Skip to main content

RADIUS over TCP
RFC 6613

Yes

(Dan Romascanu)

No Objection

(Gonzalo Camarillo)
(Jari Arkko)
(Ron Bonica)
(Sean Turner)
(Tim Polk)

No Record


Note: This ballot was opened for revision 09 and is now closed.

Lars Eggert
No Objection
Comment (2010-05-20) Unknown
Agree with Tim's DISCUSS.

Section 27, paragraph 13:
>    It is not intended
>    to define TCP as a transport protocol for RADIUS in the absence of
>    TLS.

  The document title is "RADIUS Over TCP". It's surprising to then see
  that abstract say that it is not intended to define RADIUS over TCP...
  Suggestion: Rename document to "Radius over TLS"?


Section 1., paragraph 1:
>    While
>    there are a number of benefits to using UDP as outlined in [RFC2865]
>    Section 2.4, there are also some limitations:

  Lack of congestion control is surely a limitation?


Section 1.1., paragraph 2:
>    In scenarios where RADIUS proxies exchange a large volume of packets
>    (10+ packets per second), it is likely that there will be sufficient
>    traffic to enable the congestion window to be widened beyond the
>    minimum value on a long-term basis, enabling ACK piggy-backing.

  I don't understand what this paragraph means to say. The TCP
  congestion window opens already at much lower rates than 10+ pps.
  Also, how is this at all related to ACK-piggybacking?


Section 1.1., paragraph 5:
>    These problems disappear if a 4096 application-layer payload can be
>    used alongside RADIUS over TLS.  Since most TCP implementations
>    support MTU discovery, the TCP MSS is automatically adjusted to
>    account for the MTU, and the larger congestion window supported by
>    TCP may allow multiple TCP segments to be sent within a single
>    window.

  Even those few TCP stacks that don't do PMTUD can already support
  arbitrary payloads (just with slightly less efficient packetization).


Section 2.6.1., paragraph 5:
>    As noted previously, RADIUS packets SHOULD NOT be re-transmitted to
>    the same destination IP and numerical port, but over a different
>    transport layer.

  Where does it say that? The second paragraph of Section 2.6 says that
  they MAY be retransmitted over a new connection (which is different
  from a SHOULD NOT). Also, "transport layer" here is unclear - do you
  mean "transport connection" (= use a different TCP connection) or do
  you mean "transport protocol" (= use UDP)?


Section 2.6.2., paragraph 2:
>    Unlike UDP, TLS is subject to issues related to Head of Line (HoL)
>    blocking.  This occurs when when a TLS segment is lost and a
>    subsequent TLS segment arrives out of order.  While the RADIUS server
>    can process RADIUS packets out of order, the semantics of TLS makes
>    this impossible.  This limitation can lower the maximum packet
>    processing rate of RADIUS over TLS.

  s/TLS/TCP/ in this paragraph


Section 2.6.4., paragraph 6:
>    After applying the above rules, there are still situations where the
>    previous specifications allow a packet to be "silently discarded".
>    In these situations, the TCP connections MAY remain open, or MAY be
>    closed, as an implementation choice.  However, the invalid packet
>    MUST be silently discarded.

  In order to reduce connection-setup overheads, wouldn't it make sense
  to RECOMMEND the connection stay open?
Dan Romascanu Former IESG member
Yes
Yes () Unknown

                            
Gonzalo Camarillo Former IESG member
No Objection
No Objection () Unknown

                            
Jari Arkko Former IESG member
No Objection
No Objection () Unknown

                            
Ralph Droms Former IESG member
(was Discuss) No Objection
No Objection (2010-10-26) Unknown
I cleared my DISCUSS, because I think (I hope I have this right) that "this specification"
in this text:

   "Bare" TCP transport MAY, however, be used when another method such
   as IPSec [RFC4301] is used to provide additional confidentiality and
   security.  Should experience show that such deployments are useful,
   this specification could be moved to standards track.
 
refers to a new, to-be-written document describing the use of TCP+IPSEC.

If I don't have it right, then I still don't understand how experience with TCP+IPSEC
would cause draft-ietf-radext-tcp-transport to be moved to standards track.
Ron Bonica Former IESG member
No Objection
No Objection () Unknown

                            
Russ Housley Former IESG member
No Objection
No Objection (2010-05-19) Unknown
  Please consider the comments from the Gen-ART Review by Glenn
  Kowack on 18 May 2010.  The review can be found at:

    http://www.softarmor.com/rai/temp-gen-art/
    draft-ietf-radext-tcp-transport-06-kowack.txt
Sean Turner Former IESG member
No Objection
No Objection () Unknown

                            
Tim Polk Former IESG member
(was Discuss) No Objection
No Objection () Unknown

                            
Adrian Farrel Former IESG member
No Record
No Record (2010-05-20) Unknown
To follow up on Tim Polk's Discuss point 2
I appreciate the sentiment of the paragraph, but "NOT RECOMMENDED" is not RFC 2119 language (as idnits would tell you). You have to flip the sense of the sentence and use "RECOMMENDED".
But Tim is also right, please consider "MUST NOT" since the following paragraph...

   "Bare" TCP transport MAY, however, be used when another method such
   as IPSec [RFC4301] is used to provide additional confidentiality and
   security.  Should experience show that such deployments are useful,
   this specification could be moved to standards track.

...is really confusing. It implies that the purpose of this document *is* to define the use of bare TCP transport which is in conflict with the Abstract.