[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: draft-winter-radsec-01 published



Stefan Winter wrote:
> The issue is more about the supplicant knowing its MTU, sending the maximum 
> payload possible (typically, in EAP-TLS where the supplicant has a lot to 
> say), the authenticator encapsulating that in a RADIUS packet, which grows 
> larger than the MTU on its own uplink, leading to fragmentation of the UDP 
> packet.

  Ah.  That's a completely separate problem.

> That is not in principle a problem, but practical experience has 
> shown that too many firewalls drop the fragments and auth doesn't work.

  Broken firewalls are bad.  Putting a firewall between a NAS and a
RADIUS server is generally not a good idea.  Sending RADIUS over the
wider Internet isn't a good idea, unless encapsulation is used (IPSec,
etc.), which solves the UDP fragmentation problem.

> It would be desirable to be able to tell the supplicant that it should send 
> *less* than its own MTU to prevent that from happening.

  This is a path MTU discovery problem.  It's hard.  i.e. impossible, in
the general case.

> On the server side, EAP fragment size is statically configured, and is often a 
> lot less than what supplicant could handle (1024 is a common default). Thus, 
> sending less payload than would be possible means that a server has to split 
> the EAP conversation in more RADIUS packets than need be, meaning more 
> round-trips and longer time-to-auth. 

  I'm not sure what else to say other than "Yes, that's life..."

  I think it's a bad idea to add complexity to EAP in order to work
around firewall bugs.

  Alan DeKok.

--
to unsubscribe send a message to radiusext-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://psg.com/lists/radiusext/>