On 29/07/2008, at 10:04 AM, Alper Yegin wrote:

If multiple DHCP exchanges are occurring with multiple servers, both
 IPv4 and IPv6 each needs to authenticate separately.

So, the same host needs to get authenticated twice if it is using
both IPv4
and IPv6. This is a very unusual model for AAA. You need to update AAA
servers to allow "double login." And with that, it is already
violating the
following requirement:

        IPAuth-2        Must re-use existing SP Authentication
infrastructure (use
        Radius Database)  and allow mixed mode operation (eg PPP and IP) on
        the same L3 edge device

 The RFC3118 authentication from one session could be used in the
other.

e.g. do full DHCP + EAP for IPv4, get a key. Use the same key to sign the DHCPv6 packets. The NAS has the key and the clients identity (MAC),
so all it has to do is lookup the MAC in it's table of allowed keys,
check the signature, and forward the packet if the signature is OK.

We need to see the details documented. It is hard to understand what it
looks like reading the above paragraph.

Their are drafts on key derivation from EAP to drive RFC 3118.

I know, we wrote the one long time ago. But I cannot immediately see how you
use achieve what you are describing above. Again, let's see some
documentation/detailed description on that.

http://www3.tools.ietf.org/html/draft-salowey-dhc-eapkey-3118-00




-------------------


 The client sends a DHCP Discover
message with an option specifying the authentication protocol as EAP
 to find an available DHCP server.  Any server that can that can
 authenticate and address it responds with a DHCPEAP-REQ message.

A "DHCP server" sending a "request" to the "DHCP client"? This is so
not-DHCP. Current DHCP state machine does not allow that. So,
basically you
are making a very significant change to the DHCP.

No actually DHCPFORCE in the Forced renw may have been the first to do
this but so does Rebind in a way.

What I'm saying is, DHCP client sending out a DHCPDISCOVER and receiving a
DHCPEA-REQ is not compliant with standard DHCP state machine.


You have also said that the proposal in effect pauses the state between the Discover and the Offer. In implementation we seem to have had no problem understanding this pause.


-------------------

I-D allows the DHCP server to respond to DHCPDISCOVER with "DHCPEAP-
REQ" --
a brand new message (a request) sent in response. Again, breaking
the state
machine and effectively inventing a totally new protocol that does
not look
like DHCP anymore.
Ahh, what broke?  It seems to work.

See above.

-------------------

In Figure 3, it seems like there is one DHCP client and two DHCP
servers.
Within the same DHCP flow, some messages are responded by one
server, some
by the other. This is certainly not standard DHCP.


Actually this is commonly deployed DHCP as I have pointed out in many
messages.

(Again) Please point to a IETF document that describes this. There is a whole lot of stuff happening out there, I don't think we can take them as-is
without proper IETF buy-in.

I am sorry but I do not buy that at all. We have implementations that behave this way and we now need to somehow pretend for your academic reasons that they do not exist?





-------------------


How is EAP-reauth initiated by the network is handled? The DHCP
client needs
to receive an unsolicited DHCP request from the DHCP server out of
blue.
This does not look like standard DHCP at all.


I do not see reauth in the requirements.   If it was we could put a
mechanism in to handle it.

It's not only a standard EAP behavior that needs to be accommodated, but
also explicitly stated in the requirements:

IPAuth-15       Must offer an option to re-authenticate periodically or on
demand.

Fine. DHCPFORCE message can out the client into rebind and then reauth can be initiated from the client or
we can simply check the key.




-------------------

How does DHCP satisfy the "orderly delivery" requirement imposed on
the EAP
lower layers by RFC 3748?



Same as PPP.

I don't think PPP and DHCP are the same protocol. I was asking how you
handle this. A technical response would be appreciated.

Technically there is no difference in terms of orderly delivery of EAP over PPPoE than EAP over DHCP.



An overall observation:

If we step back and look at the call flows, it is apparent that an EAP
call-flow is wedged into regular(*) DHCP call-flow, which freezes at
some
point and resumes later. The wedged-in part is so different than
DHCP, I
don't understand the value of using DHCP as the transport for that
part (why
bother having such an impact on DHCP to the extent that it looks
like a new
protocol?). But worse than that,  the wedged-in part also leaks into
the
regular DHCP call-flow (see how EAP Success/Failure gets transported
over
DHCPOFFER) -- hence not so regular anymore (*).


I made pretty much the same observation on Pana for DSL yesterday.

Nope. There is no modification to DHCP at all when PANA is used. No new DHCP
options, messages, changes to the state machines, etc.


And you propose a whole new protocol that is not supported on all the network devices in question.

- Ric


Alper


- Ric


Alper

















Alper

-----Original Message-----
From: Alper Yegin [mailto:[EMAIL PROTECTED]
Sent: Saturday, July 26, 2008 2:28 AM
To: 'Richard Pruss'
Cc: '[email protected]'; '[EMAIL PROTECTED]'
Subject: RE: [Int-area] dhcp-auth

I don't appreciate your comments. Let's stay on the technical course.

Let's start just looking at the issues about Figure 3...

- What is the DHCP-wise functionality of the NAS? Text claims it is
a "DHCP
relay" but I see it terminating some of the DHCP messages and also
generating some other messages. This is not compliant with DHCP.


As we explained to you many times most vendors BRAS's act as a DHCP
proxy and terminate all messages and look like a server to the
client.


That's not accurate according to Figure 3. I see "some" DHCP messages
terminating on the NAS (e.g., DHCPEAP*) and "others" going through
(e.g.,
DHCPDISCOVER) within the same DHCP flow.

I don't think it is as simple as your two-sentence explanation
anyways. As
requested earlier, IETF needs to see a document where this DHCP proxy
model is defined. I'm aware of one DHCP proxy model and it is
nothing like
what your document is suggesting.

Can you please send us a document that describes the DHCP proxy
model?
IETF needs to buy in the DHCP proxy model before any other proposal
built
on top of that gets accepted.


- How does the NAS handle EAP retransmissions? It needs to send
unsolicited
DHCP messages to the DHCP client. This is not compliant with DHCP.

Actually that issue is open and we can discuss what a compliant
implementation would mean in terms of retransmission timers so that
right thing always happens at the right layer.

OK, please explain.


- I see NAS inserting additional DHCP option (EAP Success) on
DHCPOFFER as
it forwards that message from DHCP server to DHCP client. This
again
breaks
DHCP.

As we explained to you many times most vendors BRAS's act as a DHCP
proxy and terminate all messages and look like a server to the
client.

Again, NAS does not really terminate "all" messages (see above).
And this
"box in the middle" inserting DHCP options towards the DHCP client
breaks
DHCP.

Lets take this to the dhcwg list as that is where the review happens
next week.

Really? What happened to the escalation of this discussion to int-
area and
the outcome of the poll from last IETF? I hope Jari can clarify this.

Alper








- Ric




Alper


_______________________________________________
Int-area mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/int-area





_______________________________________________
Int-area mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/int-area

Reply via email to