[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
RE: ISSUE: Use of RADIUS in non-layer-2 sessions.
Hi Alan,
I just gave your text a quick read, and I am basically supportive of
this. I know it goes against some existing deployments of RADIUS,
but interoperability can be helped, based upon this text.
John
> -----Original Message-----
> From: owner-radiusext@ops.ietf.org
> [mailto:owner-radiusext@ops.ietf.org]On Behalf Of ext Alan DeKok
> Sent: 06 March, 2005 19:25
> To: radiusext@ops.ietf.org
> Subject: ISSUE: Use of RADIUS in non-layer-2 sessions.
>
>
> Description: Use of RADIUS on non-layer-2 sessions
> Submitter name: Alan DeKok
> Submitter email address: aland@ox.org
> Date first submitted: March 6, 2005
> Reference: http://ops.ietf.org/lists/radiusext/2005/msg00228.html
> Document: "issues and fixes" draft
> Comment type: T
> Priority: 1
> Section:
> Rationale/Explanation of issue:
>
> RADIUS is being deployed in situations where it is performing
> authentication and authorization for access other than layer 2
> connections. e.g. web/ftp servers, user login authentication, etc.
> All of these "sessions" have clear start, stop, and authorization
> semantics. These semantics can often be represented within the
> existing RADIUS packet and attribute encapsulations. However, these
> deployments are outside of the scope of the RADIUS standard, and any
> interpretation of RADIUS within those contexts is
> implementation-defined. In order to guide implementors in the design
> and use of RADIUS in novel deployments, we offer the text below.
>
> Requested change: use suggested text
>
> The RADIUS specification [rfc's] is defined in reference to dialin
> authentication, layer 2 connections, and user "sessions" are
> discussed within that context. RADIUS has been deployed, however,
> in the context of other layers and sessions where user
> authentication, authorization, and accounting is desired. For
> example, existing deployments use RADIUS as a "back-end" for
> authenticating VOIP connections [digest], HTTP sessions [apache],
> FTP sessions [proftpd], and machine logins for multiple operating
> systems [bsdi, pam, gina]. In those contexts, the implementation
> MUST interpret the RADIUS specification as narrowly as possible,
> within the scope of the client-server model as described in
> RADIUS [RFC 2865] Section 1:
>
> <quote>
> Client/Server Model
>
> A Network Access Server (NAS) operates as a client of
> RADIUS. The
> client is responsible for passing user information to designated
> RADIUS servers, and then acting on the response which
> is returned.
>
> RADIUS servers are responsible for receiving user connection
> requests, authenticating the user, and then returning all
> configuration information necessary for the client to deliver
> service to the user.
>
> A RADIUS server can act as a proxy client to other
> RADIUS servers
> or other kinds of authentication servers.
> </quote>
>
> Any deployment of RADIUS outside of the scope of dialin
> authentication MUST therefore interpret RADIUS within the context
> of the service that the RADIUS client is delivering to the user
> who is requesting authentication, authorization, and accounting.
> For example, an Access-Reject sent to the client MUST be
> interpreted by the client as a rejection of the users request for
> service, and the client MUST no longer offer that service to the
> user.
>
> The definition of the "service" being offered is a complex
> one, and should be interpreted as narrowly as possible within the
> context of the intended deployment.
>
> For example, when an authentication failure occurs in the context
> of an FTP session, the normal semantics for rejecting FTP services
> apply. The rejection does not necessarily cause the FTP server to
> terminate the underlying TCP connection, but the FTP server MUST
> NOT offer any services protected by user authentication.
>
> We note also that users may use RADIUS to request multiple
> services from the NAS. Where those services are independent, the
> deployment MUST treat the RADIUS sessions as being independent.
>
> For example, a NAS may offer multi-link services, where a user may
> have multiple simultaneous layer 2 connections. In that case, an
> Access-Reject for a later multi-link connection request does not
> necessarily mean that earlier multi-link connections are torn
> down. Similarly, if a NAS offers both dialup and VOIP services,
> the rejection of a VOIP attempt does not mean that the dialup
> session is torn down.
>
> Alan DeKok.
>
> --
> to unsubscribe send a message to radiusext-request@ops.ietf.org with
> the word 'unsubscribe' in a single line as the message text body.
> archive: <http://psg.com/lists/radiusext/>
>
--
to unsubscribe send a message to radiusext-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://psg.com/lists/radiusext/>