Hi, Alper,

(1) I've already pointed out to Mary that if I was late enough on the Last Call review, it magically turned into the first review for this coming telechat :-( Sorry!

(2) Because I started out with the Last Call review template, I didn't use the "please wait for your AD before revising" boilerplate, but please be guided by the ADs at this point.

Almost everything you propose works for me (if it works for the IESG). If they are open for guidance, here's what I think we still have to talk about (I deleted a lot of stuff that we agreed on).


4.1.  Authentication and Authorization Phase

   The PAA SHOULD limit the rate it processes incoming PANA-Client-
   Initiation messages to provide robustness against denial-of service
   (DoS) attacks.  Details of rate limiting are outside the scope of
   this specification.

Spencer: Two concerns here - why is this a SHOULD, instead of a MUST (why
would you NOT do this?), but more importantly, I'm not sure how you
normatively require PAAs to do something that isn't described (how would
you
know if the PAA is not doing this?)

You are right. It is meant to be a recommendation. Would we say "It is
recommended that the PAA limits the rate ...."?

This is actually a good TSV question, but what *I* was thinking was that "rate limiting" is often described in more specific terms (like not sending errors more than once per second, etc.). If there's a rate you have in mind, it would be helpful for implementers to know that.

   If the PAA wants to stay stateless in response to a
   PANA-Client-Initiation message, it SHOULD NOT include an EAP-Payload
   AVP in the initial PANA-Auth-Request message, and it SHOULD NOT re-

Spencer: both of these SHOULDs seem odd - aren't you just saying "if you
want to be stateless, here's how that works"? instead of normative
language...


Is using lower-case "should" sufficient?

I still think you're simply defining stateless operation. I'm thinking "doesn't include"/"doesn't". Does that make sense?

7.  PANA Messages

   Every PANA message defined MUST include a corresponding ABNF

Spencer: this is probably not a 2119 MUST, I think.

I agree. We should use "must."

I'm thinking something like "PANA message definitions include a corresponding ..." - sometimes it's just a definition, not so much a requirement or command.

8.6.  Result-Code AVP

   PANA_AUTHENTICATION_REJECTED               1

      Authentication has failed.  When this error is returned, it is
      assumed that authorization is automatically failed.

Spencer: this is not entirely clear to me. Is it saying "the requestor can
assume that authorization has also failed"?

Yes, that's what we meant to say.

which still seems odd to me -
if
you're not the entity you claim to be, how could this not be true? Mumble.

Yes, it is always true that if the authentication fails, the client cannot
be authorized for the service.

But see, the reverse is not true. Even if the authentication succeeds, the
authorization may fail for various reasons (e.g., joe is not allowed to
access the corporate network on the weekends).

That makes perfect sense to me. The text seems to be saying "well, the authentication failed, but just in case, we checked authentication, too" - that's what confused me.


10.2.2.  Message Type

   The Message Type namespace is used to identify PANA messages.  Values
   0-65,519 are for permanent, standard message types, allocated by IETF
   Consensus [IANA].  This document defines the Message Types 1-4.  See
   Section 7.1 through Section 7.7 for the assignment of the namespace
   in this specification.

   The values 65,520 and 65,535 (hexadecimal values 0xfff0 - 0xffff) are

Spencer: is this two values, or a range of values? I'm confused by "and"
versus "-". Shouldn't these two clauses match?

True. We shall use "-" for both.

Now that I know what the sentence is saying, I'd even suggest "The range of values ...", just so it's blindingly clear.


11.  Security Considerations

   An important element in assessing security of PANA design and
   deployment in a network is the presence of lower-layer (physical and
   link-layer) security.  In the context of this document, lower-layers
   are said to be secure if they can prevent eavesdropping and spoofing
   of packets.  Examples of such networks are physically-secured DSL
   networks and 3GPP2 networks with cryptographically-secured cdma2000
   link-layer.  In these examples, the lower-layer security is enabled
   even before running the first PANA-based authentication.  In the
   absence of such a pre-established secure channel, one needs to be
   created in conjunction with PANA using a link-layer or network-layer
   cryptographic mechanism (e.g., IPsec).

Spencer: is this saying that you expect people to be able to set up an SA
before they start doing PANA? Does that seem realistic?

There are such networks where some kind of lower-layer security exists even
before L3 authentication. For example, in cdma2K networks, L2 is already
ciphered. Nevertheless, the mobile terminal is expected to get authenticated and authorized for the L3 services separately. And in DSL networks, there is
already some level of physical security prior to running the L3 access
authentication.

Yeah, I understood the L2 cases - sorry for not being clearer. What I was trying to ask was about people really setting up *IPsec* SAs before doing PANA.

Thanks for the quick response, and again, I'm sorry my review was later than it should have been. See you in Chicago?

Spencer



_______________________________________________
Gen-art mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/gen-art

Reply via email to