[radext] [Errata Verified] RFC5176 (4311)
RFC Errata System <rfc-editor@rfc-editor.org> Mon, 20 July 2015 11:05 UTC
Return-Path: <wwwrun@rfc-editor.org>
X-Original-To: radext@ietfa.amsl.com
Delivered-To: radext@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C4E8A1A1BBC; Mon, 20 Jul 2015 04:05:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.912
X-Spam-Level:
X-Spam-Status: No, score=-101.912 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_WHITELIST=-100] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dLfDfG38lJ2A; Mon, 20 Jul 2015 04:05:04 -0700 (PDT)
Received: from rfc-editor.org (rfc-editor.org [IPv6:2001:1900:3001:11::31]) by ietfa.amsl.com (Postfix) with ESMTP id 627471A1BD9; Mon, 20 Jul 2015 04:05:00 -0700 (PDT)
Received: by rfc-editor.org (Postfix, from userid 30) id 52F1E18045A; Mon, 20 Jul 2015 04:01:12 -0700 (PDT)
To: aland@freeradius.org, mchiba@cisco.com, gdommety@cisco.com, meklund@cisco.com, david@mitton.com, bernarda@microsoft.com
X-PHP-Originating-Script: 1005:errata_mail_lib.php
From: RFC Errata System <rfc-editor@rfc-editor.org>
Message-Id: <20150720110112.52F1E18045A@rfc-editor.org>
Date: Mon, 20 Jul 2015 04:01:12 -0700
Archived-At: <http://mailarchive.ietf.org/arch/msg/radext/zaBBnJKhmXrmKrS8uXBTYGNxqlU>
X-Mailman-Approved-At: Mon, 20 Jul 2015 05:20:40 -0700
Cc: radext@ietf.org, Kathleen.Moriarty@emc.com, iesg@ietf.org, rfc-editor@rfc-editor.org
Subject: [radext] [Errata Verified] RFC5176 (4311)
X-BeenThere: radext@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: RADIUS EXTensions working group discussion list <radext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/radext>, <mailto:radext-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/radext/>
List-Post: <mailto:radext@ietf.org>
List-Help: <mailto:radext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/radext>, <mailto:radext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 20 Jul 2015 11:05:07 -0000
The following errata report has been verified for RFC5176, "Dynamic Authorization Extensions to Remote Authentication Dial In User Service (RADIUS)". -------------------------------------- You may review the report below and at: http://www.rfc-editor.org/errata_search.php?rfc=5176&eid=4311 -------------------------------------- Status: Verified Type: Technical Reported by: Alan DeKok <aland@freeradius.org> Date Reported: 2015-03-23 Verified by: Kathleen Moriarty (IESG) Section: 2.3 Original Text ------------- Section 2.3 says: In CoA-Request and Disconnect-Request packets, all attributes MUST be treated as mandatory. Corrected Text -------------- In CoA-Request and Disconnect-Request packets, all attributes MUST be treated as mandatory to understand by the NAS, except Proxy-State attributes that MUST be treated as opaque data. See Section 3.1 for a discussion of how the NAS must handle Proxy-State. Notes ----- This was seen with vendor equipment. CoA proxying was done to the NAS, and the proxy was adding and forwarding Proxy-State as required by Section 3.1. However, the NAS was returning a CoA-NAK with Error-Cause = Unsupported-Attribute. The issue comes because Proxy-State is called out in Section 3.1 for special handling. However, that special handling isn't called out in Section 2.3. As a result, implementors can get confused. The RADEXT WG is rechartering with a document to address CoA proxying. We will also be addressing this issue in that document. There are additional attributes which a NAS should ignore, OR which should be filtered out by the proxy closest to the NAS. The text was slightly updated by the WG from the originally submitted text. -------------------------------------- RFC5176 (draft-ietf-radext-rfc3576bis-13) -------------------------------------- Title : Dynamic Authorization Extensions to Remote Authentication Dial In User Service (RADIUS) Publication Date : January 2008 Author(s) : M. Chiba, G. Dommety, M. Eklund, D. Mitton, B. Aboba Category : INFORMATIONAL Source : RADIUS EXTensions Area : Operations and Management Stream : IETF Verifying Party : IESG
- [radext] [Technical Errata Reported] RFC5176 (431… RFC Errata System
- Re: [radext] [Technical Errata Reported] RFC5176 … Kathleen Moriarty
- Re: [radext] [Technical Errata Reported] RFC5176 … lionel.morand
- Re: [radext] [Technical Errata Reported] RFC5176 … Kathleen Moriarty
- Re: [radext] [Technical Errata Reported] RFC5176 … lionel.morand
- [radext] [Errata Verified] RFC5176 (4311) RFC Errata System