RADIUS Extensions for IP Port Configuration and Reporting
draft-ietf-radext-ip-port-radius-ext-17
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2020-01-21
|
17 | (System) | Received changes through RFC Editor sync (added Verified Errata tag) |
2017-05-02
|
17 | (System) | Received changes through RFC Editor sync (added Errata tag) |
2017-01-27
|
17 | (System) | IANA registries were updated to include RFC8045 |
2017-01-25
|
17 | (System) | Received changes through RFC Editor sync (created alias RFC 8045, changed abstract to 'This document defines three new RADIUS attributes. For devices that implement … Received changes through RFC Editor sync (created alias RFC 8045, changed abstract to 'This document defines three new RADIUS attributes. For devices that implement IP port ranges, these attributes are used to communicate with a RADIUS server in order to configure and report IP transport ports as well as mapping behavior for specific hosts. This mechanism can be used in various deployment scenarios such as Carrier-Grade NAT, IPv4/IPv6 translators, Provider WLAN gateway, etc. This document defines a mapping between some RADIUS attributes and IP Flow Information Export (IPFIX) Information Element identifiers.', changed pages to 43, changed standardization level to Proposed Standard, changed state to RFC, added RFC published event at 2017-01-25, changed IESG state to RFC Published) |
2017-01-25
|
17 | (System) | RFC published |
2017-01-19
|
17 | (System) | RFC Editor state changed to AUTH48-DONE from AUTH48 |
2017-01-09
|
17 | (System) | RFC Editor state changed to AUTH48 from RFC-EDITOR |
2016-12-20
|
17 | (System) | RFC Editor state changed to RFC-EDITOR from REF |
2016-12-16
|
17 | (System) | RFC Editor state changed to REF from EDIT |
2016-12-12
|
17 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2016-12-12
|
17 | (System) | IANA Action state changed to Waiting on RFC Editor from In Progress |
2016-12-12
|
17 | (System) | IANA Action state changed to In Progress from Waiting on WGC |
2016-11-15
|
17 | (System) | RFC Editor state changed to EDIT from MISSREF |
2016-11-14
|
17 | (System) | IANA Action state changed to Waiting on WGC from Waiting on RFC Editor |
2016-11-14
|
17 | (System) | IANA Action state changed to Waiting on RFC Editor from In Progress |
2016-11-14
|
17 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2016-11-14
|
17 | Dean Cheng | New version available: draft-ietf-radext-ip-port-radius-ext-17.txt |
2016-11-14
|
17 | (System) | New version approved |
2016-11-14
|
17 | (System) | Request for posting confirmation emailed to previous authors: "Senthil Sivakumar" , "Mohamed Boucadair" , "Dean Cheng" , "Jouni Korhonen" |
2016-11-14
|
17 | Dean Cheng | Uploaded new revision |
2016-11-14
|
16 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2016-11-14
|
16 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2016-11-10
|
16 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2016-11-08
|
16 | (System) | IANA Action state changed to In Progress from On Hold |
2016-11-07
|
16 | (System) | IANA Action state changed to On Hold from In Progress |
2016-11-07
|
16 | (System) | IANA Action state changed to In Progress |
2016-11-07
|
16 | (System) | RFC Editor state changed to MISSREF |
2016-11-07
|
16 | (System) | IESG state changed to RFC Ed Queue from Approved-announcement sent |
2016-11-07
|
16 | (System) | Announcement was received by RFC Editor |
2016-11-07
|
16 | Cindy Morgan | IESG state changed to Approved-announcement sent from Approved-announcement to be sent::AD Followup |
2016-11-07
|
16 | Cindy Morgan | IESG has approved the document |
2016-11-07
|
16 | Cindy Morgan | Closed "Approve" ballot |
2016-11-07
|
16 | Cindy Morgan | Ballot approval text was generated |
2016-11-07
|
16 | Cindy Morgan | Ballot writeup was changed |
2016-11-03
|
16 | Cindy Morgan | IESG state changed to Approved-announcement to be sent::AD Followup from Approved-announcement to be sent::Revised I-D Needed |
2016-11-03
|
16 | Cindy Morgan | IESG state changed to Approved-announcement to be sent::Revised I-D Needed from IESG Evaluation |
2016-11-03
|
16 | Cindy Morgan | New version available: draft-ietf-radext-ip-port-radius-ext-16.txt |
2016-11-03
|
16 | (System) | Secretariat manually posting. Approvals already received |
2016-11-03
|
16 | Cindy Morgan | Uploaded new revision |
2016-11-03
|
15 | Benoît Claise | [Ballot comment] The document really improved. Thanks. - Section 2. Terminology. Typically, you want to have that note at the beginning: Note that the … [Ballot comment] The document really improved. Thanks. - Section 2. Terminology. Typically, you want to have that note at the beginning: Note that the definitions of "internal IP address", "internal port", "internal realm", "external IP address", "external port", "external realm", and "mapping" are the same as defined in Port Control Protocol (PCP) [RFC6887], and the Common Requirements for Carrier- Grade NATs (CGNs) [RFC6888]. If I know of RFC6887 and RFC6888, I don't read the definitions. You mentioned that you would fixed this. It seems that this paragraph disappeared. Is this intentional? - Normative references to IANA registries, I'm not sure. I guess the RFC-editor would correct that, if it needs to be. |
2016-11-03
|
15 | Benoît Claise | [Ballot Position Update] Position for Benoit Claise has been changed to No Objection from Discuss |
2016-11-02
|
15 | Ben Campbell | [Ballot comment] Thanks for addressing most of my comments, especially the one about privacy sensitive information in IP-Port-Local-Id TLV. However, I note that the summary … [Ballot comment] Thanks for addressing most of my comments, especially the one about privacy sensitive information in IP-Port-Local-Id TLV. However, I note that the summary for the IP-Port-Local-Id TLV in section 3.1.3 still mentions the potential for it to carry a MAC address. [Edit: The suggested changes in Alissa's current comment would help mitigate that.] |
2016-11-02
|
15 | Ben Campbell | Ballot comment text updated for Ben Campbell |
2016-11-02
|
15 | Ben Campbell | [Ballot comment] Thanks for addressing most of my comments, especially the one about privacy sensitive information in IP-Port-Local-Id TLV. However, I note that the summary … [Ballot comment] Thanks for addressing most of my comments, especially the one about privacy sensitive information in IP-Port-Local-Id TLV. However, I note that the summary for the IP-Port-Local-Id TLV in section 3.1.3 still mentions the potential for it to carry a MAC address. |
2016-11-02
|
15 | Ben Campbell | Ballot comment text updated for Ben Campbell |
2016-11-01
|
15 | Alissa Cooper | [Ballot comment] Thanks for responding to my DISCUSS and COMMENT. I understand that this document is not the appropriate place to specify error handling related … [Ballot comment] Thanks for responding to my DISCUSS and COMMENT. I understand that this document is not the appropriate place to specify error handling related to these attributes. I do still think adding a note about the potential consequences of communicating erroneous port range and port mapping information would be a good precaution here. In 3.2.11 the new text helps but I think there are a couple more changes necessary to make the constraints explicit: OLD localID string. The data type of this field is string (refer to [I-D.ietf-radext-datatypes]). This field contains the data that is a local session identifier at the customer premise, such as MAC address, interface ID, VLAN ID, PPP sessions ID, VRF ID, IP address/prefix, etc. IP-Port-Local-Id TLV MAY be included in the following Attributes: NEW localID string. The data type of this field is string (refer to [I-D.ietf-radext-datatypes]). This field contains the data that is a local session identifier at the customer premise, such as MAC address, interface ID, VLAN ID, PPP sessions ID, VRF ID, IP address/prefix, or another local session identifier. IP-Port-Local-Id TLV MAY be included in the following Attributes if it is necessary to identify the subscriber: |
2016-11-01
|
15 | Alissa Cooper | [Ballot Position Update] Position for Alissa Cooper has been changed to No Objection from Discuss |
2016-10-27
|
15 | Jean Mahoney | Closed request for Telechat review by GENART with state 'No Response' |
2016-10-25
|
15 | Kathleen Moriarty | IESG state changed to IESG Evaluation from Waiting for AD Go-Ahead |
2016-10-21
|
15 | Dean Cheng | New version available: draft-ietf-radext-ip-port-radius-ext-15.txt |
2016-10-21
|
15 | (System) | New version approved |
2016-10-21
|
15 | (System) | Request for posting confirmation emailed to previous authors: "Senthil Sivakumar" , "Mohamed Boucadair" , "Dean Cheng" , "Jouni Korhonen" |
2016-10-21
|
15 | Dean Cheng | Uploaded new revision |
2016-10-18
|
14 | Kathleen Moriarty | Placed on agenda for telechat - 2016-11-03 |
2016-10-18
|
14 | Dean Cheng | New version available: draft-ietf-radext-ip-port-radius-ext-14.txt |
2016-10-18
|
14 | (System) | New version approved |
2016-10-18
|
14 | (System) | Request for posting confirmation emailed to previous authors: "Senthil Sivakumar" , "Mohamed Boucadair" , "Dean Cheng" , "Jouni Korhonen" |
2016-10-18
|
14 | Dean Cheng | Uploaded new revision |
2016-10-16
|
13 | Stephen Farrell | [Ballot comment] Thanks for removing the ICMP identifier thing. OLD COMMENTS below. I'm happy to chat about 'em if we need to. - write-up: Yeah, … [Ballot comment] Thanks for removing the ICMP identifier thing. OLD COMMENTS below. I'm happy to chat about 'em if we need to. - write-up: Yeah, major yuks to leaving design decisions to IANA. While the folks there are quite capable, they are not able to make IETF consensus decisions. If the WG aren't sure, ask IANA personnel (or someone) and then verify that that outcome garners rough consensus back in the WG or using other IETF processes. So Alissa's discuss point#4 is entirely, completely and fully correct and a showstopper really. - I also agree with the issue called out in Joel's comment about mission creep and how this overlaps with PCP. Did the WG consider whether or not it is a good idea for the IETF to define multiple ways in which some of these features can be added? If so, what is the justification for there being more than one? (Is that somewhere in the WG list archive? If not, it ought be.) It may well be that having a RADIUS mechanism for this is also a good plan, but I think that ought be justified. - 4.1.4: using port 80 as an example is very 1990's. Would it not be better to be more up to date? That's not just a facetious point - web cameras being left open to the Internet are a major swamp for botnet gestation. Better to use a more desirable example really. - The secdir review [1] also noted a bunch of issues that as far as I can see received no response so far, but that do deserve a response. (Apologies if I missed a response.) [1] https://www.ietf.org/mail-archive/web/secdir/current/msg06736.html |
2016-10-16
|
13 | Stephen Farrell | [Ballot Position Update] Position for Stephen Farrell has been changed to No Objection from Discuss |
2016-10-13
|
13 | Mirja Kühlewind | [Ballot comment] Thanks for addressing my discuss! Here is some further feedback from the IE-Doctors: The description of the requested Information Element is still a … [Ballot comment] Thanks for addressing my discuss! Here is some further feedback from the IE-Doctors: The description of the requested Information Element is still a bit vague, but acceptable; one must read the document in order to understand that binding the value to and end-user is really binding to one or more (source) addresses. The reference to section 3.2.2 (which is, IMO, not any more explanatory than the description of the IE itself) is not necessary. |
2016-10-13
|
13 | Mirja Kühlewind | [Ballot Position Update] Position for Mirja Kühlewind has been changed to No Objection from Discuss |
2016-10-06
|
13 | Tero Kivinen | Closed request for Telechat review by SECDIR with state 'No Response' |
2016-10-05
|
13 | Mohamed Boucadair | New version available: draft-ietf-radext-ip-port-radius-ext-13.txt |
2016-10-05
|
13 | (System) | New version approved |
2016-10-05
|
13 | (System) | Request for posting confirmation emailed to previous authors: "Senthil Sivakumar" , "Mohamed Boucadair" , "Dean Cheng" , "Jouni Korhonen" |
2016-10-05
|
13 | Mohamed Boucadair | Uploaded new revision |
2016-09-28
|
12 | Dean Cheng | IANA Review state changed to Version Changed - Review Needed from IANA - Not OK |
2016-09-28
|
12 | Dean Cheng | New version approved |
2016-09-28
|
12 | Dean Cheng | New version available: draft-ietf-radext-ip-port-radius-ext-12.txt |
2016-09-28
|
12 | Dean Cheng | Request for posting confirmation emailed to previous authors: "Senthil Sivakumar" , "Mohamed Boucadair" , "Dean Cheng" , "Jouni Korhonen" |
2016-09-28
|
12 | (System) | Uploaded new revision |
2016-09-23
|
11 | Kathleen Moriarty | Removed from agenda for telechat |
2016-09-22
|
11 | Jean Mahoney | Request for Telechat review by GENART is assigned to Ron Bonica |
2016-09-22
|
11 | Jean Mahoney | Request for Telechat review by GENART is assigned to Ron Bonica |
2016-09-15
|
11 | Tero Kivinen | Request for Telechat review by SECDIR is assigned to Carl Wallace |
2016-09-15
|
11 | Tero Kivinen | Request for Telechat review by SECDIR is assigned to Carl Wallace |
2016-09-15
|
11 | Benoît Claise | [Ballot discuss] I'm late for my review here. If some points in my DISCUSS/COMMENT have been discussed already let me know. I'll flag this as … [Ballot discuss] I'm late for my review here. If some points in my DISCUSS/COMMENT have been discussed already let me know. I'll flag this as a DISCUSS to follow up on the IPFIX issues. First of, I applause the attempt to reuse/map/combine data models (IPFIX information element and RADIUS attribute). Now, there are a couple of issues. The first set of issues has been sent via the IPFIX experts, copied here for tracking purposes. Dear Authors, The experts for the IPFIX IE registry have returned the following review: In general, the Information Elements in draft-ietf-radext-ip-port- radius-ext are so underspecified as to be unimplementable. They should not be added to the registry in their present form. The authors are advised to read RFC 7013, especially Section 4, which provides useful information on defining Information Elements. Specifically: The Information Element transportType is underspecified: (a) I presume this is in reference to sourceTransportPort and destinationTransportPort, but the description must say this if it is the case; (b) It's not clear at all from the description in what context this distinction is useful; (c) What's an ICMP identifier? In addition, the description of transportType appears to create a table which should probably be handled as a subregistry. See See RFC7013 section 4.7. for advice on the creation of tables without subregistries (in short, "don't".) The Information Element natTransportLimit has an inappropriate name; it does not describe that which it (presumably) is supposed to represent (see RFC 7013 section 4.1). In addition, it is underspecified. It is impossible to implement from the description. Is the field IPv4 specific, or is IPv6 supported as well? (If not, why not?) The Information Element localID has an inappropriate name; it is far too general (see RFC 7013 section 4.1). It uses an inappropriate abstract data type (addresses should never be represented as UTF-8 strings in IPFIX, see RFC 7013 section 4.2). It is underspecified as well as poorly designed. Without the ability to disambiguate the type of information in the field, this is not a useful Information Element. Without a complete enumeration of possible types (n.b. 'etc.' in the description), it is not a useful Information Element. Its purpose is unclear from its description; further, it appears to violate the following guidance in RFC 7013 section 4: "The Information Element must be unique within the registry, and its description must represent a substantially different meaning from that of any existing Information Element. An existing Information Element that can be reused for a given purpose should be reused." I have some more issues I would like to discuss: - section 3.2.5, as an example, contains a list of sourceIPv6Address. In IPFIX, we would export those as a list [RFC 6313] Does this RADIUS document want to only reuse the semantic of individual IPFIX information element? And also the semantic of multiple information elements [RFC 6313]? And also the IPFIX encoding? For example, some IPFIX fields are "right justified" (sourceTransportPort), while some others are not (localID) The document should be clear. |
2016-09-15
|
11 | Benoît Claise | [Ballot comment] - 1. IP-Port-Limit-Info: This attribute may be carried in RADIUS Access-Accept, Access-Request, Accounting-Request or CoA-Request packet. … [Ballot comment] - 1. IP-Port-Limit-Info: This attribute may be carried in RADIUS Access-Accept, Access-Request, Accounting-Request or CoA-Request packet. The purpose of this attribute is to limit the total number of TCP/UDP ports and/or ICMP identifiers allocated to a user, associated with one or more IPv4 addresses. I see "may be carried". Could it be carried in other packets ... was my first question. It was not clear (until I read the rest of the document) that it's a non compulsory attribute only in Access-Accept, Access-Request, Accounting-Request or CoA-Request packets. Proposal: 1. IP-Port-Limit-Info: The purpose of this attribute is to limit the total number of TCP/UDP ports and/or ICMP identifiers allocated to a user, associated with one or more IPv4 addresses. This attribute is carried in RADIUS Access-Accept, Access-Request, Accounting-Request or CoA-Request packets. Same remark for the other two points below. 2. IP-Port-Range: This attribute may be carried in RADIUS Accounting-Request packet. The purpose of this attribute is to report by an address sharing device (e.g., a CGN) to the RADIUS server the range of TCP/UDP ports and/or ICMP identifiers that have been allocated or deallocated associated with a given IPv4 address for a user. 3. IP-Port-Forwarding-Map: This attribute may be carried in RADIUS Access-Accept, Access-Request, Accounting-Request or CoA-Request packet. The purpose of this attribute is to specify how an IPv4 address and a TCP/ UDP port (or an ICMP identifier) is mapped to another IPv4 address and a TCP/UDP port (or an ICMP identifier). - 1. IP-Port-Limit-Info: This attribute may be carried in RADIUS Access-Accept, Access-Request, Accounting-Request or CoA-Request packet. The purpose of this attribute is to limit the total number of TCP/UDP ports and/or ICMP identifiers allocated to a user, associated with one or more IPv4 addresses. Only for TCP/UDP? I believe Mirja had the same question. - Section 2. Terminology. Typically, you want to have that note at the beginning: Note that the definitions of "internal IP address", "internal port", "internal realm", "external IP address", "external port", "external realm", and "mapping" are the same as defined in Port Control Protocol (PCP) [RFC6887], and the Common Requirements for Carrier- Grade NATs (CGNs) [RFC6888]. If I know of RFC6887 and RFC6888, I don't read the definitions. - Section 3.1.3 This attribute is of type "TLV" as defined in the RADIUS Protocol Extensions [RFC6929]. It contains the following sub-attributes: ... o either an IP-Port-Int-IPv4-Addr TLV (see Section 3.2.4) or an IP- Port-Local-Id TLV (see Section 3.2.11), o either an IP-Port-Int-IPv6-Addr TLV (see Section 3.2.5) or an IP- Port-Local-Id TLV (see Section 3.2.11), Depending on the IP-Port-Type value, it's one of the two above, not both. - I believe the RFC 2119 keywords usage is sometimes weak (generic comment for the entire document) Example1: section 3.1.3 The attribute contains a 2-byte IP internal port number that is associated with an internal IPv4 or IPv6 address, or a locally significant identifier at the customer site, and a 2-byte IP external port number that is associated with an external IPv4 address. The internal IPv4 or IPv6 address, or the local identifier must be included; the external IPv4 address may also be included. Not RFC 2119 keywords. Shoud they be MUST and MAY? And the next paragraph contains RFC 2119 keywords. The IP-Port-Forwarding-Map Attribute MAY appear in an Access-Accept packet. It MAY also appear in an Access-Request packet to indicate a preferred port mapping by the device co-located with NAS. However the server is not required to honor such a preference. Example2: IP-Port-Ext-IPv4-Addr TLV MAY be included in the following Attributes: o IP-Port-Limit-Info Attribute, identified as 241.TBD1.3 (see Section 3.1.1). o IP-Port-Range Attribute, identified as 241.TBD2.3 (see Section 3.1.2). o IP-Port-Forwarding-Mapping Attribute, identified as 241.TBD3.3 (see Section 3.1.3). Don't you need the RFC2119 keyword in the reverse situation, in section 3.1.1 (IP-Port-Limit-Info Attribute)? OLD: o an optional IP-Port-Ext-IPv4-Addr TLV (see Section 3.2.3). NEW: o The IP-Port-Limit-Info Attribute MAY contain the IP-Port-Ext-IPv4-Addr (see Section 3.2.3). This logic would not only be clearer, but would also avoid inconsistencies. See section 3.1.3 OLD: It contains the following sub-attributes: ... o an IP-Port-Ext-IPv4-Addr TLV (see Section 3.2.3). NEW: It contains the following sub-attributes: ... o an optional IP-Port-Ext-IPv4-Addr TLV (see Section 3.2.3). Example 3: natEvent Integer. This field contains the data (unsigned8) of natEvent (230) defined in IPFIX, right justified, and unused bits must be set to zero. It indicates the allocation or deallocation of a range of IP ports as follows: MUST? |
2016-09-15
|
11 | Benoît Claise | [Ballot Position Update] New position, Discuss, has been recorded for Benoit Claise |
2016-09-14
|
11 | Kathleen Moriarty | Telechat date has been changed to 2016-09-29 from 2016-09-15 |
2016-09-14
|
11 | Kathleen Moriarty | IESG state changed to Waiting for AD Go-Ahead from Waiting for Writeup |
2016-09-14
|
11 | Stephen Farrell | [Ballot discuss] Sorry for not spotting this in other documents, but do we understand the privacy characteristics of this ICMP identifier? It may well be … [Ballot discuss] Sorry for not spotting this in other documents, but do we understand the privacy characteristics of this ICMP identifier? It may well be that the resolution of this discuss requires some other document to exist (in which case I'll get out of the way of this one) but I think we ought be quite cautious in how we introduce new functions for identifiers that may be personally identifying, so I'd like to chat about this a bit. Did the WG discuss the privacy issues associated with this identifier? |
2016-09-14
|
11 | Stephen Farrell | [Ballot comment] - write-up: Yeah, major yuks to leaving design decisions to IANA. While the folks there are quite capable, they are not able to … [Ballot comment] - write-up: Yeah, major yuks to leaving design decisions to IANA. While the folks there are quite capable, they are not able to make IETF consensus decisions. If the WG aren't sure, ask IANA personnel (or someone) and then verify that that outcome garners rough consensus back in the WG or using other IETF processes. So Alissa's discuss point#4 is entirely, completely and fully correct and a showstopper really. - I also agree with the issue called out in Joel's comment about mission creep and how this overlaps with PCP. Did the WG consider whether or not it is a good idea for the IETF to define multiple ways in which some of these features can be added? If so, what is the justification for there being more than one? (Is that somewhere in the WG list archive? If not, it ought be.) It may well be that having a RADIUS mechanism for this is also a good plan, but I think that ought be justified. - 4.1.4: using port 80 as an example is very 1990's. Would it not be better to be more up to date? That's not just a facetious point - web cameras being left open to the Internet are a major swamp for botnet gestation. Better to use a more desirable example really. - The secdir review [1] also noted a bunch of issues that as far as I can see received no response so far, but that do deserve a response. (Apologies if I missed a response.) [1] https://www.ietf.org/mail-archive/web/secdir/current/msg06736.html |
2016-09-14
|
11 | Stephen Farrell | [Ballot Position Update] New position, Discuss, has been recorded for Stephen Farrell |
2016-09-13
|
11 | Suresh Krishnan | [Ballot comment] * Does the IP-Port-Limit include the count of ports already allocated through the IP-Port-Forwarding-Map or not? * I agree with Alissa's DISCUSS points … [Ballot comment] * Does the IP-Port-Limit include the count of ports already allocated through the IP-Port-Forwarding-Map or not? * I agree with Alissa's DISCUSS points about the lack of error handling and the privacy issues and Mirja's DISCUSS point about restricting transport protocols to TCP and UDP. |
2016-09-13
|
11 | Suresh Krishnan | Ballot comment text updated for Suresh Krishnan |
2016-09-13
|
11 | Joel Jaeggli | [Ballot comment] Tim Chown Tim.Chown@jisc.ac.uk provided the opdir review. At this time, this position is not a discuss, but I would like to see a … [Ballot comment] Tim Chown Tim.Chown@jisc.ac.uk provided the opdir review. At this time, this position is not a discuss, but I would like to see a discussion or pointer to a dicussion on the role of this method vs pcp. thanks joel Hi, I have reviewed this document as part of the Operational directorate's ongoing effort to review all IETF documents being processed by the IESG. These comments were written with the intent of improving the operational aspects of the IETF drafts. Comments that are not addressed in last call may be included in AD reviews during the IESG review. Document editors and WG chairs should treat these comments just like any other last call comments. This draft defines three new RADIUS attributes to be used when communicating with a RADIUS server to facilitate the configuration or reporting of IP and port ranges used with a network appliance, typically a CGN, where there is a need to constrain the ports available per customer where IP address sharing is in use. The three RADIUS attributes are: IP-Port-Limit-Info - defines the maximum number of ports available IP-Port-Range - the specific range of port numbers available IP-Port-Forwarding-Map - to configure port forwarding on a NAT/CGN device I would consider the document to be "Ready with Issues". I have some general comments, followed by some specific comments. Note that while I am familiar with RADIUS (from an eduroam context) the draft is not one I was familiar with or followed prior to this review. Thus these comments may have already been addressed. General comments: There are at least two areas in which this document has "creep". One is that it is providing an alternative method to PCP to define port forwarding mappings on a device. So there is an open question as to whether PCP should be the method of choice for this function, or whether we wish to create a new way to establish such mappings. Secondly, two of the new attributes support inclusion of a new TLV, IP-Port-Local-Id, which allows user/device-specific information to be transmitted via RADIUS, such as MAC address or VLAN ID. While this is intended to allow differentiation of users for accounting/identification r, in doing so it adds an additional potential privacy concern into a new RADIUS attribute, depending on specific use cases of the TLV. This is not discussed in the Security Considerations section, but probably should be. I note the new attributes use a number of IPFIX information elements; has the draft considered its relationship to draft-ietf-behave-ipfix-nat-logging-09, which says the "lack of a consistent way to log the data makes it difficult to write the collector applications that would receive this data and process it to present useful information"? This draft is introducing a new method to log such elements; is this a concern at all? The examples of use cases of the new attributes include both NAT44 devices and CGNs. The document could state more clearly the address sharing scenarios, perhaps with a simplified network element diagram for each example, showing the user/host, CPE/NAT44, and NAT444/CGN? Some additional clarity here would be useful (see also comments below). Also, the term "the user" is used in many places in the document where in practice "the customer's CPE" would be more appropriate. Specific comments: NAT64 is mentioned as a use case at the start, but no example is given later in the document. This might add useful value. In Sections 3.2.6, 3.2.7, 3.2.9 and 3.2.10, the IPFIX information elements in the TLV are 16 bit values, but 32 bits are reserved for the element. Similarly the NatEvent element is 8-bit, but has 32 bits reserved. It would be useful if the document stated why these elements are being padded out to 32 bits. In Section 4.1.1, I don't think NAT64 is specifically designed to multiplex users over a smaller number of shared IPv4 addresses, rather its primary design goal is to facilitate access to legacy IPv4 content from IPv6-only networks. The text should be clarified. Also in 4.1.1, do users really have service agreements that state port limits? If they do, I doubt users are aware of them (or care...), and the issue is beyond the scope of this document. In 4.1.2, I think you mean "block", not "bulk"? And the comment on "randomization" might fit better in the Security Considerations section if you discuss privacy there (which is presumably what you mean?) Also in 4.1.2 you discuss the scenario as if it's CGN, but the flow diagram shows only the NAT44 (presumably in the CPE) and not an ISP CGN. The same happens in 4.1.3; discussion of CGN and NAT44 interchangeably, without the diagram showing there may (presumably) be mappings to establish at both the user's CPE and the ISP's CGN. And in 4.1.4 the example talks of NAT44 for Joe's CPE, but then also about a CGN allocating more ports; is that at the NAT44, or at the CGN? (These specific NAT44/CGN comments are examples of the general comment I made earlier.) In Section 5, I found the format of the table with 0 and 0+ a little unintuitive. -- Tim _______________________________________________ OPS-DIR mailing list OPS-DIR@ietf.org https://www.ietf.org/mailman/listinfo/ops-dir |
2016-09-13
|
11 | Joel Jaeggli | [Ballot Position Update] New position, No Objection, has been recorded for Joel Jaeggli |
2016-08-29
|
11 | Ron Bonica | Request for Last Call review by GENART No Response. Reviewer: Ron Bonica. |
2016-08-24
|
11 | Gunter Van de Velde | Request for Last Call review by OPSDIR Completed: Has Issues. Reviewer: Tim Chown. |
2016-08-19
|
11 | Tero Kivinen | Request for Last Call review by SECDIR Completed: Has Issues. Reviewer: Carl Wallace. |
2016-08-18
|
11 | Kathleen Moriarty | Telechat date has been changed to 2016-09-15 from 2016-08-18 |
2016-08-17
|
11 | (System) | IANA Review state changed to IANA - Not OK from Version Changed - Review Needed |
2016-08-17
|
11 | Suresh Krishnan | [Ballot comment] * Why are the the uint8 and unit16 based types getting stuffed into 32 bit fields inside the TLVs? This feels like a … [Ballot comment] * Why are the the uint8 and unit16 based types getting stuffed into 32 bit fields inside the TLVs? This feels like a complete waste. Is there any specific reason this is required? * Does the IP-Port-Limit include the count of ports already allocated through the IP-Port-Forwarding-Map or not? * I agree with Alissa's DISCUSS points about the lack of error handling and the privacy issues and Mirja's DISCUSS point about restricting transport protocols to TCP and UDP. |
2016-08-17
|
11 | Suresh Krishnan | [Ballot Position Update] New position, No Objection, has been recorded for Suresh Krishnan |
2016-08-17
|
11 | Alvaro Retana | [Ballot Position Update] New position, No Objection, has been recorded for Alvaro Retana |
2016-08-17
|
11 | Terry Manderson | [Ballot Position Update] New position, No Objection, has been recorded for Terry Manderson |
2016-08-17
|
11 | Jari Arkko | [Ballot comment] I agree with Alissa's questions. |
2016-08-17
|
11 | Jari Arkko | [Ballot Position Update] New position, No Objection, has been recorded for Jari Arkko |
2016-08-17
|
11 | Mirja Kühlewind | [Ballot discuss] I fully support Alissa's discussion points and have two more to add: 1) IP-Port-Type TLV only covers UDP, TCP and ICMP. This is … [Ballot discuss] I fully support Alissa's discussion points and have two more to add: 1) IP-Port-Type TLV only covers UDP, TCP and ICMP. This is not very future-proof: there are other transport protocols that have ports or identifiers that may want to be supported in future. Also it is not clear to me from the document why this information is needed at all in the described use cases. Therefore I see two possible ways forward: Either remove the IP-Port-Type TLV or extend it to also cover other cases. Related to this point I would like to mention that RFC6887 is not restricted to UDP/TCP and therefore the following sentence in section 2 is not correct: "Note that the definitions of [...] "internal port", [...] "external port" [...] are the same as defined in Port Control Protocol (PCP) [RFC6887]" 2) The IE doctors have provide feedback to IANA that the Information Elements in this doc are underspecified (not confirm with rules in RFC 7013) and should therefore be not registered. Addressing this feedback could lead to a mayor rewrite of this doc, especially in the relation to the use and definition of transportType and receptively IP-Port-Type TLV, and should therefore be done before a final IESG decision. |
2016-08-17
|
11 | Mirja Kühlewind | [Ballot Position Update] New position, Discuss, has been recorded for Mirja Kühlewind |
2016-08-17
|
11 | Alexey Melnikov | [Ballot comment] Maybe it is just me, but I found that the idea that most subattributes are the same size, but right aligned to be … [Ballot comment] Maybe it is just me, but I found that the idea that most subattributes are the same size, but right aligned to be wasteful. Is this a common design pattern for Radius? I am agreeing with Alissa on privacy concerns. On page 12: IP-Port-Int-IPv6-Addr TLV This TLV contains an IPv4 address that is associated with the Typo: should be IPv6? internal IP port number contained in the IP-Port-Int-Port TLV. For IPv6 network, either this TLV or IP-Port-Local-Id TLV must be included as part of the IP-Port-Forwarding-Map Attribute. Refer to Section 3.2.5. |
2016-08-17
|
11 | Alexey Melnikov | Ballot comment text updated for Alexey Melnikov |
2016-08-16
|
11 | Ben Campbell | [Ballot comment] I originally intended the two comments under "Major Issues" to be points for a DISCUSS position. But I see Alissa has already captured … [Ballot comment] I originally intended the two comments under "Major Issues" to be points for a DISCUSS position. But I see Alissa has already captured the essence of them in her DISCUSS. Therefore I will ballot NO OBJECTION for now, and will watch that discussion. Major Issues: The guidance for IP-Port-Local-Id TLV contemplates using persistent client identifiers, such as MAC addresses. Is that necessary? I suspect the answer will be "yes". But if that is the case, the draft really needs a privacy considerations section to discuss the implications and tradeoffs. - 3.1.1, paragraph 7: "However, the RADIUS server is not required to honor such a preference." Please describe what it means to "not honor" such a preference? Does the server report an error? Does the transaction succeed, but report a different limit? Does the server just ignore the preference and do its own thing? (I expect this applies to any number of failure conditions.) Minor Issues: - Please clarify the applicability to IPv4 and IPv6. Specifically, I note that you define TLVs for "internal" IPv4 and IPv6 addresses, but only for "external" IPv4 address. I assume that to mean that this supports Nat44 and Nat64 use cases, but not anything that uses IPv6 in the "external" realm? (Whatever the answer, it would be helpful to have a paragraph or two to make that explicit.) -2, definition of "port-based device": Wouldn’t that more properly be called a port-mapping device? (anything using TCP or UDP would seem to be port-based) -3.1.1, last paragraph: This language precludes new extension packet types from using the attribute without updating this document. Is that really the intent? Would it make sense to say something like "... MUST NOT appear in any other RADIUS packet types defined at the time of this writing. If a future packet type uses the attribute, the specification of that packet type will need to define it's usage"? (Note that this issue repeats several times in the document.) Editorial Comments and Nits: - The use of the term "session" seems inconsistent. In some places it seems like an IPFlow or a NAT mapping, but in other places it seems like a network connection (i.e. NAS attachment.) - 1, list item 1: Singular/plural mismatch for "packet". Either "packet" should be "packets", or you need an article before RADIUS. (e.g. a RADIUS...packet.) Note that this error repeats many times in similar patterns throughout the document. -1, list item 2, last sentence: Convoluted sentence. Can it be simplified? -1, last paragraph: It would be helpful to mention that this draft defines IPFIX elements near the top of the section, and also in the abstract. -2, definition of "Internal IP Address": "refers to the IP address that is used as a source IP address" Used by what device? -2, definition of "mapping": I cannot parse the text. (Note that while the last paragraph in the section says this is taken from 6887 and 6888, neither of them seem to use this specific language.) -4.1, second paragraph: " A CGN function in a broadband network would most likely co-located on a BNG." There's a missing word in there somewhere. Maybe a "be" before "co-located"? -6, last paragraph: The paragraph doesn't parse. Should "deployed" be "deployments"? |
2016-08-16
|
11 | Ben Campbell | [Ballot Position Update] New position, No Objection, has been recorded for Ben Campbell |
2016-08-16
|
11 | Deborah Brungard | [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard |
2016-08-16
|
11 | Alissa Cooper | [Ballot discuss] (1) I find the absence of any definition of error handling behavior in this document to be a problem. I realize that the … [Ballot discuss] (1) I find the absence of any definition of error handling behavior in this document to be a problem. I realize that the attributes specified in this document are meant to be transmitted between components that are all operated by the same administrative entity, but implementors can still make mistakes, and for those cases it seems like error handling should be defined. For example: - What happens if the AAA server sends an IP-Port-Limit-Info attribute with a larger limit than the CGN is able to allocate to that particular user? What is the CGN supposed to do and how is that communicated back to the AAA server? - What happens if the CGN sends an IP-Port-Range attribute that encompasses a larger range than a previously sent IP-Port-Limit-Info? What is the AAA server supposed to do? - What happens if the AAA server sends an IP-Port-Forwarding-Map attribute to map a port that is not within the requesting host's allocated range? Is the CGN expected to change the mapping and send a CoA with a different IP-Port-Forwarding-Map, or communicate some sort of error, or something else? There are surely other error cases. I think it's worth going through the uses of each attribute and specifying all the error handling behavior. This seems especially important since part of the motivation for these attributes is for identification and the consequences of erroneous identification could be severe for the user. Discussion of those consequences is also missing from Section 6. (2) Section 3.1.2 says: "For port allocation, both IP-Port-Range-Start TLV and IP- Port-Range-End TLV must be included; for port deallocation, the inclusion of these two TLVs is optional and if not included, it implies that all ports that are previously allocated are now deallocated." How does an AAA server distinguish between port allocation and deallocation requests if a deallocation request includes a range start and range end? Is the server supposed to assume that whatever range is specified by the most recently received IP-Port-Range attribute represents the only range of allocated ports for the host? What is the meaning of sending an IP-Port-Range request with only a start value or an end value but not both (as seems to be allowable by the above)? (3) The specification of IP-Port-Local-Id seems to allow for unnecessary exposure of potentially sensitive information. There is no explanation given for why the combination of the other identifiers included in IP-Port-Range and IP-Port-Forwarding attributes is insufficient to identify the host in DS-Extra-Lite and Lightweight 4over6 cases. As defined, it sounds like implementations could put basically any user, device, or interface identifier in there. If this TLV is actually necessary to communicate what these attributes are trying to accomplish, the justification for it should be provided and the limitations on when this field may be used and what kind of identifiers can appear here should be stated. (4) The shepherd write-up discusses two different approaches to defining the sub-TLV types and then says: "Both approaches were considered as valid and the WG has decided to let IANA decide what the approach is preferred when allocating the TLV-Type for the sub-TLVs defined in this document." This is not appropriate. The document needs to explicitly define how the types should be allocated and should not leave the decision to IANA. I see that IANA has already noted that Section 7.3 is ambiguous about this; the WG needs to make a choice. (5) Section 6 seems to be missing a discussion of the consequences of communicating erroneous port range and port mapping information. Since part of the motivation for these attributes is identification of the host, this needs to be discussed. |
2016-08-16
|
11 | Alissa Cooper | [Ballot comment] (1) What does it mean for an IP-Port-Range attribute to have IP-Port-Type 1 or 2? Can numbers in the whole range be used … [Ballot comment] (1) What does it mean for an IP-Port-Range attribute to have IP-Port-Type 1 or 2? Can numbers in the whole range be used for any of the port or identifier types? Or is the range expected to be split up somehow among the multiple types? I think this needs to be explained. (2) In 4.1.4, how does the ISP know that Joe is traveling? |
2016-08-16
|
11 | Alissa Cooper | [Ballot Position Update] New position, Discuss, has been recorded for Alissa Cooper |
2016-08-16
|
11 | Alia Atlas | [Ballot Position Update] New position, No Objection, has been recorded for Alia Atlas |
2016-08-16
|
11 | Alexey Melnikov | [Ballot comment] On page 12: IP-Port-Int-IPv6-Addr TLV This TLV contains an IPv4 address that is associated with the … [Ballot comment] On page 12: IP-Port-Int-IPv6-Addr TLV This TLV contains an IPv4 address that is associated with the Typo: should be IPv6? internal IP port number contained in the IP-Port-Int-Port TLV. For IPv6 network, either this TLV or IP-Port-Local-Id TLV must be included as part of the IP-Port-Forwarding-Map Attribute. Refer to Section 3.2.5. |
2016-08-16
|
11 | Alexey Melnikov | [Ballot Position Update] New position, No Objection, has been recorded for Alexey Melnikov |
2016-08-15
|
11 | Spencer Dawkins | [Ballot Position Update] New position, No Objection, has been recorded for Spencer Dawkins |
2016-08-12
|
11 | Kathleen Moriarty | Ballot has been issued |
2016-08-12
|
11 | Kathleen Moriarty | [Ballot Position Update] New position, Yes, has been recorded for Kathleen Moriarty |
2016-08-12
|
11 | Kathleen Moriarty | Created "Approve" ballot |
2016-08-12
|
11 | Kathleen Moriarty | Ballot writeup was changed |
2016-08-12
|
11 | Kathleen Moriarty | Ballot writeup was changed |
2016-08-11
|
11 | Jean Mahoney | Request for Last Call review by GENART is assigned to Ron Bonica |
2016-08-11
|
11 | Jean Mahoney | Request for Last Call review by GENART is assigned to Ron Bonica |
2016-08-11
|
11 | (System) | IESG state changed to Waiting for Writeup from In Last Call |
2016-08-10
|
11 | Dean Cheng | IANA Review state changed to Version Changed - Review Needed from IANA - Not OK |
2016-08-10
|
11 | Dean Cheng | New version available: draft-ietf-radext-ip-port-radius-ext-11.txt |
2016-08-10
|
10 | (System) | IANA Review state changed to IANA - Not OK from IANA - Review Needed |
2016-08-10
|
10 | Sabrina Tanamal | (Via drafts-lastcall-comment@iana.org): IESG/Authors/WG Chairs: IANA has completed its review of draft-ietf-radext-ip-port-radius-ext-10.txt. If any part of this review is inaccurate, please let us know. IANA … (Via drafts-lastcall-comment@iana.org): IESG/Authors/WG Chairs: IANA has completed its review of draft-ietf-radext-ip-port-radius-ext-10.txt. If any part of this review is inaccurate, please let us know. IANA has a question about one of the actions requested in the IANA Considerations section of this document. IANA understands that, upon approval of this document, there are three actions which IANA must complete. First, in the IPFIX Information Elements subregistry of the IP Flow Information Export (IPFIX) Entities registry located at: https://www.iana.org/assignments/ipfix/ three new information elements are to be registered as follows: ElementID: [ TBD-at-registration ] Name: transportType Data Type: unsigned8 Data Type Semantics: Status: current Description: The value indicates TCP/UDP ports and ICMP Identifiers (1), TCP/UDP ports (2), TCP ports (3), UDP ports (4) or ICMP identifiers (5). Units: Range: References: [ RFC-to-be ] ElementID: [ TBD-at-registration ] Name: natTransportLimit Data Type: unsigned16 Data Type Semantics: Status: current Description: The value is the max number of IP transport ports to be assigned to an end user associated with one or more IPv4 addresses. Units: Range: References: [ RFC-to-be ] ElementID: [ TBD-at-registration ] Name: localID Data Type: string Data Type Semantics: Status: current Description: The value is an IPv4 or IPv6 address, a MAC address, a VLAN ID, etc. Units: Range: References: [ RFC-to-be ] IANA Question --> for each of these three registrations, could the authors please supply the data type semantics and the units to be registered with these values? As this document requests registrations in an Expert Review or Specification Required (see RFC 5226) registry, we will initiate the required Expert Review via a separate request. Expert review will need to be completed before your document can be approved for publication as an RFC. Second, in the Radius Attribute Types subregistry of the Radius Types registry located at: http://www.iana.org/assignments/ three new Radius attribute types are to be registered under the 241 Extended-Attribute-1 type as follows: Value: 241.[ TBD-at-registration ] Description: IP-Port-Limit-Info Reference: [ RFC-to-be ] Value: 241.[ TBD-at-registration ] Description: IP-Port-Range Reference: [ RFC-to-be ] Value: 241.[ TBD-at-registration ] Description: IP-Port-Forwarding-Map Reference: [ RFC-to-be ] Third, IANA notes that the authors request: This specification requests allocation of the following TLVs: Name Value Meaning ---- ----- ------- IP-Port-Type 1 see Section 3.2.1 IP-Port-Limit 2 see Section 3.2.2 IP-Port-Ext-IPv4-Addr 3 see Section 3.2.3 IP-Port-Int-IPv4-Addr 4 see Section 3.2.4 IP-Port-Int-IPv6-Addr 5 see Section 3.2.5 IP-Port-Int-Port 6 see Section 3.2.6 IP-Port-Ext-Port 7 see Section 3.2.7 IP-Port-Alloc 8 see Section 3.2.8 IP-Port-Range-Start 9 see Section 3.2.9 IP-Port-Range-End 10 see Section 3.2.10 IP-Port-Local-Id 11 see Section 3.2.11 IANA Question --> Specifically, in what registry are these new TLVs to be registered? IANA understands that the three actions above are the only ones required to be completed upon approval of this document. Note: The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is only to confirm what actions will be performed. Thank you, Sabrina Tanamal IANA Specialist ICANN |
2016-08-04
|
10 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Carl Wallace |
2016-08-04
|
10 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Carl Wallace |
2016-08-04
|
10 | Lionel Morand | === 1. Summary === The document shepherd is Lionel Morand. The responsible Area Director is Kathleen Moriarty. This document defines three new RADIUS attributes. For … === 1. Summary === The document shepherd is Lionel Morand. The responsible Area Director is Kathleen Moriarty. This document defines three new RADIUS attributes. For devices that implementing IP port ranges, these attributes are used to communicate with a RADIUS server in order to configure and report TCP/UDP ports and ICMP identifiers, as well as mapping behavior for specific hosts. This mechanism can be used in various deployment scenarios such as Carrier-Grade NAT, IPv4/IPv6 translators, Provider WLAN Gateway, etc. Three new attributes (IP-Port-Limit-Info, IP-Port-Range, IP-Port-Forwarding-Map)are defined as "Extended Type" using the "TLV" data type, both defined in RFC6929). The "tlv" data type is an encapsulation layer that permits the "Value" field the attribute to contain new sub-attributes and this nesting is used to group data into logical containers. This document provides also a mapping between RADIUS sub-TLV and IPFIX Information Element Identifiers, defining new IPFIX Information Elements when required. === 2. Review and Consensus === After detailed reviews and clean-up, this document is ready to be published. These new attributes are useful when a RADIUS server is used to configure TCP/UDP port (or ICMP identifier) mapping behaviors in Carrier-Grade NAT or to report to the RADIUS Server the port/identifier mapping behavior applied by the CGN to a user session, as part of the accounting information sent to a RADIUS server. The proposed RADIUS extensions are simple (definition of new TLV attributes allocated from the RADIUS "Extended Type" code space defined in RFC6929), and there was no difficulty in coming to consensus on the definition of these TLVs. The IANA considerations section has been reviewed and is consistent with the body of the document. There is no discussion regarding the attribute type values assigned from the Short Extended Space defined in RFC6929. The attribute type value assignment by IANA should be straightforward. However, there was a discussion in the WG regarding the allocation of TLV-Type values for the sub-TLVs. Some of the sub-TLVs are reused in the three attributes defined in this document. Therefore, two approaches were discussed after the shepherd review: Approach#1: allocate a fixed TLV-Type for a same sub-TLV reused in multiple parent attributes. Approach#2: allocate a TLV-Type meaningful only within the context defined by the parent attribute. In the approach 1, using fixed values for sub-TLV used in any attribute is straightforward from a dictionary/configuration point of view, i.e. the same information is identified by the same name/value independently of the parent attribute. However it would mean defining a flat allocation space for sub-TLV, allowing only 253 values for the definition of sub-TLVs in the Extended-Type space. In the approach 2, the guidelines given in the RFC6929 are strictly enforced, i.e. for nested TLVs, the TLV-Type is allocated in the type space defined by the parent attribute, of the form "Type.Extended-Type.TLV-Type.TLV-Type", allowing the definition of 253 TLV per extended attribute. However this implies extra-complexity to manage the same TLV with different name/id in different parent attributes. Both approaches were considered as valid and the WG has decided to let IANA decide what the approach is preferred when allocating the TLV-Type for the sub-TLVs defined in this document. If required, the IANA section will be updated according to the final decision. === 3. Intellectual Property === Each author has confirmed conformance with BCP 78/79. There are no IPR disclosures on the document. === 4. Other Points === ID nits tool confirms that document meets the internet drafts checklists. One specification put as informative reference is still in progress: * I-D.gundavelli-v6ops-community-wifi-svcs However, it is not essential for this specification. |
2016-08-02
|
10 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Tim Chown |
2016-08-02
|
10 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Tim Chown |
2016-08-02
|
10 | Gunter Van de Velde | Closed request for Last Call review by OPSDIR with state 'Withdrawn' |
2016-08-01
|
10 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Jouni Korhonen |
2016-08-01
|
10 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Jouni Korhonen |
2016-07-28
|
10 | Jean Mahoney | Request for Last Call review by GENART is assigned to Ron Bonica |
2016-07-28
|
10 | Jean Mahoney | Request for Last Call review by GENART is assigned to Ron Bonica |
2016-07-28
|
10 | Cindy Morgan | IANA Review state changed to IANA - Review Needed |
2016-07-28
|
10 | Cindy Morgan | The following Last Call announcement was sent out: From: The IESG To: "IETF-Announce" CC: draft-ietf-radext-ip-port-radius-ext@ietf.org, Kathleen.Moriarty.ietf@gmail.com, lionel.morand@orange.com, radext-chairs@ietf.org, radext@ietf.org Reply-To: ietf@ietf.org … The following Last Call announcement was sent out: From: The IESG To: "IETF-Announce" CC: draft-ietf-radext-ip-port-radius-ext@ietf.org, Kathleen.Moriarty.ietf@gmail.com, lionel.morand@orange.com, radext-chairs@ietf.org, radext@ietf.org Reply-To: ietf@ietf.org Sender: Subject: Last Call: (RADIUS Extensions for IP Port Configuration and Reporting) to Proposed Standard The IESG has received a request from the RADIUS EXTensions WG (radext) to consider the following document: - 'RADIUS Extensions for IP Port Configuration and Reporting' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2016-08-11. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract This document defines three new RADIUS attributes. For devices that implement IP port ranges, these attributes are used to communicate with a RADIUS server in order to configure and report TCP/UDP ports and ICMP identifiers, as well as mapping behavior for specific hosts. This mechanism can be used in various deployment scenarios such as Carrier-Grade NAT, IPv4/IPv6 translators, Provider WLAN Gateway, etc. The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-radext-ip-port-radius-ext/ IESG discussion can be tracked via https://datatracker.ietf.org/doc/draft-ietf-radext-ip-port-radius-ext/ballot/ No IPR declarations have been submitted directly on this I-D. |
2016-07-28
|
10 | Cindy Morgan | IESG state changed to In Last Call from Last Call Requested |
2016-07-28
|
10 | Kathleen Moriarty | Last call was requested |
2016-07-28
|
10 | Kathleen Moriarty | Ballot approval text was generated |
2016-07-28
|
10 | Kathleen Moriarty | Ballot writeup was generated |
2016-07-28
|
10 | Kathleen Moriarty | IESG state changed to Last Call Requested from Publication Requested |
2016-07-28
|
10 | Kathleen Moriarty | IESG state changed to Publication Requested from AD is watching |
2016-07-28
|
10 | Kathleen Moriarty | Notification list changed to radext@ietf.org |
2016-07-28
|
10 | Kathleen Moriarty | Placed on agenda for telechat - 2016-08-18 |
2016-07-28
|
10 | Kathleen Moriarty | Last call announcement was generated |
2016-07-28
|
10 | Kathleen Moriarty | Last call announcement was generated |
2016-07-28
|
10 | Kathleen Moriarty | IESG state changed to AD is watching from Publication Requested |
2016-07-28
|
10 | Mohamed Boucadair | New version available: draft-ietf-radext-ip-port-radius-ext-10.txt |
2016-06-13
|
09 | Lionel Morand | === 1. Summary === The document shepherd is Lionel Morand. The responsible Area Director is Kathleen Moriarty. This document defines three new RADIUS attributes. For … === 1. Summary === The document shepherd is Lionel Morand. The responsible Area Director is Kathleen Moriarty. This document defines three new RADIUS attributes. For devices that implementing IP port ranges, these attributes are used to communicate with a RADIUS server in order to configure and report TCP/UDP ports and ICMP identifiers, as well as mapping behavior for specific hosts. This mechanism can be used in various deployment scenarios such as Carrier-Grade NAT, IPv4/IPv6 translators, Provider WLAN Gateway, etc. Three new attributes (IP-Port-Limit-Info, IP-Port-Range, IP-Port-Forwarding-Map)are defined as "Extended Type" using the "TLV" data type, both defined in RFC6929). The "tlv" data type is an encapsulation layer that permits the "Value" field the attribute to contain new sub-attributes and this nesting is used to group data into logical containers. This document provides also a mapping between RADIUS sub-TLV and IPFIX Information Element Identifiers, defining new IPFIX Information Elements when required. === 2. Review and Consensus === After detailed reviews and clean-up, this document is ready to be published. These new attributes are useful when a RADIUS server is used to configure TCP/UDP port (or ICMP identifier) mapping behaviors in Carrier-Grade NAT or to report to the RADIUS Server the port/identifier mapping behavior applied by the CGN to a user session, as part of the accounting information sent to a RADIUS server. The proposed RADIUS extensions are simple (definition of new TLV attributes allocated from the RADIUS "Extended Type" code space defined in RFC6929), and there was no difficulty in coming to consensus on the definition of these TLVs. The IANA considerations section have been reviewed and is consistent with the body of the document. There is no discussion regarding the attribute type values assigned from the Short Extended Space defined in RFC6929. The attribute type value assignment by IANA should be straightforward. However, there was a discussion in the WG regarding the allocation of TLV-Type values for the sub-TLVs. Some of the sub-TLVs are reused in the three attributes defined in this document. Therefore, two approaches were discussed after the shepherd review: Approach#1: allocate a fixed TLV-Type for a same sub-TLV reused in multiple parent attributes. Approach#2: allocate a TLV-Type meaningful only within the context defined by the parent attribute. In the approach 1, using fixed values for sub-TLV used in any attribute is straightforward from a dictionary/configuration point of vie, i.e. the same information is identified by the same name/value independently of the parent attribute. However it would mean defining a flat allocation space for sub-TLV, allowing only 253 values for the definition of sub-TLVs in the Extended-Type space. In the approach 2, the guidelines given in the RFC6929 are strictly enforced, i.e. for nested TLVs, the TLV-Type is allocated in the type space defined by the parent attribute, of the form "Type.Extended-Type.TLV-Type.TLV-Type", allowing the definition of 253 TLV per extended attribute. However this implies extra-complexity to manage the same TLV with different name/id in different parent attributes. Both approaches were considered as valid and the WG has decided to let IANA decide what is the preferred approach when allocating the TLV-Type for the sub-TLVs defined in this document. If required, the IANA section will be updated according to the final decision. === 3. Intellectual Property === Each author has confirmed conformance with BCP 78/79. There are no IPR disclosures on the document. === 4. Other Points === ID nits tool confirms that document meets the internet drafts checklists. One specifications put as informative reference are still in progress: * I-D.gundavelli-v6ops-community-wifi-svcs However, it is not essential for this specification. |
2016-06-13
|
09 | Lionel Morand | IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up |
2016-06-13
|
09 | Lionel Morand | IESG state changed to Publication Requested |
2016-06-13
|
09 | Lionel Morand | IESG process started in state Publication Requested |
2016-06-13
|
09 | Lionel Morand | Changed consensus to Yes from Unknown |
2016-06-13
|
09 | Lionel Morand | Allocation of Reserved entries in the extended space requires Standards Action |
2016-06-13
|
09 | Lionel Morand | Intended Status changed to Proposed Standard from None |
2016-06-13
|
09 | Lionel Morand | Changed document writeup |
2016-03-17
|
09 | Dean Cheng | New version available: draft-ietf-radext-ip-port-radius-ext-09.txt |
2016-03-14
|
08 | Dean Cheng | New version available: draft-ietf-radext-ip-port-radius-ext-08.txt |
2016-03-09
|
07 | Dean Cheng | New version available: draft-ietf-radext-ip-port-radius-ext-07.txt |
2015-10-19
|
06 | Dean Cheng | New version available: draft-ietf-radext-ip-port-radius-ext-06.txt |
2015-10-14
|
05 | (System) | Notify list changed from radext-chairs@ietf.org, "Lionel Morand" to (None) |
2015-07-03
|
05 | Lionel Morand | IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call |
2015-07-03
|
05 | Lionel Morand | Notification list changed to radext-chairs@ietf.org, "Lionel Morand" <lionel.morand@orange.com> from radext-chairs@ietf.org |
2015-07-03
|
05 | Lionel Morand | Document shepherd changed to Lionel Morand |
2015-04-23
|
05 | Dean Cheng | New version available: draft-ietf-radext-ip-port-radius-ext-05.txt |
2015-04-22
|
04 | Dean Cheng | New version available: draft-ietf-radext-ip-port-radius-ext-04.txt |
2015-03-31
|
03 | Lionel Morand | IETF WG state changed to In WG Last Call from WG Document |
2015-02-06
|
03 | Dean Cheng | New version available: draft-ietf-radext-ip-port-radius-ext-03.txt |
2015-01-27
|
02 | Benoît Claise | Shepherding AD changed to Kathleen Moriarty |
2014-12-17
|
02 | Benoît Claise | Notification list changed to radext@ietf.org, radext-chairs@tools.ietf.org, draft-ietf-radext-ip-port-radius-ext.all@tools.ietf.org |
2014-12-12
|
02 | Dean Cheng | New version available: draft-ietf-radext-ip-port-radius-ext-02.txt |
2014-07-10
|
01 | Stefan Winter | This document now replaces draft-cheng-behave-cgn-cfg-radius-ext, draft-cheng-radext-ip-port-radius-ext instead of draft-cheng-behave-cgn-cfg-radius-ext |
2014-07-09
|
01 | Stefan Winter | This document now replaces draft-cheng-behave-cgn-cfg-radius-ext instead of None |
2014-06-12
|
01 | Dean Cheng | New version available: draft-ietf-radext-ip-port-radius-ext-01.txt |
2014-05-09
|
00 | Dean Cheng | New version available: draft-ietf-radext-ip-port-radius-ext-00.txt |