Movatterモバイル変換


[0]ホーム

URL:


[RFC Home] [TEXT|PDF|HTML] [Tracker] [IPR] [Info page]

INFORMATIONAL
Network Working Group                                 B. Aboba, MicrosoftRequest for Comments: 2989   P. Calhoun, S. Glass, Sun Microsystems, Inc.Category: Informational T. Hiller, P. McCann, H. Shiino, P. Walsh, Lucent                                 G. Zorn, G. Dommety, Cisco Systems, Inc.                           C. Perkins, B. Patil, Nokia Telecommunications                                   D. Mitton, S. Manning, Nortel Networks                                              M. Beadles, SmartPipes Inc.                                                         X. Chen, Alcatel                         S. Sivalingham, Ericsson Wireless Communications                                                       A. Hameed, Fujitsu                                                  M. Munson, GTE Wireless                                              S. Jacobs, GTE Laboratories                            B. Lim, LG Information & Communications, Ltd.                                                   B. Hirschman, Motorola                                                   R. Hsu, Qualcomm, Inc.                         H. Koo, Samsung Telecommunications America, Inc.                                                   M. Lipford, Sprint PCS                                            E. Campbell, 3Com Corporation                                                Y. Xu, Watercove Networks                                  S. Baba, Toshiba America Research, Inc.                                            E. Jaques, Vodaphone Airtouch                                                            November 2000Criteria for Evaluating AAA Protocols for Network AccessStatus of this Memo   This memo provides information for the Internet community.  It does   not specify an Internet standard of any kind.  Distribution of this   memo is unlimited.Copyright Notice   Copyright (C) The Internet Society (2000).  All Rights Reserved.Abstract   This document represents a summary of Authentication, Authorization,   Accounting (AAA) protocol requirements for network access.  In   creating this document, inputs were taken from documents produced by   the Network Access Server Requirements Next Generation (NASREQ),   Roaming Operations (ROAMOPS), and MOBILEIP working groups, as well as   from TIA 45.6.Aboba, et al.                Informational                      [Page 1]

RFC 2989         Network Access AAA Evaluation Criteria    November 2000   This document summarizes the requirements collected from those   sources, separating requirements for authentication, authorization   and accounting.  Details on the requirements are available in the   original documents.1.  Introduction   This document represents a summary of AAA protocol requirements for   network access.  In creating this documents, inputs were taken from   documents produced by the NASREQ [3], ROAMOPS [2], and MOBILEIP [5]   working groups, as well as from TIA 45.6 [4].  This document   summarizes the requirements collected from those sources, separating   requirements for authentication, authorization and accounting.   Details on the requirements are available in the original documents.1.1.  Requirements language   In this document, the key words "MAY", "MUST, "MUST NOT", "optional",   "recommended", "SHOULD", and "SHOULD NOT", are to be interpreted as   described in [1].   Please note that the requirements specified in this document are to   be used in evaluating AAA protocol submissions.  As such, the   requirements language refers to capabilities of these protocols; the   protocol documents will specify whether these features are required,   recommended, or optional.  For example, requiring that a protocol   support confidentiality is NOT the same thing as requiring that all   protocol traffic be encrypted.   A protocol submission is not compliant if it fails to satisfy one or   more of the MUST or MUST NOT requirements for the capabilities that   it implements.  A protocol submission that satisfies all the MUST,   MUST NOT, SHOULD and SHOULD NOT requirements for its capabilities is   said to be "unconditionally compliant"; one that satisfies all the   MUST and MUST NOT requirements but not all the SHOULD or SHOULD NOT   requirements for its protocols is said to be "conditionally   compliant."Aboba, et al.                Informational                      [Page 2]

RFC 2989         Network Access AAA Evaluation Criteria    November 20001.2.  Terminology   Accounting             The act of collecting information on resource usage for the             purpose of trend analysis, auditing, billing, or cost             allocation.   Administrative Domain             An internet, or a collection of networks, computers, and             databases under a common administration.  Computer entities             operating in a common administration may be assumed to             share administratively created security associations.   Attendant A node designed to provide the service interface between a             client and the local domain.   Authentication             The act of verifying a claimed identity, in the form of a             pre-existing label from a mutually known name space, as the             originator of a message (message authentication) or as the             end-point of a channel (entity authentication).   Authorization             The act of determining if a particular right, such as             access to some resource, can be granted to the presenter of             a particular credential.   Billing   The act of preparing an invoice.   Broker    A Broker is an entity that is in a different administrative             domain from both the home AAA server and the local ISP, and             which provides services, such as facilitating payments             between the local ISP and home administrative entities.             There are two different types of brokers; proxy and             routing.   Client    A node wishing to obtain service from an attendant within             an administrative domain.   End-to-End             End-to-End is the security model that requires that             security information be able to traverse, and be validated             even when an AAA message is processed by intermediate nodes             such as proxies, brokers, etc.Aboba, et al.                Informational                      [Page 3]

RFC 2989         Network Access AAA Evaluation Criteria    November 2000   Foreign Domain             An administrative domain, visited by a Mobile IP client,             and containing the AAA infrastructure needed to carry out             the necessary operations enabling Mobile IP registrations.             From the point of view of the foreign agent, the foreign             domain is the local domain.   Home Domain             An administrative domain, containing the network whose             prefix matches that of a mobile node's home address, and             containing the AAA infrastructure needed to carry out the             necessary operations enabling Mobile IP registrations.             From the point of view of the home agent, the home domain             is the local domain.   Hop-by-hop             Hop-by-hop is the security model that requires that each             direct set of peers in a proxy network share a security             association, and the security information does not traverse             a AAA entity.   Inter-domain Accounting             Inter-domain accounting is the collection of information on             resource usage of an entity within an administrative             domain, for use within another administrative domain.  In             inter-domain accounting, accounting packets and session             records will typically cross administrative boundaries.   Intra-domain Accounting             Intra-domain accounting is the collection of information on             resource within an administrative domain, for use within             that domain.  In intra-domain accounting, accounting             packets and session records typically do not cross             administrative boundaries.   Local Domain             An administrative domain containing the AAA infrastructure             of immediate interest to a Mobile IP client when it is away             from home.   Proxy     A AAA proxy is an entity that acts as both a client and a             server.  When a request is received from a client, the             proxy acts as a AAA server.  When the same request needs to             be forwarded to another AAA entity, the proxy acts as a AAA             client.Aboba, et al.                Informational                      [Page 4]

RFC 2989         Network Access AAA Evaluation Criteria    November 2000   Local Proxy             A Local Proxy is a AAA server that satisfies the definition             of a Proxy, and exists within the same administrative             domain as the network device (e.g., NAS) that issued the             AAA request.  Typically, a local proxy will enforce local             policies prior to forwarding responses to the network             devices, and are generally used to multiplex AAA messages             from a large number of network devices.   Network Access Identifier             The Network Access Identifier (NAI) is the userID submitted             by the client during network access authentication.  In             roaming, the purpose of the NAI is to identify the user as             well as to assist in the routing of the authentication             request.  The NAI may not necessarily be the same as the             user's e-mail address or the user-ID submitted in an             application layer authentication.   Routing Broker             A Routing Broker is a AAA entity that satisfies the             definition of a Broker, but is NOT in the transmission path             of AAA messages between the local ISP and the home domain's             AAA servers.  When a request is received by a Routing             Broker, information is returned to the AAA requester that             includes the information necessary for it to be able to             contact the Home AAA server directly.  Certain             organizations providing Routing Broker services MAY also             act as a Certificate Authority, allowing the Routing Broker             to return the certificates necessary for the local ISP and             the home AAA servers to communicate securely.   Non-Proxy Broker             A Routing Broker is occasionally referred to as a Non-Proxy             Broker.   Proxy Broker             A Proxy Broker is a AAA entity that satisfies the             definition of a Broker, and acts as a Transparent Proxy by             acting as the forwarding agent for all AAA messages between             the local ISP and the home domain's AAA servers.   Real-time Accounting             Real-time accounting involves the processing of information             on resource usage within a defined time window.  Time             constraints are typically imposed in order to limit             financial risk.Aboba, et al.                Informational                      [Page 5]

RFC 2989         Network Access AAA Evaluation Criteria    November 2000   Roaming Capability             Roaming capability can be loosely defined as the ability to             use any one of multiple Internet service providers (ISPs),             while maintaining a formal, customer-vendor relationship             with only one.  Examples of cases where roaming capability             might be required include ISP "confederations" and ISP-             provided corporate network access support.   Session record             A session record represents a summary of the resource             consumption of a user over the entire session.  Accounting             gateways creating the session record may do so by             processing interim accounting events.   Transparent Proxy             A Transparent Proxy is a AAA server that satisfies the             definition of a Proxy, but does not enforce any local             policies (meaning that it does not add, delete or modify             attributes or modify information within messages it             forwards).2.  Requirements Summary   The AAA protocol evaluation criteria for network access are   summarized below.  For details on the requirements, please consult   the documents referenced in the footnotes.Aboba, et al.                Informational                      [Page 6]

RFC 2989         Network Access AAA Evaluation Criteria    November 20002.1.  General requirements   These requirements apply to all aspects of AAA and thus are   considered general requirements.   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |                           |         |         |         |   |  General                  | NASREQ  | ROAMOPS | MOBILE  |   |  Reqts.                   |         |         |   IP    |   |                           |         |         |         |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |                           |         |         |         |   |   Scalability             |    M    |   M     |    M    |   |      a                    |   12    |   3     |  30 39  |   |                           |         |         |         |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |                           |         |         |         |   |   Fail-over               |    M    |         |    M    |   |      b                    |   12    |         |   31    |   |                           |         |         |         |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |                           |         |         |         |   |   Mutual auth             |    M    |         |    M    |   |   AAA client/server       |   16    |         |   30    |   |      c                    |         |         |         |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |                           |         |         |         |   |   Transmission level      |         |   M     |    S    |   |   security                |         |   6     |  31 39  |   |      d                    |         |         |         |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |                           |         |         |         |   |  Data object              |    M    |   M     |    M    |   |  Confidentiality          |   26    |   6     |   40    |   |      e                    |         |         |         |   |                           |         |         |         |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |                           |         |         |         |   |  Data object              |    M    |   M     |    M    |   |  Integrity                |   16    |   6     |  31 39  |   |      f                    |         |         |         |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |                           |         |         |         |   |  Certificate transport    |    M    |         |  S/M    |   |      g                    |   42    |         |31,33/46 |   |                           |         |         |         |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+Aboba, et al.                Informational                      [Page 7]

RFC 2989         Network Access AAA Evaluation Criteria    November 2000   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |                           |         |         |         |   |  Reliable AAA transport   |    M    |         |    M    |   |  mechanism                |   22    |         |  31 32  |   |      h                    |         |         |         |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |                           |         |         |         |   |   Run Over IPv4           |    M    |   M     |    M    |   |                           |   11    |   1     |   33    |   |                           |         |         |         |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |                           |         |         |         |   |   Run Over IPv6           |    M    |         |    S    |   |                           |   11    |   1     |   47    |   |                           |         |         |         |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |                           |         |         |         |   |  Support Proxy and        |    M    |         |    M    |   |  Routing Brokers          |   12    |         |  31 39  |   |      i                    |         |         |         |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |                           |         |         |         |   |  Auditability             |    S    |         |         |   |      j                    |   25    |         |         |   |                           |         |         |         |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |                           |         |         |         |   |   Dual App and Transport  |         |   O     |     M   |   |    Security not required  |         |   6     |    40   |   |      k                    |         |         |         |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |                           |         |         |         |   |  Ability to carry         |    M    |         |    S    |   |  service-specific attr.   |   43    |         |  31 33  |   |      l                    |         |         |         |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   Key   M = MUST   S = SHOULD   O = MAY   N = MUST NOT   B = SHOULD NOTAboba, et al.                Informational                      [Page 8]

RFC 2989         Network Access AAA Evaluation Criteria    November 2000   Clarifications   [a]  The AAA protocol must be capable of supporting millions of users        and tens of thousands of simultaneous requests.  The AAA        architecture and protocol MUST be capable of supporting tens of        thousands of devices, AAA servers, proxies and brokers.   [b]  In the event of failure to communicate with a given server, the        protocol must provide a mechanism to change service to another        backup or secondary server.   [c]  This requirement refers to the ability to support mutual        authentication between the AAA client and server.   [d]  The AAA protocol requires authentication, integrity protection        and confidentiality at the transmission layer.  This security        model is also referred to as hop-by-hop security, whereas the        security is established between two communicating peers.  All of        the security is removed when the AAA message is processed by a        receiving AAA entity.   [e]  The AAA protocol requires confidentiality at the object level,        where an object consists of one or more attributes.  Object        level confidentiality implies that only the target AAA entity        for whom the data is ultimately destined may decrypt the data,        regardless of the fact that the message may traverse one or more        intermediate AAA entities (e.g., proxies, brokers).   [f]  The AAA protocol requires authentication and integrity        protection at the object level, which consists of one or more        attributes.  Object level authentication must be persistent        across one or more intermediate AAA entity (e.g., proxy, broker,        etc), meaning that any AAA entity in a proxy chain may verify        the authentication.  This implies that data that is covered by        object level security CANNOT be modified by intermediate        servers.   [g]  The AAA protocol MUST be capable of transporting certificates.        This requirement is intended as an optimization, in lieu of        requiring that an out-of-band protocol be used to fetch        certificates.   [h]  This requirement refers to resilience against packet loss,        including:        1. Hop-by-hop retransmission and fail-over so that reliability           does not solely depend on single hop transport           retransmission.Aboba, et al.                Informational                      [Page 9]

RFC 2989         Network Access AAA Evaluation Criteria    November 2000        2. Control of the retransmission mechanism by the AAA           application.        3. Acknowledgment by the transport that a message was delivered           successfully, separate from message semantics or syntax           evaluation.        5. Piggy-backing of acknowledgments in AAA messages.        6. Timely delivery of AAA responses.   [i]  In the Mobile IP AAA architecture, brokers can be in the        forwarding path, in which case they act as transparent proxies        (proxy brokers).  Alternatively, it is also possible to conceive        of brokers operating as certifying authorities outside of the        forwarding path (routing brokers).   [j]  An auditable process is one in which it is possible to        definitively determine what actions have been performed on AAA        packets as they travel from the home AAA server to the network        device and back.   [k]  The AAA protocol MUST allow communication to be secured.        However, the AAA protocol MUST also allow an underlying security        service (e.g., IP Security) to be used.  When the latter is        used, the former MUST NOT be required.   [l]  The AAA protocol MUST be extensible by third parties (e.g.,        other IETF Working Groups), in order to define attributes that        are specific to the service being defined.  This requirement        simply means that the AAA protocol MUST allow groups other than        the AAA WG to define standard attributes.Aboba, et al.                Informational                     [Page 10]

RFC 2989         Network Access AAA Evaluation Criteria    November 20002.2.  Authentication Requirements   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |                           |         |         |         |   | Authentication            | NASREQ  | ROAMOPS | MOBILE  |   | Reqts.                    |         |         |   IP    |   |                           |         |         |         |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |                           |         |         |         |   |   NAI Support             |    M    |   M     |   S/M   |   |      a                    |    9    |   2     |32,34,39/|   |                           |         |         |   40    |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |                           |         |         |         |   |   CHAP Support            |    M    |   M     |         |   |      b                    |   10    |   3     |         |   |                           |         |         |         |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |                           |         |         |         |   |   EAP Support             |    M    |   S     |         |   |      c                    |   10    |   3     |         |   |                           |         |         |         |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |                           |         |         |         |   |   PAP/Clear-Text Support  |    M    |   B     |         |   |      d                    |   26    |   3     |         |   |                           |         |         |         |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |                           |         |         |         |   |   Re-authentication       |    M    |         |    S    |   |   on demand               |   17    |         |   33    |   |      e                    |         |         |         |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |                           |         |         |         |   |   Authorization Only      |    M    |         |         |   |   without Authentication  |    9    |         |         |   |      f                    |         |         |         |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   Key   M = MUST   S = SHOULD   O = MAY   N = MUST NOT   B = SHOULD NOTAboba, et al.                Informational                     [Page 11]

RFC 2989         Network Access AAA Evaluation Criteria    November 2000   Clarifications   [a]  The AAA protocol MUST allow the use of Network Access        Identifiers (NAI) [8] to identify users and/or devices.   [b]  The AAA protocol MUST allow CHAP [20] authentication information        to be transported.  This is commonly used by Network Access        Servers that request authentication of a PPP user.   [c]  The AAA protocol MUST allow for Extensible Authentication        Protocol (EAP) [14] payload to be transported.  Since some EAP        authentication mechanisms require more than one round trip, the        AAA protocol must allow for such authentication mechanisms to be        used.  The actual EAP authentication mechanism negotiated MUST        be transparent to the AAA protocol.  When EAP is used,        authentication typically occurs between the user being        authenticated and his/her home AAA server.   [d]  While PAP is deprecated, it is still in widespread use for its        original intended purpose, which is support of clear-text        passwords.  As a result, a AAA protocol will need to be able to        securely transport clear-text passwords.  This includes        providing for confidentiality of clear-text passwords traveling        over the wire, as well as protecting against disclosure of        clear-text passwords to proxies in the forwarding path.   [e]  The AAA protocol MUST allow for a user to be re-authenticated        on-demand.  The protocol MUST allow for this event to be        triggered by either the user, access device (AAA client), or the        home or visited AAA server.   [f]  The AAA protocol MUST NOT require that credentials of the user        be provided during authorization.  The AAA protocol supports        authorization by identification or assertion only.Aboba, et al.                Informational                     [Page 12]

RFC 2989         Network Access AAA Evaluation Criteria    November 20002.3.  Authorization Requirements   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |                           |         |         |         |   | Authorization             | NASREQ  | ROAMOPS | MOBILE  |   | Reqts.                    |         |         |   IP    |   |                           |         |         |         |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |   Static and Dynamic      |         |         |         |   |   IPv4/6 Address Assign.  |    M    |   M     |   M     |   |      a                    |   11    |   5     | 32 36   |   |                           |         |         |         |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |                           |         |         |         |   |   RADIUS gateway          |    M    |   M     |    M    |   |   capability              |   44    |   3     |    45   |   |      b                    |         |         |         |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |                           |         |         |         |   |   Reject                  |    M    |   M     |   M     |   |   capability              |   12    |   4     |  39     |   |      c                    |         |         |         |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |                           |         |         |         |   |   Precludes layer 2       |    N    |   N     |         |   |   tunneling               |   11    |   5     |         |   |                           |         |         |         |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |                           |         |         |         |   |  Re-Authorization on      |    M    |         |   S     |   |   demand                  |   18    |         | 30 33   |   |      d                    |         |         |         |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |                           |         |         |         |   |  Support for Access Rules,|    M    |         |         |   |  Restrictions, Filters    | 11, 19  |         |         |   |      e                    |         |         |         |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |                           |         |         |         |   |  State Reconciliation     |    M    |         |         |   |      f                    |   20    |         |         |   |                           |         |         |         |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |                           |         |         |         |   |  Unsolicited Disconnect   |    M    |         |         |   |      g                    |   18    |         |         |   |                           |         |         |         |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+Aboba, et al.                Informational                     [Page 13]

RFC 2989         Network Access AAA Evaluation Criteria    November 2000   Key   M = MUST   S = SHOULD   O = MAY   N = MUST NOT   B = SHOULD NOT   Clarifications   [a]  The AAA protocol MUST allow a server to provide a static or        dynamic address during the authorization phase of a user and/or        device.  The address assigned MUST be either of type IPv4 or        IPv6.  If both the client AND the server are aware of a pre-        configured address, then it is considered static.  Anything else        is dynamic.   [b]  This requirement refers to the ability of a new AAA protocol be        sufficiently compatible with the large installed base of        attributes for existing approaches (RADIUS), such that a server        implementation could speak both protocols, or translate between        them.   [c]  This requirement refers to the ability of a proxy broker to deny        access without forwarding the access request to the AAA server,        or to deny access after receiving an access accept from the AAA        server.   [d]  This requirement refers to the ability of the AAA client or        server to trigger re-authorization, or to the ability of the        server to send updated authorization information to the device,        such as "stop service."  Authorization can allow for a time        period, then additional authorization can be sought to continue.        A server can initially authorize a user to connect and receive        services, but later decide the user is no longer allowed use of        the service, for example after N minutes.  Authorizations can        have a time limit.  Re-authorization does not necessarily imply        re-authentication.   [e]  This requirement refers to the ability to of the protocol to        describe access operational limitations and authorization        restrictions to usage to the NAS which includes (but is not        limited to):        1. Session expirations and Idle Timeouts        2. Packet filters        3. Static routes        4. QoS parametersAboba, et al.                Informational                     [Page 14]

RFC 2989         Network Access AAA Evaluation Criteria    November 2000   [f]  This requirement refers to the ability of the NAS to use the AAA        server to manage resource allocation state.  This capability can        assist with, but it is not synonymous with, simultaneous user        login control, port usage limitations, or IP address pooling.        The design must provide for recovery from data loss due to a        variety of faults, including NAS and AAA server reboots, and        NAS/AAA server communication outages, and MUST be independent of        the accounting stream.  The granularity of the recovery of state        information after an outage may be on the order of a fraction of        a minute.  In order to provide for state recovery, explicit        session/resource status and update and disconnect messages will        be required.        Because of potential multi-domain issues, only systems that        allocate or use a resource should track its state.   [g]  This requirement refers to the ability of the AAA server to        request the NAS to disconnect an active session for        authorization policy reasons.Aboba, et al.                Informational                     [Page 15]

RFC 2989         Network Access AAA Evaluation Criteria    November 20002.4.  Accounting Requirements   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |                           |         |         |         |   | Accounting                | NASREQ  | ROAMOPS | MOBILE  |   | Reqts.                    |         |         |   IP    |   |                           |         |         |         |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |                           |         |         |         |   |   Real-time accounting    |    M    |    M    |   M     |   |      a                    |   14    |    7    |  31     |   |                           |         |         |         |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |                           |         |         |         |   |   Mandatory Compact       |         |    M    |         |   |    Encoding               |         |    7    |         |   |      b                    |         |         |         |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |                           |         |         |         |   |   Accounting Record       |         |    M    |   M     |   |    Extensibility          |         |    7    |  33     |   |                           |         |         |         |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |                           |         |         |         |   |   Batch Accounting        |    S    |         |         |   |      c                    |   21    |         |         |   |                           |         |         |         |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |                           |         |         |         |   |   Guaranteed Delivery     |    M    |         |    M    |   |      d                    |   22    |         |   31    |   |                           |         |         |         |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |                           |         |         |         |   |   Accounting Time Stamps  |    M    |         |    M    |   |      e                    |   23    |         |   40    |   |                           |         |         |         |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |                           |         |         |         |   |  Dynamic Accounting       |    M    |         |         |   |      f                    |   48    |         |         |   |                           |         |         |         |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+Aboba, et al.                Informational                     [Page 16]

RFC 2989         Network Access AAA Evaluation Criteria    November 2000   Key   M = MUST   S = SHOULD   O = MAY   N = MUST NOT   B = SHOULD NOT   Clarifications   [a]  This requirement may be loosely defined as reporting        synchronously with events.  Typically the time window is on the        order of seconds, not milliseconds.   [b]  The AAA protocol's Accounting data format MUST NOT be bloated,        imposing a large overhead for one or more accounting data        elements.   [c]  This requirement refers to the ability to buffer or store        multiple accounting records, and send them together at some        later time.   [d]  This is an application layer acknowledgment.  This is sent when        the receiving server is willing to take responsibility for the        message data.   [e]  This requirement refers to the ability to reflect the time of        occurrence of events such as log-on, logoff, authentication,        authorization and interim accounting.  It also implies the        ability to provide for unambiguous time-stamps.   [f]  This requirement refers to the ability to account for dynamic        authentication and authorization.  To support this, there can be        multiple accounting records for a single session.2.5.  Unique Mobile IP requirements   In addition to the above requirements, Mobile IP also has the   following additional requirements:Aboba, et al.                Informational                     [Page 17]

RFC 2989         Network Access AAA Evaluation Criteria    November 2000   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |                           |         |         |         |   |  Encoding of Mobile IP    |         |         |   M     |   |  registration messages    |         |         |   33    |   |                           |         |         |         |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |                           |         |         |         |   |  Firewall friendly        |         |         |   M     |   |      a                    |         |         |   35    |   |                           |         |         |         |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |                           |         |         |         |   |  Allocation of local Home |         |         |   S/M   |   |  agent                    |         |         |  37/41  |   |                           |         |         |         |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   Key   M = MUST   S = SHOULD   O = MAY   N = MUST NOT   B = SHOULD NOT   Clarifications   [a]  A firewall friendly protocol is one which is designed to        accommodate a firewall acting as a proxy.  For example, this        would permit a Home Agent AAA server situated behind a firewall        to be reachable from the Internet for the purposes of providing        AAA services to a Mobile IP Foreign Agent.        Notes        [1] Section 4.2.1 of [2]        [2] Section 4.2.2 of [2]. Also see [8].        [3] Section 4.2.3 of [2]. Also see [14].        [4] Section 4.2.4 of [2].        [5] Section 4.2.5 of [2].        [6] Section 4.2.6 of [2].        [7] Section 4.3 of [2].        [8] Section 6 of [3].  Also see [6].        [9] Section 8.2.2.2 of [3].  Also see [14].        [10] Section 8.2.2.1 of [3].  Also see [14].        [11] Section 8.3.2.2 of [3].  Also see [7].        [12] Section 8.1.1 of [3].        [13] Section 8.1.4.4 of [3].        [14] Section 8.4.1.2 of [3].Aboba, et al.                Informational                     [Page 18]

RFC 2989         Network Access AAA Evaluation Criteria    November 2000        [15] Section 8.4.2 of [3].        [16] Section 8.1.3 of [3].        [17] Section 8.2.1.2 of [3].        [18] Section 8.3.1.1 of [3].        [19] Section 8.3.2.1 of [3].  Also see [7].        [20] Section 8.3.2.3 of [3].  Also see [6], [7].        [21] Section 8.4.1.3 of [3].        [22] Section 8.4.1.1 of [3].        [23] Section 8.4.1.4 of [3].        [24] Section 8.4.3.1 of [3].        [25] Section 8.4.3.2 of [3].        [26] Section 8.2.3.1 of [3].        [27] Section 8.3.3.1 of [3].        [28] Section 8.1.4.1 of [3].        [29] Refer [15]        [30] Section 3 of [5]        [31] Section 3.1 of [5]        [32] Section 4 of [5]        [33] Section 5 of [5]        [34] Section 5.1 of [5]        [35] Section 5.2 of [5]        [36] Section 5.3 of [5]        [37] Section 5.4 of [5]        [38] Section 5.5 of [5]        [39] Section 6 of [5]        [40] Section 5.1 of [4]        [41] Section 5.2.2 of [4]        [42] Section 8.2.2.2 of [3]        [43] Section 8.1.2.3 of [3]        [44] Section 8.1.2.2 of [3]        [45] Section 5.4 of [4]        [46] Section 7 of [4]        [47] Section 8 of [5]        [48] Section 8.4.1.5 of [3]3.  References   [1]  Bradner, S., "Key words for use in RFCs to Indicate Requirement        Levels",BCP 14,RFC 2119, March 1997.   [2]  Aboba, B. and G. Zorn, "Criteria for Evaluating Roaming        Protocols",RFC 2477, January 1999.   [3]  Beadles, M. and D. Mitton, "Criteria for Evaluating Network        Access Server Protocols", Work in Progress.   [4]  Hiller, T., et al., "Cdma2000 Wireless Data Requirements for        AAA", Work in Progress.Aboba, et al.                Informational                     [Page 19]

RFC 2989         Network Access AAA Evaluation Criteria    November 2000   [5]  Glass, S., Hiller, T., Jacobs, S. and C. Perkins, "Mobile IP        Authentication, Authorization, and Accounting Requirements",RFC2977, October 2000.   [6]  Mitton, D., Beadles, M., "Network Access Server Requirements        Next Generation (NASREQNG) NAS Model",RFC 2881, July 2000.   [7]  Mitton, D., "Network Access Server Requirements: Extended RADIUS        Practices",RFC 2882, July 2000.   [8]  Aboba,  B. and M. Beadles, "The Network Access Identifier",RFC2486, January 1999.   [9]  Rigney, C., Willens, S., Rubens, A. and W. Simpson, "Remote        Authentication Dial In User Service (RADIUS)",RFC 2865, June        2000.   [10] Rigney, C., "RADIUS Accounting",RFC 2866, June 2000.   [11] Simpson, W., Editor, "The Point-to-Point Protocol (PPP)", STD        51,RFC 1661, July 1994.   [12] Sklower, K., Lloyd, B., McGregor, G., Carr, D. and T. Coradetti,        "The PPP Multilink Protocol (MP)",RFC 1990, August 1996.   [13] Simpson, W., Editor, "PPP LCP Extensions",RFC 1570, January        1994.   [14] Blunk, L. and J. Vollbrecht, "PPP Extensible Authentication        Protocol (EAP)",RFC 2284, March 1998.   [15] Solomon, J. and S. Glass, "Mobile-IPv4 Configuration Option for        PPP IPCP",RFC 2290, Feb 1998   [16] Calhoun, P. and C. Perkins, "Mobile IP Network Access Identifier        Extension for IPv4",RFC 2794, March 2000.   [17] Perkins, C., "IP Mobility Support",RFC 2002, Oct 1996.   [18] Johnson, D. and C. Perkins,"Mobility Support in IPv6", Work in        Progress.   [19] Aboba, B. and J. Vollbrecht, "Proxy Chaining and Policy        Implementation in Roaming",RFC 2607, June 1999.   [20] Simpson, W., "PPP Challenge Handshake Authentication Protocol        (CHAP)",RFC 1994, August 1996.Aboba, et al.                Informational                     [Page 20]

RFC 2989         Network Access AAA Evaluation Criteria    November 20004.  Security Considerations   This document, being a requirements document, does not have any   security concerns.  The security requirements on protocols to be   evaluated using this document are described in the referenced   documents.5.  IANA Considerations   This memo does not create any new number spaces for IANA   administration.6.  Acknowledgments   Thanks to the members of the Mobile IP, AAA, and NASREQ working   groups who have discussed and commented on these requirements. We   would also like to thank the members of the AAA evaluation team, Mike   St. Johns, Barney Wolf, Mark Stevens, David Nelson, Dave Mitton,   Basavaraj Patil and Stuart Barkley for their thorough review of this   document.7.  Authors' Addresses   Bernard Aboba   Microsoft Corporation   One Microsoft Way   Redmond, WA 98052   Phone: +1 425-936-6605   Fax:   +1 425-936-7329   EMail: bernarda@microsoft.com   Pat R. Calhoun   Network and Security Research Center, Sun Labs   Sun Microsystems, Inc.   15 Network Circle   Menlo Park, CA 94025   Phone: +1 650-786-7733   EMail: pcalhoun@eng.sun.comAboba, et al.                Informational                     [Page 21]

RFC 2989         Network Access AAA Evaluation Criteria    November 2000   Steven M. Glass   Sun Microsystems   1 Network Drive   Burlington, MA 01845   Phone: +1 781-442-0504   Fax:   +1 781-442-1677   EMail: steven.glass@sun.com   Tom Hiller   Wireless Data Standards & Architectures   Lucent Technologies   263 Shuman Drive   Room 1HP2F-218   Naperville, IL 60563   Phone: +1 630-976-7673   EMail: tom.hiller@lucent.com   Peter J. McCann   Lucent Technologies   Rm 2Z-305   263 Shuman Blvd   Naperville, IL  60566   Phone: +1 630-713 9359   EMail: mccap@lucent.com   Hajime Shiino   Lucent Technologies Japan Ltd.   25 Mori Bldg. 1-4-30 Roppongi,   Minato-ku Tokyo   Japan   Phone: +81-3-5561-3695   EMail: hshiino@lucent.com   Glen Zorn   Cisco Systems, Inc.   500 108th Avenue N.E., Suite 500   Bellevue, WA 98004   Phone: +1 425-468-0955   EMail: gwz@cisco.comAboba, et al.                Informational                     [Page 22]

RFC 2989         Network Access AAA Evaluation Criteria    November 2000   Gopal Dommety   IOS Network Protocols   Cisco Systems, Inc.   170 West Tasman Drive   San Jose, CA 95134-1706   Phone: +1 408-525-1404   Fax:   +1 408-526-4952   EMail: gdommety@cisco.com   Charles E. Perkins   Communications Systems Lab   Nokia Research Center   313 Fairchild Drive   Mountain View, CA   Phone: +1 650-625-2986   Fax:   +1-650-625-2502   EMail: charliep@iprg.nokia.com   Basavaraj Patil   Nokia Networks   6000 Connection Dr.   Irving, TX 75039   Phone: +1 972-894-6709   Fax:   +1 972-894-5349   EMail: Basavaraj.Patil@nokia.com   David Mitton   Nortel Networks   880 Technology Park Drive   Billerica, MA 01821   Phone: +1 978-288-4570   EMail: dmitton@nortelnetworks.com   Serge Manning   Nortel Networks   2201 Lakeside Blvd   Richardson, TX  75082-4399   Phone: +1 972-684-7277   EMail: smanning@nortelnetworks.comAboba, et al.                Informational                     [Page 23]

RFC 2989         Network Access AAA Evaluation Criteria    November 2000   Mark Anthony Beadles   SmartPipes, Inc.   565 Metro Place South   Suite 300   Dublin, OH 43017   Phone: +1 614-923-5657   EMail: mbeadles@smartpipes.com   Pat Walsh   Lucent Technologies   263 Shuman Blvd.   1F-545   Naperville, IL   Phone: +1 630-713-5063   EMail: walshp@lucent.com   Xing Chen   Alcatel USA   1000 Coit Road   Plano, TX 75075   Phone: +1 972-519-4142   Fax:   +1 972-519-3300   EMail: xing.chen@usa.alcatel.com   Sanjeevan Sivalingham   Ericsson Wireless Communications Inc.,   Rm Q-356C   6455 Lusk Blvd   San Diego, CA 92126   Phone: +1 858-332-5670   EMail: s.sivalingham@ericsson.com   Alan Hameed   Fujitsu   2801 Telecom Parkway   Richardson, TX 75082   Phone: +1 972-479-2089Aboba, et al.                Informational                     [Page 24]

RFC 2989         Network Access AAA Evaluation Criteria    November 2000   Mark Munson   GTE Wireless   One GTE Place   Alpharetta, GA  30004   Phone: +1 678-339-4439   EMail: mmunson@mobilnet.gte.com   Stuart Jacobs   Secure Systems Department   GTE Laboratories   40 Sylvan Road,   Waltham, MA 02451-1128   Phone: +1 781-466-3076   Fax:   +1 781-466-2838   EMail: sjacobs@gte.com   Byung-Keun Lim   LG Electronics, Ltd.   533, Hogye-dong, Dongan-ku, Anyang-shi,   Kyungki-do,431-080   Korea   Phone: +82-31-450-7199   Fax:   +82-31-450-7050   EMail: bklim@lgic.co.kr   Brent Hirschman   1501 Shure Dr.   Arlington Hieghts, IL 60006   Phone: +1 847-632-1563   EMail: qa4053@email.mot.com   Raymond T. Hsu   Qualcomm Inc.   6455 Lusk Blvd.   San Diego, CA 92121   Phone: +1 619-651-3623   EMail: rhsu@qualcomm.comAboba, et al.                Informational                     [Page 25]

RFC 2989         Network Access AAA Evaluation Criteria    November 2000   Haeng S. Koo   Samsung Telecommunications America, Inc.   1130 E. Arapaho Road   Richardson, TX 75081   Phone: +1 972-761-7755   EMail: hskoo@sta.samsung.com   Mark A. Lipford   Sprint PCS   8001 College Blvd.; Suite 210   Overland Park, KS  66210   Phone: +1 913-664-8335   EMail: mlipfo01@sprintspectrum.com   Ed Campbell   3Com Corporation   1800 W. Central Rd.   Mount Prospect, IL 60056   Phone: +1 847-342-6769   EMail: ed_campbell@3com.com   Name: Yingchun Xu   WaterCove Networks   One Century Centre, Suite 550   1750 E. Golf Road   Schaumburg, IL   Phone: +1 847-477-9280   EMail: yxu@watercove.com   Shinichi Baba   Toshiba America Research, Inc.   PO Box 136,   Convent Station, NJ 07961-0136   Phone: +1 973-829-4795   EMail: sbaba@tari.toshiba.comAboba, et al.                Informational                     [Page 26]

RFC 2989         Network Access AAA Evaluation Criteria    November 2000   Eric Jaques   Vodafone AirTouch   2999 Oak Road, MS-750   Walnut Creek, CA 94596   Phone: +1 925-279-6142   EMail: ejaques@akamail.com8.  Intellectual Property Statement   The IETF takes no position regarding the validity or scope of any   intellectual property or other rights that might be claimed to   pertain to the implementation or use of the technology described in   this document or the extent to which any license under such rights   might or might not be available; neither does it represent that it   has made any effort to identify any such rights.  Information on the   IETF's procedures with respect to rights in standards-track and   standards-related documentation can be found inBCP-11.  Copies of   claims of rights made available for publication and any assurances of   licenses to be made available, or the result of an attempt made to   obtain a general license or permission for the use of such   proprietary rights by implementors or users of this specification can   be obtained from the IETF Secretariat.   The IETF invites any interested party to bring to its attention any   copyrights, patents or patent applications, or other proprietary   rights which may cover technology that may be required to practice   this standard.  Please address the information to the IETF Executive   Director.Aboba, et al.                Informational                     [Page 27]

RFC 2989         Network Access AAA Evaluation Criteria    November 20009.  Full Copyright Statement   Copyright (C) The Internet Society (2000).  All Rights Reserved.   This document and translations of it may be copied and furnished to   others, and derivative works that comment on or otherwise explain it   or assist in its implementation may be prepared, copied, published   and distributed, in whole or in part, without restriction of any   kind, provided that the above copyright notice and this paragraph are   included on all such copies and derivative works.  However, this   document itself may not be modified in any way, such as by removing   the copyright notice or references to the Internet Society or other   Internet organizations, except as needed for the purpose of   developing Internet standards in which case the procedures for   copyrights defined in the Internet Standards process must be   followed, or as required to translate it into languages other than   English.   The limited permissions granted above are perpetual and will not be   revoked by the Internet Society or its successors or assigns.   This document and the information contained herein is provided on an   "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING   TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING   BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION   HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF   MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.Acknowledgement   Funding for the RFC Editor function is currently provided by the   Internet Society.Aboba, et al.                Informational                     [Page 28]

[8]ページ先頭

©2009-2025 Movatter.jp