Thanks, Mark...
- Ralph
On Oct 10, 2007, at Oct 10, 2007,11:11 PM, Mark Townsley wrote:
Ralph Droms wrote:
I believe the DSLF document "Subscriber Sessions" (DSLF WT-146)
lists the DSLF requirements for subscriber session management. Do
we (IETF) have access to this document?
Ralph, the IETF did get a liaison from the DSLF on WT-146, but the
entire document does not seem to be posted on our liaison
statements page. I'm checking with the DSLF now to see if it was
expected and understood that a snapshot of WT-146 be posted
publicly. Generally, "Working Texts" are only available to DSL
Forum members, though approved "Technical Reports" are made public.
In any case, a subsequent liaison directly included some relevant
requirements as an excerpt from WT-146, I've cut and paste them
here so that folks do not have to deal with the .doc if they don't
want to:
Req # Description
IPAuth-1 Authentication must not depend on the use of any given
application, eg web browser.
IPAuth-2 Must re-use existing SP Authentication infrastructure
(use Radius Database) and allow mixed mode operation (eg PPP and
IP) on the same L3 edge device
IPAuth-3 Must offer L3 edge device (BRAS) subscriber policy
enforcement via pull and push methods, ie L3 edge must be aware of
authentication status and any subscriber credentials
IPAuth-4 Must allow for authorization purposes the use of any
additional identifiers that may be available, eg MAC address,
Option82 circuit-id.
IPAuth-5 Should allow for subscriber nomadicity and support
tracking of changes to location.
IPAuth-6 Must fit into TR-101 operational model
(TR101 may be found here: https://datatracker.ietf.org/documents/
LIAISON/file468.pdf)
IPAuth-7 Must support revoking authentication
IPAuth-8 Must handle L3 CPE device authentication and end-device
(PC) user based authentication (likely with L2 CPEs in the latter
case)
IPAuth-9 Should be simple to implement on client (PC or CPE)
IPAuth-10 Must be independent of medium type (eg Fixed Ethernet,
Legacy ATM, PON, WiFi, WiMax, etc)
IPAuth-11 Must not require major re-work for IPv6. None ideally.
IPAuth-12 Must be resilient to attacks on the subscriber, eg
against brute-force challenge attacks, or spoofing of an
authenticator edge device
IPAuth-13 Must offer authenticator edge device resiliency, eg
not be prone to DOS authentication attacks
IPAuth-14 Must allow for authentication and download of
subscriber service profile before service IP address is assigned
IPAuth-15 Must offer an option to re-authenticate periodically
or on demand.
IPAuth-16 At an absolute minimum, must provide equivalent or
better security than PPP CHAP/MD5 does today. Must include the
ability to move to more secure authentication methods over time.
IPAuth-17 Should offer authentication fail/success reason
message to subscriber from authenticator .
IPAuth-18 Must allow for multiple authenticated subscribers on
same physical or logical interface.
IPAuth-19 Must offer scalable subscriber management, eg not
rely on subscriber credentials configured on the authenticator Edge
IPAuth-20 Must have a logical path towards standardization
IPAuth-21 Must scale to 10000s of subscribers per L3 edge
device (ie must be conservative in use of resources)
- Ralph
On Oct 10, 2007, at Oct 10, 2007,7:47 AM, Iljitsch van Beijnum wrote:
On 10-okt-2007, at 12:49, Jari Arkko wrote:
Since we are talking about converting PPPoE customers to this
new scheme, *something* at the home site has to change.
My guess would be that most likely change would be at the
DSL box that you get from the provider. If it does 802.1X,
PANA, or DHCP Auth from that point to the network does
not matter from the home user's perspective.
Today, you can:
1. hook up a PC directly to a DSL modem
2. use some kind of gateway to connect multiple PCs
3. use a modem with gateway functionality
I would be very interested in learning which of these models the
DSL forum wants to support. I'm somewhat worried about a
situation where 3. is the only option, because that way, end-
users would have to live with whatever functionality the (ISP-
provided) gateway delivers, which will invariably include NAT,
and although NAT is always a bad thing in theory, a "good" NAT
isn't too troublesome in practice while a bad one is a disaster.
_______________________________________________
Int-area mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/int-area
_______________________________________________
Int-area mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/int-area
_______________________________________________
Int-area mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/int-area