Re: [radext] WGLC #2 for draft-ietf-radext-dtls-04

Peter Deacon <peterd@iea-software.com> Sat, 06 April 2013 07:28 UTC

Return-Path: <peterd@iea-software.com>
X-Original-To: radext@ietfa.amsl.com
Delivered-To: radext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C69A421F940F for <radext@ietfa.amsl.com>; Sat, 6 Apr 2013 00:28:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.522
X-Spam-Level:
X-Spam-Status: No, score=-2.522 tagged_above=-999 required=5 tests=[AWL=0.078, BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9mN4MTvf8lu7 for <radext@ietfa.amsl.com>; Sat, 6 Apr 2013 00:28:43 -0700 (PDT)
Received: from aspen.internal.iea-software.com (remote.iea-software.com [70.89.142.196]) by ietfa.amsl.com (Postfix) with ESMTP id 753E121F940D for <radext@ietf.org>; Sat, 6 Apr 2013 00:28:43 -0700 (PDT)
Received: from SMURF (unverified [10.0.3.195]) by aspen.internal.iea-software.com (Rockliffe SMTPRA 7.0.6) with ESMTP id <B0005878368@aspen.internal.iea-software.com>; Sat, 6 Apr 2013 00:28:42 -0700
Date: Sat, 06 Apr 2013 00:28:39 -0700
From: Peter Deacon <peterd@iea-software.com>
To: Alan DeKok <aland@deployingradius.com>
In-Reply-To: <515EDBB8.2020101@deployingradius.com>
Message-ID: <alpine.WNT.2.00.1304052202020.3988@SMURF>
References: <1A5FDF7C-9E93-447E-A103-9700349CB2F5@gmail.com> <alpine.WNT.2.00.1304021450180.3988@SMURF> <515C3604.3040406@deployingradius.com> <alpine.WNT.2.00.1304042021411.3988@SMURF> <515EDBB8.2020101@deployingradius.com>
User-Agent: Alpine 2.00 (WNT 1167 2008-08-23)
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset="US-ASCII"; format="flowed"
Cc: radext@ietf.org, radext-chairs@tools.ietf.org
Subject: Re: [radext] WGLC #2 for draft-ietf-radext-dtls-04
X-BeenThere: radext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: RADIUS EXTensions working group discussion list <radext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/radext>, <mailto:radext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/radext>
List-Post: <mailto:radext@ietf.org>
List-Help: <mailto:radext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/radext>, <mailto:radext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 06 Apr 2013 07:28:44 -0000

On Fri, 5 Apr 2013, Alan DeKok wrote:

>> If an operator is deciding they want to improve the security of their
>> system they would be *required* to accept responses with lower security
>> after they have declared otherwise.

>  Uh... they declared that RADIUS/UDP packets were acceptable.  The DTLS
> flag is for *new* traffic.

It makes a decision for the operator by assuming past configuration is 
still desired or applicable.

>  It makes no sense to send RADIUS/UDP packets, and then ignore the
> responses because DTLS is now required.

When switching to DTLS clients may no longer be capable or willing to 
touch RADIUS/UDP.  I'm not arguing against the behavior.  I just think the 
MUST requirement is too strong.

>  The point of the transition path is to *allow* a transition path. 
> Otherwise an administrator needs to modify both ends simultaneously. 
> He also needs to deal with dropped traffic due to the human 
> "simultaneous" having a different timescale from the computer 
> "simultaneous".

>  i.e. there may be seconds to minutes where the two systems are out of 
> sync, and *all* RADIUS traffic is dropped.

>  For someone who is worried about idle timeout synchronization, it's 
> surprising that you're OK with having no protocol synchronization.  One 
> works in the real world and causes no real-world problems.  The other
> causes network outages and potentially loss of revenue.

At some point the operator would have had to update firmware or software 
taking the system offline to obtain RADIUS/DTLS functionality.  These 
kinds of things are handled normally within a planned maintenance window.

As draft points out in section 10.3 this automatic scheme causes breakage 
while there are multiple clients behind a single IP.  When just one of 
them upgrades all other clients break causing network outage and potential 
loss of revenue.  The simple manual server knobs without migration 
behavior in this case prevents migration from *causing* an outage.

Having thought about this a bit more perhaps it would be better simply to 
move migration procedure from server to client.  This would fix NAT 
problems and server "flag" would only be used to declare level of security 
it is willing to accept.

>> We see lots of NASes with only a few if any concurrent users.  It is not
>> uncommon for new RADIUS traffic to be seen on orders of tens of minutes
>> to hours.  Having a connection open hurts nobody and prevents delay
>> including possibly additional delay to failover for users coming
>> online.  It also prevents state sync problems..(see my comments below)

>  This is related to the RFC2865 issue of "keep alive considered
> harmful".  If there's no traffic to the RADIUS server for hours, having
> DTLS heartbeats have little benefit.

>  I think the arguments against this are best summarized by the 20
> year-old argument against keep-alives.

RFC 2865 makes this argument in context of probing server availability.

DTLS heartbeat communicates DTLS session availability.

Now that there are sessions to be managed and connect first constraints on 
source port usage have to be careful with context of RFC 2865 keepalive 
philosophy.

The main reason I see a need to use heartbeats is to thread the needle 
keeping UDP NAT associations from expiring, letting servers know our 
session is not forgotten and detecting session termination.  None of these 
concerns apply to RADIUS/UDP.

I would be happy if DTLS heartbeats were able to reset server idle 
timeout.  Thats all I want.

In my view the only "application layer" thing that works for purpose of 
determining useful overall systems availability is still passive 
observation of response to client requests in the spirit of RFC 2865.

regards,
Peter