Re: [dhcwg] FW: New Version Notification for draft-yeh-dhc-dhcpv6-authorization-opt-00.txt

Leaf yeh <leaf.y.yeh@huawei.com> Wed, 28 March 2012 14:05 UTC

Return-Path: <leaf.y.yeh@huawei.com>
X-Original-To: dhcwg@ietfa.amsl.com
Delivered-To: dhcwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EE24221E824B for <dhcwg@ietfa.amsl.com>; Wed, 28 Mar 2012 07:05:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=-0.001, BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8MyAZTKMrhQa for <dhcwg@ietfa.amsl.com>; Wed, 28 Mar 2012 07:05:35 -0700 (PDT)
Received: from dfwrgout.huawei.com (dfwrgout.huawei.com [206.16.17.72]) by ietfa.amsl.com (Postfix) with ESMTP id 8740921E808E for <dhcwg@ietf.org>; Wed, 28 Mar 2012 07:05:35 -0700 (PDT)
Received: from 172.18.9.243 (EHLO dfweml201-edg.china.huawei.com) ([172.18.9.243]) by dfwrg02-dlp.huawei.com (MOS 4.2.3-GA FastPath) with ESMTP id AEL53744; Wed, 28 Mar 2012 10:05:35 -0400 (EDT)
Received: from DFWEML404-HUB.china.huawei.com (10.193.5.203) by dfweml201-edg.china.huawei.com (172.18.9.107) with Microsoft SMTP Server (TLS) id 14.1.323.3; Wed, 28 Mar 2012 07:03:09 -0700
Received: from SZXEML419-HUB.china.huawei.com (10.82.67.158) by dfweml404-hub.china.huawei.com (10.193.5.203) with Microsoft SMTP Server (TLS) id 14.1.323.3; Wed, 28 Mar 2012 07:03:13 -0700
Received: from SZXEML510-MBX.china.huawei.com ([169.254.7.75]) by szxeml419-hub.china.huawei.com ([10.82.67.158]) with mapi id 14.01.0323.003; Wed, 28 Mar 2012 22:03:08 +0800
From: Leaf yeh <leaf.y.yeh@huawei.com>
To: Ted Lemon <Ted.Lemon@nominum.com>
Thread-Topic: [dhcwg] FW: New Version Notification for draft-yeh-dhc-dhcpv6-authorization-opt-00.txt
Thread-Index: AQHNDNBPZKAXl95iTE6kUm0fOpBKvZZ/jsKkgAAuYXWAAAA7Wg==
Date: Wed, 28 Mar 2012 14:03:08 +0000
Message-ID: <99ED2276-8625-4405-9BE1-2AD4841D83F1@mimectl>
References: <E1CE3E6E6D4E1C438B0ADC9FFFA345EA218D0B71@SZXEML510-MBX.china.huawei.com>, <8D23D4052ABE7A4490E77B1A012B6307472D0C15@mbx-01.win.nominum.com>
In-Reply-To: <8D23D4052ABE7A4490E77B1A012B6307472D0C15@mbx-01.win.nominum.com>
Accept-Language: en-US, zh-CN
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [172.24.1.68]
Content-Type: multipart/alternative; boundary="_000_99ED2276862544059BE12AD4841D83F1mimectl_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Cc: dhc WG <dhcwg@ietf.org>
Subject: Re: [dhcwg] FW: New Version Notification for draft-yeh-dhc-dhcpv6-authorization-opt-00.txt
X-BeenThere: dhcwg@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <dhcwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dhcwg>
List-Post: <mailto:dhcwg@ietf.org>
List-Help: <mailto:dhcwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Mar 2012 14:05:37 -0000

Hi, Ted

Thanks for your comments of the quick review and text revisions after '/s'. I will update these revision in the '-01'.

Ted  - *** There is no reason to use either suboptions or RADIUS options.   The
right thing to do is simply define a DHCP option to carry each RADIUS attribute
that you think the DHCP server might need.   Sub-options are common in DHCPv4
because there are only 256 option codes possible, but in DHCPv6 this is not a
problem, and the additional complexity introduced by suboptions is undesirable.

Section 4 of this draft raised the discussion on the option design. Design-1 employs the sub-option; Design-2 employs the same method of RFC4014. Hope we could figure out the best design in the WG. The code space of DHCPv6 option is 2-octect, so we don't need to worry about the exhaustion of DHCPv6 option codes. The draft could request the option code for Option_Pool_Name, Option_Address_Prefix_Auth from the same space for Option_Authorization, such as OPTION_IAPREFIX(26) in OPTION_IA_PD(25), or OPTION_IAADDR(5) in OPTION_IA_NA(3). That means the concept of sub-option is not necessary in this draft, the 'contained option' might be the substitute for the text.


Ted - *** So, the following should all just be DHCPv6 options, and there should be
no Option_Authorization option.

The following (Option_Pool_Name, Option_Address_Prefix_Auth ) could be DHCPv6 options, and also could be the 'contained option' in the 'container option', Option_Authorization.


Ted - *** You need to say how the string is encoded; I'd suggest UTF8 or
NVT-ASCII, whichever makes more sense to you.   UTF8 is better if
it's possible, but I don't know what the RADIUS spec says.

The defintion of RADIUS attribute 'Framed-Pool' in the setion 5.18 of RFC2869 is quoted as 'The string field contains the name of an assigned address pool configured on the NAS.'. The defintion of RADIUS attribute 'Framed-IPv6-Pool' in the setion 2.6 of RFC3316  is quoted as 'The string field contains the name of an assigned IPv6 prefix pool configured on the NAS. The field is not NUL (hex 00) terminated.'. The definetion of 'string'data type in RADIUS attribute can be found in section 5 of RFC2865 and section 2.1 of RFC6158, quoted as '8-bit binary data'. UTF-8 is used in 'text' data type of RADIUS.

Ted - *** Why not have two options here, one an address and the other a prefix?
Is there a reason why it makes sense to overload this (e.g., does RADIUS
do it this way?)

No special reason here, just supposed the address and the prefix could be presented in the unified format. I am ok with re-define 2 options here. RADIUS employs one data type for 'IPv6 address' and the other data type for 'IPv6 prefix' per the section 2.1 of RFC6158 (or the section 2.1, 2.3 of RFC3162).

Ted - *** Okay, so RADIUS does it the same way I'd suggest doing it for DHCP.

Ted - *** This really isn't kosher.   DHCP servers do address allocation,
not relay agents.   If the RADIUS server actually controls address
allocation, there is no need for a DHCP server.



As mentioned in section 6 of this draft, the relay includes Option_Authorization per the RADIUS attrbutes in the message of 'Access-Accept'. The server will respond (or do address allocation) per the indication in Option_Authorization, as the same behavior when the server locates on the NAS (BRAS). In fact, the idea in this draft expects the sever only do the address/prefix allocation. Hope it is clarified.





Best Regards,
Leaf



From: Ted Lemon [Ted.Lemon@nominum.com]
Sent: Wednesday, March 28, 2012 18:48
To: Leaf yeh; dhc WG
Subject: RE: [dhcwg] FW: New Version Notification for draft-yeh-dhc-dhcpv6-authorization-opt-00.txt


I had a chance to give the draft a thorough read yesterday; I've attached comments and proposed edits.