[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Access-Reject (was RE: Comments on draft-carroll-dynmobileip- cdma -04.txt)



Avi Lior <avi@bridgewatersystems.com> wrote:
> No.  That is the problem we are now facing. Authorize-Only messages maybe
> sent by the NAS without receiving a CoA.
> This makes perfect sense.

  ... outside of the scope of RFC 3576, where meaning is
implementation-defined.

> Here is an simple example.  If an already authenticated user wants to
> establish a new call VoIP call etc... The NAS can then Authorize that call
> by issueing an Access-Request Authorize-Only.  No need to autenticate again
> right?

  I can see that.  But the more I think about it, the more I believe
that "Authorize-Only" is inappropriate in this context.  I'll continue
that discussion elsewhere, though.


  RADIUS is being deployed in situations where it is performing
authentication and authorization for access *other* than layer 2
connections.  e.g. web/ftp servers, user login authentication, etc.
All of these "sessions" have clear start, stop, and authorization
semantics.  These semantics can often be represented within the
existing RADIUS packet and attribute encapsulations.

  My suggestion for the "issues and fixes" document is the following
text:


    The RADIUS specification [rfc's] is defined in reference to dialin
    authentication, layer 2 connections, and user "sessions" are
    discussed within that context.  RADIUS has been deployed, however,
    in the context of other layers and sessions where user
    authentication, authorization, and accounting is desired.  For
    example, existing deployments use RADIUS as a "back-end" for
    authenticating VOIP connections [digest], HTTP sessions [apache],
    FTP sessions [proftpd, and machine logins for multiple operating
    systems [bsdi, pam, gina].  In those contexts, the implementation
    MUST interpret the RADIUS specification as narrowly as possible,
    within the scope of the client-server model as described in
    RADIUS [RFC 2865] Section 1:

  <quote>
   Client/Server Model

      A Network Access Server (NAS) operates as a client of RADIUS.  The
      client is responsible for passing user information to designated
      RADIUS servers, and then acting on the response which is returned.

      RADIUS servers are responsible for receiving user connection
      requests, authenticating the user, and then returning all
      configuration information necessary for the client to deliver
      service to the user.

      A RADIUS server can act as a proxy client to other RADIUS servers
      or other kinds of authentication servers.
   </quote>

    Any deployment of RADIUS outside of the scope of dialin
    authentication MUST therefore interpret RADIUS within the context
    of the service that the RADIUS client is delivering to the user
    who is requesting authentication, authorization, and accounting.
    For example, an Access-Reject sent to the client MUST be
    interpreted by the client as a rejection of the users request for
    service, and the client MUST no longer offer that service to the
    user.  In the deployments listed above, this rejection will mean
    termination of a VOIP call, TCP connection, or user login session.


  I'll resubmit this using the ISSUES format.

  Alan DeKok.

--
to unsubscribe send a message to radiusext-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://psg.com/lists/radiusext/>