servers. In multi rounds full EAP
       authentication, the Destination-Host AVP provides the solution to reach
       the same server across the exchanges. Only this server possess the EMSK
       for the session. In case of explicit bootstrapping, the ER server must
@@ -672,9 +626,12 @@
       EAP/DEA in the ER server, which is a bit similar to the implicit
       bootstrapping scenario described here -- only we save the server name
       instead of the root key, and we must then be able to match the DSRK with
-      the user name. <vspace blankLines="1" /> Finally, this document
-      currently lacks a description of what happens when a Re-Auth-Request is
-      received for a peer on the authenticator.</t>
+      the user name. <vspace blankLines="1" />In roaming environments, it
+      might be useful that a broker provides ERP services. The security
+      implications of storing the DSRK generated for the visited domain into
+      the broker's server should be studied.<vspace blankLines="1" /> Finally,
+      this document currently lacks a description of what happens when a
+      Re-Auth-Request is received for a peer on the authenticator.</t>
     </section>
 
     <section anchor="Acknowledgements" title="Acknowledgements">
@@ -725,8 +682,9 @@
         </list> <list style="hanging">
           <t hangText="FFS:"><vspace blankLines="0" /> Do we really respect
           these security considerations with the mechanism we describe here?
-          Is it safe to use ERP-RK-Request / Answer AVPs? What is the worst
-          case?</t>
+          Is it safe to use ERP-RK-Request &amp; Key AVPs? What is the worst
+          case? For example if a domain tricks the peer into beliving it is
+          located in a different domain?</t>
         </list> EAP channel bindings may be necessary to ensure that the
       Diameter client and the server are in sync regarding the key Requesting
       Entity's Identity. Specifically, the Requesting Entity advertises its
"Welcome to our mercurial repository"