Re: [radext] Server identity and RFC7585bis (was: Review of draft-ietf-radext-radiusdtls)

Alexander Clouter <alex+ietf@coremem.com> Wed, 10 April 2024 21:57 UTC

Return-Path: <alex+ietf@coremem.com>
X-Original-To: radext@ietfa.amsl.com
Delivered-To: radext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3ABBDC14F604 for <radext@ietfa.amsl.com>; Wed, 10 Apr 2024 14:57:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.797
X-Spam-Level:
X-Spam-Status: No, score=-2.797 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=coremem.com header.b="rv8rNL31"; dkim=pass (2048-bit key) header.d=messagingengine.com header.b="LfeL1CGn"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FpibvCTdkc86 for <radext@ietfa.amsl.com>; Wed, 10 Apr 2024 14:57:43 -0700 (PDT)
Received: from fout6-smtp.messagingengine.com (fout6-smtp.messagingengine.com [103.168.172.149]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6D7C5C14F60E for <radext@ietf.org>; Wed, 10 Apr 2024 14:57:43 -0700 (PDT)
Received: from compute3.internal (compute3.nyi.internal [10.202.2.43]) by mailfout.nyi.internal (Postfix) with ESMTP id CDB0913800A1 for <radext@ietf.org>; Wed, 10 Apr 2024 17:57:42 -0400 (EDT)
Received: from imap46 ([10.202.2.96]) by compute3.internal (MEProxy); Wed, 10 Apr 2024 17:57:42 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=coremem.com; h= cc:content-transfer-encoding:content-type:content-type:date:date :from:from:in-reply-to:in-reply-to:message-id:mime-version :references:reply-to:subject:subject:to:to; s=fm1; t=1712786262; x=1712872662; bh=1rni7qY0unALsmxxUC3/hG6tWsdjwUDxjSYNTSh1umg=; b= rv8rNL31plFYApgbK+uZzf7i0KIRAYjWVNtae5W9iazet3yv54Qxq4MZVlGd8vBZ BJuo151dp1TcLrIxyh+VmMK/sexRdZR70bGJZ+fiApcJyxDxoVDlLl50HnIlcqOX mlPOBKdgC3ozF5DuaVU11Heau9YtfaZTw9AmFzcBEUodc0CyImWrTGUUlvODp3qV fcqB26le+ChTYZllchuy9Xunchr/z0BMVh/Pv0sRMQSdo+jWRKGoyNsdtZtnXM7+ bjy7NH9+EyzF1bnyF7sFS9RS8XvedxRBIw89bjbViCvSYBfuEB+blhsGx7wndwjK FAqq2hWuvbs/ec17O2scZg==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-transfer-encoding:content-type :content-type:date:date:feedback-id:feedback-id:from:from :in-reply-to:in-reply-to:message-id:mime-version:references :reply-to:subject:subject:to:to:x-me-proxy:x-me-proxy :x-me-sender:x-me-sender:x-sasl-enc; s=fm2; t=1712786262; x= 1712872662; bh=1rni7qY0unALsmxxUC3/hG6tWsdjwUDxjSYNTSh1umg=; b=L feL1CGnsEHlwF9myKj45NEJt+rV669/wrKgmTC4mk6KWdB54s1y+1DKGroYsShvC +AICA4+CSY9//xL45ISoZ3VGGfJgrb7nH415LhYJSCH6XhrU4HBNkzhXI14J8G4p 0rdxeFVjgDfqzZAQ/ABwVpWTvNMOVQF+6osdR+lD0VJND0Pkxbev/4wVKlPJA8AI DTxYXzvuHArgmEsoLUr8GlxaBawM0UnAP3GaB4xr4Yji+24y5pPSlCyS+cCbKUiD SAyVW6E6QC291nJhOXW6P61d14IOWZEUDQ2koRF/6CY2zPhUAWLtHGUez3sEYlKd lqDcjoQu+9rOC/MN1jk3Q==
X-ME-Sender: <xms:VgsXZj9eHP6h6VRVP5iXT_tog98kQsy2O5rAETKkeA5P6RlF8LA3vA> <xme:VgsXZvvWynpgXyBParb5L-DkopBhrf3vFFLppGFCqoqTNPkHKq3VvkESQUzZ1TDrz Hl8n0nD4ZmJFmrwLA>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvledrudehjedgtdehucetufdoteggodetrfdotf fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen uceurghilhhouhhtmecufedttdenucenucfjughrpefofgggkfgjfhffhffvufgtgfesth hqredtreerjeenucfhrhhomhepfdetlhgvgigrnhguvghrucevlhhouhhtvghrfdcuoegr lhgvgidoihgvthhfsegtohhrvghmvghmrdgtohhmqeenucggtffrrghtthgvrhhnpeeltd evfeegueekhedvudejgfethfdvteekjeduvddtueffffefvdekgeduheehgfenucevlhhu shhtvghrufhiiigvpedtnecurfgrrhgrmhepmhgrihhlfhhrohhmpegrlhgvgidoihgvth hfsegtohhrvghmvghmrdgtohhm
X-ME-Proxy: <xmx:VgsXZhBjR1Yym-49ZyQnm8nDJN1CIBS9YO71mAwhu6-SErpDr4D5yw> <xmx:VgsXZvf5CFewfTqu3ZinTbCp2kmC4J7G3G92SJZ_WEDfBn6huMn4vg> <xmx:VgsXZoMcXv0GbOtF0WdqWJYkncnsmODal3x4eJeV10oBbuGaDufRhA> <xmx:VgsXZhlyWtJ-4T3AedvINvMpSPekVYR61BsYAkgSgJjkilbwlc1wcA> <xmx:VgsXZiXSV99e1Q55TOR8e_HJc_xiqBwnpx57PKaalwd-kcgdCtVwJCeI>
Feedback-ID: ie3614602:Fastmail
Received: by mailuser.nyi.internal (Postfix, from userid 501) id 882C92A2008B; Wed, 10 Apr 2024 17:57:42 -0400 (EDT)
X-Mailer: MessagingEngine.com Webmail Interface
User-Agent: Cyrus-JMAP/3.11.0-alpha0-379-gabd37849b7-fm-20240408.001-gabd37849
MIME-Version: 1.0
Message-Id: <dfdaac4a-c4b0-4509-93a6-a41805a16e87@app.fastmail.com>
In-Reply-To: <6628c5c8-5071-476f-9ea2-2875d86304e2@dfn.de>
References: <CA9BEA9C-39EF-4764-A0FE-D122413B37F7@deployingradius.com> <18ef8267-474e-49ae-9204-0c6c79d5e50c@dfn.de> <6628c5c8-5071-476f-9ea2-2875d86304e2@dfn.de>
Date: Wed, 10 Apr 2024 22:57:22 +0100
From: Alexander Clouter <alex+ietf@coremem.com>
To: radext@ietf.org
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/radext/gFHYXt8msYDAJeKJ0aJENQxVfDY>
Subject: Re: [radext] Server identity and RFC7585bis (was: Review of draft-ietf-radext-radiusdtls)
X-BeenThere: radext@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: RADIUS EXTensions working group discussion list <radext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/radext>, <mailto:radext-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/radext/>
List-Post: <mailto:radext@ietf.org>
List-Help: <mailto:radext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/radext>, <mailto:radext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Apr 2024 21:57:48 -0000

Hello,

On Wed, 10 Apr 2024, at 08:34, Jan-Frederik Rieckers wrote:
> On 20.03.24 03:55, Jan-Frederik Rieckers wrote:
>>>     ... If a RADIUS/(D)TLS client has multiple connection to a server, 
>>> it MUST NOT decide to mark the whole server as DOWN until all 
>>> connections to it have been marked DOWN.
>>>
>>>    Maybe add a discussion of what, exactly, is a "server". Destination 
>>> IP?  How is this affected by RFC 7585 dynamic DNS lookups?
>> 
>> I've added a TODO for after the IETF.
>
> I've started to write a section to explain how a server is uniquely 
> identified, but I am failing to come up with anything other than 
> destination IP address and destination port.
> Is there some better qualifier?

This makes me twitchy, especially when things are multi-homed...dual stack of course can be seen as a type of multi-homing.

I think it is important that no one knows the relationship between N connections and the final destination.

It may actually be harmful to think like this.

The connection (stream, datagram, carrier pigeon, ...) is to an endpoint that pinky promises to handle a set of requests (eg. for a given realm).  It is an implementation detail of the endpoint on if a given connection maps back to a particular physical bit of tin, a load balancer, an anycast service...or a flock of pigeons.

I would recommend each connection is just treated (and described) as a *route* to the service endpoint.

It seems easier to read if you replace 'connection' with 'route' when reading it out loud. Connections provide *routes* to a server. When there are no routes, the 'server' (ie. 'service endpoint') is then DOWN.

Alternatively, redefine 'RADIUS/(D)TLS server' as the definition at the moment is 'port' orientated so you cannot use destination IP as an anchor.

Personally, I think it is clearer to describe connections using routing characteristics...but that maybe is just me :)

Cheers