Re: [radext] Adoption call for draft-perez-radext-radius-fragmentation-06

Peter Deacon <peterd@iea-software.com> Thu, 22 August 2013 16:48 UTC

Return-Path: <peterd@iea-software.com>
X-Original-To: radext@ietfa.amsl.com
Delivered-To: radext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B297611E80FC for <radext@ietfa.amsl.com>; Thu, 22 Aug 2013 09:48:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MuBzXerCPjlc for <radext@ietfa.amsl.com>; Thu, 22 Aug 2013 09:48:11 -0700 (PDT)
Received: from aspen.internal.iea-software.com (remote.iea-software.com [70.89.142.196]) by ietfa.amsl.com (Postfix) with ESMTP id 5B34911E80E3 for <radext@ietf.org>; Thu, 22 Aug 2013 09:48:11 -0700 (PDT)
Received: from SMURF (unverified [10.0.3.195]) by aspen.internal.iea-software.com (Rockliffe SMTPRA 7.0.6) with ESMTP id <B0005896352@aspen.internal.iea-software.com>; Thu, 22 Aug 2013 09:48:10 -0700
Date: Thu, 22 Aug 2013 09:48:08 -0700
From: Peter Deacon <peterd@iea-software.com>
To: Alan DeKok <aland@deployingradius.com>
In-Reply-To: <52160EB3.9070603@deployingradius.com>
Message-ID: <alpine.WNT.2.00.1308220754420.1748@SMURF>
References: <86D0772B-4561-46BD-950D-AF95BED87292@gmail.com> <alpine.WNT.2.00.1308210755460.1748@SMURF> <52160EB3.9070603@deployingradius.com>
User-Agent: Alpine 2.00 (WNT 1167 2008-08-23)
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset="US-ASCII"; format="flowed"
Cc: "radext@ietf.org" <radext@ietf.org>
Subject: Re: [radext] Adoption call for draft-perez-radext-radius-fragmentation-06
X-BeenThere: radext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: RADIUS EXTensions working group discussion list <radext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/radext>, <mailto:radext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/radext>
List-Post: <mailto:radext@ietf.org>
List-Help: <mailto:radext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/radext>, <mailto:radext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 22 Aug 2013 16:48:16 -0000

On Thu, 22 Aug 2013, Alan DeKok wrote:

>> RFC5176 dynamic auth clients are not necessarily always RADIUS servers.
>> We have production systems where CoA client and RADIUS server are
>> separate with separate roles.  Seeing value in maintaining separation I
>> do not favor Additional-Authorization.

>  There is a network connecting the machines.  The RADIUS server can
> proxy Access-Requests to the maching hosting the CoA information.

Speaking for myself this is problematic.  Dynamic auth clients are just 
clients with no capability to act as RADIUS server.  They only manage a 
subset of possible authorization parameters not capable of full response.

The argument is not whether it is possible to coordinate rather value in 
maintaining separation.  If transport limits are lifted rather than 
supporting adoption of this draft none of these "workarounds" are 
necessary.

>> Accounting proposal is not atomic and depends on assumptions about type
>> of content.  (e.g long attribute not able to fit within 4096 byte limit
>> cannot be transmitted)

>  There has been no demonstrated need for large accounting packets.

If authors see no value recommend removing associated references from 
draft.

>> Proposed 'T' bit in extended long attributes means existing systems
>> supporting extended attributes may require enhancement to pass needed
>> data.  Despite 'SHOULD' language from RFC6929 I do not believe it
>> reasonable expectation proxy systems able to understand an attribute
>> known to be broke would elect to forward such an attribute anyway.

>  There are no deployed proxies which implement 6929.  The

Incorrect

> implementations could support the "T" bit before this document is
> finalized.  Nothing prevents implementations from adding new,
> non-standardized functionality.

If modification is necessary I see no value in supporting this draft vs 
solutions addressing underlying transport limit.  The whole point was that 
it work with existing systems unmodified.

>> General.

>> Attribute proxy not possible without proxy server modification to
>> support draft.

>  The only issue is the T bit.  No other proxy modifications are required.

I apologize for any confusion.  By attribute proxy I mean forwarding 
requests based on attributes other than User-Name.

>> Existing proxy servers not supporting draft may lose ability to
>> understand/enforce policy when attribute fragmentation is used.

>  Tough.  Existing proxy servers which don't implement RFC 6929 won't
> understand / enforce policies when RFC 6929 attributes are used.

>  This argument is, IMHO, ridiculous.  If we are to believe it at face 
> value, it means we cannot implement ANY new feature in RADIUS.  Because 
> existing proxies won't be able to enforce policies for those new 
> features.

My understanding is both existing and new attributes may be conveyed using 
the fragmentation mechanism.  Existing attributes may end up being 
transmitted in separate requests where previously they would have to occur 
in the same request.

>> A policy of limiting large RADIUS UDP packets to MTU would about triple
>> number of round trips needed to convey same information.

>  Some systems don't support UDP fragmentation, and drop all fragmented 
> UDP packets.  So one alternative is to have *no* RADIUS traffic go 
> through the network.

>  You may think that's better.  I don't.

This is an edge problem within most operators administrative control to 
effect.

regards,
Peter