>> Right.
>> 
>> Nevertheless, the max message would be reached with the EAP-carrying PAR 
>> messages, like you say.
>> 
>> Even though there is not limit on the number of *-Algorithms, it'd be a 
>> reasonable number not to cause the message going beyond an EAP-carrying PAR 
>> message in size.
>> 
> 
> 
> In that logic, the max message would be a PAR in re-authentication
> phase where an EAP-Paylaod AVP carrying an EAP method and additionally
> an AUTH AVP.
> 

I think you are right.

Alper


> Yoshihiro Ohba
> 
>> Alper
>> 
>> 
>> 
>>> [Figure 4, RFC 5191]
>>>   The table uses the following symbols:
>>> 
>>>   0     The AVP MUST NOT be present in the message.
>>> 
>>>   0-1   Zero or one instance of the AVP MAY be present in the message.
>>>         It is considered an error if there is more than one instance of
>>>         the AVP.
>>> 
>>>   1     One instance of the AVP MUST be present in the message.
>>> 
>>>   0+    Zero or more instances of the AVP MAY be present in the
>>>         message.
>>> 
>>>                         +---------------------------+
>>>                         |        Message Type       |
>>>                         +---+---+---+---+---+---+---+
>>>   Attribute Name        |PCI|PAR|PAN|PTR|PTA|PNR|PNA|
>>>   ----------------------+---+---+---+---+---+---+---+
>>>   AUTH                  | 0 |0-1|0-1|0-1|0-1|0-1|0-1|
>>>   EAP-Payload           | 0 |0-1|0-1| 0 | 0 | 0 | 0 |
>>>   Integrity-Algorithm   | 0 |0+ |0-1| 0 | 0 | 0 | 0 |
>>>   Key-Id                | 0 |0-1|0-1| 0 | 0 | 0 | 0 |
>>>   Nonce                 | 0 |0-1|0-1| 0 | 0 | 0 | 0 |
>>>   PRF-Algorithm         | 0 |0+ |0-1| 0 | 0 | 0 | 0 |
>>>   Result-Code           | 0 |0-1| 0 | 0 | 0 | 0 | 0 |
>>>   Session-Lifetime      | 0 |0-1| 0 | 0 | 0 | 0 | 0 |
>>>   Termination-Cause     | 0 | 0 | 0 | 1 | 0 | 0 | 0 |
>>>   ----------------------+---+---+---+---+---+---+---+
>>> 
>>>   Figure 4: AVP Occurrence Table
>>> 
>>> Best,
>>> Yasuyuki Tanaka
>>> 
>>> (2012/02/09 18:11), Alper Yegin wrote:
>>>> Hello,
>>>> 
>>>> Thank you for the review and feedback.
>>>> 
>>>> On Feb 9, 2012, at 7:44 AM, Yasuyuki Tanaka wrote:
>>>> 
>>>>> Hi all,
>>>>> 
>>>>> I have four comments about the draft. I put them at the bottom of
>>>>> this mail. Please see them.
>>>>> 
>>>>> Best,
>>>>> Yasuyuki Tanaka
>>>>> 
>>>>> ---------------------------------------------------------------------
>>>>> 
>>>>> (1) Page 4, Paragraph 1
>>>>> It would be helpful to add text about the source port number and the
>>>>> destination port number of the PCI as below.
>>>>> 
>>>>> [edited]
>>>>>  Step 1: The PaC initiates PANA by sending a broadcasted PCI carrying
>>>>>  a Token AVP that contains a random value generated by the PaC.
>>>>> 
>>>>> ! The source IPv4 address of the PCI is set to 0.0.0.0. The source
>>>>> ! port number is chosen by the PaC. The destination IPv4 address is
>>>>> ! set to 255.255.255.255. The destination port number is the PANA port
>>>>> ! number (716).
>>>>> 
>>>>> [original]
>>>>>  Step 1: The PaC initiates PANA by sending a broadcasted PCI carrying
>>>>>  a Token AVP that contains a random value generated by the PaC.
>>>>> 
>>>>>  The source IPv4 address of the PCI is set to 0.0.0.0.  The
>>>>>  destination IPv4 address is set to 255.255.255.255.
>>>>> 
>>>> 
>>>> 
>>>> OK.
>>>> 
>>>>> ---------------------------------------------------------------------
>>>>> 
>>>>> (2) Figure 1, Page 4
>>>>> 
>>>>> If the PAA want to initiate re-authentication, PAA have to know PaC's
>>>>> IPv4 address which is configured by DHCP.
>>>>> 
>>>>> It would be better that Figure 1 has messages related to "PaC Updating
>>>>> Its IP Address" described in Section 5.6, RFC 5191.
>>>>> 
>>>>> [Section 5.6. in RFC 5191]
>>>>>  After the PaC has changed its IP address used for PANA, it MUST send
>>>>>  any valid PANA message.  If the message that carries the new PaC IP
>>>>>  address in the Source Address field of the IP header is valid, the
>>>>>  PAA MUST update the PANA session with the new PaC address.  If there
>>>>>  is an established PANA SA, the message MUST be protected with an
>>>>>  AUTH AVP.
>>>> 
>>>> 
>>>> Let us consider that.
>>>> 
>>>>> ---------------------------------------------------------------------
>>>>> 
>>>>> (3) Page 6, Paragraph 3
>>>>> 
>>>>> I have no idea which PAR should have 'I' bit. Every PAR sent by
>>>>> PAA should have 'I' bit? Or, only a PAR with 'C' bit should have
>>>>> 'I' bit? (I think the latter is preferable.)
>>>>> 
>>>>> I've referred to RFC 5191, but I've not found the answer.
>>>>> 
>>>> 
>>>> I think this is an ambiguity with the RFC 5191. PAR with 'C' bit makes 
>>>> sense.
>>>> 
>>>> 
>>>>> [original]
>>>>>  The PAA SHALL set the 'I' (IP Reconfiguration) bit of PAR messages
>>>>>  in authentication and authorization phase so that the PaC proceeds
>>>>>  to IP address configuration.
>>>>> 
>>>>> ---------------------------------------------------------------------
>>>>> 
>>>>> (4) Page 6, Paragraph 7
>>>>> I don't think that the description about the size of the largest PANA
>>>>> is correct. This is because the initial PAR could have multiple
>>>>> Integrity-Algorithm AVPs and PRF-Algorithm AVPs. This specification is
>>>>> described in Section 4.1, RFC 5191.
>>>>> 
>>>>> [Section 4.1. in RFC 5191]
>>>>>   the PAA sends the initial PANA-Auth-Request carrying one or more
>>>>>   PRF-Algorithm AVPs and one or more Integrity-Algorithm AVPs for the
>>>>>   PRF and integrity algorithms supported by it, respectively.
>>>>> 
>>>>> In my understanding, it is sufficient to consider a PANA Message which
>>>>> has only one EAP-Payload AVP for "Message Size Considerations". In
>>>>> other words, the minimum PANA MTU size is equivalent to the size of a
>>>>> PANA message which has only one EAP-Payload AVP.
>>>>> 
>>>> 
>>>> 
>>>> We are trying to find the the size of the largest PANA message.
>>>> The largest PANA message is possibly not the very first PAR from the PAA 
>>>> (unlike the current draft states).
>>>> Such a PAR can be carrying a EAP-Request/Identity, hence not really be 
>>>> caring a minimum EAP MTU size.
>>>> A subsequent PAR can be carrying that (and it'd not have the 
>>>> Integrity-Algorithm, PRF-Algorithm, and Token AVPs).
>>>> 
>>>> Are you using the same reasoning for your above suggestion?
>>>> 
>>>> Alper
>>>> 
>>>> 
>>>> 
>>>>> ---------------------------------------------------------------------
>>>>> 
>>>>> 
>>>>> _______________________________________________
>>>>> Pana mailing list
>>>>> Pana@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/pana
>>>> 
>>> 
>> 
>> _______________________________________________
>> Pana mailing list
>> Pana@ietf.org
>> https://www.ietf.org/mailman/listinfo/pana
>> 
> 
> _______________________________________________
> Pana mailing list
> Pana@ietf.org
> https://www.ietf.org/mailman/listinfo/pana

_______________________________________________
Pana mailing list
Pana@ietf.org
https://www.ietf.org/mailman/listinfo/pana

Reply via email to