Re: [radext] [netmod] Comment on draft-ietf-netmod-system-mgmt-05

Jouni Korhonen <jouni.nospam@gmail.com> Thu, 11 April 2013 06:33 UTC

Return-Path: <jouni.nospam@gmail.com>
X-Original-To: radext@ietfa.amsl.com
Delivered-To: radext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8C59321F8D7A; Wed, 10 Apr 2013 23:33:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.699
X-Spam-Level:
X-Spam-Status: No, score=-0.699 tagged_above=-999 required=5 tests=[AWL=-0.851, BAYES_00=-2.599, FH_RELAY_NODNS=1.451, J_CHICKENPOX_64=0.6, J_CHICKENPOX_65=0.6, RDNS_NONE=0.1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7ykJ5mOqIGFf; Wed, 10 Apr 2013 23:33:00 -0700 (PDT)
Received: from mail-la0-x236.google.com (mail-la0-x236.google.com [IPv6:2a00:1450:4010:c03::236]) by ietfa.amsl.com (Postfix) with ESMTP id 7AC4821F8D31; Wed, 10 Apr 2013 23:32:59 -0700 (PDT)
Received: by mail-la0-f54.google.com with SMTP id ec20so1155893lab.27 for <multiple recipients>; Wed, 10 Apr 2013 23:32:58 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=x-received:content-type:mime-version:subject:from:in-reply-to:date :cc:content-transfer-encoding:message-id:references:to:x-mailer; bh=J7IUzWWov/0EscTT1ADBwkOtjZldJKjb9G8blSTfBc8=; b=gTBRh37cPSj4VNu6cW+sk62o74vpofcVgDvB0wMRnGoMOH7KDhWIMoqASbDyy2PwKq b3MUTHdi3+fS5igZSHb0QanVrHINa7Is2iK3k4qCuPkYCdq10qeMP5fuZ1iwEGQ8bN4+ 7K4SfemO/RsIchtYeDT+6gLEAPuU0PKU7kPh8yTRw4cdiGoARr0m0tWDfannazO7ArQt 6h9de7xooDL69y9FUrQ7Vde+O8pP2NyuED/GzgFDCAf40mO55QFBpSU8fVXl51VpTP78 p02WVzcEzqwJIo+X/0iLXlPEyJzWmStuAj/F1/BY59/mmY3x1k/WaNc18UO/O7OnANM4 w2Zw==
X-Received: by 10.112.132.134 with SMTP id ou6mr2568065lbb.45.1365661978398; Wed, 10 Apr 2013 23:32:58 -0700 (PDT)
Received: from [192.168.250.235] ([194.100.71.98]) by mx.google.com with ESMTPS id t20sm1202617lbi.5.2013.04.10.23.32.55 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Wed, 10 Apr 2013 23:32:56 -0700 (PDT)
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 6.3 \(1503\))
From: Jouni Korhonen <jouni.nospam@gmail.com>
In-Reply-To: <20130409.212512.301591899.mbj@tail-f.com>
Date: Thu, 11 Apr 2013 09:32:56 +0300
Content-Transfer-Encoding: quoted-printable
Message-Id: <8F9CE41F-422C-4143-9261-BAF6F71848E8@gmail.com>
References: <97FEA158-451F-4F48-85B3-5763A6026A8F@gmail.com> <CABCOCHTDveoHav4sNJMJN-3DPy_AnB5UVxje68639vicaP9Wmw@mail.gmail.com> <20130409.212512.301591899.mbj@tail-f.com>
To: Martin Bjorklund <mbj@tail-f.com>
X-Mailer: Apple Mail (2.1503)
Cc: radext@ietf.org, jouni.nospam@gmail.com, andy@yumaworks.com, netmod@ietf.org
Subject: Re: [radext] [netmod] Comment on draft-ietf-netmod-system-mgmt-05
X-BeenThere: radext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: RADIUS EXTensions working group discussion list <radext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/radext>, <mailto:radext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/radext>
List-Post: <mailto:radext@ietf.org>
List-Help: <mailto:radext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/radext>, <mailto:radext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Apr 2013 06:33:00 -0000

Martin,


On Apr 9, 2013, at 10:25 PM, Martin Bjorklund <mbj@tail-f.com> wrote:

> Andy Bierman <andy@yumaworks.com> wrote:
>> On Tue, Apr 9, 2013 at 5:32 AM, Jouni Korhonen <jouni.nospam@gmail.com> wrote:
>>> Folks,
>>> 
>>> AAA-Doctors track on all documents that specify something that
>>> relates to AAA protocols (RADIUS/Diameter). In that light we
>>> also occasionally provide some early comments before the I-Ds
>>> from other WGs enter IETF LC.
>>> 
>>> Section 3.4 of draft-ietf-netmod-system-mgmt-05 defines a data
>>> model for the configuration of the RADIUS client. Has the WG
>>> considered additional transports for RADIUS than the original
>>> UDP? RADEXT has defined TCP (RFC6613), TLS (RFC6614) and is
>>> about to complete DTLS (draft-ietf-radext-dtls-04). There are
>>> implementations already out in the field. I would envision
>>> different transports would have an impact to the data model
>>> (transport type, possible TLS cipher details and credentials,
>>> etc). Or is there a particular reason for not taking alternative
>>> transports into account?
>>> 
>> 
>> thanks for the review.
>> How would you suggest adding this support?
>> The radius feature (page 12) references RFC 2865.
>> 
>> If the transport is something the server developer picks,
>> then perhaps updating the description and reference
>> statements for this feature is sufficient.
>> 
>> If the transport is something the operator picks,
>> then it gets more complicated. E.g.,
>>   - add a config=false leaf or leaf-list identifying the transports
>>     supported by the server
>>  - add a config=true leaf to the radius/server list (page 21)
>>    specifying the transport for the server to use
>>  - add new identity statements for the standard transports
> 
> I think what is needed is more flexibility in the radius server list
> (note that we only provide client-side configuration; so in the client
> config we list the servers the client can talk to).  Something like
> this:


Something like below would be fine. Of course, it is up to Netmod to
decide what goes in and what does not. We just wanted to point out
that RADIUS has moved on and there are more tools in the box. I
would assume that TLS transport should be interesting for the
management folks.

- Jouni




> 
>   container radius {
>     list server {
>       key name;
>       ordered-by user;
> 
>       leaf name {
>         type string;  // arbitrary name
>       }
>       leaf address {
>         type inet:host;
>         mandatory true;
>       }
>       choice transport {
>         case udp {
>           container udp {
>             leaf authentication-port { ... }
>             leaf shared-secret { ... }
>           }
>         case tcp {
>           container tcp {
>             leaf authentication-port { ... }
>             // RFC 6613 section 2.6.7 talks about config parameters
>             // maybe include them here?
>           }
>         }
>         case tls {
>             leaf port { ... }
>             // what else...?
>           }
>         }
>       }
>       ...
>     }
> 
> Note that this is an extensible model; other transports can be added
> or augmented into this structure.
> 
> One option could be to restructure like this but only actually define
> the udp case above, and leave the rest (tcp, tls, dtls) for future
> work.
> 
> 
> /martin
> 
>