summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc2904.txt
diff options
context:
space:
mode:
authorThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
committerThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
commit4bfd864f10b68b71482b35c818559068ef8d5797 (patch)
treee3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc2904.txt
parentea76e11061bda059ae9f9ad130a9895cc85607db (diff)
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc2904.txt')
-rw-r--r--doc/rfc/rfc2904.txt1963
1 files changed, 1963 insertions, 0 deletions
diff --git a/doc/rfc/rfc2904.txt b/doc/rfc/rfc2904.txt
new file mode 100644
index 0000000..f57e5c2
--- /dev/null
+++ b/doc/rfc/rfc2904.txt
@@ -0,0 +1,1963 @@
+
+
+
+
+
+
+Network Working Group J. Vollbrecht
+Request for Comments: 2904 Interlink Networks, Inc.
+Category: Informational P. Calhoun
+ Sun Microsystems, Inc.
+ S. Farrell
+ Baltimore Technologies
+ L. Gommans
+ Enterasys Networks EMEA
+ G. Gross
+ Lucent Technologies
+ B. de Bruijn
+ Interpay Nederland B.V.
+ C. de Laat
+ Utrecht University
+ M. Holdrege
+ ipVerse
+ D. Spence
+ Interlink Networks, Inc.
+ August 2000
+
+
+ AAA Authorization Framework
+
+Status of this Memo
+
+ This memo provides information for the Internet community. It does
+ not specify an Internet standard of any kind. Distribution of this
+ memo is unlimited.
+
+Copyright Notice
+
+ Copyright (C) The Internet Society (2000). All Rights Reserved.
+
+Abstract
+
+ This memo serves as the base requirements for Authorization of
+ Internet Resources and Services (AIRS). It presents an architectural
+ framework for understanding the authorization of Internet resources
+ and services and derives requirements for authorization protocols.
+
+
+
+
+
+
+
+
+
+
+
+
+Vollbrecht, et al. Informational [Page 1]
+
+RFC 2904 AAA Authorization Framework August 2000
+
+
+Table of Contents
+
+ 1. Introduction ................................................ 2
+ 2. Authorization Entities and Trust Relationships .............. 4
+ 3. Message Sequences ........................................... 7
+ 3.1. Single Domain Case ..................................... 7
+ 3.1.1. The Agent Sequence .............................. 7
+ 3.1.2. The Pull Sequence ............................... 8
+ 3.1.3. The Push Sequence ............................... 9
+ 3.2. Roaming ................................................ 10
+ 3.3. Distributed Services ................................... 13
+ 3.4. Combining Roaming and Distributed Services ............. 15
+ 4. Relationship of Authorization and Policy .................... 16
+ 4.1. Policy Retrieval ....................................... 16
+ 4.2. Policy Evaluation ...................................... 17
+ 4.3. Policy Enforcement ..................................... 17
+ 4.4. Distributed Policy ..................................... 18
+ 5. Use of Attribute Certificates ............................... 19
+ 6. Resource Management ......................................... 22
+ 6.1. Session Management ..................................... 23
+ 6.2. The Resource Manager ................................... 24
+ 7. AAA Message Forwarding and Delivery ......................... 25
+ 8. End-to-End Security ......................................... 26
+ 9. Streamlined Authorization Process ........................... 27
+ 10. Summary of the Authorization Framework ..................... 28
+ 11. Security Considerations .................................... 28
+ Glossary ....................................................... 29
+ References ..................................................... 31
+ Authors' Addresses ............................................. 32
+ Full Copyright Statement ....................................... 35
+
+1. Introduction
+
+ This document is one of a series of three documents under
+ consideration by the AAAarch RG dealing with the authorization
+ requirements for AAA protocols. The three documents are:
+
+ AAA Authorization Framework (this document)
+ AAA Authorization Requirements [2]
+ AAA Authorization Application Examples [3]
+
+ There is a demonstrated need for a common scheme which covers all
+ Internet services which offer Authorization. This common scheme will
+ address various functional architectures which meet the requirements
+ of basic services. We attempt to describe these architectures and
+ functions as a basis for deriving requirements for an authorization
+ protocol [2].
+
+
+
+
+Vollbrecht, et al. Informational [Page 2]
+
+RFC 2904 AAA Authorization Framework August 2000
+
+
+ These architectures include Policy structures, Certificate
+ Authorities, Resource Managers, Inter-Domain and Multi-Domain
+ schemes, and Distributed Services. The requirements are for the
+ expected use of Authorization services across these architectures.
+
+ A representative set of applications that may use this architecture
+ to support their authorization needs is presented in [3]. The
+ examples in [3] show how this framework may be used to meet a wide
+ variety of different authorization needs.
+
+ We expect that this work may be extended in the future to a more
+ comprehensive model and that the scheme described here will be
+ incorporated into a framework that includes authentication,
+ accounting and auditing. We have referenced a number of
+ authorization sources, but also recognize that there may be some that
+ we have missed and that should be included. Please notify one of the
+ authors of any such oversight so it can be corrected in a future
+ revision.
+
+ In general, it is assumed that the parties who are participating in
+ the authorization process have already gone through an authentication
+ phase. The authentication method used by those parties is outside
+ the scope of this document except to the extent that it influences
+ the requirements found in a subsequent authorization process.
+ Likewise, accounting requirements are outside the scope of this
+ document other than recording accounting data or establishing trust
+ relationships during an authorization that will facilitate a
+ subsequent accounting phase.
+
+ The work for this memo was done by a group that originally was the
+ Authorization subgroup of the AAA Working Group of the IETF. When
+ the charter of the AAA working group was changed to focus on MobileIP
+ and NAS requirements, the AAAarch Research Group was chartered within
+ the IRTF to continue and expand the architectural work started by the
+ Authorization subgroup. This memo is one of four which were created
+ by the subgroup. This memo is a starting point for further work
+ within the AAAarch Research Group. It is still a work in progress
+ and is published so that the work will be available for the AAAarch
+ subgroup and others working in this area, not as a definitive
+ description of architecture or requirements.
+
+ This document uses the terms 'MUST', 'SHOULD' and 'MAY', and their
+ negatives, in the way described in RFC 2119 [4].
+
+
+
+
+
+
+
+
+Vollbrecht, et al. Informational [Page 3]
+
+RFC 2904 AAA Authorization Framework August 2000
+
+
+2. Authorization Entities and Trust Relationships
+
+ The following framework is being presented in order to provide a
+ framework for discussing authorization requirements for a large
+ number of applications. The intent is to provide some common
+ vocabulary for the discussion. Terminology is introduced for basic
+ elements in the authorization transaction and for concepts that
+ appear to be common to all (or at least many) authorization
+ proposals.
+
+ Figure 1, below, identifies the basic conceptual entities that may
+ be participants in an authorization:
+
+ 1. A User who wants access to a service or resource.
+
+ 2. A User Home Organization (UHO) that has an agreement with the user
+ and checks whether the user is allowed to obtain the requested
+ service or resource. This entity may carry information required
+ to authorize the User, which might not be known to the Service
+ Provider (such as a credit limit).
+
+ 3. A Service Provider's AAA Server which authorizes a service based
+ on an agreement with the User Home Organization without specific
+ knowledge about the individual User. This agreement may contain
+ elements that are not relevant to an individual user (e.g., the
+ total agreed bandwidth between the User Home Organization and the
+ Service Provider).
+
+ 4. A Service Provider's Service Equipment which provides the service
+ itself. This might, for example, be a NAS in dial service, or a
+ Router in the QoS service, or a print server in the Internet
+ Printing service.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Vollbrecht, et al. Informational [Page 4]
+
+RFC 2904 AAA Authorization Framework August 2000
+
+
+ +------+ +-------------------------+
+ | | | User Home Organization |
+ | | | +-------------------+ |
+ | | | | AAA Server | |
+ | | | | | |
+ | | | +-------------------+ |
+ | | | |
+ | | +-------------------------+
+ | |
+ | |
+ | |
+ | User | +-------------------------+
+ | | | Service Provider |
+ | | | +-------------------+ |
+ | | | | AAA Server | |
+ | | | | | |
+ | | | +-------------------+ |
+ | | | |
+ | | | +-------------------+ |
+ | | | | Service | |
+ | | | | Equipment | |
+ | | | +-------------------+ |
+ | | | |
+ +------+ +-------------------------+
+
+ Fig. 1 -- The Basic Authorization Entities
+
+ These entities will be referenced in the authorization requirements.
+
+ There may be bilateral agreements between pairs of organizations
+ involved in an authorization transaction. Agreements between
+ organizations may take the form of formal contracts or Service Level
+ Agreements. Figure 2 uses double lines to show relationships that
+ may exist between the User and the User Home Organization and between
+ the User Home Organization and the Service Provider.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Vollbrecht, et al. Informational [Page 5]
+
+RFC 2904 AAA Authorization Framework August 2000
+
+
+ +------+ +-------------------------+
+ | | | User Home Organization |
+ | |======| +-------------------+ |
+ | | | | AAA Server | |
+ | | | | | |
+ | | | +-------------------+ |
+ | | | |
+ | | +-------------------------+
+ | | ||
+ | | ||
+ | | ||
+ | User | +-------------------------+
+ | | | Service Provider |
+ | | | +-------------------+ |
+ | | | | AAA Server | |
+ | | | | | |
+ | | | +-------------------+ |
+ | | | |
+ | | | +-------------------+ |
+ | | | | Service | |
+ | | | | Equipment | |
+ | | | +-------------------+ |
+ | | | |
+ +------+ +-------------------------+
+
+ Fig. 2 -- Service Agreements
+
+ Authorization is based on these bilateral agreements between
+ entities. Agreements may be chained, as shown in figure 2. The User
+ has an agreement with the User Home Organization (e.g., the User may
+ have access to the service between 9:00 a.m. and 11:00 a.m. daily).
+ The User Home Organization has an agreement with the Service Provider
+ (e.g., that all requests for access will be granted, except between
+ 5:00 a.m. and 10:00 a.m. on Sunday). The fulfillment of the User's
+ request depends on both agreements being honored.
+
+ Note that these agreements may be implemented by hand configuration
+ or by evaluation of Policy data stored in a Policy database. The
+ point is that there must be a set of known rules in place between
+ entities in order for authorization transactions to be executed.
+
+ Trust is necessary to allow each entity to "know" that the policy it
+ is authorizing is correct. This is a business issue as well as a
+ protocol issue. Trust is often established through third party
+ authentication servers (such as Kerberos), via a certificate
+ authority, by configuring shared secrets or passwords, or by sharing
+ a common facility (such as a connecting wire between processors).
+ These "static" trust relationships are necessary for authorization
+
+
+
+Vollbrecht, et al. Informational [Page 6]
+
+RFC 2904 AAA Authorization Framework August 2000
+
+
+ transactions to take place. Static trust relationships are used in
+ an authorization sequence to establish a "dynamic" relationship
+ between the User and the Service Equipment. Several possible
+ authorization sequences are possible, each of which use the static
+ trust "chain" to have the user first be approved by the User Home
+ Organization, and then have the Service Provider accept the request
+ based on its trust of the User Home Organization.
+
+3. Message Sequences
+
+ In general, the User Home Organization and the Service Provider are
+ different entities or different "administrative domains". In the
+ simplest case, however, the User Home Organization and the Service
+ Provider may be combined as a single entity. This case will be used
+ to describe three authorization sequences possible with the simple
+ case.
+
+ In following sections these concepts will be applied to more
+ complicated cases involving separate User Home Organization and
+ Service Provider entities (as in roaming) and multiple Service
+ Providers each with their own AAA Servers and Service Equipment (as
+ in distributed services).
+
+3.1. Single Domain Case
+
+ This case includes the User, the Service Provider's AAA Server, and
+ the Service Provider's Service Equipment. Examples of this case
+ include a NAS supported by a standalone RADIUS server, or a QoS
+ Router supported by a local bandwidth broker.
+
+ The sequences considered in the following figures are the "agent",
+ "pull", and "push" sequences for the single domain case.
+
+3.1.1. The Agent Sequence
+
+ In the agent sequence (see figure 3), the Service Provider AAA Server
+ functions as an agent between the User and the service itself. The
+ AAA Server receives a request from the User and forwards
+ authorization and possibly configuration information to the Service
+ Equipment. In this model, the User sends a request to the Service
+ Provider's AAA Server (1), which will apply a policy associated with
+ the User and the particular service being requested. The AAA Server
+ sends a request to the Service Equipment, and the Service Equipment
+ sets up whatever is requested (2). The Service Equipment then
+ responds to the AAA Server acknowledging that it has set up the
+ Service for the user (3). The AAA Server replies to the User telling
+ it that the Service is set up (4).
+
+
+
+
+Vollbrecht, et al. Informational [Page 7]
+
+RFC 2904 AAA Authorization Framework August 2000
+
+
+ Depending on the nature of the service, further communication may
+ take place between the User and the Service Equipment. For this to
+ occur, there needs to be a binding between the User and the
+ authorized service. This requires further study.
+
+ +-------------------------+
+ +------+ | Service Provider |
+ | | 1 | +-------------------+ |
+ | |------+->| AAA Server | |
+ | |<-----+--| | |
+ | | 4 | +-------------------+ |
+ | User | | | /|\ |
+ | | | |2 |3 |
+ | | | \|/ | |
+ | | | +-------------------+ |
+ | | | | Service | |
+ | | | | Equipment | |
+ | | | +-------------------+ |
+ +------+ | |
+ +-------------------------+
+
+ Fig. 3 -- Agent Sequence
+
+ Example: A regular user may ask for 1 Mb/s bandwidth (1). The
+ bandwidth broker (AAA Server) tells the router (Service Equipment) to
+ set this user into the 1Mb/s "queue" (2). The router responds that
+ it has done so (3), and the bandwidth broker tells the User the
+ bandwidth is set up (4).
+
+3.1.2. The Pull Sequence
+
+ The pull sequence (figure 4) is what is typically used in the Dialin
+ application, in the Mobile-IP proposal, and in some QoS proposals.
+ The User sends a request to the Service Equipment (1), which forwards
+ it to the Service Provider's AAA Server (2), which evaluates the
+ request and returns an appropriate response to the Service Equipment
+ (3), which sets up the service and tells the User it is ready (4).
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Vollbrecht, et al. Informational [Page 8]
+
+RFC 2904 AAA Authorization Framework August 2000
+
+
+ +-------------------------+
+ +------+ | Service Provider |
+ | | | +-------------------+ |
+ | | | | AAA Server | |
+ | | | | | |
+ | | | +-------------------+ |
+ | User | | /|\ | |
+ | | | |2 |3 |
+ | | | | \|/ |
+ | | 1 | +-------------------+ |
+ | |------+->| Service | |
+ | |<-----+--| Equipment | |
+ | | 4 | +-------------------+ |
+ +------+ | |
+ +-------------------------+
+
+ Fig. 4 -- Pull Sequence
+
+3.1.3. The Push Sequence
+
+ The push sequence (figure 5) requires that the User get from the
+ Service Provider's AAA Server a ticket or certificate verifying that
+ it is o.k. for the User to have access to the service (1,2). The
+ User includes the ticket in the request (3) to the Service Equipment.
+ The Service Equipment uses the ticket to verify that the request is
+ approved by the Service Provider's AAA Server. The Service Equipment
+ then sends an o.k. to the User (4).
+
+ The ticket the user gets from the Service Provider's AAA Server will
+ typically have some time limit on it. It may contain an indication
+ of service location, and in some applications, it might be used for
+ more than one request.
+
+ In the push sequence the communication between the AAA Server and the
+ Service Equipment is relayed through the User rather than directly
+ between themselves.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Vollbrecht, et al. Informational [Page 9]
+
+RFC 2904 AAA Authorization Framework August 2000
+
+
+ +-------------------------+
+ +------+ | Service Provider |
+ | | 1 | +-------------------+ |
+ | |------+->| AAA Server | |
+ | |<-----+--| | |
+ | | 2 | +-------------------+ |
+ | User | | |
+ | | | |
+ | | | |
+ | | 3 | +-------------------+ |
+ | |------+->| Service | |
+ | |<-----+--| Equipment | |
+ | | 4 | +-------------------+ |
+ +------+ | |
+ +-------------------------+
+
+ Fig. 5 -- Push Sequence
+
+3.2. Roaming -- the User Home Organization is not the Service Provider
+
+ In many interesting situations, the organization that authorizes and
+ authenticates the User is different from the organization providing
+ the service. This situation has been explored in the Roaming
+ Operations (roamops) Working Group. For purposes of this discussion,
+ any situation in which the User Home Organization is different from
+ the Service Provider is considered to be roaming.
+
+ Examples of roaming include an ISP selling dialin ports to other
+ organizations or a Mobile-IP provider allowing access to a user from
+ another domain.
+
+ The same agent, pull and push sequences are possible with roaming.
+ If the Service Provider's AAA Server and the Service Equipment are
+ grouped as a logical entity for purposes of description, then the
+ following figures illustrate these cases.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Vollbrecht, et al. Informational [Page 10]
+
+RFC 2904 AAA Authorization Framework August 2000
+
+
+ +------+ +-------------------------+
+ | | 1 | User Home Organization |
+ | |----->| +-------------------+ |
+ | | | | AAA Server | |
+ | |<-----| | | |
+ | | 4 | +-------------------+ |
+ | | | |
+ | | +-------------------------+
+ | | | /|\
+ | | |2 |3
+ | | \|/ |
+ | User | +-------------------------+
+ | | | Service Provider |
+ | | | +-------------------+ |
+ | | | | AAA Server | |
+ | | | | | |
+ | | | +-------------------+ |
+ | | | |
+ | | | +-------------------+ |
+ | | | | Service | |
+ | | | | Equipment | |
+ | | | +-------------------+ |
+ | | | |
+ +------+ +-------------------------+
+
+ Fig. 6 -- Roaming Agent Sequence
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Vollbrecht, et al. Informational [Page 11]
+
+RFC 2904 AAA Authorization Framework August 2000
+
+
+ +------+ +-------------------------+
+ | | | User Home Organization |
+ | | | +-------------------+ |
+ | | | | AAA Server | |
+ | | | | | |
+ | | | +-------------------+ |
+ | | | |
+ | | +-------------------------+
+ | | /|\ |
+ | | |2 |3
+ | | | \|/
+ | | +-------------------------+
+ | | | Service Provider |
+ | User | | +-------------------+ |
+ | | | | AAA Server | |
+ | | 1 | | | |
+ | |----->| +-------------------+ |
+ | | | |
+ | |<-----| +-------------------+ |
+ | | 4 | | Service | |
+ | | | | Equipment | |
+ | | | +-------------------+ |
+ | | | |
+ +------+ +-------------------------+
+
+ Fig. 7 -- Roaming Pull Sequence
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Vollbrecht, et al. Informational [Page 12]
+
+RFC 2904 AAA Authorization Framework August 2000
+
+
+ +------+ +-------------------------+
+ | | 1 | User Home Organization |
+ | |----->| +-------------------+ |
+ | | | | AAA Server | |
+ | |<-----| | | |
+ | | 2 | +-------------------+ |
+ | | | |
+ | | +-------------------------+
+ | |
+ | |
+ | |
+ | User | +-------------------------+
+ | | | Service Provider |
+ | | | +-------------------+ |
+ | | | | AAA Server | |
+ | | 3 | | | |
+ | |----->| +-------------------+ |
+ | | | |
+ | |<-----| +-------------------+ |
+ | | 4 | | Service | |
+ | | | | Equipment | |
+ | | | +-------------------+ |
+ | | | |
+ +------+ +-------------------------+
+
+ Fig. 8 -- Roaming Push Sequence
+
+3.3. Distributed Services
+
+ To provide a complete service to a user, offerings from several
+ service providers may need to be combined. An example would be a
+ user who requires a QoS service for a session that crosses multiple
+ ISPs. Any service that is provided by more than one Service Provider
+ acting in concert is a distributed service. Figure 9 illustrates
+ distributed services.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Vollbrecht, et al. Informational [Page 13]
+
+RFC 2904 AAA Authorization Framework August 2000
+
+
+ +-------------------+ +-------------------+
+ +------+ | Org1 | | Org2 |
+ | | | +-------------+ | | +-------------+ |
+ | | | | AAA Server | | | | AAA Server | |
+ | | | | | | | | | |
+ | | | +-------------+ | | +-------------+ |
+ | User |======| |======| |
+ | | | +-------------+ | | +-------------+ |
+ | | | | Service | | | | Service | |
+ | | | | Equipment | | | | Equipment | |
+ | | | +-------------+ | | +-------------+ |
+ +------+ | | | |
+ +-------------------+ +-------------------+
+
+ Fig. 9 -- Distributed Services
+
+ The agreements between entities in figure 9 imply that the request
+ from the User will be authenticated and authorized by the first
+ organization, then forwarded to the second organization. Note that
+ the sequence between User and Org1 may be different than between Org1
+ and Org2. The first might use a pull sequence, and the second might
+ use an agent sequence. This example is illustrated in figure 10.
+
+ +-------------------+ +-------------------+
+ +------+ | Org1 | | Org2 |
+ | | | +-------------+ | 3 | +-------------+ |
+ | | | | AAA Server |--+------+->| AAA Server | |
+ | | | | |<-+------+--| | |
+ | | | +-------------+ | 6 | +-------------+ |
+ | User | | /|\ | | | | /|\ |
+ | | | |2 |7 | | |4 |5 |
+ | | | | \|/ | | \|/ | |
+ | | 1 | +-------------+ | | +-------------+ |
+ | |------+->| Service | | | | Service | |
+ | |<-----+--| Equipment | | | | Equipment | |
+ | | 8 | +-------------+ | | +-------------+ |
+ +------+ | | | |
+ +-------------------+ +-------------------+
+
+ Fig. 10 -- A Possible Distributed Sequence
+
+ There are a number of other ways that authorization sequences for
+ distributed services can be set up. For example, it is possible
+ that, in order to reduce delay time in setting up a session, Org1
+ could send a response to the user before receiving a verification
+ that Org2 has authorized the service. In that case Org1 would need
+ to be able to revoke the authorization sent earlier if Org2 does not
+ send the authorization in some amount of time.
+
+
+
+Vollbrecht, et al. Informational [Page 14]
+
+RFC 2904 AAA Authorization Framework August 2000
+
+
+3.4. Combining Roaming and Distributed Services
+
+ Figure 11 shows a combination of Roaming and Distributed Services.
+ Contract and trust relationships may be set up in number of ways,
+ depending on a variety of factors, especially the business model.
+
+ +------+ +-------------------+ +-------------------+
+ | | | User Home Org | | SuperOrg |
+ | | | +-------------+ | | +-------------+ |
+ | | | | AAA Server | | | | AAA Server | |
+ | | | | | | | | | |
+ | | | +-------------+ | | +-------------+ |
+ | | | | | |
+ | | +-------------------+ +-------------------+
+ | |
+ | |
+ | | +-------------------+ +-------------------+
+ | User | | Org1 | | Org2 |
+ | | | +-------------+ | | +-------------+ |
+ | | | | AAA Server | | | | AAA Server | |
+ | | | | | | | | | |
+ | | | +-------------+ | | +-------------+ |
+ | | | | | |
+ | | | +-------------+ | | +-------------+ |
+ | | | | Service | | | | Service | |
+ | | | | Equipment | | | | Equipment | |
+ | | | +-------------+ | | +-------------+ |
+ | | | | | |
+ +------+ +-------------------+ +-------------------+
+
+ Fig. 11 -- Roaming and Distributed Services
+
+ New entities that combine or add capabilities can be created to meet
+ business needs. In figure 11, one such possibility, a SuperOrg
+ entity is shown. The idea is that this entity would provide
+ authentication and authorization for organizations that are providing
+ services to end-users. It could be considered to be a wholesaler or
+ broker. While not all authorization will require having a broker,
+ authorization protocols should allow such entities to be created to
+ meet legitimate requirements.
+
+ Having considered the basic players and how they interact, we will
+ now consider different ways that authorization data may be stored in
+ the network.
+
+
+
+
+
+
+
+Vollbrecht, et al. Informational [Page 15]
+
+RFC 2904 AAA Authorization Framework August 2000
+
+
+4. Relationship of Authorization and Policy
+
+ The Policy Framework (policy) Working Group is seeking to provide a
+ framework to represent, manage, and share policies and policy
+ information in a vendor-independent, interoperable, scalable manner.
+ [5],[6],[7]. This section explores the relationship of policy and
+ authorization and sets the stage for defining protocol requirements
+ for supporting policy when included as part of multi-domain
+ authorization. The work presented here builds on the policy
+ framework, extending it to support policy across multiple domains.
+
+ One view of an authorization is that it is the result of evaluating
+ policies of each organization that has an interest in the
+ authorization decision. In this document the assumption is that each
+ administration may have policies which may be indexed by user, by
+ service, or by other attributes of the request. The policies of each
+ administration are defined independently of other administrations.
+
+ Each independent policy must be 1) retrieved, 2) evaluated, and 3)
+ enforced.
+
+4.1. Policy Retrieval
+
+ Policy definitions are maintained and stored in a policy repository
+ [5] by (or on behalf of) the organization that requires them. The
+ Policy Framework WG is working on a way to describe policy [7].
+ Other implementations describe policy as a set of ACL lists. Policy
+ definitions must be retrieved in order to be evaluated and enforced.
+ Policy Definitions can be indexed by requester, by service attribute,
+ or by some other key. The organization requiring the policy is also
+ responsible for determining which policy is to be applied to a
+ specific authorization request.
+
+ Policy retrieval is typically done by the administration that defines
+ the policy or by an agent acting for that administration. Thus a
+ policy defining the times of day that a particular User is allowed to
+ connect to the network is maintained and retrieved by the User
+ Organization. A policy defining a time that ports will be unusable
+ because of maintenance is maintained and retrieved by the Service
+ Provider.
+
+ Note that some implementation may choose to have the Service Provider
+ retrieve a policy from the User Home Organization using a distributed
+ directory access protocol. This may be appropriate in some cases,
+ but is not a general solution. To understand why, suppose the remote
+ administration and the home administration communicate via a broker
+ which proxies their communications. In this case the remote and home
+
+
+
+
+Vollbrecht, et al. Informational [Page 16]
+
+RFC 2904 AAA Authorization Framework August 2000
+
+
+ administrations have no prior relationship, and therefore the home
+ administration directory is unlikely to be open for access by the
+ remote administration and vice versa.
+
+4.2. Policy Evaluation
+
+ Evaluation of policy requires access to information referenced by the
+ policy. Often the information required is not available in the
+ administration where the policy is retrieved. For example, checking
+ that a user is allowed to login at the current time can readily be
+ done by the User Home Organization because the User Home Organization
+ has access to current time. But authorizing a user requiring a 2Mb/s
+ path with less than 4 hops requires information available at a
+ Service Provider and not directly available to the UHO, so the UHO
+ must either 1) have a way to query a remote administration for the
+ needed information or 2) forward the policy to the remote
+ administration and have the remote administration do the actual
+ evaluation or 3) attempt somehow to "shadow" the authoritative source
+ of the information (e.g by having the Service Provider send updates
+ to the UHO).
+
+ Applications might support either 1) or 2), and a general
+ authorization protocol must allow both. Case 3) is not considered
+ further as shadowing seems too "expensive" to be supported by an AAA
+ protocol.
+
+ An example of case 1 is when a Service Provider forwards a request to
+ a UHO which includes a query for the clearance code of the User. The
+ Service Provider policy includes reference to the clearance code and
+ the information in the reply is used as input to that policy.
+
+ An example of case 2 is when the UHO approves an authorization
+ conditional on the Service Provider confirming that there is
+ currently a specific resource available for its use. The UHO
+ includes the "policy" along with a conditional authorization to the
+ Service Provider.
+
+4.3. Policy Enforcement
+
+ Policy Enforcement is typically done by the Service Provider on the
+ Service Equipment. The Service Equipment is equivalent to the Policy
+ Target described in the Policy Framework [5]. Thus a NAS may enforce
+ destination IP address limits via "filters" and a Router may enforce
+ QoS restrictions on incoming packets. The protocol that sends the
+ information between the Service Equipment and the Service Provider
+ AAA Server may be specific to the Service Equipment, but it seems
+ that the requirements are not different in kind from what is required
+ between other AAA servers.
+
+
+
+Vollbrecht, et al. Informational [Page 17]
+
+RFC 2904 AAA Authorization Framework August 2000
+
+
+ In particular, an AAA Server could send a "policy" to the Service
+ Equipment stating what the equipment should do under various
+ situations. The Service equipment should either set up to "enforce"
+ the policy or reject the request.
+
+ The AAA Server could also send a query to the Service Equipment for
+ information it requires to evaluate a policy.
+
+4.4. Distributed Policy
+
+ A policy is retrieved by a Policy Retrieval Point (PRP) from a Policy
+ Repository, evaluated at a Policy Decision Point (PDP) or Policy
+ Consumer, and enforced at a Policy Enforcement Point (PEP) or Policy
+ Target [5].
+
+ Generally, any of the AAA Servers involved in an authorization
+ transaction may retrieve a policy or evaluate a policy, and any of
+ the Service Equipment may enforce a policy. Policy Repositories may
+ reside on any of the AAA Servers or be located elsewhere in the
+ network.
+
+ Information against which policy conditions are evaluated (such as
+ resource status, session state, or time of day) are accessible at
+ Policy Information Points (PIPs) and might be accessed using Policy
+ Information Blocks (PIBs). An interesting question in any
+ authorization application that uses policy is where are the PDPs,
+ PRPs, PIPs and PEPs?
+
+ Figure 12 shows which policy elements may be available at different
+ points in the model. In distributed services, there may be multiple
+ Service Providers involved in the authorization transaction, and each
+ may act as the policy elements shown below.
+
+ Note that the User (or requester) may also be a PRP (e.g. use policy
+ description to specify what service is being requested), a PIP (have
+ information needed by other entities to evaluate their policy), and a
+ PDP (decide if it will accept a service with specific parameters).
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Vollbrecht, et al. Informational [Page 18]
+
+RFC 2904 AAA Authorization Framework August 2000
+
+
+ +------+ +------------------------------+
+ | | | User Home Organization |
+ | | | +-------------------+ PRP |
+ | | | | AAA Server | PIP |
+ | | | | | PDP |
+ | | | +-------------------+ |
+ | | | |
+ | | +------------------------------+
+ | |
+ | |
+ | | +------------------------------+
+ | User | | Service Provider |
+ | | | +-------------------+ PRP |
+ | PRP | | | AAA Server | PIP |
+ | PIP | | | | PDP |
+ | PDP | | +-------------------+ |
+ | | | |
+ | | | +-------------------+ |
+ | | | | Service | PIP |
+ | | | | Equipment | PEP |
+ | | | +-------------------+ |
+ | | | |
+ +------+ +------------------------------+
+
+ PRP = Policy Retrieval Point
+ PIP = Policy Information Point
+ PDP = Policy Decision Point
+ PEP = Policy Enforcement Point
+
+ Fig. 12 -- Where Different Policy Elements May be Located
+
+ An AAA protocol must be able to transport both policy definitions and
+ the information needed to evaluate policies. It must also support
+ queries for policy information.
+
+5. Use of Attribute Certificates to Store Authorization Data
+
+ This section outlines another mechanism that could be used for
+ securely transporting the attributes on which an authorization
+ decision is to be made. Work on X.509 Attribute Certificates is
+ currently being undertaken in the Public Key Infrastructure (PKIX)
+ Working Group [8]. This proposal is largely based on that work.
+
+ When considering authorization using certificate-based mechanisms,
+ one is often less interested in the identity of the entity than in
+ some other attributes, (e.g. roles, account limits etc.), which
+ should be used to make an authorization decision.
+
+
+
+
+Vollbrecht, et al. Informational [Page 19]
+
+RFC 2904 AAA Authorization Framework August 2000
+
+
+ In many such cases, it is better to separate this information from
+ the identity for management, security, interoperability or other
+ reasons. However, this authorization information may also need to be
+ protected in a fashion similar to a public key certificate. The name
+ used here for such a structure is an Attribute Certificate (AC) which
+ is a digitally signed (certified) set of attributes.
+
+ An AC is a structure that is similar to an X.509 public key
+ certificate [9] with the main difference being that it contains no
+ public key. The AC typically contains group membership, role,
+ clearance and other access control information associated with the AC
+ owner. A syntax for ACs is also defined in the X.509 standard.
+
+ When making an access decision based on an AC, an access decision
+ function (in a PEP, PDP or elsewhere) may need to ensure that the
+ appropriate AC owner is the entity that has requested access. The
+ linkage between the request and the AC can be achieved if the AC has
+ a "pointer" to a Public Key Certificate (PKC) for the requester and
+ that the PKC has been used to authenticate the request. Other forms
+ of linkage can be defined which work with other authentication
+ schemes.
+
+ As there is often confusion about the difference between public key
+ certificates (PKC's) and attribute certificates (ACs), an analogy may
+ help. A PKC can be considered to be like a passport: it identifies
+ the owner, it tends to be valid for a long period, it is difficult to
+ forge, and it has a strong authentication process to establish the
+ owner's identity. An AC is more like an entry visa in that it is
+ typically issued by a different authority than the passport issuing
+ authority, and it doesn't have as long a validity period as a
+ passport. Acquiring an entry visa typically requires presenting a
+ passport that authenticates that owner's identity. As a consequence,
+ acquiring the entry visa becomes a simpler procedure. The entry visa
+ will refer to the passport as a part of how that visa specifies the
+ terms under which the passport owner is authorized to enter a
+ country.
+
+ In conjunction with authentication services, ACs provide a means to
+ transport authorization information securely to applications.
+ However, there are a number of possible communication paths that an
+ AC may take.
+
+ In some environments, it is suitable for a client to "push" an AC to
+ a server. This means that no new connections between the client and
+ server domains are required. It also means that no search burden is
+ imposed on servers, which improves performance.
+
+
+
+
+
+Vollbrecht, et al. Informational [Page 20]
+
+RFC 2904 AAA Authorization Framework August 2000
+
+
+ In other cases, it is more suitable for a client simply to
+ authenticate to the server and for the server to request the client's
+ AC from an AC issuer or a repository. A major benefit of the this
+ model is that it can be implemented without changes to the client and
+ client/server protocol. It is also more suitable for some inter-
+ domain cases where the client's rights should be assigned within the
+ server's domain, rather than within the client's "home" domain.
+
+ There are a number of possible exchanges that can occur, and there
+ are three entities involved: client, server, and AC issuer. In
+ addition the use of a directory service as a repository for AC
+ retrieval may be supported.
+
+ Figure 13 shows an abstract view of the exchanges that may involve
+ ACs. Note that the lines in the diagram represent protocols which
+ must be defined, not data flows. The PKIX working group will define
+ the required acquisition protocols. One candidate for the lookup
+ protocols is LDAP (once an LDAP schema exists which states where an
+ AC is to be found).
+
+ +--------------+ +---------------+
+ | AAA Server/ | | |
+ | AC Issuer +----+ | Directory |
+ | | | | |
+ +--+-----------+ | Server +-------+-------+
+ | | Acquisition |
+ |Client | |Server
+ |Acquisition +----------------------+ |Lookup
+ | | |
+ +--+-----------+ +--+----+-------+
+ | | AC in application | Service |
+ | User +------------------------+ Equipment/ |
+ | | protocol | AAA Server |
+ +--+-----------+ +---------------+
+ |
+ | Client Lookup
+ +--+-----------+
+ | |
+ | Directory |
+ | |
+ +--------------+
+
+ Fig. 13 -- AC Exchanges
+
+
+
+
+
+
+
+
+Vollbrecht, et al. Informational [Page 21]
+
+RFC 2904 AAA Authorization Framework August 2000
+
+
+ Figure 14 shows the data flows which may occur in one particular
+ case, that termed "push" above (section 2.1.3).
+
+ +--------------+
+ | AAA Server/ |
+ | AC Issuer |
+ | |
+ +--+-----------+
+ |
+ |Client
+ |Acquisition (1)
+ |
+ +--+-----------+ +---------------+
+ | | AC in application | Service |
+ | User +------------------------+ Equipment/ |
+ | | protocol (2) | AAA Server |
+ +--------------+ +---------------+
+
+ Fig. 14 -- One example of an AC exchange
+
+ In the diagram, the user first contacts the AC Issuer and then
+ incorporates the AC into the application protocol. The Service
+ Equipment must then validate the AC and use it as the basis for the
+ access decision (this functionality may be distributed between a PEP
+ and PDP).
+
+6. Resource Management
+
+ Authorization requests may be chained through a set of servers, as
+ described in previous sections. Each of the servers may have a
+ contractual relationship with servers on either side of it in the
+ chain. In many of the applications being considered, the
+ authorization results in establishing of an ongoing service which we
+ call a session. Each of the servers involved in the authorization
+ may also want to keep track of the state of the session, and be able
+ to effect changes to the session if required. To make it simple to
+ discuss this capability, we assume that each AAA Server MAY have a
+ Resource Manager component. Resource Managers tracking the same
+ session need to be able to initiate changes to the session, and to
+ inform other Resource Managers when changes occur. Communication
+ between Resource Managers creates requirements for an authorization
+ protocol.
+
+ An example of the use of resource management might be a user which
+ sets up a QoS path through two ISPs, and while this path is active,
+ one of the ISPs gets a request for more bandwidth from a higher
+ priority user. The ISP may need to take some bandwidth from a the
+ lower priority user's previously allocated session and give it to the
+
+
+
+Vollbrecht, et al. Informational [Page 22]
+
+RFC 2904 AAA Authorization Framework August 2000
+
+
+ new request. To do this, each of the administrations in the
+ authorization path must be informed and agree to the change (this
+ could be considered to be "authorizing the new value").
+
+6.1. Session Management and State Synchronization
+
+ When an AAA Server grants authorization of some resource to an AAA
+ requester (either a User or another AAA Server), the server may need
+ to maintain session state information. This is used to make
+ decisions about new sessions based on the state of current sessions,
+ and to allow monitoring of sessions by all interested AAA Servers.
+
+ Each session is identified by a session identifier, which must be
+ unique within each AAA Server. Communication between AAA Servers
+ must include the session identifier. It is desirable that the
+ session identifier is the same across all AAA servers, otherwise each
+ server will have to map identifiers from other servers to its own
+ identifiers. A single session identifier significantly simplifies
+ auditing and session control functions.
+
+ Maintaining session state across AAA administrative boundaries
+ increases the complexity of the problem, especially if each AAA
+ Server in the trust chain must keep state as well. This can be
+ viewed as an interdomain database replication problem. The protocol
+ must include tools to help manage replicated state. Some of the
+ problems to be addressed are:
+
+ a) Service Equipment must be able to notify its Resource Manager when
+ a session terminates or changes state in some other way. The
+ Resource Manager must inform other Resource Managers which keep
+ state for this session.
+
+ b) The Resource Manager will need to set a time limit for each
+ session which must be refreshed by having the Resource Manager
+ query for authoritative status or by having the authoritative
+ source send periodic keep alive messages that are forwarded to all
+ Resource Managers in the authorization chain. Determining the
+ appropriate session lifetime may be application specific and
+ depends on the acceptable level of risk. If the service being
+ offered is billed based on time, the session lifetime may need to
+ be relatively small; if the service is billed on usage, the
+ lifetime may be relatively large.
+
+ c) Any Resource Manager in the chain must have the ability to
+ terminate a session. This requires the Resource Manager to have
+ knowledge of at least the adjacent AAA Servers in the
+ authorization chain.
+
+
+
+
+Vollbrecht, et al. Informational [Page 23]
+
+RFC 2904 AAA Authorization Framework August 2000
+
+
+ An example of how resource management can be used is in the PPP
+ dialin application. A home ISP may wish to restrict the number of
+ concurrent sessions that a user can have at any given time. This is
+ particularly important when service providers give all-you-can-eat
+ Internet access. The possibility for fraud is quite large, since a
+ user could provide his or her username/password to many people,
+ causing a loss of revenue. Resource management would allow the home
+ ISP AAA server to identify when a user is active and to reject any
+ authorization request for the user until termination indication is
+ received from the NAS or until the session expires.
+
+6.2. The Resource Manager
+
+ This section describes the functions of the Resource Manager in more
+ detail.
+
+ The Resource Manager is the component which tracks the state of
+ sessions associated with an AAA Server or Service Equipment. It also
+ may allocate resources to a session (e.g. IP addresses) and may track
+ use of resources allocated by peer resource managers to a session
+ (e.g. bandwidth in a foreign administrative domain). The resource
+ manager also provides interfaces to allow the User to acquire or
+ release authorized sessions.
+
+ The Resource Manager maintains all session specific AAA state
+ information required by the AAA Server. That state information may
+ include pointers to peer Resource Managers in other administrative
+ domains that possess additional AAA state information that refers to
+ the same session. The Resource Manager is the anchor point in the
+ AAA Server from which a session can be controlled, monitored, and
+ coordinated even if that session is consuming network resources or
+ services across multiple Service Provider administrative domains.
+
+ The Resource Manager has several important functions:
+
+ a) It allows a Service Provider operations staff to inspect the
+ status of any of the allocated resources and services including
+ resources that span foreign Service Provider administrative
+ boundaries. The peer Resource Managers will cooperatively share
+ only the state information subset that is required to assist in
+ diagnosing cross-domain trouble tickets. The network operator may
+ also modify or altogether cancel one of the User's active
+ authorizations.
+
+ b) It is the process contacted by other Resource Managers to inform
+ the AAA Server that a specific session has been cancelled. This
+ information is relayed to the other peer Resource Managers that
+ also know about that session and hence must cancel it.
+
+
+
+Vollbrecht, et al. Informational [Page 24]
+
+RFC 2904 AAA Authorization Framework August 2000
+
+
+ c) The Resource Manager conceals the identity and location of its
+ private internal AAA components from other administrative domains
+ and from the User, while at the same time facilitating cooperation
+ between those domains.
+
+ d) The Resource Manager cooperates with "policy servers" or Policy
+ Decision Points (PDPs). The Resource Manager maintains internal
+ state information, possibly complex cross-administrative domain
+ information, supported by dialogues with its peer Resource
+ Managers. A policy server can use the state information when
+ evaluating a particular policy.
+
+ e) The separation of the Resource Manager and the policy server into
+ two distinct architectural components allows a single session to
+ span multiple administrative domains, where each administrative
+ domain has one or more policy server cooperating with its Resource
+ Manager.
+
+ AAA resource managers will normally use the same trust relationships
+ needed for authorization sequences. It is possible for independent
+ relationships to be established, but that is discouraged.
+
+7. AAA Message Forwarding and Delivery
+
+ An AAA Server is responsible for securely forwarding AAA messages to
+ the correct destination system or process in the AAA infrastructure.
+ Two well known examples are forwarding AAA messages for a roaming AAA
+ service, and forwarding AAA messages for a distributed AAA service.
+ The same principle can also be applied to intra-domain
+ communications. The message forwarding is done in one of two modes.
+
+ The first mode is when an AAA server needs to forward a message to a
+ peer AAA server that has a known "logical destination address" that
+ must be resolved by an application-specific procedure into its actual
+ network address. Typically the forwarding procedure indexes into a
+ database by an application-specific identifier to discover the peer's
+ network address. For example, in the roaming dialin application, the
+ application-specific identifier may be an NAI. A bandwidth brokerage
+ application would use other search indices unique to its problem
+ domain to select the addressed peer AAA server. After the address
+ resolution procedure has completed successfully, then the AAA server
+ transmits the message to its peer over the connection associated with
+ that destination network address.
+
+ The second mode is when the AAA server already has an established
+ session representing an authorization. The session's state contains
+ the addressing and context used to direct the message to its
+ destination peer AAA server, PDP, PEP, or User. The message is sent
+
+
+
+Vollbrecht, et al. Informational [Page 25]
+
+RFC 2904 AAA Authorization Framework August 2000
+
+
+ over the AAA server's connection to that destination peer,
+ multiplexed with other session's messages. The message must be
+ qualified by a session identifier that is understood by both end
+ points. The AAA message's destination may be either intra-
+ administrative domain, or inter-administrative domain. In the former
+ case, the destination process may reside on the same system as the
+ AAA server.
+
+ In addition to the above message forwarding processing, the
+ underlying message delivery service must meet the following
+ requirements:
+
+ - Unicast capability -- An end system can send a message to any
+ other end system with minimal latency of session setup/disconnect
+ overhead messages, and no end system overhead of keeping state
+ information about every potential peer.
+
+ - Data integrity and error detection -- This data transport protocol
+ assumes an underlying datagram network layer service that includes
+ packet discard on error detection, and data integrity protection
+ against third party modifications.
+
+ - Reliable data transport assurance -- When an end system
+ successfully receives a message marked receipt requested, it must
+ acknowledge that message to the sending system by either
+ piggybacking the acknowledgement on an application-specific reply
+ message, or else as a standalone acknowledgement message. The
+ sending system maintains a retry timer; when the timer expires,
+ the sending system retransmits a copy of its original message. It
+ gives up after a configurable number of unsuccessful retries.
+
+ - Sequenced data delivery -- If multiple messages are sent between a
+ pair of end systems, those messages are delivered to the addressed
+ application in the same order as they were transmitted.
+ Duplicates are silently suppressed.
+
+ - Responsive to network congestion feedback -- When the network
+ enters into congestion, the end systems must detect that
+ condition, and they must back off their transmission rate until
+ the congestion subsides. The back off and recovery algorithms
+ must avoid oscillations.
+
+8. End-to-End Security
+
+ When AAA servers communicate through intermediate AAA servers, such
+ as brokers, it may be necessary that a part of the payload be secure
+ between the originator and the target AAA server. The security
+ requirement may consist of one or more of the following: end-to-end
+
+
+
+Vollbrecht, et al. Informational [Page 26]
+
+RFC 2904 AAA Authorization Framework August 2000
+
+
+ message integrity, confidentiality, replay protection, and
+ nonrepudiation. Furthermore, it is a requirement that intermediate
+ AAA servers be able to append information such as local policy to a
+ message before forwarding the message to its intended destination.
+ It may also be required that an intermediate AAA Server sign such
+ appended information.
+
+ This requirement has been clearly documented in [10], which describes
+ many current weaknesses of the RADIUS protocol [11] in roaming
+ networks since RADIUS does not provide such functionality. One
+ well-known attack is the ability for the intermediate nodes to modify
+ critical accounting information, such as a session time.
+
+ Most popular security protocols (e.g. IPSec, SSL, etc.) do not
+ provide the ability to secure a portion of the payload. Therefore, it
+ may be necessary for the AAA protocol to implement its own security
+ extensions to provide end-to-end security.
+
+9. Streamlined Authorization Process
+
+ The techniques described above allow for great flexibility in
+ distributing the components required for authentication and
+ authorization. However, working groups such as Roamops and MobileIP
+ have identified requirements to minimize Internet traversals in order
+ to reduce latency. To support these requirements, data fields
+ necessary for both authentication and authorization SHOULD be able to
+ be carried in a single message set. This is especially important
+ when there are intermediate servers (such as Brokers) in the AAA
+ chain.
+
+ Furthermore, it should be possible for the Brokers to allow end-to-
+ end (direct) authentication and authorization. This can be done as
+ follows. The User Home Organization generates a ticket which is
+ signed using the UHO's private key. The ticket is carried in the
+ accounting messages. The accounting messages must flow through the
+ Broker since the Broker is acting as the settlement agent and
+ requires this information. There are Brokers that will require to be
+ in the authentication and authorization path as well since they will
+ use this information to detect fraudulent activity, so the above
+ should be optional.
+
+ In order for end-to-end authentication and authorization to occur, it
+ may be necessary for the Broker to act as a certificate authority.
+ All members of the roaming consortium would be able to trust each
+ other (to an extent) using the certificates. A Service Provider's
+ AAA server that sends a request to the Broker should be able to
+ receive a redirect message which would allow the two peers (Service
+ Provider and UHO) to interact directly. The redirect message from
+
+
+
+Vollbrecht, et al. Informational [Page 27]
+
+RFC 2904 AAA Authorization Framework August 2000
+
+
+ the Broker should include the UHO's certificate, which eliminates the
+ Service Provider from accessing the certificate archive. The request
+ from the Service Provider could include its own certificate, and a
+ token from the Broker's redirect message that is timestamped and
+ guarantees that the Service Provider is in good standing with the
+ Broker. This eliminates the home domain from accessing the
+ Certificate Revocation List (CRL).
+
+10. Summary of the Authorization Framework
+
+ The above has introduced the basic players in an authorization
+ transaction as User, User Home Organization, Service Provider's AAA
+ Server, and Service Equipment. It has discussed relationships
+ between entities based on agreements or contracts, and on "trust".
+ Examples of authorization sequences have been given.
+
+ Concepts of roaming and distributed services have been briefly
+ described. Combination of roaming and distributed services was also
+ considered and the concept of a "wholesaler" or Broker was
+ introduced. We have considered the use of policies and attribute
+ certificates to store and transmit authorization data. We discussed
+ the problem of managing the resources to which access has been
+ authorized including the problem of tracking state information for
+ session-oriented services, and we defined the Resource Manager
+ component of a AAA Server. We considered the problem of forwarding
+ AAA messages among servers in possibly different administrative
+ domains. We considered the need for end-to-end security of portions
+ of the payload of authorization messages that pass through
+ intermediate AAA Servers. Finally we stressed the need for support
+ of a streamlined authorization process that minimizes delay for
+ latency-sensitive applications.
+
+ The intent is that this will provide support for discussing and
+ understanding requirements of specific applications that need
+ authorization services.
+
+11. Security Considerations
+
+ Authorization is itself a security mechanism. As such, it is
+ important that authorization protocols cannot easily be abused to
+ circumvent the protection they are intended to ensure. It is the
+ responsibility of protocol designers to design their protocols to be
+ resilient against well-known types of attacks. The following are
+ some considerations that may guide protocol designers in the
+ development of authorization protocols.
+
+
+
+
+
+
+Vollbrecht, et al. Informational [Page 28]
+
+RFC 2904 AAA Authorization Framework August 2000
+
+
+ Authorization protocols must not be susceptible to replay attacks.
+ If authentication data is carried with the authorization data, for
+ example, the authentication protocol used must either be impervious
+ to replay or else the confidentiality of the authentication data must
+ be protected.
+
+ If proxying is required, the authorization protocol must not be
+ susceptible to man-in-the-middle attacks.
+
+ If the push model is used, the confidentiality of the authorization
+ data must be ensured so that it may not be hijacked by third parties
+ and used to obtain a service fraudulently.
+
+ If the agent model is used, the binding between the authorization and
+ the service itself must be protected to prevent service authorized to
+ one party from being fraudulently received by another.
+
+ In addition to guarding against circumvention, authorization
+ protocols designed according to this framework will have some
+ intrinsic security requirements. These are included among the
+ requirements in [2] and summarized briefly below.
+
+ Among the intrinsic security needs is the fact that authorization
+ protocols may carry sensitive information. It is necessary to
+ protect such information from disclosure to unauthorized parties
+ including (as discussed in section 8) even certain parties involved
+ in the authorization decision.
+
+ We have discussed the use of multi-party trust chains involving
+ relaying of authorization data through brokers or other parties. In
+ such cases, the integrity of the chain must be maintained. It may be
+ necessary to protect the data exchanged between parties using such
+ mechanisms as encryption and digital signatures.
+
+ Finally, because authorization will be necessary to gain access to
+ many Internet services, a denial of service attack against an
+ authorization server can be just as effective as a denial of service
+ attack against the service equipment itself in preventing access to
+ Internet services.
+
+Glossary
+
+ Attribute Certificate -- structure containing authorization
+ attributes which is digitally signed using public key
+ cryptography.
+
+
+
+
+
+
+Vollbrecht, et al. Informational [Page 29]
+
+RFC 2904 AAA Authorization Framework August 2000
+
+
+ Contract Relationship -- a relation established between two or more
+ business entities where terms and conditions determine the
+ exchange of goods or services.
+
+ Distributed Service -- a service that is provided by more than one
+ Service Provider acting in concert.
+
+ Dynamic Trust Relationship -- a secure relationship which is
+ dynamically created between two entities who may never have had
+ any prior relationship. This relationship can be created if the
+ involved entities have a mutually trusted third party. Example: A
+ merchant trusts a cardholder at the time of a payment transaction
+ because they both are known by a credit card organization.
+
+ Policy Decision Point (PDP) -- The point where policy decisions are
+ made.
+
+ Policy Enforcement Point (PEP) -- The point where the policy
+ decisions are actually enforced.
+
+ Resource Manager -- the component of an AAA Server which tracks the
+ state of sessions associated with the AAA Server or its associated
+ Service Equipment and provides an anchor point from which a
+ session can be controlled, monitored, and coordinated.
+
+ Roaming -- An authorization transaction in which the Service Provider
+ and the User Home Organization are two different organizations.
+ (Note that the dialin application is one for which roaming has
+ been actively considered, but this definition encompasses other
+ applications as well.)
+
+ Security Association -- a collection of security contexts, between a
+ pair of nodes, which may be applied to protocol messages exchanged
+ between them. Each context indicates an authentication algorithm
+ and mode, a secret (a shared key, or appropriate public/private
+ key pair), and a style of replay protection in use. [12]
+
+ Service Equipment -- the equipment which provides a service.
+
+ Service Provider -- an organization which provides a service.
+
+ Static Trust Relationship -- a pre-established secure relationship
+ between two entities created by a trusted party. This
+ relationship facilitates the exchange of AAA messages with a
+ certain level of security and traceability. Example: A network
+ operator (trusted party) who has access to the wiring closet
+
+
+
+
+
+Vollbrecht, et al. Informational [Page 30]
+
+RFC 2904 AAA Authorization Framework August 2000
+
+
+ creates a connection between a user's wall outlet and a particular
+ network port. The user is thereafter trusted -- to a certain
+ level -- to be connected to this particular network port.
+
+ User -- the entity seeking authorization to use a resource or a
+ service.
+
+ User Home Organization (UHO) -- An organization with whom the User
+ has a contractual relationship which can authenticate the User and
+ may be able to authorize access to resources or services.
+
+References
+
+ [1] Bradner, S., "The Internet Standards Process -- Revision 3", BCP
+ 9, RFC 2026, October 1996.
+
+ [2] Farrell, S., Vollbrecht, J., Calhoun, P., Gommans, L., Gross,
+ G., de Bruijn, B., de Laat, C., Holdrege, M. and D. Spence, "AAA
+ Authorization Requirements", RFC 2906, August 2000.
+
+ [3] Vollbrecht, J., Calhoun, P., Farrell, S., Gommans, L., Gross,
+ G., de Bruijn, B., de Laat, C., Holdrege, M. and D. Spence, "AAA
+ Authorization Application Examples", RFC 2905, August 2000.
+
+ [4] Bradner, S., "Key words for use in RFCs to Indicate Requirement
+ Levels", BCP 14, RFC 2119, March 1997.
+
+ [5] Stevens, M., "Policy Framework", Work in Progress.
+
+ [6] Strassner, John, Ed Ellesson, and Bob Moore, "Policy Core
+ Information Model -- Version 1 Specification", Work in Progress.
+
+ [7] Strassner, John, et al, "Policy Framework LDAP Core Schema",
+ Work in Progress.
+
+ [8] Farrell, Stephen and Russell Housley, "An Internet Attribute
+ Certificate Profile for Authorization", Work in Progress.
+
+ [9] Housley, R., Ford, W., Polk, W. and D. Solo, "Internet X.509
+ Public Key Infrastructure -- Certificate and CRL Profile", RFC
+ 2459, January 1999.
+
+ [10] Aboba, B. and J. Vollbrecht, "Proxy Chaining and Policy
+ Implementation in Roaming", RFC 2607, June 1999.
+
+ [11] Rigney, C., Rubens, A., Simpson, W. and S. Willens, "Remote
+ Authentication Dial In User Service (RADIUS)", RFC 2138, April
+ 1997.
+
+
+
+Vollbrecht, et al. Informational [Page 31]
+
+RFC 2904 AAA Authorization Framework August 2000
+
+
+ [12] Perkins, C., "IP Mobility Support", RFC 2002, October 1996.
+
+ [13] Yavatkar, R., Pendarakis, D. and R. Guerin, "A Framework for
+ Policy-based Admission Control", RFC 2753, January 2000.
+
+Authors' Addresses
+
+ John R. Vollbrecht
+ Interlink Networks, Inc.
+ 775 Technology Drive, Suite 200
+ Ann Arbor, MI 48108
+ USA
+
+ Phone: +1 734 821 1205
+ Fax: +1 734 821 1235
+ Mail: jrv@interlinknetworks.com
+
+
+ Pat R. Calhoun
+ Network and Security Research Center, Sun Labs
+ Sun Microsystems, Inc.
+ 15 Network Circle
+ Menlo Park, California, 94025
+ USA
+
+ Phone: +1 650 786 7733
+ Fax: +1 650 786 6445
+ EMail: pcalhoun@eng.sun.com
+
+
+ Stephen Farrell
+ Baltimore Technologies
+ 61 Fitzwilliam Lane
+ Dublin 2
+ Ireland
+
+ Phone: +353 1 647 7406
+ Fax: +353 1 647 7499
+ EMail: stephen.farrell@baltimore.ie
+
+
+
+
+
+
+
+
+
+
+
+
+Vollbrecht, et al. Informational [Page 32]
+
+RFC 2904 AAA Authorization Framework August 2000
+
+
+ Leon Gommans
+ Enterasys Networks EMEA
+ Kerkplein 24
+ 2841 XM Moordrecht
+ The Netherlands
+
+ Phone: +31 182 379279
+ email: gommans@cabletron.com
+ or at University of Utrecht:
+ l.h.m.gommans@phys.uu.nl
+
+
+ George M. Gross
+ Lucent Technologies
+ 184 Liberty Corner Road, m.s. LC2N-D13
+ Warren, NJ 07059
+ USA
+
+ Phone: +1 908 580 4589
+ Fax: +1 908-580-4991
+ Email: gmgross@lucent.com
+
+
+ Betty de Bruijn
+ Interpay Nederland B.V.
+ Eendrachtlaan 315
+ 3526 LB Utrecht
+ The Netherlands
+
+ Phone: +31 30 2835104
+ EMail: betty@euronet.nl
+
+
+ Cees T.A.M. de Laat
+ Physics and Astronomy dept.
+ Utrecht University
+ Pincetonplein 5,
+ 3584CC Utrecht
+ Netherlands
+
+ Phone: +31 30 2534585
+ Phone: +31 30 2537555
+ EMail: delaat@phys.uu.nl
+
+
+
+
+
+
+
+
+Vollbrecht, et al. Informational [Page 33]
+
+RFC 2904 AAA Authorization Framework August 2000
+
+
+ Matt Holdrege
+ ipVerse
+ 223 Ximeno Ave.
+ Long Beach, CA 90803
+
+ EMail: matt@ipverse.com
+
+
+ David W. Spence
+ Interlink Networks, Inc.
+ 775 Technology Drive, Suite 200
+ Ann Arbor, MI 48108
+ USA
+
+ Phone: +1 734 821 1203
+ Fax: +1 734 821 1235
+ EMail: dspence@interlinknetworks.com
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Vollbrecht, et al. Informational [Page 34]
+
+RFC 2904 AAA Authorization Framework August 2000
+
+
+Full Copyright Statement
+
+ Copyright (C) The Internet Society (2000). All Rights Reserved.
+
+ This document and translations of it may be copied and furnished to
+ others, and derivative works that comment on or otherwise explain it
+ or assist in its implementation may be prepared, copied, published
+ and distributed, in whole or in part, without restriction of any
+ kind, provided that the above copyright notice and this paragraph are
+ included on all such copies and derivative works. However, this
+ document itself may not be modified in any way, such as by removing
+ the copyright notice or references to the Internet Society or other
+ Internet organizations, except as needed for the purpose of
+ developing Internet standards in which case the procedures for
+ copyrights defined in the Internet Standards process must be
+ followed, or as required to translate it into languages other than
+ English.
+
+ The limited permissions granted above are perpetual and will not be
+ revoked by the Internet Society or its successors or assigns.
+
+ This document and the information contained herein is provided on an
+ "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
+ TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
+ BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
+ HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
+ MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
+
+Acknowledgement
+
+ Funding for the RFC Editor function is currently provided by the
+ Internet Society.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Vollbrecht, et al. Informational [Page 35]
+