[Dime] draft-sarikaya-dimeradext-prefix-auth-ps-00.txt

Behcet Sarikaya <behcetsarikaya@yahoo.com> Mon, 28 July 2008 14:55 UTC

Return-Path: <dime-bounces@ietf.org>
X-Original-To: dime-archive@megatron.ietf.org
Delivered-To: ietfarch-dime-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 4E3C13A6A1D; Mon, 28 Jul 2008 07:55:50 -0700 (PDT)
X-Original-To: dime@core3.amsl.com
Delivered-To: dime@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 8AC103A6AD3 for <dime@core3.amsl.com>; Mon, 28 Jul 2008 07:55:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.264
X-Spam-Level:
X-Spam-Status: No, score=-2.264 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, IP_NOT_FRIENDLY=0.334]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jFZCClaCKIun for <dime@core3.amsl.com>; Mon, 28 Jul 2008 07:55:45 -0700 (PDT)
Received: from web84306.mail.re1.yahoo.com (web84306.mail.re1.yahoo.com [69.147.74.185]) by core3.amsl.com (Postfix) with SMTP id 949CD3A6ACC for <dime@ietf.org>; Mon, 28 Jul 2008 07:55:45 -0700 (PDT)
Received: (qmail 55421 invoked by uid 60001); 28 Jul 2008 14:55:55 -0000
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=Received:X-Mailer:Date:From:Reply-To:Subject:To:Cc:MIME-Version:Content-Type:Message-ID; b=PSPq41bUQXZrDACif3h2raIfe34e6SGyqYFkiEIFT9V7YFVHkbP6q/uCJSX8IiCfNJMU8T7qSPElXVuBXAphP8okzjACS5a37x7UJlV4DPEJxGnTZnmy57H0Kgkn9oQBna+i8IMF8SF4cGsnvmLF6H/q6trF3puT9YjJf4de/8M=;
Received: from [130.129.20.221] by web84306.mail.re1.yahoo.com via HTTP; Mon, 28 Jul 2008 07:55:54 PDT
X-Mailer: YahooMailRC/975.45 YahooMailWebService/0.7.199
Date: Mon, 28 Jul 2008 07:55:54 -0700
From: Behcet Sarikaya <behcetsarikaya@yahoo.com>
To: Hannes Tschofenig <Hannes.Tschofenig@gmx.net>
MIME-Version: 1.0
Message-ID: <24043.55283.qm@web84306.mail.re1.yahoo.com>
Cc: dime@ietf.org
Subject: [Dime] draft-sarikaya-dimeradext-prefix-auth-ps-00.txt
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: Behcet Sarikaya <sarikaya@ieee.org>
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/dime>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0096999340=="
Sender: dime-bounces@ietf.org
Errors-To: dime-bounces@ietf.org

Hi Hannes,
  Regarding the issue of SDOs and this draft raised by Avi, I am surprised by the replies from Alper as well as from Avi. 
  The fact is that this problem (AAA based prefix authorization) was not brought to any SDOs by us, at least not yet. I don't know what type of conclusion can be made from this, I leave it up to the working group.
  I regret the statements made by WiMAX "guru" on this issue during the meeting today. I suggest that people in such positions please make correct (and possibly also objective) statements and refrain from confusing other people in the meeting.

Regards,

Behcet


----- Original Message ----
From: Hannes Tschofenig <Hannes.Tschofenig@gmx.net>
To: Frank Xia <xiayangsong@huawei.com>
Cc: dime@ietf.org
Sent: Wednesday, July 23, 2008 3:13:21 PM
Subject: Re: [Dime] Relationship between draft-sarikaya-dimeradext-prefix-auth-ps-00.txt and draft-sarikaya-dime-prefix-delegation-ps-01.txt

Hi Frank,

Frank Xia wrote:
> Hi Hannes
>
> Please check my reply..
>
> BR
> Frank
> ----- Original Message ----- From: "Hannes Tschofenig" 
> <Hannes.Tschofenig@gmx.net>
> To: "Frank Xia" <xiayangsong@huawei.com>
> Cc: <dime@ietf.org>
> Sent: Wednesday, July 23, 2008 2:30 PM
> Subject: Re: [Dime] Relationship between 
> draft-sarikaya-dimeradext-prefix-auth-ps-00.txt and 
> draft-sarikaya-dime-prefix-delegation-ps-01.txt
>
>
>> Hi Frank,
>>
>> thanks for the quick feedback.
>>
>> I have a few more comments inline
>>
>> Frank Xia wrote:
>>> Hi Hannes
>>>
>>> I try to jump ahead of Behcet to  answer
>>> some of your questions :-)
>>>
>>> Please check inline comments.
>>>
>>> BR
>>> Frank
>>>
>>>
>>> ----- Original Message ----- From: "Hannes Tschofenig" 
>>> <Hannes.Tschofenig@gmx.net>
>>> To: <dime@ietf.org>
>>> Sent: Wednesday, July 23, 2008 7:41 AM
>>> Subject: [Dime] Relationship between 
>>> draft-sarikaya-dimeradext-prefix-auth-ps-00.txt and 
>>> draft-sarikaya-dime-prefix-delegation-ps-01.txt
>>>
>>>
>>>> I have sent my rechartering questions around regarding these two 
>>>> documents. I took a brief look at them and I wonder what the 
>>>> relationship between the two documents is. Why are there 2 
>>>> documents on almost the same subject?
>>>>
>>> Frank=>They have almost the same main idea.
>>> You can only refer to the draft
>>> http://www.ietf.org/internet-drafts/draft-sarikaya-dimeradext-prefix-auth-ps-00.txt. 
>>>
>>>
>> Ok. We can essentially forget the other document. Right?
> Frank=>Yes.
>
>>
>>
>>>> When I browse through 
>>>> http://www.ietf.org/internet-drafts/draft-sarikaya-dimeradext-prefix-auth-ps-00.txt 
>>>> then I sometimes get the impression that you would like to later 
>>>> standardize a Diameter application. I wasn't sure why additional 
>>>> AVPs aren't sufficient, in case existing AVPs cannot be re-used?
>>> Frank=>Prefix delegation is an authorization which may be
>>> decoupled from an authentication. RFC4005/4072 only deal
>>> with coupled authentication& authorization scenario.
>>>
>> It is true that the request for prefix authorization is not run 
>> independently from the message exchanges used for authentication.
> Frank=>A little bit confusing.   You meant "independently " or not?
>

I agree with you that RFC 4072 combines the prefix authorization 
protocol run with the EAP protocol run.

RFC 4005 is a bit different since it has the RAR and RAA commands that 
allow you to perform re-authorization.Wouldn't they be a nice fit?

>>
>>>>
>>>> Let me also comment on a few selected items:
>>>>
>>>>
>>>> AAA-based prefix authorization (PA) application MUST run between a 
>>>> NAS, located on AR, LMA, MR, etc. and an AAA server.
>>>>
>>>> [hannes] This requirement does not say a lot. The AAA protocol is 
>>>> always run between a client and a server.
>>>>
>>>>
>>>>
>>>> AAA-based PA application MUST support the AAA client to request 
>>>> prefixes from an AAA server. AAA-based PA application MUST support 
>>>> the client to give back the prefixes to the AAA server.
>>>>
>>>> [hannes] With the last sentence you mean that you need to have a 
>>>> way to indicate that the AAA session is terminated?
>>> Frank=>In IPv6 renumbering scenario, it is necessary
>>>
>>>>
>>>> If Secure Neighbor Discovery (SEND) [RFC3971] is used by the 
>>>> devices on the network, the certificate or the information needed 
>>>> to obtain a certificate SHOULD also be sent by the AAA server to NAS.
>>>>
>>>> [hannes] What information do you exactly want to carry towards the 
>>>> AAA client?
>>> Frank=>IPv6 address prefix for NAS is authorized to route
>>>
>> I mean, you want to provide
>> * prefix
>> * lifetime
>> * certificate
>> from the AAA server to the AAA client.
>> What else?
> Frank=> I can only find these now.
>
>>
>>>>
>>>> In point-to-point link operation, the NAS MUST identify the 
>>>> interface of MN in its request. The NAS MAY provide a prefix hint, 
>>>> e.g. of length /48 to which the AAA server MUST reply with one or 
>>>> more prefixes, e.g. of length /64.
>>>>
>>>> [hannes] how would such an interface identifier look like?
>>> Frank=>Tentatively, it can be the interface identifier part of 
>>> host's link local
>>> address, NAI (RFC4282), or MAC address.
>>>
>> I would like to better understand what the AAA server should be doing 
>> based on this hint.
>> Is the "hint" used to identify the end user and it's host?
> Frank=>The hint is only for expressing client's preference.  The
> server may honor this or not based on it's own discretion.
>
I guess you need to describe the details of this hint a bit more.

>>
>>>>
>>>> In point-to-point operation, the AAA server MAY assign the 
>>>> prefix(es) and related parameters such as the lifetime and the 
>>>> certificates to MN from MN's profile.
>>>>
>>>> [hannes] I am not sure what this means. You mean that the AAA 
>>>> server should keep state to make sure that it does not forget what 
>>>> it has provided to the MN?
>>> Frank=>Probably, the AAA server for prefix delegation is different from
>>> the AAA server for authentication.  So it is necessary to record the 
>>> state.
>>>
>> OK.
>>
>> I don't think that you need to say that since this is already done 
>> today.
>>
>>>> For some reason the problem is not well described. In Section 3 of 
>>>> draft-sarikaya-dimeradext-prefix-auth-ps-00.txt you refer to RFC 
>>>> 4818 but I do not quite understand what you would like to see 
>>>> happening instead.
>>>>
>>>> AAA-based prefix authorization application SHOULD support prefix 
>>>> release procedures.
>>>>
>>>> [hannes] isn't this the same as mentioned in the previous 
>>>> requirement "AAA-based PA application MUST support the client to 
>>>> give back the prefixes to the AAA server. "
>>> Frank=>It is the same.
>>>
>>>>
>>>> The NAS is responsible for renewing the prefixes when the lifetime 
>>>> expires. The NAS SHOULD be able to extend the lifetime of the 
>>>> prefixes using messages designed for this purpose.
>>>>
>>>> [hannes] Why wouldn't we tie the lifetime of the prefix to the 
>>>> lifetime of the AAA session itself? Makes things much easier. The 
>>>> same applies a bit to this requirement: "It SHOULD be possible to 
>>>> renumber the prefixes authorized by AAA server. The AAA server 
>>>> SHOULD initiate prefix renumbering process. "
>>> Frank=>IPv6 renumbering is a feature of IPv6.
>>> If we tie the lifetime of prefix to the lifetime of AAA session,
>>> it is certain that we can't suport IPv6 renumbering.
>>> Even though IPv6 renumbering probably happen probably
>>> infrequently, it is better for us to have such a mechnism to support.
>>>
>>> For IPv6 renumbering, here are some references
>>> RFC 1916/2071/2072/2874/2894/4076/4192.
>>>
>> I know IPv6 renumbering but I was wondering about the following issue.
>>
>> IPv6 renumber should occur less frequently and hence the lifetime is 
>> rather long.
>> A AAA session typically isn't very long lived and it is possible to 
>> influence the lifetime with various parameters.
> Frank=>IMHO, I don't agree with your assumption on AAA session lifetime.
> In fact, many people including me are always online because many 
> operators
> don't charge based on time.  For example, $30 a month is for no 
> limited access.
>
I don't know your home setup but typically you have a DSL router at home 
and your PC / laptop may be running all the time. Your DSL router 
re-connects automatically when re-authentication is needed.

>>
>> Now, isn't it possible to re-authenticate and re-authorize the end 
>> host in case of network renumbering. Given that you have to 
>> re-authenticate quite often for other reasons as well shouldn't cause 
>> big problems.
> Frank=>IMHO, it is not very graceful to kick off all the users
> when renumbering.
Maybe.

When I look at the IT problems I had this year then renumbering is the 
least thing I worry about.

>>
>> I am just trying to figure out how tough the requirements are.
> Frank=>IMHO, it is very hard to figure out before widely IPv6 deployment.
> However, it is probably too late after large scale deployment.
>
Difficult to know, I agree.

Ciao
Hannes

_______________________________________________
DiME mailing list
DiME@ietf.org
https://www.ietf.org/mailman/listinfo/dime
_______________________________________________
DiME mailing list
DiME@ietf.org
https://www.ietf.org/mailman/listinfo/dime