[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Review of draft-ietf-radext-management-authorization-02.txt



Abstract
 
The current text is a bit wordy.  How about this?
 
   This document describes Remote Authentication Dial-In User Service
   (RADIUS) attributes for the authorization and service provisioning of
   Network Access Servers (NASes).  Both local and remote management
   are supported, with granular access rights and management privileges.
   Specific provisions are made for remote management via framed
   management protocols, and for specification of a protected transport
   protocol.
 
Section 7.1
 
I don't think you need to repeat much of Section 5.6 of RFC 2865.  Why
not just reference it instead?  Here is some recommended text for this
section:
 
7.1.  Service-Type

   The Service-Type attribute is defined in Section 5.6 of RFC 2865
   [RFC2865].   This document defines a new value of the Service-Type
   Attribute:

      (TBA)     Framed-Management

      The semantics of the Framed-Management service are as follows:

      Framed-Management   A framed management protocol session should
                          be started on the NAS.
 
Section 8.1
 
   The Framed-Management-Protocol attribute indicates the application-
   layer management protocol to be used for framed management access.
   It MAY be used in both Access-Request and Access-Accept packets.
[BA] Please add a sentence explaining the semantics in this usage.  For
example, in the Access-Request I assume that this Attribute describes the
protocol that the client is using for remote administration.  What does it mean
in an Access-Accept?  For example, what does the NAS do if the value in the
Access-Accept is different from the protocol that is being used?  Does it
disconnect?
 
 
  The acronyms used in the above table expand as follows:

   o  SNMP: Simple Network Management Protocol.
 
[BA] Please add a reference.

   o  Web-based: Use of an embedded web server in the NAS for management
      via a generic web browser client.  The interface presented to the
      administrator may be graphical, tabular or textual.  The protocol
      is HTML over HTTP.  The protocol may optionally be HTML over
      HTTPS, i.e. using HTTP over TLS.
 
[BA] Please add a reference to the HTTP and HTTPS specifications.

   o  NETCONF: Management via the NETCONF protocol using XML over
      supported transports (e.g.  HTTP, BEEP, SOAP).  As secure
      transport profiles are defined for NETCONF, the list of transport
      options may expand.
 
[BA] Please add a reference to NETCONF specification.

   o  FTP: File Transfer Protocol, used to transfer configuration files
      to and from the NAS.
 
[BA] Please add a reference to the FTP specification.

   o  TFTP: Trivial File Transfer Protocol, used to transfer
      configuration files to and from the NAS.

[BA] Please add a reference to TFTP specification.

   o  CP: CP (file copy) protocol, used to transfer configuration files
      to and from the NAS.

[BA] What is the CP protocol?  Do you mean RCP?  Please add a reference.
 
Section 8.2
 
[BA] What packets can this attribute be included in?  Access-Request & Access-Accept?
What are the semantics in each case?  For example, in an Access-Request is this the
level of protection that is being used?  What if the value in an Access-Accept is different
(e.g. higher) than that in use?  For example, if confidentiality  & integrity is being requested,
but the session is protected with TLS and an integrity-only ciphersuite?  Is the session
dropped?
 
   o  Confidentiality-Protection: The management session requires
      protection in a secure or protected transport, that is supported
      by the management access protocol and implementation.  The secure
      transport MUST provide Confidentiality Protection.

Does this option really make sense?  When would you want Confidentiality but not integrity?
Isn't this dangerous?
 
Section 8.3
 
Therefore, two or more occurrences of this attribute
 SHOULD NOT be included in a single service provisioning message, such
 as Access-Accept or CoA.
[BA] I think you mean Change-of-Authorization Request (CoA-Request) here.
 
Section 8.4
 
It MAY be used in both Access-Request and Access-Accept packets.
[BA] The table indicates that it can only be included in Access-Accept packets.
 
Section 9
 
The examples use the Transport-Protocol Attribute, which is not defined in this
document any more.  Also, please include the value of NAS-Port-Type in the examples.
 
Section 11
 
I'd recommend moving this to a sub-section under Security Considerations.
 
Section 13
 
This section needs to be rewritten to list the new attribute for which numbers being
requested, as well as the new value for Service-Type.