ROAMOPS Working Group                                    Bernard Aboba
     INTERNET-DRAFT                                   Microsoft Corporation
     <draft-ietf-roamops-roamreq-00.txt>                          Glen Zorn
     26 November 1996                                 Microsoft Corporation
     
     
     
                          Dialup Roaming Requirements
     
     
     
     1.  Status of this Memo
     
     This document is an Internet-Draft.  Internet-Drafts are working docu-
     ments of the Internet Engineering Task Force (IETF),  its  areas,  and
     its  working groups.  Note that other groups may also distribute work-
     ing documents as Internet-Drafts.
     
     Internet-Drafts are draft documents valid for a maximum of six  months
     and  may  be updated, replaced, or obsoleted by other documents at any
     time.  It is inappropriate to use Internet-Drafts as  reference  mate-
     rial or to cite them other than as ``work in progress.''
     
     To  learn  the  current status of any Internet-Draft, please check the
     ``1id-abstracts.txt'' listing contained in the Internet-Drafts  Shadow
     Directories   on   ds.internic.net   (US  East  Coast),  nic.nordu.net
     (Europe), ftp.isi.edu (US West Coast), or munnari.oz.au (Pacific Rim).
     
     The  distribution  of  this memo is unlimited.  It is filed as <draft-
     ietf-roamops-roamreq-00.txt>, and  expires June 1, 1997.  Please  send
     comments to the authors.
     
     
     2.  Abstract
     
     This  document  describes  the  features required for the provision of
     "roaming capability" for dialup Internet users, as  well  as  offering
     some  suggestions  for future protocol standardization work.  "Roaming
     capability" may be loosely defined as the ability to use  any  one  of
     multiple  Internet  service providers (ISPs), while maintaining a for-
     mal, customer-vendor relationship with only one.   Examples  of  cases
     where  roaming  capability  might  be required include ISP "confedera-
     tions" and ISP-provided corporate network access support.
     
     
     3.  Introduction
     
     Considerable interest has arisen recently in a set  of  features  that
     fit  within  the  general  category of "roaming capability" for dialup
     Internet users.  Interested parties have included:
     
          Regional Internet Service Providers  (ISPs)  operating  within  a
          particular  state  or  province, looking to combine their efforts
          with those of other regional providers to  offer  dialup  service
     
     
     
     Aboba & Zorn                                                  [Page 1]


     INTERNET-DRAFT                                        26 November 1996
     
     
          over a wider area.
     
          National  ISPs  wishing to combine their operations with those of
          one or more ISPs in another nation to  offer  more  comprehensive
          dialup service in a group of countries or on a continent.
     
          Businesses  desiring  to  offer  their  employees a comprehensive
          package of dialup services on a global basis.  Those services may
          include  Internet  access  as  well as secure access to corporate
          intranets via a Virtual Private Network (VPN), enabled by tunnel-
          ing protocols such as PPTP, L2F, or L2TP.
     
     What are the elements of a dialup roaming architecture?  The following
     list is a first cut at defining the elements  for  successful  roaming
     among an arbitrary set of ISPs:
     
          Phone number presentation
          Phone number exchange
          Phone book compilation
          Phone book update
          Connection management
          Authentication
          NAS Configuration/Authorization
          Address Assignment/Routing
          Security
          Accounting
     
     These topics are discussed further in following sections.
     
     
     3.1.  Terminology
     
     This document frequently uses the following terms:
     
     phone book
               This is a database or document containing data pertaining to
               dialup access, including phone numbers  and  any  associated
               attributes.
     
     phone book server
               This  is  a  server that maintains the latest version of the
               phone book.  Clients communicate with phone book servers  in
               order to keep their phone books up to date.
     
     Network Access Server
               The  Network  Access Server (NAS) is the device that clients
               dial in order to get access to the network.
     
     RADIUS server
               This  is   a   server   which   provides   for   authentica-
               tion/authorization  via  the  protocol described in [3], and
               for accounting as described in [4].
     
     
     
     
     
     Aboba & Zorn                                                  [Page 2]


     INTERNET-DRAFT                                        26 November 1996
     
     
     RADIUS proxy
               In order to provide for the routing of RADIUS authentication
               and accounting requests, a RADIUS proxy may employed. To the
               NAS, the RADIUS proxy appears to act as a RADIUS server, and
               to  the  RADIUS server, the proxy appears to act as a RADIUS
               client.
     
     Network Access Identifier
               In order to provide for the routing of RADIUS authentication
               and accounting requests, the userID field used in PPP (known
               as the Network Access Identifier or NAI) and in  the  subse-
               quent  RADIUS  authentication  and  accounting requests, may
               contain structure. This structure provides a means by  which
               the  RADIUS  proxy  will locate the RADIUS server that is to
               receive the request.
     
     
     3.2.  Requirements language
     
     This specification uses the same words as RFC 1123  [4]  for  defining
     the significance of each particular requirement.  These words are:
     
     
     MUST      This word or the adjective "required" means that the item is
               an absolute requirement of the specification.
     
     
     SHOULD    This word or the adjective "recommended"  means  that  there
               may  exist  valid  reasons  in  particular  circumstances to
               ignore this item, but the full implications should be under-
               stood  and the case carefully weighed before choosing a dif-
               ferent course.
     
     
     MAY       This word or the adjective "optional" means that  this  item
               is truly optional. One vendor may choose to include the item
               because a particular marketplace requires it or  because  it
               enhances  the  product, for example; another vendor may omit
               the same item.
     
               An implementation is not compliant if it  fails  to  satisfy
               one  or  more  of the MUST requirements for the protocols it
               implements. An implementation that satisfies  all  the  MUST
               and all the SHOULD requirements for its protocols is said to
               be "unconditionally compliant"; one that satisfies  all  the
               MUST  requirements  but  not all the SHOULD requirements for
               its protocols is said to be "conditionally compliant."
     
     
     4.  Requirements for Dialup Roaming
     
     Suppose we have a customer, Fred,  who  has  signed  up  for  Internet
     access  with ISP A in his local area, through his company, BIGCO.  ISP
     A has joined  an  association  of  other  ISPs  (which  we  will  call
     
     
     
     Aboba & Zorn                                                  [Page 3]


     INTERNET-DRAFT                                        26 November 1996
     
     
     ISPGROUP)  in order to offer service outside the local area.  Now Fred
     travels to another part of the world, and wishes to dial into a  phone
     number offered by ISP B (also a member of ISPGROUP).  What is involved
     in allowing this to occur?
     
     
     Phone number presentation
          Fred must be able to find and select the phone number offered  by
          ISP B.
     
     Phone number exchange
          When  there is a change in the status of phone numbers (additions
          or deletions) from individual providers,  providers  in  ISPGROUP
          will typically notify each other and propagate the changes.
     
     Phone book compilation
          When  these  updates  occur,  a  new phone book will be compiled,
          based on the changes submitted by the  individual  ISPs  in  ISP-
          GROUP.
     
     Phone book update
          Once  a new phone book is compiled, there must be a way to update
          the phone books of customers such as Fred, so  that  the  changes
          are reflected in the user phone books.
     
     Connection management
          Fred's  machine  must  be able to dial the phone number, success-
          fully connect, and interoperate with the  Network  Access  Server
          (NAS) on the other end of the line.
     
     Authentication
          Fred must be able to secure access to the network.
     
     NAS configuration/authorization
          The Network Access Server (NAS) must receive configuration param-
          eters in order to set up Fred's session.
     
     Security
          If desired by BIGCO, additional security  measures  may  be  sup-
          ported for Fred's session.  These could include supporting use of
          token cards, or setting up Fred's account so that he is automati-
          cally  tunneled  to  the  corporate  PPTP, L2F or L2TP server for
          access to the corporate intranet.
     
     Address assignment/routing
          Fred must be assigned a routable IP address by the NAS.
     
     Accounting
          ISP B must keep track of what resources Fred used during the ses-
          sion.   Relevant  information  may include how long Fred used the
          service, what speed he connected at,  whether  he  connected  via
          ISDN or modem, etc.
     
     
     
     
     
     Aboba & Zorn                                                  [Page 4]


     INTERNET-DRAFT                                        26 November 1996
     
     
     Note  that  some of these requirements may not require standardization
     or lie outside the scope of the IETF; they are  all  listed  for  com-
     pleteness' sake.
     
     
     
     4.1.  Phone Number Presentation
     
     Phone number presentation involves the display of available phone num-
     bers to the user, and culminates in the choosing of a  number.   Since
     the  user  interface  and  sequence of events involved in phone number
     presentation is a function of the connection management software  that
     Fred  is using, it is likely that individual vendors will take differ-
     ent approaches to the problem.  These differences  may  include  vari-
     ances  in  the format of the client phone books, varying approaches to
     presentation, etc.  There is no  inherent  problem  with  this.  As  a
     result, phone number presentation need not be standardized.
     
     
     4.2.  Phone Number Exchange
     
     Phone  number  exchange  involves  propagation of phone number changes
     between providers in a roaming association. As described in  [2]  how-
     ever,  no current roaming implementations provide for complete automa-
     tion of the phone number exchange process. As a result,  phone  number
     exchange need not be standardized at this time.
     
     
     4.3.  Phone Book Compilation
     
     Once  an  ISP's phone book server has received its updates it needs to
     compile a new phone book and propagate this  phone  book  to  all  the
     phone  book  servers  operated by that ISP. Given that the compilation
     process does not affect protocol  interoperability,  it  need  not  be
     standardized.
     
     
     4.4.  Phone Book Update
     
     Once  the  phone  book  is compiled, it needs to be propagated to cus-
     tomers. Standardization of the phone book update  process  allows  for
     providers  to  update  the  phone books of users, independent of their
     client and operating system. As a result, roaming implementations pro-
     viding for phone book update MUST implement the standard update proto-
     col.
     
     
     4.4.1.  Phone book update protocol requirements
     
     What must a phone book update protocol do to be successful?
     
     
      Portability
          The update protocol must allow for updating of clients on a range
     
     
     
     Aboba & Zorn                                                  [Page 5]


     INTERNET-DRAFT                                        26 November 1996
     
     
          of  platforms  and operating systems. Therefore the update mecha-
          nism must not impose any operating system-specific  requirements.
     
     
      Authentication
          The  client  must  be  able  to determine the authenticity of the
          server sending the phone book update. The server should  also  be
          able to authenticate the client.
     
     
     Versioning
          The  update  protocol must provide for updating of the phone book
          from an arbitrary previous version to the latest  available  ver-
          sion.
     
     
      Integrity Checking
          The  client  must  be  able  to  determine  the  integrity of the
          received update before applying it, as well as the  integrity  of
          the newly produced phone book after updating it.
     
     
      Light weight transfers
          Since  the  client machine may in many cases be a low-end PC, the
          update protocol must be lightweight.
     
     
      Language support
          The phone book update  mechanism  must  support  the  ability  to
          request  that  the phone book be transmitted in a particular lan-
          guage and character set. For example, if the customer has a  Rus-
          sian  language  software package, then the propagation and update
          protocols must provide a mechanism for the user to request a Rus-
          sian language phone book.
     
     
     4.4.2.  Phone book format requirements
     
     What must a phone book format do to be successful?
     
     
      Phone number attributes
          The  phone  book format must support phone number attributes com-
          monly used by Internet service providers.  These  attributes  are
          required  in order to provide users with information on the capa-
          bilities of the available phone numbers.
     
     
      Provider attributes
          In addition to providing information relating to  a  given  phone
          number, the phone book must provide information on the individual
          roaming consortium members.  These  attributes  are  required  in
          order  to  provide  users  with  information about the individual
          providers in the roaming consortium.
     
     
     
     Aboba & Zorn                                                  [Page 6]


     INTERNET-DRAFT                                        26 November 1996
     
     
      Service attributes
          In addition to providing information relating to  a  given  phone
          number,  and service provider, the phone book must provide infor-
          mation relevant to configuration of the service. These attributes
          are  necessary to provide the client with information relating to
          the operation of the service.
     
     
      Extensibility
          Since it may be necessary to add phone book attributes, the phone
          book  format  must support the addition of phone number, provider
          and service attributes without modification to the update  proto-
          col  or  phone  book  format.  Registration  of  new  phone  book
          attributes will be handled by IANA. To  accommodate  growth,  the
          attribute space must be sufficiently large to allow for growth.
     
     
      Compactness
          Since phone book may be frequently updated, the phone book format
          must be compact so as to minimize the bandwidth used in  updating
          it.
     
     
     
     4.4.2.1.  Phone number attributes
     
     Examples of phone number attributes include:
     
          Unique identifier for the phone number
          City
          State or Region
          Country
          Area code
          Local phone number
          Minimum speed
          Maximum speed
          Modem protocols supported (V.32bis, V.34, etc.)
          ISDN protocols supported (V.110, V.120, etc.)
          Multicast capability
          Times of operation
          Priority level (for control of presentation order)
          External/internal flag (denoting whether the number has been imported)
     
     
     4.4.2.2.  Provider attributes
     
     Examples of provider attributes include:
     
          Provider name
          Provider address
          Provider voice phone number
          Provider fax phone number
          Customer support phone number
          Provider icon
     
     
     
     Aboba & Zorn                                                  [Page 7]


     INTERNET-DRAFT                                        26 November 1996
     
     
          Provider domain name
          Primary Domain Name Server
          Secondary Domain Name Server
          Dial-up IP Address
          News server
          Mail server
          Web page
          Maximum length of the user name for the provider
          Maximum length of the password for the provider
     
     
     
     4.4.2.3.  Service attributes
     
     Examples of service attributes include:
     
          The name of the service
          A description of the service
          The URL of the service phone book server
          The service phone book filename
          The service phone book version number
     
     
     4.5.  Connection Management
     
     Once  Fred  has  chosen  a number from his phone book, he will need to
     connect to ISP B via ISDN or modem, and bring up a dialup network con-
     nection.   In the case of a PPP session, this will include CHAP or PAP
     authentication.
     
     
     4.5.1.  Requirements
     
     To be successful, a roaming implementation must provide:
     
     
      PPP Support
          Given the current popularity and near ubiquity of PPP, a  roaming
          standard  must  provide support for PPP.  While an implementation
          may choose to support other framing protocols such as SLIP,  SLIP
          support  is  expected to prove difficult since SLIP does not sup-
          port negotiation of connection parameters and lacks  support  for
          protocols other than IP. Support for non-IP protocols (e.g., IPX)
          may be necessary for the provision of corporate  intranet  access
          via the Internet.
     
     
     4.6.  Authentication
     
     Authentication  may  be  seen as consisting of two parts: the claim of
     identity (or identification) and the proof of the claim (or  verifica-
     tion).
     
     
     
     
     
     Aboba & Zorn                                                  [Page 8]


     INTERNET-DRAFT                                        26 November 1996
     
     
     In  order  for  Fred to obtain network access from ISP B, he must have
     been assigned a user ID which identifies him as a customer of a member
     of  ISPGROUP (in this case, ISP A).  If a user ID suffix is used, Fred
     might identify himself as "fred@ispa.com"; if a  prefix  is  used,  he
     might identify himself as "ISPA/fred".  Note that some NAS vendors may
     need to modify their devices so as to  support  the  longer  user  IDs
     resulting from addition of prefixes or suffixes.
     
     After  obtaining Fred's user ID and other authentication data, the NAS
     device will then forward a RADIUS request packet to a RADIUS proxy  or
     server.  If  a proxy is being used, it must examine the user ID prefix
     or suffix, check whether it represents  an  authorized  authentication
     realm,   and  then  pass  the  request either to an appropriate RADIUS
     server, or to another proxy for further routing.
     
     
     4.6.1.  Identification
     
     As part of the authentication process, users  identify  themselves  to
     the  Network  Access  Server  (NAS) in a manner that allows the NAS to
     route the authentication request to its home destination.
     
     
     4.6.1.1.  Naming requirements
     
     What must an identification scheme have to do to be successful?
     
     
      Authentication routing
          A roaming standard must provide a mechanism for the remote ISP to
          efficiently  route the authentication request to the home authen-
          tication server. As part of this, there must be  a  way  for  the
          remote  ISP  to  determine  the  IP address of the authentication
          server that is to be contacted.
     
     
      Robustness
          Authentication routing must be  carried  out  in  a  manner  that
          allows  the  authentication request to reach its the destination,
          and for the response to be returned  to  the  querying  NAS,  all
          within  a  time  period  compatible  with  typical RADIUS timeout
          parameters.
     
     
     4.6.2.  Verification of Identity
     
     CHAP and PAP are the two authentication protocols used within the  PPP
     framework today. Some groups of users are requiring different forms of
     proof of identity (e.g., token or smart cards,  Kerberos  credentials,
     etc.)  for  special  purposes(such  as  acquiring  access to corporate
     intranets).
     
     
     
     
     
     
     Aboba & Zorn                                                  [Page 9]


     INTERNET-DRAFT                                        26 November 1996
     
     
     4.6.3.  Requirements
     
     A roaming standard must provide:
     
     
      Support for PAP and CHAP
          A successful roaming implementation must support  both  CHAP  and
          PAP authentication.
     
     
      RADIUS Support
          Given the current popularity and near ubiquity of RADIUS, a roam-
          ing standard must support RADIUS, as  defined  in  [2]  and  [3].
          Other protocols may be supported. However, it is the responsibil-
          ity of participating ISPs  and/or  software  vendors  to  produce
          gateways between those protocols and RADIUS.
     
     
      Security
          A roaming standard must provide a mechanism for the remote ISP to
          determine whether the home  authentication  server  has  a  valid
          business  relationship  with  the remote ISP. This implies either
          that the authenticating party is a member of the roaming associa-
          tion, or that the authenticating party has a valid business rela-
          tionship with a member of the roaming association.
     
     
      Scalability
          A roaming standard,  once  available,  is  likely  to  be  widely
          deployed  on the Internet. A roaming standard must therefore pro-
          vide sufficient scalability.  At a minimum,  a  roaming  standard
          must scale to accomodate no less
           than  20 ISPs within a roaming association. In addition, a roam-
          ing standard must support the use of at  least  10  "sub-domains"
          per  ISP.  These  subdomains may consist of ISP customers running
          their own authentication servers. Thus, the standard must be able
          to  deal with the possibility of 200 authentication servers oper-
          ating within a roaming association.
     
     
     
     4.7.  NAS Configuration/Authorization
     
     In order for Fred to be able to log in to ISP B, it is  necessary  for
     ISP  A's  RADIUS server to return the proper configuration information
     to ISP B's NAS.
     
     
     4.7.1.  Configuration/Authorization requirements
     
     In order to be successful, a roaming standard must provide:
     
     
     
     
     
     
     Aboba & Zorn                                                 [Page 10]


     INTERNET-DRAFT                                        26 November 1996
     
     
      Masking of heterogeneity
          ISP A and ISP B's NAS devices may be from different vendors; even
          if they are from the same vendor, ISP A and ISP B may use differ-
          ent NAS configurations.  As a result, the NASs may  each  require
          different parameters in order to properly configure them.  In the
          case of RADIUS, this problem can be solved through the use  of  a
          proxy which adds ISP- and NAS-specific attributes to the response
          returned by ISP A's RADIUS server, with the result being that ISP
          B's RADIUS proxy will provide the attributes necessary to config-
          ure ISP B's NAS device, while ISP A's RADIUS server will  perform
          the  actual user authentication.  In order to support heterogene-
          ity among providers within the roaming association, RADIUS  prox-
          ies must support attribute editing.
     
     
     4.8.  Address assignment/routing
     
     Given  that no existing roaming implementations support static address
     assignment, a roaming standard need only concern itself  with  dynamic
     address assignment.
     
     However,  static  address  assignment,  if it is to be supported, will
     most likely be accomplished via use of  tunneling  protocols  such  as
     PPTP,  L2F, or L2TP. These protocols hold great promise for the imple-
     mentation of Virtual Private  Networks  as  a  means  for  inexpensive
     access  to  remote  networks. Therefore proxy implementations must not
     preclude mandatory tunneling.
     
     
     4.9.  Security
     
     Although network security is a very broad subject, in  this  paper  we
     will limit our attention to the problems of secure proxying and shared
     secret management.
     
     
     4.9.1.  Requirements
     
     What must a roaming standard do to be successful?
     
     
      Secure proxying
          One of the problems which arises from the dependency on a proxied
          system  of  authorization is how to guarantee that the proxy will
          properly forward the security-related parameters returned by  the
          remote  server  and  that the NAS will enforce them. For example,
          the user must not be allowed to authenticate using only  CHAP  or
          PAP  if  the  remote authorization server had returned attributes
          indicating a requirement for token card use.  Similarly,  a  user
          must  not  be allowed access to the Internet if the remote autho-
          rization server had returned attributes indicating a  requirement
          for  a  mandatory  tunnel.   As a result, RADIUS proxies must not
          remove security-related parameters from responses.
     
     
     
     
     Aboba & Zorn                                                 [Page 11]


     INTERNET-DRAFT                                        26 November 1996
     
     
      Shared secret management
          A roaming standard must provide for efficient management of share
          secrets.  This  is  required since the RADIUS protocol requires a
          shared secret between the NAS and the RADIUS server.  This  along
          with  authentication  routing  and  timeout  constraints  are the
          issues most limiting the  scalability  of  roaming.  In  a  proxy
          implementation, this translates to shared secrets between the NAS
          devices and the ISP proxy, and  another  set  of  shared  secrets
          between  the  ISP  proxies  and  second  level  proxies or RADIUS
          servers. Note that the issue of shared secret management is inti-
          mately  connected  with authentication routing, since the routing
          scheme determines the number of hops that must be  traversed  for
          the authentication request to reach its destination. This in turn
          influences the number of shared secrets that must  be  maintained
          on each proxy or server.
     
     
     
     4.10.  Accounting
     
     Today  there  is no proposed standard for how NAS accounting should be
     accomplished, and there is wide variation in  the  protocols  used  by
     providers to communicate accounting information within their own orga-
     nizations. As a result, rather than requiring  the use of a particular
     accounting  protocol (RADIUS, TACACS+, SNMP, SYSLOG, etc.),  a roaming
     standard will require that accounting records be generated in a  stan-
     dardized format and transmitted in a standardized way.
     
     
     4.10.1.  Accounting requirements
     
     What must an accounting record format and transfer protocol do?
     
     
     Identification of the settlement agent
          Prior  to  setting up the accounting record transfer, the roaming
          implementation must be able to determine who the  records  should
          be sent to. .
     
     
     Tagging and bagging
          The transfer protocol must be able to tag and bag the transferred
          records so as to identify the version and type  of  record  being
          transferred.
     
     
     Accounting metrics
          The account record format must be able to encode metrics commonly
          used by Internet Service Providers to determine the user's  bill.
     
     
     Extensibility
          Since  these metrics change over time, the accounting record for-
          mat must be extensible so as to be able to add future metrics  as
     
     
     
     Aboba & Zorn                                                 [Page 12]


     INTERNET-DRAFT                                        26 November 1996
     
     
          they  come  along.  The  record format must support both standard
          metrics as well as vendor-specific metrics.
     
     
     Encryption
          For the sake of security, the record transfer protocol must  pro-
          vide  for  encrypted transfer of records via an encryption mecha-
          nism that can be legally deployed in at least a  minimal  set  of
          countries.
     
     
     Authentication
          Also  for the sake of security, the record must provide for sign-
          ing of the accounting records, so as to  assure  their  integrity
          and  authenticity.  In  addition, during the transfer process the
          sender and receiver must mutually authenticate.
     
     
     Compactness
          For the sake of efficiency, the record format must be compact.
     
     
     Robustness
          The accounting transfer protocol must be  capable  of  recovering
          from a variety of faults, including partially completed transfers
          and undecodable metrics.
     
     
     Non-repudiation
          Once an accounting record file has been transferred or processed,
          the sender must be able to secure a receipt from the receiver.
     
     
     4.10.1.1.  Example accounting metrics
     
     Examples of accounting metrics include:
     
          User Name (String; the user's ID, including prefix or suffix)
          NAS IP address (Integer; the IP address of the user's NAS)
          NAS Port (Integer; identifies the physical port on the NAS)
          Service Type (Integer; identifies the service provided to the user)
          NAS Identifier (Integer; unique identifier for the NAS)
          Delay Time (Integer; time client has been trying to send)
          Input Octets (Integer; in stop record, octets received from port)
          Output Octets (Integer; in stop record, octets sent to port)
          Session ID (Integer; unique ID identifying the session)
          Authentication (Integer; indicates how user was authenticated)
          Session Time (Integer; in stop record, seconds of received service)
          Input Packets (Integer; in stop record, packets received from port)
          Output Packets (Integer; in stop record, packets sent to port)
          Termination Cause (Integer; in stop record, indicates termination cause)
          Multi-Session ID (String; for linking of multiple related sessions)
          Link Count (Integer; number of links up when record was generated)
          NAS Port Type (Integer; indicates async vs. sync ISDN, V.120, etc.)
     
     
     
     Aboba & Zorn                                                 [Page 13]


     INTERNET-DRAFT                                        26 November 1996
     
     
     5.  Acknowledgements
     
     Thanks  to  Dr.  Thomas Pfenning and Don Dumitru of Microsoft for many
     useful discussions of this problem space.
     
     
     6.  References
     
     [1]  B. Aboba, L. Liu, J. Alsop, J. Ding.  "Review of  Roaming  Imple-
     mentations."  draft-ietf-roamops-imprev-00.txt,  Microsoft, Aimnet, i-
     Pass Alliance, Asiainfo, September, 1996.
     
      [2]  C. Rigney, A.  Rubens,  W.  A.  Simpson,  S.  Willens.   "Remote
     Authentication  Dial  In  User  Service  (RADIUS)." draft-ietf-radius-
     radius-05.txt, Livingston, Merit, Daydreamer, July 1996.
     
     [3]    C.    Rigney.     "RADIUS    Accounting."    draft-ietf-radius-
     accounting-05.txt, Livingston, July 1996.
     
     [4]   R.  Braden.   "Requirements for Internet hosts - application and
     support." STD 3, RFC 1123, IETF, October 1989.
     
     [5] G. Zorn.  "RADIUS Attributes for Tunnel Protocol Support."  draft-
     zorn-radius-tunnel-auth-00.txt,  Microsoft Corporation, October, 1996.
     
     [6] B. Aboba.  "Implementation of  Mandatory  Tunneling  via  RADIUS."
     draft-aboba-radius-tunnel-imp-01.txt,  Microsoft Corporation, October,
     1996.
     
     
     7.  Authors' Addresses
     
     Bernard Aboba
     Microsoft Corporation
     One Microsoft Way
     Redmond, WA 98052
     
     Phone: 206-936-6605
     EMail: bernarda@microsoft.com
     
     
     Glen Zorn
     Microsoft Corporation
     One Microsoft Way
     Redmond, WA 98052
     
     Phone: 206-703-1559
     EMail: glennz@microsoft.com
     
     
     
     
     
     
     
     
     
     Aboba & Zorn                                                 [Page 14]