[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Proposed Resolution of Issue 223: Event-Timestamp and Duplicate Detection



The WG came to the conclusion at IETF 68 that Event-Timestamp should NOT be recalculated on retransmission. Here are the changes necessary to address this issue in RFC 3576bis:

Section 2.3

Delete:

"     Note that if the Event-Timestamp Attribute is included, it will be
     updated when the packet is retransmitted, changing the content of
     the Attributes field and requiring a new Identifier and Request
     Authenticator."

Section 6.4

Change:

"When the Event-Timestamp attribute is present,
both the NAS and the RADIUS server MUST check that the Event-Timestamp
Attribute is current within an acceptable time window.
If the Event-Timestamp Attribute is not
current, then the packet MUST be silently discarded.
This implies the need for loose time
synchronization within the network, which can be achieved
by a variety of means, including SNTP, as described in [RFC4330].

Implementations SHOULD be configurable to discard CoA-Request or
Disconnect-Request packets not containing
an Event-Timestamp attribute.
A default time window of 300 seconds is recommended."

To:

"When the Event-Timestamp attribute is present,
both the NAS and the RADIUS server MUST check that the
Event-Timestamp Attribute is current within an
acceptable time window. If the Event-Timestamp
Attribute is not current, then the packet MUST be silently
discarded.  This implies the need for loose time
synchronization within the network, which can be achieved
by a variety of means, including SNTP, as described in [RFC4330].
Implementations SHOULD be configurable to discard CoA-Request or
Disconnect-Request packets not containing an Event-Timestamp attribute.

If the Event-Timestamp Attribute is included, it represents the time
at which the original packet was sent, and therefore it SHOULD NOT
be updated when the packet is retransmitted.
If the Event-Timestamp attribute is not updated, this implies that the Identifier is not changed in retransmitted packets. As a result, the ability to detect replay within the time window is dependent on support for duplicate detection within that same window. RADIUS clients implementing this specification MUST be capable of
detecting a duplicate request if it has the same source IP
address, source UDP port and Identifier within a short span of time.

On RADIUS clients that support the Event-Timestamp Attribute for replay
protection,  the time window used for duplicate detection MUST be the
same as the window used to detect stale Event-Timestamp Attributes.
Since the RADIUS Identifier cannot be repeated within the selected time
window, no more than 256 Requests can be accepted within the time
window.  As a result, the chosen time window will depend on the
expected maximum volume of CoA/Disconnect-Requests, so that
unnecessary discards can be avoided.  A default time window of
300 seconds should be adequate in many circumstances."



--
to unsubscribe send a message to radiusext-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://psg.com/lists/radiusext/>