Re: [radext] Adoption call for draft-perez-radext-radius-fragmentation-06

Alan DeKok <aland@deployingradius.com> Thu, 22 August 2013 13:19 UTC

Return-Path: <aland@deployingradius.com>
X-Original-To: radext@ietfa.amsl.com
Delivered-To: radext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6756611E81C4 for <radext@ietfa.amsl.com>; Thu, 22 Aug 2013 06:19:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level:
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eNAfJTrtv5ZQ for <radext@ietfa.amsl.com>; Thu, 22 Aug 2013 06:19:11 -0700 (PDT)
Received: from power.freeradius.org (power.freeradius.org [88.190.25.44]) by ietfa.amsl.com (Postfix) with ESMTP id 869BD11E81B8 for <radext@ietf.org>; Thu, 22 Aug 2013 06:19:11 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by power.freeradius.org (Postfix) with ESMTP id 2AEE72240144; Thu, 22 Aug 2013 15:18:42 +0200 (CEST)
X-Virus-Scanned: Debian amavisd-new at power.freeradius.org
Received: from power.freeradius.org ([127.0.0.1]) by localhost (power.freeradius.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 91miLdv2OpL0; Thu, 22 Aug 2013 15:18:40 +0200 (CEST)
Received: from Thor-2.local (unknown [70.50.218.116]) by power.freeradius.org (Postfix) with ESMTPSA id 27675224013E; Thu, 22 Aug 2013 15:18:40 +0200 (CEST)
Message-ID: <52160FB0.30208@deployingradius.com>
Date: Thu, 22 Aug 2013 09:18:40 -0400
From: Alan DeKok <aland@deployingradius.com>
User-Agent: Thunderbird 2.0.0.24 (Macintosh/20100228)
MIME-Version: 1.0
To: Stefan Winter <stefan.winter@restena.lu>
References: <86D0772B-4561-46BD-950D-AF95BED87292@gmail.com> <52146E31.1030701@restena.lu> <5214AE3C.4010909@deployingradius.com> <5214C457.70204@restena.lu>
In-Reply-To: <5214C457.70204@restena.lu>
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit
Cc: radext@ietf.org
Subject: Re: [radext] Adoption call for draft-perez-radext-radius-fragmentation-06
X-BeenThere: radext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: RADIUS EXTensions working group discussion list <radext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/radext>, <mailto:radext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/radext>
List-Post: <mailto:radext@ietf.org>
List-Help: <mailto:radext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/radext>, <mailto:radext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 22 Aug 2013 13:19:17 -0000

Stefan Winter wrote:
> That doesn't seem right. If a proxy supports RFC6929, but not the
> fragmentation draft, it will not know that the T flag exists and can't
> react accordingly. It will see an M flag and some gibberish in the
> Reserved field (which RFC6929 says should simply be ignored). It will
> observe that the M flag requirements are violated and has every right to
> drop the packet.

  Yes.  That presumes (a) everyone implements RFC 6929, and (b) those
implementations get deployed to proxies.

  I don't think either will happen for a while.  That limits the
problems with this approach.

> Imagine a single access point which is part of "eduroam" and "S-Mobile";
> and emits both SSIDs. Both consortia use RADIUS auth; the access point
> is dumb and only knows "its" authentication server.
> 
> At that point, the RADIUS server which gets the AP's packet needs to
> realise: if a user tried to log into the eduroam SSID, I'll proxy the
> packet to eduroam infrastructure; if the user tried S-Mobile, I'll proxy
> to their infrastructure.

  I think initially the idea is to have fragmentation from server to
server.  i.e. few (if any) APs will be implementing it.  So the issue
becomes less relevant.

  A server local to the AP can track a users session, including SSID.
And then make proxy decisions based on that.  The proxies in the wider
network will *not* know about the site's SSID, and will *not* be basing
proxy decisions on it.

  Alan DeKok.