Alan DeKok wrote:
Richard Pruss wrote:
I think you have misunderstood the draft, possibly I was not clear
enough, two points of clarification for you concerns:
1. In the draft the DHCP server is the NAS and it has layer 2 restricted
relationship with the device offering credentials.  There is no
technical difference between where this is running and where and PPPoE
is used, the only difference is that after authentication, services like
multicast can be introduced from Layer 2 devices before the NAS, which
is why providers want to move from PPPoE.

  I do agree that DHCP has to be part of the solution to this problem.
Most clients will do DHCP before anything else, so putting some kind of
tie in to authentication requirements in DHCP is very useful.

  But does DHCP have to carry the authentication itself, or just the
notification that authentication is required?  i.e. Can't the DHCP
server just say "you must do PANA/EAPoL before I give you a lease".

When we work through the details of the system for authenticate later with PANA/EAPoL or Web Authentication, some problems arise here are some: 1. @Domain in the authentication is typically used by wholesale DSL providers to choose which ISP and thus IP address domain you are in. If you get that information after the IP address needs to be allocated, you need to do some two step hack to re-address the client after authentication. 2. DHCP auth is far more about getting configuration information from very large existing AAA databases (currently used for PPPoE and the SP operations processes around those) and correctly configuring the Host and the NAS with that information than "Authentication". Authenticating later does not solve the real problem of getting the client information from the AAA databases without changing the AAA and operational infrastructure supporting millions of live users. 3. The current proposal requires a change to the Home Gateway and NAS but as it uses functions in the system that assume DHCP other solutions would be needed for: 3.1 Line ID - currently the DSLAM or first hop L2 switch (in MetroE) marks the residential line into Option 82 in DHCP (or PPP tag in PPPoE) this is used to support the credentials in authentication (Something you are, Something you know, etc.) or at least inform the choice of configuration. This would mean that we would need some new mechanism to snoop PANA and insert Line ID. When I evaluated this PANA could not be snooped but Alper tells me this has changed. 3.2 Source Address Verification, ARP protection, Layer 2 VLAN security policies - Most vendors now snoop the DHCP as the major mechanism informing the layer 2 protections against a host of bad behaviours. As we move content that was behind the NAS to in front of the NAS these protections are even more important not just for Layer 2 but also for any Layer 3 content devices like VOD pumps etc. With the DHCP auth proposal the DHCP transaction continues in this function but with the PANA/EAPol approach we would need a policy distribution mechanism to contact the L2 edge and change the policies post authentication. 3.3 Introducing changes to the DSLAMs and L2 switches is far more expensive for the SP to migrate to and the vendors to impliment.

2. In the second option in the draft one may run EAP over DHCP which can
be as encrypted and signed to your hearts content.

  i.e. Yet another transport layer for EAP.  We already have PPP, EAPoL,
PANA, RADIUS, Diameter, etc. to carry EAP.  I'm wary of adding one more.
That is a tribute to EAP and something the community should be happy about as the alternative was that all those were doing there own Authentication Protocols.

-Ric
  And my issue isn't the signing and encrypting part.  It's that we
already have solutions to these problems.  The protocols exist, and in
some cases, are deployed on tens of millions of clients.  Rather than
updating the DHCP stack to do EAP, it would seem to be much easier to
have the DHCP stack *inform* the rest of the system that authentication
was required.  The system could then do PPPoE, PANA, EAPoL, or whatever
else was appropriate for the link.

  Alan DeKok.

_______________________________________________
Int-area mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/int-area

Reply via email to