Skip to main content

Diameter Mobile IPv4 Application
draft-ietf-aaa-diameter-mobileip-20

Revision differences

Document history

Date Rev. By Action
2012-08-22
20 (System) post-migration administrative database adjustment to the Yes position for Thomas Narten
2012-08-22
20 (System) post-migration administrative database adjustment to the No Objection position for Steven Bellovin
2012-08-22
20 (System) post-migration administrative database adjustment to the No Objection position for Russ Housley
2004-08-25
20 Amy Vezza State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza
2004-08-25
20 Amy Vezza IESG state changed to Approved-announcement sent
2004-08-25
20 Amy Vezza IESG has approved the document
2004-08-25
20 Amy Vezza Closed "Approve" ballot
2004-08-25
20 Bert Wijnen State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Bert Wijnen
2004-08-25
20 Bert Wijnen Note field has been cleared by Bert Wijnen
2004-08-25
20 Bert Wijnen Status date has been changed to 2004-08-25 from 2004-08-12
2004-08-25
20 (System) [Ballot Position Update] New position, No Objection, has been recorded for Alex Zinin
2004-08-25
20 (System) [Ballot Position Update] New position, No Objection, has been recorded for Bill Fenner
2004-08-25
20 (System) [Ballot Position Update] New position, No Objection, has been recorded for Ned Freed
2004-08-25
20 (System) [Ballot Position Update] New position, No Objection, has been recorded for Allison Mankin
2004-08-25
20 (System) [Ballot Position Update] New position, Yes, has been recorded for Randy Bush
2004-08-25
20 Thomas Narten [Ballot Position Update] Position for Thomas Narten has been changed to Yes from Discuss by Thomas Narten
2004-08-20
20 (System) Removed from agenda for telechat - 2004-08-19
2004-08-19
20 Amy Vezza State Changes to IESG Evaluation::AD Followup from IESG Evaluation by Amy Vezza
2004-08-12
20 Bert Wijnen State Changes to IESG Evaluation from IESG Evaluation::AD Followup by Bert Wijnen
2004-08-12
20 Bert Wijnen Status date has been changed to 2004-08-12 from 2004-08-03
2004-08-12
20 Bert Wijnen Placed on agenda for telechat - 2004-08-19 by Bert Wijnen
2004-08-12
20 Bert Wijnen
[Note]: 'Waiting for IANA to give OK on IANA considerations section;
Once we receive that, then Thomas can clear his DISCUSS.
So back on 19 …
[Note]: 'Waiting for IANA to give OK on IANA considerations section;
Once we receive that, then Thomas can clear his DISCUSS.
So back on 19 aug telechat to force that decision.' added by Bert Wijnen
2004-08-10
20 (System) Sub state has been changed to AD Follow up from New Id Needed
2004-08-10
20 (System) New version available: draft-ietf-aaa-diameter-mobileip-20.txt
2004-08-03
20 Bert Wijnen State Change Notice email list have been change to , , , , from , , , , mccap@lucent.com>
2004-08-03
20 Bert Wijnen State Change Notice email list have been change to , , , , mccap@lucent.com> from , , ,
2004-08-03
20 Bert Wijnen State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation::AD Followup by Bert Wijnen
2004-08-03
20 Bert Wijnen New revision expected right after IETF60 to clarify IANA considerations and to document the correct Application ID.
2004-08-03
20 Bert Wijnen Status date has been changed to 2004-08-03 from 2004-07-20
2004-07-23
20 Steven Bellovin [Ballot Position Update] Position for Steve Bellovin has been changed to No Objection from Discuss by Steve Bellovin
2004-07-20
20 Bert Wijnen Checking with other IESG members if DISCUSSes can be cleared now.
2004-07-20
20 Bert Wijnen Status date has been changed to 2004-07-20 from 2004-06-17
2004-07-14
19 (System) New version available: draft-ietf-aaa-diameter-mobileip-19.txt
2004-06-17
20 Bert Wijnen
On hold to fix this issue:
-----Original Message-----
From: Bernard Aboba [mailto:aboba@internaut.com]
Sent: woensdag 16 juni 2004 02:55
To: iesg@ietf.org
Subject: Comment on …
On hold to fix this issue:
-----Original Message-----
From: Bernard Aboba [mailto:aboba@internaut.com]
Sent: woensdag 16 juni 2004 02:55
To: iesg@ietf.org
Subject: Comment on Diameter NASREQ, EAP, MIPv4 (fwd)


Yoshi Ohba has found an error that exists within all several Diameter
Application drafts -- Diameter NASREQ, EAP and MIPv4.  This concerns the
use of Application-IDs in those documents.

Based on the Application-ID guidelines of RFC 3588, the Diameter NASREQ,
EAP and MIPv4 documents are not permitted to allocate new Application-IDs
because no new mandatory AVPs are defined in those documents.  Re-using
Diameter Base commands will enable Diameter agents (such as
Diameter/RADIUS gateways) to operate across a range of applications with
no code changes.

Diameter EAP & NASREQ use ACR/ACA, RAR/RAA, STR/STA and ASR/ASA commands.
Diameter MIPv4 uses ACR/ACA, STR/STA and ASR/ASA commands.
2004-06-17
20 Bert Wijnen Status date has been changed to 2004-06-17 from 2004-05-08
2004-05-17
20 Amy Vezza [Ballot Position Update] Position for Russ Housley has been changed to No Objection from Discuss by Amy Vezza
2004-05-08
20 Bert Wijnen State Changes to IESG Evaluation::AD Followup from IESG Evaluation by Bert Wijnen
2004-05-08
20 Bert Wijnen Checking with respective ADs and IANA if DISCUSS and concerns have been fixed in rev 18.
2004-05-08
20 Bert Wijnen Status date has been changed to 2004-05-08 from 2004-04-21
2004-05-05
18 (System) New version available: draft-ietf-aaa-diameter-mobileip-18.txt
2004-04-21
20 Bert Wijnen State Changes to IESG Evaluation from IESG Evaluation::Revised ID Needed by Bert Wijnen
2004-04-21
20 Bert Wijnen New revision received. This supposedly addresses all raised issues/concerns.
2004-04-21
20 Bert Wijnen Status date has been changed to 2004-04-21 from 2004-04-08
2004-04-15
17 (System) New version available: draft-ietf-aaa-diameter-mobileip-17.txt
2004-04-08
20 Bert Wijnen
WG and editor still strugling.
But the aaa-keys doc is now in IETF Last Call, so no holdup on that any more (or so I …
WG and editor still strugling.
But the aaa-keys doc is now in IETF Last Call, so no holdup on that any more (or so I think).
So I expect a revision REAL SOON now.
2004-04-08
20 Bert Wijnen State Change Notice email list have been change to , , , from , ,
2004-04-08
20 Bert Wijnen Status date has been changed to 2004-04-08 from 2004-03-25
2004-03-25
20 Bert Wijnen
[Note]: 'This doc is back. It has been on IESG agenda in Nov 2002 and again mid 2003. Since has been so long,
I prefer …
[Note]: 'This doc is back. It has been on IESG agenda in Nov 2002 and again mid 2003. Since has been so long,
I prefer to have IESG review it again instead of just trying to figure out if DISCUSSes have been addressed.' has been cleared by Bert Wijnen
2004-03-25
20 Bert Wijnen Checking with WG chairs where we are in terms of addressing IESG DISCUSSes and COMMENTs.
2004-03-25
20 Bert Wijnen Status date has been changed to 2004-03-25 from 2004-02-10
2004-02-20
20 Steven Bellovin
[Ballot discuss]
Nit: it speaks of xyz.com instead of example.com

2.2 says

      Security considerations may require that the HAR be sent directly …
[Ballot discuss]
Nit: it speaks of xyz.com instead of example.com

2.2 says

      Security considerations may require that the HAR be sent directly
      from the AAAH to the HA without the use of intermediary Diameter
      agents. This requires that a security association between the AAAH
      and HA be established, as in Figure 4.

If the HA is in the foreign network, how does AAAH get suitable
information to set up a secure session?

7: "the keys in this regime are symmetric in the sense they are
      used in both directions" is a very bad idea. 

------
1.6: What is a "preconfigured shared security association"? Do you
mean a preshared secret? A security association comprises far more
than just a key.

I have not evaluated the security of the scheme in this section, since
it depends on another draft, and possibly on the security of MobileIP
itself. Can we really even consider this draft until those are done?

1.10: What firewall rules? Are the agents supposed to tell their local
firewalls to open up some holes?

5.2: 64 bits is not sufficient for a key. Why not just mandate 128,
instead of strongly recommending it?

5: I confess that it still isn't clear to me how the home and foreign
agents know authoritatively who each other are. Then again, that's
always been my main complaint about AAA. But here they're handing out
keys.
2004-02-20
20 Russ Housley
[Ballot discuss]
I am uncomfortable proceeding with this document without seeing [MIPKEYS]
too. The reference was difficult to track down. Once I finally found it, …
[Ballot discuss]
I am uncomfortable proceeding with this document without seeing [MIPKEYS]
too. The reference was difficult to track down. Once I finally found it,
it is in 'Publication Requested' state.
2004-02-19
20 Amy Vezza [Ballot Position Update] New position, Discuss, has been recorded for Russ Housley by Amy Vezza
2004-02-19
20 Amy Vezza [Ballot Position Update] New position, No Objection, has been recorded for David Kessens by Amy Vezza
2004-02-19
20 Amy Vezza [Ballot Position Update] New position, No Objection, has been recorded for Margaret Wasserman by Amy Vezza
2004-02-19
20 Amy Vezza [Ballot Position Update] New position, No Objection, has been recorded for Jon Peterson by Amy Vezza
2004-02-19
20 Amy Vezza [Ballot Position Update] New position, No Objection, has been recorded for Ted Hardie by Amy Vezza
2004-02-19
20 Amy Vezza [Ballot Position Update] New position, No Objection, has been recorded for Harald Alvestrand by Amy Vezza
2004-02-19
20 Amy Vezza State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Amy Vezza
2004-02-19
20 Amy Vezza
[Note]: 'This doc is back. It has been on IESG agenda in Nov 2002 and again mid 2003. Since has been so long,
I prefer …
[Note]: 'This doc is back. It has been on IESG agenda in Nov 2002 and again mid 2003. Since has been so long,
I prefer to have IESG review it again instead of just trying to figure out if DISCUSSes have been addressed.' added by Amy Vezza
2004-02-12
20 Amy Vezza [Ballot Position Update] Position for Bert Wijnen has been changed to Yes from No Objection by Amy Vezza
2004-02-12
20 Bert Wijnen [Ballot Position Update] New position, Yes, has been recorded for Bert Wijnen
2004-02-12
20 Bert Wijnen Ballot has been issued by Bert Wijnen
2004-02-12
20 (System) Ballot writeup text was added
2004-02-12
20 (System) Last call text was added
2004-02-12
20 (System) Ballot approval text was added
2004-02-12
20 Bert Wijnen Placed on agenda for telechat - 2004-02-19 by Bert Wijnen
2004-02-12
20 Bert Wijnen State Changes to IESG Evaluation from IESG Evaluation::Revised ID Needed by Bert Wijnen
2004-02-12
20 Bert Wijnen
[Note]: 'This doc is back. It has been on IESG agenda in Nov
2002 and again mid 2003. Since has been so long,
I prefer …
[Note]: 'This doc is back. It has been on IESG agenda in Nov
2002 and again mid 2003. Since has been so long,
I prefer to have IESG review it again instead of just
trying to figure out if DISCUSSes have been addressed.' added by Bert Wijnen
2004-02-12
20 Bert Wijnen New revision received.
Ad is checking
2004-02-12
20 Bert Wijnen Status date has been changed to 2004-02-10 from 2002-12-08
2004-02-12
20 Bert Wijnen [Note]: 'Responsible for new rev: WG and authors' has been cleared by Bert Wijnen
2004-02-09
16 (System) New version available: draft-ietf-aaa-diameter-mobileip-16.txt
2003-12-08
20 Bert Wijnen WG promised a new revision (soon now).
2003-12-08
20 Bert Wijnen Shepherding AD has been changed to Bert Wijnen from Randy Bush
2003-12-08
20 Bert Wijnen State Change Notice email list have been change to , , from ,
2003-12-08
20 Bert Wijnen Status date has been changed to 2002-12-08 from 2002-10-30
2003-12-08
20 Bert Wijnen [Note]: 'Responsible for new rev: WG and authors' added by Bert Wijnen
2003-10-27
15 (System) New version available: draft-ietf-aaa-diameter-mobileip-15.txt
2003-06-16
20 Thomas Narten
[Ballot discuss]
> sufficient for protecting session keys. (It should be noted that the
> CMS security application is referenced as informative in this
> …
[Ballot discuss]
> sufficient for protecting session keys. (It should be noted that the
> CMS security application is referenced as informative in this
> application and the usage is only a recommendation.) However, if a

recommendation != normative? A recommendation to do something is
normative, IMO.

> without Diameter agents. When deployed in an environment with
> Diameter agents, the keys must be encrypted by means described in
> [CMS].

Seems normative to me...


> 1.9 Fast Handoff support
>
> This application requires that foreign agents issue an AMR upon
> receipt of the first registration message from a mobile node,
> regardless of the fact that the mobile node MAY have been previously
> authorized to another foreign agent.
>
> The Mobile IP Working Group is currently investigating fast handoff
> proposals, and the Seamoby WG is looking at creating a protocol that
> would allow AAA state information to be exchange between foreign
> agents during a handoff. These proposals MAY allow future
> enhancements to the Diameter protocol, in order to reduce the amount
> of Diameter exchanges required during a handoff.

A bit of a nit, but the MAY above doesn't seem right. It sounds like
you are just trying to say "future work may relate". But MAY is a
statement about choices to implement, and its premature to use that
terminoligy here.

Also, IANA had the following question. Did these get responded to (I
don't see the email trail, but I might have deleted it...)
2003-06-16
20 Steven Bellovin
[Ballot discuss]
1.6: What is a "preconfigured shared security association"? Do you
mean a preshared secret? A security association comprises far more
than just a …
[Ballot discuss]
1.6: What is a "preconfigured shared security association"? Do you
mean a preshared secret? A security association comprises far more
than just a key.

I have not evaluated the security of the scheme in this section, since
it depends on another draft, and possibly on the security of MobileIP
itself. Can we really even consider this draft until those are done?

1.10: What firewall rules? Are the agents supposed to tell their local
firewalls to open up some holes?

5.2: 64 bits is not sufficient for a key. Why not just mandate 128,
instead of strongly recommending it?

5: I confess that it still isn't clear to me how the home and foreign
agents know authoritatively who each other are. Then again, that's
always been my main complaint about AAA. But here they're handing out
keys.
2003-06-16
20 Steven Bellovin Created "Approve" ballot
2003-06-01
20 Randy Bush
Date: Sun, 1 Jun 2003 08:05:50 -0700 (PDT)
From: Bernard Aboba
To: Randy Bush
cc: David Mitton , Bert Wijnen ,
  housley@vigilsec.com
Subject: Re: …
Date: Sun, 1 Jun 2003 08:05:50 -0700 (PDT)
From: Bernard Aboba
To: Randy Bush
cc: David Mitton , Bert Wijnen ,
  housley@vigilsec.com
Subject: Re: draft-ietf-aaa-diameter-mobileip-14.txt

...

Next Steps:
===========

1. Comments from Thomas Narten and Russ Housley to go into draft tracker.
2. Tony to add the text based on RFC2869bis and Diameter Nasreq
  app. into the Diameter-MIPv4 app to deal with impersonation, and
  authorization.
3. If there are any true keys being sent (not Nonces) via proxies, we need
  to make those AVPs go end-to-end via redirects. No need to reference
  CMS, since AAA WG will not be going ahead with CMS.
4. Tony to add clear diagrams showing what messages are passing between
  what entities and where keys and nonces go.  This is essential if the
  IESG is to understand the relationship between the entities and what
  quantities are possessed by each party and passed back and forth
  between them.
5. Try to get this all wrapped up in a months time.
6. Tony to discuss with Tom to get the AAA Keys draft completed.
7. Bernard to setup a teleconf next month (June) to ensure all AD
  comments have been addressed in revised documents. By then we are
  expecting a -15 draft addressing IESG comments.
2003-06-01
20 Randy Bush
From: Thomas Narten
To: iesg-secretary@ietf.org
Date: Wed, 21 May 2003 08:57:13 -0400
Subject: discuss comments on draft-ietf-aaa-diameter-mobileip-14.txt

My discuss comments need to go into tracker. …
From: Thomas Narten
To: iesg-secretary@ietf.org
Date: Wed, 21 May 2003 08:57:13 -0400
Subject: discuss comments on draft-ietf-aaa-diameter-mobileip-14.txt

My discuss comments need to go into tracker. Thanks.

Thomas

>    sufficient for protecting session keys. (It should be noted that the
>    CMS security application is referenced as informative in this
>    application and the usage is only a recommendation.) However, if a

recommendation != normative? A recommendation to do something is
normative, IMO.

>    without Diameter agents.  When deployed in an environment with
>    Diameter agents, the keys must be encrypted by means described in
>    [CMS].

Seems normative to me...


> 1.9  Fast Handoff support
>
>    This application requires that foreign agents issue an AMR upon
>    receipt of the first registration message from a mobile node,
>    regardless of the fact that the mobile node MAY have been previously
>    authorized to another foreign agent.
>
>    The Mobile IP Working Group is currently investigating fast handoff
>    proposals, and the Seamoby WG is looking at creating a protocol that
>    would allow AAA state information to be exchange between foreign
>    agents during a handoff. These proposals MAY allow future
>    enhancements to the Diameter protocol, in order to reduce the amount
>    of Diameter exchanges required during a handoff.

A bit of a nit, but the MAY above doesn't seem right. It sounds like
you are just trying to say "future work may relate". But MAY is a
statement about choices to implement, and its premature to use that
terminoligy here.

Also, IANA had the following question. Did these get responded to (I
don't see the email trail, but I might have deleted it...)

From: "IANA"
To:
Cc: , ,
  , ,
Date: Thu, 17 Oct 2002 13:27:33 -0700
Subject: RE: Last Call: Diameter Mobile IPv4 Application to Proposed Standard
Importance: Normal

IESG:

The IANA has reviewed the following Internet-Draft which is in Last
Call: , and has the
following comments with regards to the publication of this document:

9.0  IANA Considerations
            9.1  Command Codes
            9.2  AVP Codes
            9.3  Result-Code AVP Values
            9.4  MIP-Feature-Vector AVP Values
            9.5  MIP-Algorithm-Type AVP Values
            9.6  MIP-Replay-Mode AVP Values
            9.7  Application Identifier

Do these registrations go in an existing registry?  If so which
one?  Also, in the IANA Considerations section it mentions the
following:

This specification assigns the values 260 and 262 from the Command
  Code namespace defined in [DIAMBASE].

[DIAMBASE]    P. Calhoun, H. Akhtar, J. Arkko, E. Guttman, A. Rubens,
              "Diameter Base Protocol", draft-ietf-aaa-diameter-12.txt,
              IETF work in progress, July 2002.

The above document, also in last call, has an IANA Considerations section
that indicates there are no IANA Actions.  This seems contradictory.
There are multiple references to defined parameters in [DIAMBASE].

This is a bit confusing.  If we have misunderstood the IANA Considerations
for this document, please let us know.

Please respond to the IANA about our concerns with regards to this
document.  Failing to do so may cause delay of the approval and
publication of your document.

Thank you.

Michelle S. Cotton
(on behalf of the IANA)
2003-04-29
14 (System) New version available: draft-ietf-aaa-diameter-mobileip-14.txt
2002-12-20
20 Randy Bush State Changes to IESG Evaluation  :: Revised ID Needed from IESG Evaluation by Bush, Randy
2002-11-14
20 Randy Bush
From: "Wijnen, Bert (Bert)"

If you look at draft-ietf-aaa-diameter-15.txt, page 40, sect 4.4,
then you will see that they use IPAddress to represent IPv4 …
From: "Wijnen, Bert (Bert)"

If you look at draft-ietf-aaa-diameter-15.txt, page 40, sect 4.4,
then you will see that they use IPAddress to represent IPv4 and
IPv6 addresses.

I wondered what your comments would be, given the fact that you
guys took a real good look at IP (or INET) addresses when you
worked on the INET-ADDRESS-MIB.

For me, this use of IPAddress seems at least confusing, and it
also does not seem future-proof.
2002-11-14
20 Randy Bush
From: "Steven M. Bellovin"

In a number of places below, I'm not necessarily asking for changes to
the text.  But there are some things that …
From: "Steven M. Bellovin"

In a number of places below, I'm not necessarily asking for changes to
the text.  But there are some things that need justification, either
within the document or just in email to me and the IESG. 

1.4 It would be good to define "user".  I *think* that "user" means
"the entity requesting or using some resource, in support of which
a Diameter client has generated a request" or some such.  I'm
trying to avoid confusion in discussions of authentication -- is
it the Diameter node or the resource-requesting entity that is
being authenticated?

The definition of "end-to-end security" needs to be improved.

2.1 ECONNREFUSED is a Unix errno value.  Probably, OS-independent
terminology should be used.

Does "RESET call" mean "send a TCP RST bit" (or the SCTP
equivalent?  Or does it mean that a connection should be
terminated without benefit of the DPR exchange?

2.1.1 How many SCTP streams should be created?  May be created?

2.8.1 Use example.net and example.com?  (Same in 4.5.1)

2.8.3 It is very far from clear to me that redirect agents are or should
be application-agnostic.  Is routing on the contents of
application-specific fields to be disallowed?  I note that
6.13 permits per-user redirection, and user names are not
in the routing table defined earlier.  (I'm perfectly
happy with the answer "the WG has considered and rejected this
point".) 

2.8.4 The description here makes it clear that the phrase "end-to-end
security" is not, in fact, accurate.  If that transform can (or
should) be applied by an intermediate node, which is strongly
suggested by this section, it is not "end-to-end".  I suspect
that something like "object security" is closer, though still
not quite right.

3 What purpose is served by the T bit?  Given that the underlying
network may be duplicating packets -- a few months ago, I was
seeing up to 90% duplicates on my local loop, with no apparent
ill effects on the stack -- why is there some advantage to
trying to convey that information in Diameter?  It almost makes
sense if set only when the application has switched peers before
the retranmission, though it's still not clear to me what
the receiver of such a message would do with the information.

Should the spec indicate that the reserved bits MUST be ignored
by receivers, rather than sending an error?  It makes it hard to
start using those bits, given the current language.  "Be liberal
in what you receive", etc.

4.1 Same comment about the reserved bits.

4.6 Why is the flag "MAY Encr" when confidentiality is mandatory?

What is the SHLD NOT column?  It's never used in that table.

I don't see the reasoning for some of the settings of that
flag.  For example, I would think that the authentication- and
authorization-related flags would require protection, to guard
against deletion to prevent the operation from taking place,
or to spoof the result.  This also illustrates confusion between
the need for integrity protection vs. confidentiality.  It
would be good to give some general guidance, for the benefit
of people defining Diameter applications.

5.2, search rule 3.2, last paragraph:  Unless I'm misreading something,
it says that the domain suffixes SHOULD and need not match
the original query.

3.3 should probably be numbered 4.

Discuss DNSsec?  What TLS or IPsec certificates should be
checked for?  More specifically:  the peer discovery mechanisms
MUST be tied to a security authorization model.  Each peer to
which a node speaks must be authorized for some role.  The
Diameter implementation must have some list of credentials
that are acceptable *for this role*.  That point should probably
be discussed here, and possibly in the Security section as well.
(Note that suitable checking in this fashion relegates DNSsec
issues to availability, and not even much of that -- an attacker
can't impersonate a legimate peer, because it lacks the right
credentials.) 

5.3 May CER or CEA messages be relayed?

5.3.1 Why is the IP address in the message, when it should be
available via the local incarnation of getpeername()?

5.6.4 What is a "hanging octet"?

6.1.8 Proxy-Info has security implications, and probably requires an
embedded HMAC with a node-local key.

8.3 The RAA message is curious, and perhaps the answer to my
question is in another AAA document.  That said -- in general,
something like a NAS can't do user authentication by itself.
Instead, it's going to use Diameter facilities to send something
upstream.  Ultimately, it's the Diameter server that is going to
make the decision.  That suggests that reauthenticate is more
of a command from the server to the client, where the server
will, at some point, issue a disconnect message.  The current
model seems to suggest a sequence of

server->client: RAR
client->server: authentication info } repeated
server->client: authentication info }
client->server: success/failure

In other words, there's a nested exchange.  Is that intended?
What Session-ID should be used?  Will Diameter implementations
be confused by that sort of sequence?  There's a state machine
lurking in the background here, I think.

9 I'm concerned that I don't see a way for a server to detect
a total ordering of accounting records for a session.  This
would be useful, for example, when processing interim records.
The situation I'm concerned about is as follows.  Suppose a
client sends an interim record to a proxy or relay agent.  The
upstream link from the agent is experiencing a transient
problem.  Or perhaps the agent crashes and reboots, but has
stored the pending records in non-volatile storage.  In the
meantime, the client sends another interim message via another
path, either because it suspects a failure or because it is
using multiple peers for load-sharing.  This second record
can be received first.  I suspect that the easiest solution is
to require that Accounting-Record-Number be monotonically
increasing within a session.

13 Is there some document that discusses the end-to-end (and I mean
that literally here) Diameter authorization model?  I know that
it was discussed in the WG, but I don't see anything on that
here.  What's I'm looking for -- somewhere -- is some discussion
on how, say, a NAS "knows" that it will be paid when an
authorization comes from five proxies away.

14 Non-ascii hyphens (which shouldn't be there anyway)
2002-11-14
20 Randy Bush
From: Patrik F�ltstr�m

Text from draft below...

When you have two strings using the Unicode Character Set, there need
to be rules for how you …
From: Patrik F�ltstr�m

Text from draft below...

When you have two strings using the Unicode Character Set, there need
to be rules for how you compare the two strings -- if comparison is
done.

Doing bit by bit comparison is cruel, and not recommended, but even if
that is the solution that has to be stated.

The easiest way of doing it is to create a profile of stringprep, which
tells how comparison is to be done, and then point at that profile in
documents like this.

Note: UTF8String in diameter possibly have to be split in two different
types "normalized UTF8String" and "raw UTF8String".

I am happy to explain more if needed.

    paf

>      UTF8String
>          The UTF8String format is derived from the OctetString AVP Base
>          Format. This is a human readable string represented using the
>          ISO/IEC IS 10646-1 character set, encoded as an OctetString
>          using the UTF-8 [UFT8] transformation format described in RFC
>          2279.
>
>          Since additional code points are added by amendments to the
>          10646 standard from time to time, implementations MUST be
>          prepared to encounter any code point from 0x00000001 to
>          0x7fffffff. Byte sequences that do not correspond to the valid
>          encoding of a code point into UTF-8 charset or are outside
> this
>          range are prohibited.
>
>          The use of control codes SHOULD be avoided. When it is
>          necessary to represent a newline, the control code sequence CR
>          LF SHOULD be used.
>
>          The use of leading or trailing white space SHOULD be avoided.
>
>          For code points not directly supported by user interface
>          hardware or software, an alternative means of entry and
>          display, such as hexadecimal, MAY be provided.
>
>          For information encoded in 7-bit US-ASCII, the UTF-8 charset
> is
>          identical to the US-ASCII charset.
>
>          UTF-8 may require multiple bytes to represent a single
>          character / code point; thus the length of an UTF8String in
>          octets may be different from the number of characters encoded.
>
>          Note that the AVP Length field of an UTF8String is measured in
>          octets, not characters.


From: Patrik F�ltstr�m

> The easiest way of doing it is to create a profile of stringprep,
> which tells how comparison is to be done, and then point at that
> profile in documents like this.

I.e. suggested action:

  1) Create a profile of stringprep to be used for diameter
  2) Add the following text to "UTF8String", after first paragraph

The string is to be normalized according to the specification in RFC
XXXX [xxxx]

  3) Add reference to the profile

Reference:

[xxxx] RFC XXXX, stringprep profile for use in the Diameter protocol.
2002-11-03
20 Randy Bush State Changes to IESG Evaluation from Waiting for Writeup by Bush, Randy
2002-10-31
20 Stephen Coya State Changes to Waiting for Writeup  :: 0 from In Last Call by Coya, Steve
2002-10-16
20 Jacqueline Hargest Due date has been changed to 2002-10-30 from 
by jhargest
2002-10-16
20 Jacqueline Hargest State Changes to In Last Call  -- 0 from Last Call Requested by jhargest
2002-10-16
20 Randy Bush ietf last call requested
2002-10-16
20 Randy Bush by randy
2002-10-16
20 Randy Bush State Changes to Last Call Requested from Publication Requested by randy
2002-10-16
20 (System) Last call sent
2002-10-07
13 (System) New version available: draft-ietf-aaa-diameter-mobileip-13.txt
2002-08-28
12 (System) New version available: draft-ietf-aaa-diameter-mobileip-12.txt
2002-07-02
11 (System) New version available: draft-ietf-aaa-diameter-mobileip-11.txt
2002-04-24
10 (System) New version available: draft-ietf-aaa-diameter-mobileip-10.txt
2002-03-15
20 Randy Bush Draft Added by Randy Bush
2002-03-06
09 (System) New version available: draft-ietf-aaa-diameter-mobileip-09.txt
2001-11-21
08 (System) New version available: draft-ietf-aaa-diameter-mobileip-08.txt
2001-07-20
07 (System) New version available: draft-ietf-aaa-diameter-mobileip-07.txt
2001-06-19
06 (System) New version available: draft-ietf-aaa-diameter-mobileip-06.txt
2001-06-05
05 (System) New version available: draft-ietf-aaa-diameter-mobileip-05.txt
2001-05-15
04 (System) New version available: draft-ietf-aaa-diameter-mobileip-04.txt
2001-05-04
03 (System) New version available: draft-ietf-aaa-diameter-mobileip-03.txt
2001-04-09
02 (System) New version available: draft-ietf-aaa-diameter-mobileip-02.txt
2001-03-05
01 (System) New version available: draft-ietf-aaa-diameter-mobileip-01.txt
2001-02-09
00 (System) New version available: draft-ietf-aaa-diameter-mobileip-00.txt