Dynamic Authorization Extensions to Remote Authentication Dial In User Service (RADIUS)
draft-ietf-radext-rfc3576bis-13
Revision differences
Document history
| Date | Rev. | By | Action |
|---|---|---|---|
|
2012-08-22
|
13 | (System) | post-migration administrative database adjustment to the No Objection position for Tim Polk |
|
2012-08-22
|
13 | (System) | post-migration administrative database adjustment to the Abstain position for Sam Hartman |
|
2012-08-22
|
13 | (System) | post-migration administrative database adjustment to the No Objection position for Russ Housley |
|
2007-11-13
|
13 | Amy Vezza | State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza |
|
2007-11-09
|
13 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
|
2007-11-09
|
13 | (System) | IANA Action state changed to Waiting on RFC Editor from Waiting on Authors |
|
2007-11-09
|
13 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
|
2007-11-09
|
13 | (System) | IANA Action state changed to In Progress |
|
2007-11-09
|
13 | Amy Vezza | IESG state changed to Approved-announcement sent |
|
2007-11-09
|
13 | Amy Vezza | IESG has approved the document |
|
2007-11-09
|
13 | Amy Vezza | Closed "Approve" ballot |
|
2007-11-09
|
13 | Amy Vezza | State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Amy Vezza |
|
2007-10-26
|
13 | Sam Hartman | [Ballot comment] Getting my discuss addressed would likely take more time with this set of authors and chairs than is worthwhile. |
|
2007-10-26
|
13 | Sam Hartman | [Ballot Position Update] Position for Sam Hartman has been changed to Abstain from Discuss by Sam Hartman |
|
2007-10-21
|
13 | (System) | New version available: draft-ietf-radext-rfc3576bis-13.txt |
|
2007-10-19
|
13 | (System) | Removed from agenda for telechat - 2007-10-18 |
|
2007-10-18
|
13 | Amy Vezza | State Changes to IESG Evaluation::AD Followup from IESG Evaluation by Amy Vezza |
|
2007-10-18
|
12 | (System) | New version available: draft-ietf-radext-rfc3576bis-12.txt |
|
2007-10-18
|
13 | Tim Polk | [Ballot Position Update] Position for Tim Polk has been changed to No Objection from Undefined by Tim Polk |
|
2007-10-18
|
13 | Tim Polk | [Ballot Position Update] Position for Tim Polk has been changed to Undefined from Discuss by Tim Polk |
|
2007-10-18
|
13 | Lisa Dusseault | [Ballot Position Update] New position, No Objection, has been recorded by Lisa Dusseault |
|
2007-10-18
|
13 | David Ward | [Ballot Position Update] New position, No Objection, has been recorded by David Ward |
|
2007-10-18
|
13 | Ron Bonica | [Ballot Position Update] New position, No Objection, has been recorded by Ron Bonica |
|
2007-10-18
|
13 | Russ Housley | [Ballot Position Update] Position for Russ Housley has been changed to No Objection from Discuss by Russ Housley |
|
2007-10-18
|
13 | Magnus Westerlund | [Ballot Position Update] New position, No Objection, has been recorded by Magnus Westerlund |
|
2007-10-18
|
13 | Sam Hartman | [Ballot discuss] The RFC 2401 IPsec model does not actually support the concept of a security policy entry that is "accept protected traffic but don't … [Ballot discuss] The RFC 2401 IPsec model does not actually support the concept of a security policy entry that is "accept protected traffic but don't require it." Some of the suggested policies in the security considerations section seem to rely on this. Since we have no mechanism for an application to find out if traffic is protected, I don't think that you can actually have a secure setup if you sometimes use IPsec with a given source and sometimes do not. Please make the sample policies consistent with RFC 2401. Also, please take a look at draft-bellovin-use-ipsec and include the information specified by that draft. You don't seem to say what IKE authentication modes need to be supported. You may get a long way by referring to RFC 4945. I'm confused by section 6.2. Does the attack described there actually happen if the first-hop proxy uses a different secret for each DAS/NAS and confirms that the right secret is used? I.E. confirms that the NAS identity matches the expected NAS identity for the secret? |
|
2007-10-18
|
13 | Sam Hartman | [Ballot Position Update] New position, Discuss, has been recorded by Sam Hartman |
|
2007-10-18
|
13 | Chris Newman | [Ballot Position Update] New position, No Objection, has been recorded by Chris Newman |
|
2007-10-18
|
13 | Lars Eggert | [Ballot Position Update] New position, No Objection, has been recorded by Lars Eggert |
|
2007-10-18
|
13 | Amy Vezza | State Changes to IESG Evaluation from Waiting for Writeup by Amy Vezza |
|
2007-10-17
|
13 | Tim Polk | [Ballot discuss] This is a discuss discuss in two parts. To be clear, it is not blocking; I will clear immediately after the document comes … [Ballot discuss] This is a discuss discuss in two parts. To be clear, it is not blocking; I will clear immediately after the document comes up on the agenda. (1) Paul Hoffman has suggested that standards track would be more appropriate than informational for this specification. I understand this would necessitate an issue-specific IETF Last Call, but I tend to agree with Paul. Is there another reason that I am missing to stay at informational? (2) The security considerations section on Impersonation (section 6.2) seem to apply to implementations of RFC 2865, rather than this specification: To address these vulnerabilities RADIUS proxies one hop from the NAS SHOULD check whether NAS identification attributes (see Section 3) match the packet source address. Where one or more attributes do not As far as I can tell, the RADIUS proxy that SHOULD perform this check may be entirely unaware of this specification. Is that correct? If so, publishing the security considerations here seems unlikely to have much impact. (I checked RFC 2685, and these considerations do not seem to be present.) This is a carryover from RFC 3567, so there is no value in blocking the progression of this specification. (Besides, the following paragraph notes that this check cannot always be performed.) I would like to hear other ADs thoughts on handling this sort of situation in the future, though. |
|
2007-10-17
|
13 | Tim Polk | [Ballot comment] The figures in sections 2.1 and 2.2 use Disconnect-Response and CoA-Response as shorthand for "Disconnect-ACK or Disconnect-NAK" and "CoA-ACK or CoA-NAK" respectively. These … [Ballot comment] The figures in sections 2.1 and 2.2 use Disconnect-Response and CoA-Response as shorthand for "Disconnect-ACK or Disconnect-NAK" and "CoA-ACK or CoA-NAK" respectively. These terms are never defined, and in fact are never used again. I can't claim it was too hard to figure out, but it might be better if the meaning was explicitly stated. Perhaps the terms could be introduced in the text following the figures and implicitly defined in a parenthetical, in the same way that "Response packet" was introduced in section 2.3: The Authenticator field in a Response Packet (e.g. Disconnect-ACK, Disconnect-NAK, CoA-ACK, or CoA-NAK). |
|
2007-10-17
|
13 | Tim Polk | [Ballot comment] The figures in sections 2.1 and 2.2 use Disconnect-Response and CoA-Response as shorthand for "Disconnect-ACK or Disconnect-NAK" and "CoA-ACK or CoA-NAK" respectively. These … [Ballot comment] The figures in sections 2.1 and 2.2 use Disconnect-Response and CoA-Response as shorthand for "Disconnect-ACK or Disconnect-NAK" and "CoA-ACK or CoA-NAK" respectively. These terms are never defined, and in fact are never used again. I can't claim it was too hard to figure out, but it might be better if the meaning was explicitly stated. Perhaps the terms could be introduced in the text following the figures and implicitly defined in a parenthetical, in the same way that "Response packet" was introduced in section 2.3: The Authenticator field in a Response Packet (e.g. Disconnect-ACK, Disconnect-NAK, CoA-ACK, or CoA-NAK). |
|
2007-10-17
|
13 | Tim Polk | [Ballot discuss] This is a discuss discuss in two parts. To be clear, it is not blocking; I will clear immediately after the document comes … [Ballot discuss] This is a discuss discuss in two parts. To be clear, it is not blocking; I will clear immediately after the document comes up on the agenda. (1) Paul Hoffman has suggested that standards track would be more appropriate than informational for this specification. I understand this would necessitate an issue-specific IETF Last Call, but I tend to agree with Paul. Is there another reason that I am missing to stay at informational? (2) The security considerations section on Impersonation (section 6.2) seem to apply to implementations of RFC 2865, rather than this specification: To address these vulnerabilities RADIUS proxies one hop from the NAS SHOULD check whether NAS identification attributes (see Section 3) match the packet source address. Where one or more attributes do not As far as I can tell, the RADIUS proxy that SHOULD perform this check may be entirely unaware of this specification. Is that correct? If so, publishing the security considerations here seems unlikely to have much impact. (I checked RFC 2685, and these considerations do not seem to be present.) This is a carryover from RFC 3567, so there is no value in blocking the progression of this specification. (Besides, the following paragraph notes that this scheck cannot always be performed.) I would like to hear other ADs thoughts on handling this sort of situation in the future, though. |
|
2007-10-17
|
13 | Tim Polk | [Ballot discuss] This is a discuss discuss. I will clear immediately after the document comes up on the agenda. Paul Hoffman has suggested that standards … [Ballot discuss] This is a discuss discuss. I will clear immediately after the document comes up on the agenda. Paul Hoffman has suggested that standards track would be more appropriate than informational for this specification. |
|
2007-10-17
|
11 | (System) | New version available: draft-ietf-radext-rfc3576bis-11.txt |
|
2007-10-17
|
13 | Ross Callon | [Ballot Position Update] New position, No Objection, has been recorded by Ross Callon |
|
2007-10-17
|
13 | Russ Housley | [Ballot comment] From Gen-ART Review by Ben Campbell. In Section 3.2, It would be helpful to mention how Authorize Only is used to … [Ballot comment] From Gen-ART Review by Ben Campbell. In Section 3.2, It would be helpful to mention how Authorize Only is used to ease mapping to Diameter, and reference the Diameter Considerations section. As it is, the reader wonders what the semantic effect of the resulting Access-Request message is supposed to be. Section 6.2, 4th paragraph, raises a question. Can a proxy be expected to easily know if it is one-hop away from the NAS? Is the mechanism for determining this well-known or documented somewhere that could be referenced here? |
|
2007-10-17
|
13 | Russ Housley | [Ballot discuss] Includes comments from the Gen-ART Review by Ben Campbell. Section 3, first paragraph, says: > > All NAS and session … [Ballot discuss] Includes comments from the Gen-ART Review by Ben Campbell. Section 3, first paragraph, says: > > All NAS and session identification attributes included in a > CoA-Request or Disconnect-Request packet MUST match at least one > session in order for a Request to be successful; otherwise a > Disconnect-NAK or CoA-NAK MUST be sent. > What does it mean for a NAS identification attribute to match a session? I assume we are using the NAS identifiers as a scope in which the session identifiers have meaning, so that all sessions could be considered of having an implied NAS property? This is ambiguous. Please clarify. Section 3.1, last paragraph, says: > > Since Disconnect and CoA responses are authenticated on the > entire packet contents, the stripping of the Proxy-State > Attribute invalidates the integrity check - so the proxy needs > to recompute it. > Please say the proxy MUST recompute... Section 3.5, 5th paragraph, says: > > When the HMAC-MD5 message integrity check is calculated the > Request Authenticator field and Message-Authenticator Attribute > should be considered to be sixteen octets of zero. > Both of these are set to 16 zero octets. That is not clear. Also, please reword to use MUST. |
|
2007-10-17
|
13 | Russ Housley | [Ballot Position Update] New position, Discuss, has been recorded by Russ Housley |
|
2007-10-17
|
13 | Tim Polk | [Ballot Position Update] New position, Discuss, has been recorded by Tim Polk |
|
2007-10-17
|
13 | Jari Arkko | [Ballot Position Update] New position, No Objection, has been recorded by Jari Arkko |
|
2007-10-17
|
13 | Mark Townsley | [Ballot Position Update] New position, No Objection, has been recorded by Mark Townsley |
|
2007-10-15
|
13 | Cullen Jennings | [Ballot Position Update] New position, No Objection, has been recorded by Cullen Jennings |
|
2007-10-09
|
13 | Dan Romascanu | Placed on agenda for telechat - 2007-10-18 by Dan Romascanu |
|
2007-10-09
|
13 | Dan Romascanu | [Ballot Position Update] New position, Yes, has been recorded for Dan Romascanu |
|
2007-10-09
|
13 | Dan Romascanu | Ballot has been issued by Dan Romascanu |
|
2007-10-09
|
13 | Dan Romascanu | Created "Approve" ballot |
|
2007-10-04
|
10 | (System) | New version available: draft-ietf-radext-rfc3576bis-10.txt |
|
2007-09-24
|
13 | (System) | State has been changed to Waiting for Writeup from In Last Call by system |
|
2007-09-13
|
13 | Sam Weiler | Request for Last Call review by SECDIR is assigned to Paul Hoffman |
|
2007-09-13
|
13 | Sam Weiler | Request for Last Call review by SECDIR is assigned to Paul Hoffman |
|
2007-09-11
|
13 | Amanda Baber | IANA Last Call comments: Upon approval of this document, the IANA will make the following assignments in the "RADIUS TYPES" registry located at http://www.iana.org/assignments/radius-types sub-registry … IANA Last Call comments: Upon approval of this document, the IANA will make the following assignments in the "RADIUS TYPES" registry located at http://www.iana.org/assignments/radius-types sub-registry "Values for RADIUS Attribute 101, Error-Cause Attribute [RFC3576]:" # Value --- ----- tbd(407) Invalid Attribute Value [RFC-radext-rfc3576bis-09] tbd(508) Multiple Session Selection Unsupported [RFC-radext-rfc3576bis-09] We understand the above to be the only IANA Action for this document. |
|
2007-09-10
|
13 | Amy Vezza | Last call sent |
|
2007-09-10
|
13 | Amy Vezza | State Changes to In Last Call from Last Call Requested by Amy Vezza |
|
2007-09-10
|
13 | Dan Romascanu | Last Call was requested by Dan Romascanu |
|
2007-09-10
|
13 | (System) | Ballot writeup text was added |
|
2007-09-10
|
13 | (System) | Last call text was added |
|
2007-09-10
|
13 | (System) | Ballot approval text was added |
|
2007-09-10
|
13 | Dan Romascanu | State Changes to Last Call Requested from AD Evaluation by Dan Romascanu |
|
2007-08-02
|
13 | Dan Romascanu | State Changes to AD Evaluation from Publication Requested by Dan Romascanu |
|
2007-08-01
|
09 | (System) | New version available: draft-ietf-radext-rfc3576bis-09.txt |
|
2007-07-31
|
13 | Dinara Suleymanova | PROTO Write-up (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the document and, in particular, … PROTO Write-up (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the document and, in particular, does he or she believe this version is ready for forwarding to the IESG for publication? The Document Shepherd is David Nelson. I have personally reviewed the document. (1.b) Has the document had adequate review from both key WG members And key non-WG members? Does the Document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? Yes. This document has been through two RADEXT WG last calls. (1.c) Does the Document Shepherd have concerns that the document needs more review from a particular or broader perspective e.g., security, operational complexity, someone familiar with AAA, internationalization or XML? This document is a revision of RFC 3576, so there is existing operational experience. (1.d) Does the Document Shepherd have any specific concerns or issues with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. Has an IPR disclosure related to this document been filed? If so, please include a reference to the disclosure and summarize the WG discussion and conclusion on this issue. No concerns. (1.e) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? There is consensus behind this document. At various points, 6 people have posted review comments or made contributions relating to the document. The issues raised and the resolutions are available for inspection at http://www.drizzle.com/~aboba/RADEXT/ (1.f) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is entered into the ID Tracker.) No. (1.g) Has the Document Shepherd personally verified that the document satisfies all ID nits? (See http://www.ietf.org/ID-Checklist.html and http://tools.ietf.org/tools/idnits/). Boilerplate checks are not enough; this check needs to be thorough. Has the document met all formal review criteria it needs to, such as the MIB Doctor, media type and URI type reviews? Yes. An output of the run on this revision of the ID by the online nits checker: idnits 2.04.09 tmp/draft-ietf-radext-rfc3576bis-08.txt: Checking boilerplate required by RFC 3978 and 3979, updated by RFC 4748: ---------------------------------------------------------------------------- No issues found here. Checking nits according to http://www.ietf.org/ietf/1id-guidelines.txt: ---------------------------------------------------------------------------- No issues found here. Checking nits according to http://www.ietf.org/ID-Checklist.html: ---------------------------------------------------------------------------- No issues found here. Miscellaneous warnings: ---------------------------------------------------------------------------- No issues found here. Checking references for intended status: Informational ---------------------------------------------------------------------------- == Missing Reference: 'Note 1' is mentioned on line 956, but not defined '[Note 1] Where NAS or session identification attributes are inclu...' == Missing Reference: 'Note 3' is mentioned on line 970, but not defined '[Note 3] When included within a CoA-Request, these attributes...' == Missing Reference: 'Notes 1' is mentioned on line 908, but not defined '0+ 0 0 97 Framed-IPv6-Prefix [Notes 1,6]...' -- Looks like a reference, but probably isn't: '6' on line 908 '0+ 0 0 97 Framed-IPv6-Prefix [Notes 1,6]...' == Missing Reference: 'Note 2' is mentioned on line 962, but not defined '[Note 2] The Reply-Message Attribute is used to present a display...' == Missing Reference: 'Note 7' is mentioned on line 998, but not defined '[Note 7] Within CoA-Request packets, Vendor-Specific Attributes...' == Missing Reference: 'Note 5' is mentioned on line 982, but not defined '[Note 5] When included within a CoA-Request, these attributes...' == Missing Reference: 'Note 4' is mentioned on line 976, but not defined '[Note 4] When included within a successful Disconnect-Request (wh...' == Missing Reference: 'Note 6' is mentioned on line 987, but not defined '[Note 6] Since the Framed-IP-Address, Framed-IPv6-Prefix and Fram...' ** Obsolete normative reference: RFC 2409 (Obsoleted by RFC 4306) Summary: 1 error (**), 8 warnings (==), 1 comment (--). (1.h) Has the document split its references into normative and informative? Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the strategy for their completion? Are there normative references that are downward references, as described in [RFC3967]? If so, list these downward references to support the Area Director in the Last Call procedure for them [RFC3967]. The document splits normative and informative references. There are no normative references to IDs. (1.i) Has the Document Shepherd verified that the document IANA consideration section exists and is consistent with the body of the document? If the document specifies protocol extensions, are reservations requested in appropriate IANA registries? Are the IANA registries clearly identified? If the document creates a new registry, does it define the proposed initial contents of the registry and an allocation procedure for future registrations? Does it suggest a reasonable name for the new registry? See [RFC2434]. If the document describes an Expert Review process has Shepherd conferred with the Responsible Area Director so that the IESG can appoint the needed Expert during the IESG Evaluation? The document only requests assignment of additional values of existing attributes, since most parameters were already allocated in RFC 3575 and 3576. (1.j) Has the Document Shepherd verified that sections of the document that are written in a formal language, such as XML code, BNF rules, MIB definitions, etc., validate correctly in an automated checker? This document does not contain sections written in a formal language. (1.k) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up? Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: - Technical Summary This document describes a currently deployed extension to the Remote Authentication Dial In User Service (RADIUS) protocol, allowing dynamic changes to a user session, as implemented by network access server products. This includes support for disconnecting users and changing authorizations applicable to a user session. - Working Group Summary This document represents an update to RFC 3576, addressing issues and fixes that have been identified since the document was originally published. Originally, these issues were included in the RADIUS Issues and Fixes document, but were sufficient in number and size to require a revision to RFC 3576. - Document Quality This document describes issues that were encountered by implementers of RFC 3576. As a result, it has been reviewed by implementers as well as operators. - Personnel David Nelson is the document shepherd. The responsible Area Director is Dan Romascanu. |
|
2007-07-31
|
13 | Dinara Suleymanova | Draft Added by Dinara Suleymanova in state Publication Requested |
|
2007-06-07
|
08 | (System) | New version available: draft-ietf-radext-rfc3576bis-08.txt |
|
2007-05-29
|
07 | (System) | New version available: draft-ietf-radext-rfc3576bis-07.txt |
|
2007-05-24
|
06 | (System) | New version available: draft-ietf-radext-rfc3576bis-06.txt |
|
2007-05-23
|
05 | (System) | New version available: draft-ietf-radext-rfc3576bis-05.txt |
|
2007-04-11
|
04 | (System) | New version available: draft-ietf-radext-rfc3576bis-04.txt |
|
2007-03-29
|
03 | (System) | New version available: draft-ietf-radext-rfc3576bis-03.txt |
|
2007-03-28
|
02 | (System) | New version available: draft-ietf-radext-rfc3576bis-02.txt |
|
2007-03-22
|
01 | (System) | New version available: draft-ietf-radext-rfc3576bis-01.txt |
|
2007-01-22
|
00 | (System) | New version available: draft-ietf-radext-rfc3576bis-00.txt |