Re: [dhcwg] draft-pruss-dhcp-auth-dsl-00.txt

Richard Pruss <ric@cisco.com> Sun, 04 March 2007 23:04 UTC

Return-path: <dhcwg-bounces@ietf.org>
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1HNzkh-0001Rs-Ai; Sun, 04 Mar 2007 18:04:27 -0500
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1HNzkg-0001RZ-4M for dhcwg@ietf.org; Sun, 04 Mar 2007 18:04:26 -0500
Received: from ams-iport-1.cisco.com ([144.254.224.140]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1HNzke-0002HO-MZ for dhcwg@ietf.org; Sun, 04 Mar 2007 18:04:26 -0500
Received: from ams-dkim-2.cisco.com ([144.254.224.139]) by ams-iport-1.cisco.com with ESMTP; 05 Mar 2007 00:04:24 +0100
Received: from hkg-core-1.cisco.com (hkg-core-1.cisco.com [64.104.123.94]) by ams-dkim-2.cisco.com (8.12.11/8.12.11) with ESMTP id l24N4MaO023650; Mon, 5 Mar 2007 00:04:23 +0100
Received: from xbh-hkg-412.apac.cisco.com (xbh-hkg-412.cisco.com [64.104.123.69]) by hkg-core-1.cisco.com (8.12.10/8.12.6) with ESMTP id l24N4HjO025940; Sun, 4 Mar 2007 23:04:17 GMT
Received: from xfe-hkg-411.apac.cisco.com ([64.104.123.70]) by xbh-hkg-412.apac.cisco.com with Microsoft SMTPSVC(6.0.3790.1830); Mon, 5 Mar 2007 07:04:17 +0800
Received: from syd-rpruss-vpn1.cisco.com ([10.67.195.18]) by xfe-hkg-411.apac.cisco.com with Microsoft SMTPSVC(6.0.3790.1830); Mon, 5 Mar 2007 07:04:16 +0800
Message-ID: <45EB5071.7000601@cisco.com>
Date: Mon, 05 Mar 2007 09:04:17 +1000
From: Richard Pruss <ric@cisco.com>
Organization: Cisco Systems
User-Agent: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.8.0.8) Gecko/20061025 Thunderbird/1.5.0.8 Mnenhy/0.7.4.0
MIME-Version: 1.0
To: Yoshihiro Ohba <yohba@tari.toshiba.com>
Subject: Re: [dhcwg] draft-pruss-dhcp-auth-dsl-00.txt
References: <20070302202844.GC8479@steelhead>
In-Reply-To: <20070302202844.GC8479@steelhead>
Content-Type: text/plain; charset="ISO-2022-JP"
Content-Transfer-Encoding: 7bit
X-OriginalArrivalTime: 04 Mar 2007 23:04:16.0511 (UTC) FILETIME=[6ED650F0:01C75EB1]
DKIM-Signature: v=0.5; a=rsa-sha256; q=dns/txt; l=3631; t=1173049464; x=1173913464; c=relaxed/simple; s=amsdkim2001; h=Content-Type:From:Subject:Content-Transfer-Encoding:MIME-Version; d=cisco.com; i=ric@cisco.com; z=From:=20Richard=20Pruss=20<ric@cisco.com> |Subject:=20Re=3A=20[dhcwg]=20draft-pruss-dhcp-auth-dsl-00.txt |Sender:=20; bh=oeyOS6JqFAhAtO7cHOAhtWOJE7ayxIopa4E8TX7BQTs=; b=P1Xqi0rLuhCYSNGn5FGljuMsRaFFlNTeaUWFuWYpFpIQbMhKK1t+rjdlW9Y1m+cJhZXvQBuB uxpaNXOHcS5O8SOcOiH9xna4OewvXCvvdzcZNZiwyCEmsu8NwQ3IiEFF;
Authentication-Results: ams-dkim-2; header.From=ric@cisco.com; dkim=pass (si g from cisco.com/amsdkim2001 verified; );
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 6cca30437e2d04f45110f2ff8dc1b1d5
Cc: dhcwg@ietf.org
X-BeenThere: dhcwg@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: ric@cisco.com
List-Id: dhcwg.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:dhcwg@ietf.org>
List-Help: <mailto:dhcwg-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=subscribe>
Errors-To: dhcwg-bounces@ietf.org

Possibly it would help you understand if you though of why the NAS
authenticates the subscriber; from section 3.1 of the draft
"
The NAS obtains per-subscriber client
configuration information either locally or from the AAA
infrastructure (which itself may consult external DHCP servers if
necessary) after authentication is successfully completed.
"
In wholesale DSL networks it is common to use the @domain portion of the
username to find retail ISP of the subscriber, they are then
authenticated by that ISP's AAA. This authentication returns
authorizations which in conjunction with the wholesale configuration in
the NAS determines the subscriber IP address, host configuration and
network edge configuration and security authorizations which is all
closely coupled to the retail domain.
>From this perspective, PANA happens to late as the host already has it's
IP address, it would be in the correct IP forwarding context, the
network would already need to have some mechanisms for securing the
domain from layer 3 attacks independent of PANA and so on.

Regards,
Ric

Yoshihiro Ohba wrote:
> Hi,
>
> Let me ask the same fundamental question that I asked before for a
> similar draft related to DHCP and authentication.
>
> Is this WG chartered for developing a solution for network access
> authentication and authorization other than developing authentication
> mechanisms for DHCP?
>
> I am asking this because Introduction of
> draft-pruss-dhcp-auth-dsl-00.txt says:
>
> "
>    This document defines DHCP Options and procedures that allow for a
>    CHAP-based authentication exchange to occur in DHCP in order to
>    enable smooth migration from PPP sessions to IP sessions in a DSL
>    Broadband network environment.  Primary goals are integration of
>    authentication in such a way that it will operate seamlessly with
>    existing RADIUS-based AAA infrastructure and ATM or Ethernet based
>    DSL Networks.  As such, only the termination points of PPP in the DSL
>    network are affected, both of which are devices that would logically
>    need to be updated in any transition from PPP to IP sessions.
> "
>
> Also, I fail to see a reason for IETF to work on combining DHCP and
> network access authentication even as experimental and for the purpose
> of the primary goals stated above.  I believe that the primary goals
> can be achieved by simply using PANA running EAP-MD5 between HGW and
> NAS.  In this case, NAS is acting as EAP authenticator co-located with
> EAP server for EAP-MD5, where the EAP server is acting as a protocol
> translator that converts credentials carried in EAP-MD5 into RADIUS
> attributes or field (i.e., CHAP-Password and CHAP-Challenge or RADIUS
> Request Authenticator field) used for carrying CHAP credentials, and
> vise versa.  If an algorithm other than MD5 is used for CHAP, it is
> also possible to define an experimental EAP method to interwork with
> non-MD5 CHAP algorithms and again let the EAP server on the NAS act as
> a protocol translator.  I think these workarounds are sufficient to
> work with existing RADIUS-based AAA infrastructure and ATM or Ethernet
> based DSL Networks and still allows smooth migration from PPP session
> to IP session with EAP.
>
> The bottomline is, host configuration and network access
> authentication are two different problems that are better solved by
> separate protocols.
>
> Regards,
> Yoshihiro Ohba
>
> _______________________________________________
> dhcwg mailing list
> dhcwg@ietf.org
> https://www1.ietf.org/mailman/listinfo/dhcwg
>
>   

_______________________________________________
dhcwg mailing list
dhcwg@ietf.org
https://www1.ietf.org/mailman/listinfo/dhcwg