Project

General

Profile

EPDG implementation plan » History » Version 24

pespin, 02/07/2024 03:17 PM

1 2 laforge
{{>toc}}
2
3 1 laforge
h1. EPDG implementation plan
4 2 laforge
5
h2. The big picture
6
7
Ideally, we want to reuse existing code whenever possible, rather than reinvent the wheel.  Time will tell, if this works out or if we have to rewrite more of it.
8
* StrongSwan charon for handling IKEv2 and managing the IPsec SAs in the kernel IPsec
9
* Erlang DIAMETER application for all the related interfaces
10
* Erlang gtplib for S2b
11
12
This means we will have two major "applications" running:
13
* charon
14
* ePDG (likely in Erlang)
15
16
Between those two we will need some kind of non-standard, custom interface.  For now I've called it "CEAI" for (Charon External AKA Interface)
17
18
h2. Control Plane
19
20
* *red* color indicates elements / interfaces to be implemented.
21
22
{{graphviz_link()
23
digraph G {
24
  rankdir=LR;
25
  subgraph cluster_swan {
26
    label = "StrongSWAN domain";
27
    charon;
28
  }
29
  subgraph cluster_erlang {
30
    label = "Erlang domain";
31
    ePDG [color=red];
32
    AAA [label="3GPP AAA Server", color=red];
33
  }
34
  HSS;
35
  PGW;
36 14 pespin
  PCRF;
37 2 laforge
  UE;
38
39
  charon -> ePDG [label="CEAI", color=red];
40
41
  UE -> charon [label="IKEv2"];
42
  ePDG -> AAA [label="SWm (DIAMETER)", color=red];
43
  AAA -> HSS [label="SWx (DIAMETER)", color=red];
44 14 pespin
  PGW -> AAA [label="S6b (DIAMETER)", color=red];
45 2 laforge
46
  ePDG -> PGW [label="S2b (GTPv2C)", color=red];
47 1 laforge
  ePDG -> PCRF [label="Gxb", color=red, style=dashed];
48
  PGW -> PCRF [label="Gx (DIAMETER)"];
49 14 pespin
50
  {rank=same; PCRF; HSS}
51 2 laforge
}
52
}}
53
54
h2. User Plane
55
56
* *red* color indicates elements / interfaces to be implemented.
57
* *blue* color indicates control-plane elements controlling the user plane
58
59
{{graphviz_link()
60
digraph G {
61
  rankdir=LR;
62
63
  subgraph cluster_swan {
64
    label = "StrongSWAN domain";
65
    { rank=same;
66
      ipsec [label="Linux kernel\nIPsec"];
67
      charon [color=blue];
68
    }
69
    charon -> ipsec [label="netlink", color=blue];
70
  }
71
  subgraph cluster_erlang {
72
    label = "Erlang domain";
73
    { rank=same
74
      gtp [label="Linux kernel\nGTP"];
75
      ePDG [color="blue"];
76
    }
77
    ePDG -> gtp [label="netlink", color=blue];
78
  }
79
  PGW;
80
  UE;
81
82
  UE -> ipsec [label="ESP/UDP"];
83
  ipsec->gtp [label="kernel IP stack"];
84
  gtp -> PGW [label="S2b (GTPv1U)", color=red];
85
}
86
}}
87
88 16 laforge
h3. At system startup
89
90
* set the various routes
91
* on @epdg@ node
92 17 laforge
** osmo-epdg creates the @gtp0@ net-device (in GTP_ROLE_SGSN) via netlink
93 16 laforge
* on @epc@ node
94
** open5gs-upf creates the @tun0@ net-device
95
96
h3. When a user authenticates via IPsec
97
98
* on @epdg@ node
99
** osmo-epdg creates a new GTP tunnel entry within the GTP link
100 18 laforge
*** GTPA_PEER_ADDRESS/ADDR6 = pgw-ip
101
*** GTPA_MS_ADDRESS/MS_ADDR6 = ue-ip (inner)
102
*** GTPA_I_TEI = epdg-teid
103
*** GTPA_O_TEI = pgw-teid
104 16 laforge
* on @epc@ node
105
** open5gs-upf creates a new GTP tunnel entry within its internal state tables
106
107
h3. Uplink traffic (e.g. from UE to P-CSCF)
108
109
* one @epdg@ node
110
** IPsec-encapsulated traffic from the UE side enters as IPv6-in-ESP-in-UDP-in-IP[v4/v6] on the public/internet-facing side
111
** kernel-IPsec (configured by strongswan) will transform (decrypt, ...) the traffic
112
*** we configure strongswan to mark the ipsec-originated traffic with a certain fwmark
113
** traffic with that fwmark is routed (using a statically configured @ip rule@) towards the @gtp0@ net-device (created by osmo-epdg at startup)
114
** linux kernel GTP tunnel module
115
*** looks up the in-kernel table to determine destination TEID and destination IP address based on the MS-side source address
116
*** encapsulates packet in GTP header and sends it through the in-kernel UDP socket to the PGW
117
* on the @epc@ node 
118
** (open5gs-)pgw matches inbound packet based on (dest-ip + TEID) with its internal state table
119
** (open5gs-)pgw decapsulates packet from GTP header
120
** (open5gs-)pgw exposes inner IPv6 packet on @tun0@ net-device
121
** linux kernel routes packet towards P-CSCF (inner IPv6 dest IP address as originally set by UE)
122
* on the @ims@ node
123
** linux kernel routes packet towards local P-CSCF socket
124
125
h3. Downlink traffic (e.g. from P-CSCF to UE)
126
127
* on @ims@ node
128
** IPv6 packet from P-CSCF is sent to UE IPv6 address
129
** large network route (for all UE) points towards @epc@ node
130
* on @epc@ node
131
** traffic to UE IPv6 is routed into @tun0@ net-device
132
** (open5gs-)pgw looks up destination-ip and TEID
133
** (open5gs-)pwg encapsulates packet with GTP-U header and sends it via UDP socket
134
** linux kernel routes it towards the ePDG
135
* on @epdg@ node
136
** linux kernel routes GTP packet to locally bound UDP socket and detects the kernel GTP driver is bound to that socket
137
** linux kernel GTP driver performs lookup based on dest-ip and TEID
138
** linux kernel de-capsulates GTP packet and exposes inner packet on @gtp0@ net-device
139
** linux kernel IPsec code applies transformation (crypto) and ESP-in-UDP-encapsulation
140
* packet is routed towards UE
141 5 lynxis
142
h2. Authentication
143
144
!ipsec_auth.png!
145
146 3 laforge
h2. 3GPP Interfaces and Procedures
147 2 laforge
148
h3. ePDG
149
150 20 pespin
h4. IKEv2 to UE
151
152
* TS 33.402 section 8
153
* TS 24.302 chapter 7
154 23 pespin
* RFC 4187
155 24 pespin
* RFC 4555
156 23 pespin
* RFC 5996
157 22 pespin
* RFC 7296
158 1 laforge
159 6 lynxis
h4. S2b to PGW (GTPv2C) [TS 29.274]
160 2 laforge
161
h5. Create Session Request / Response
162
163
h5. Delete Session Request / Response
164
165
h5. Modify Bearer Request /  Respone (not needed?)
166
167
h5. Modify Bearere Command (not needed?)
168
169
h5. Bearer Resource Command (not needed?)
170
171
h5. Create Bearer Request / Response
172
173
h5. Update Bearer Request / Response (not needed?)
174
175
176 9 pespin
h4. SWm to AAA (DIAMETER) [3GPP TS 29.273]
177 2 laforge
178
h5. Diameter-EAP-Request (DER) / Diameter-EAP-Response (DEA)
179
180
h5. Diameter-AA-Request (AAR) / Diameter-AA-Response (AAA)
181
182
h5. Session-Termination-Request (STR) / Session-Termination-Answer (STA)
183
184
h5. Re-Auth-Requst (RAR) / Re-Auth-Answer (RAA)
185
186
h5. Abort-Session-Request (ASR) / Abort-Session-Answer (ASA)
187
188 12 pespin
h4. SWu to UE (IKEv2, ESP) [3GPP TS 33.402]
189 2 laforge
190 11 pespin
* Related: https://fabricioapps.blogspot.com/2017/10/untrusted-non-3gpp-ip-access-swu-ikev2.html
191 2 laforge
192
h4. Gxb to PCRF (not needed?)
193
194
h3. 3GPP AAA Server
195
196 10 pespin
h4. SWx to HSS (DIAMETER) [3GPP TS 29.273 sec 8,  3GPP TS 23.402 sec 12]
197 2 laforge
198
h5. Push-Profile-Request (PPR) / Push-Profile-Answer (PPA)
199
200
h5. Registration-Termination-Request (RTR) / Registration-Termination-Answer (RTA)
201
202
h5. Multimedia-Auth-Request (MAR) / Multimedia-Auth-Answer (MAA)
203
204 7 pespin
* 3GPP TS 29.273 8.2.2.1
205 8 pespin
* https://www.etsi.org/deliver/etsi_ts/129200_129299/129273/17.06.00_60/ts_129273v170600p.pdf
206 7 pespin
* https://dstest.info/DiaDict/Dictionary/Multimedia-Auth-Request_SWx.html
207
208 2 laforge
h5. Server-Assignment-Request (SAR) / Server-Assignment-Answer (SAA)
209
210 13 pespin
h4. S6b to PGW (DIAMETER) [3GPP TS 29.273 sec 9]
211 2 laforge
212 13 pespin
* https://osmocom.org/issues/6229
213 2 laforge
214
h4. SWm to ePDG (DIAMETER)
215
216 1 laforge
see above.
217 3 laforge
218 4 lynxis
h3. custom Interfaces / Procedures
219
220 19 lynxis
h4. CEAI / GSUP
221 4 lynxis
222 19 lynxis
All messages must contain the TLV message class using the value IPSEC_EPDG / 5.
223 1 laforge
224 19 lynxis
h5. Send Authentication Information Request
225
226
* Request the Auth Tuples to authenticate a UE. osmo-epdg will use SWx to request the information from the HSS.
227
* Direction: Send from strongswan to osmo-edpg
228
229
h5. Send Authentication Information Result
230
231
* Direction: Send from osmo-epdg to strongswan
232
233
h5. Send Authentication Information Error
234
235
* Direction: Send from osmo-epdg to strongswan
236
237
238
h5. Update Location Request
239
240
* Authorization of the UE to use the ePDG and requested APN/PGW. osmo-epdg will use SWx to update the HSS and authorize in the same request the UE + APN/PGW.
241
* Direction: Send from strongswan to osmo-edpg
242
243
h5. Update Location Result
244
245
* Direction: Send from osmo-epdg to strongswan
246
247
h5. Update Location Error
248
249
* Direction: Send from osmo-epdg to strongswan
250
251
252
h5. Tunnel Request
253
254
* strongswan ask the osmo-epdg to create the GTP Tunnel towards the PGW.
255
* Direction: Send from strongswan to osmo-edpg
256
257
h5. Tunnel Result
258
259
* Direction: Send from osmo-epdg to strongswan
260
261
h5. Tunnel Error
262
263
* Direction: Send from osmo-epdg to strongswan
264 1 laforge
265 21 pespin
h5. Purge MS Request
266 1 laforge
267 21 pespin
* strongswan asks the osmo-epdg to tear down the UE session due to UE disconnection (close ipsec tunnel).
268
* Direction: Send from strongswan to osmo-epdg
269 1 laforge
270 21 pespin
h5. Purge MS Result
271
272
* Direction: Send from osmo-epdg to strongswan
273
274
h5. Purge MS Error
275
276
* Direction: Send from osmo-epdg to strongswan
277
278
h5. Cancel Location Request
279
280
* The HSS/PGW asked to terminate the session since the UE moved somewhere else.
281
* Direction: Send from osmo-epdg to strongswan
282
283
h5. Cancel Location Result
284
285
* Direction: Send from strongswan to osmo-epdg
286
287
h5. Cancel Location Error
288
289
* Direction: Send from strongswan to osmo-epdg
290 19 lynxis
291
292
h4. Related information links
293 15 pespin
294
* https://www.cisco.com/c/en/us/td/docs/wireless/asr_5000/21-23/PGW-Admin/21-23-pgw-admin/21-16-PGW-Admin_chapter_011001.html
Add picture from clipboard (Maximum size: 48.8 MB)