diff options
Diffstat (limited to 'doc/rfc/rfc4849.txt')
-rw-r--r-- | doc/rfc/rfc4849.txt | 507 |
1 files changed, 507 insertions, 0 deletions
diff --git a/doc/rfc/rfc4849.txt b/doc/rfc/rfc4849.txt new file mode 100644 index 0000000..ab552f4 --- /dev/null +++ b/doc/rfc/rfc4849.txt @@ -0,0 +1,507 @@ + + + + + + +Network Working Group P. Congdon +Request for Comments: 4849 M. Sanchez +Category: Standards Track ProCurve Networking by HP + B. Aboba + Microsoft Corporation + April 2007 + + + RADIUS Filter Rule Attribute + +Status of This Memo + + This document specifies an Internet standards track protocol for the + Internet community, and requests discussion and suggestions for + improvements. Please refer to the current edition of the "Internet + Official Protocol Standards" (STD 1) for the standardization state + and status of this protocol. Distribution of this memo is unlimited. + +Copyright Notice + + Copyright (C) The IETF Trust (2007). + +Abstract + + While RFC 2865 defines the Filter-Id attribute, it requires that the + Network Access Server (NAS) be pre-populated with the desired + filters. However, in situations where the server operator does not + know which filters have been pre-populated, it is useful to specify + filter rules explicitly. This document defines the NAS-Filter-Rule + attribute within the Remote Authentication Dial In User Service + (RADIUS). This attribute is based on the Diameter NAS-Filter-Rule + Attribute Value Pair (AVP) described in RFC 4005, and the + IPFilterRule syntax defined in RFC 3588. + + + + + + + + + + + + + + + + + + +Congdon, et al. Standards Track [Page 1] + +RFC 4849 Filter Rule Attribute April 2007 + + +Table of Contents + + 1. Introduction ....................................................2 + 1.1. Terminology ................................................2 + 1.2. Requirements Language ......................................3 + 1.3. Attribute Interpretation ...................................3 + 2. NAS-Filter-Rule Attribute .......................................3 + 3. Table of Attributes .............................................5 + 4. Diameter Considerations .........................................5 + 5. IANA Considerations .............................................6 + 6. Security Considerations .........................................6 + 7. References ......................................................7 + 7.1. Normative References .......................................7 + 7.2. Informative References .....................................7 + 8. Acknowledgments .................................................7 + +1. Introduction + + This document defines the NAS-Filter-Rule attribute within the Remote + Authentication Dial In User Service (RADIUS). This attribute has the + same functionality as the Diameter NAS-Filter-Rule AVP (400) defined + in [RFC4005], Section 6.6, and the same syntax as an IPFilterRule + defined in [RFC3588], Section 4.3. This attribute may prove useful + for provisioning of filter rules. + + While [RFC2865], Section 5.11, defines the Filter-Id attribute (11), + it requires that the Network Access Server (NAS) be pre-populated + with the desired filters. However, in situations where the server + operator does not know which filters have been pre-populated, it is + useful to specify filter rules explicitly. + +1.1. Terminology + + This document uses the following terms: + + Network Access Server (NAS) + A device that provides an access service for a user to a network. + + RADIUS server + A RADIUS authentication server is an entity that provides an + authentication service to a NAS. + + RADIUS proxy + A RADIUS proxy acts as an authentication server to the NAS, and a + RADIUS client to the RADIUS server. + + + + + + +Congdon, et al. Standards Track [Page 2] + +RFC 4849 Filter Rule Attribute April 2007 + + +1.2. Requirements Language + + The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", + "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this + document are to be interpreted as described in [RFC2119]. + +1.3. Attribute Interpretation + + If a NAS conforming to this specification receives an Access-Accept + packet containing a NAS-Filter-Rule attribute that it cannot apply, + it MUST act as though it had received an Access-Reject. [RFC3576] + requires that a NAS receiving a Change of Authorization Request + (CoA-Request) reply with a CoA-NAK if the Request contains an + unsupported attribute. It is RECOMMENDED that an Error-Cause + attribute with value set to "Unsupported Attribute" (401) be included + in the CoA-NAK. As noted in [RFC3576], authorization changes are + atomic so that this situation does not result in session termination, + and the pre-existing configuration remains unchanged. As a result, + no accounting packets should be generated because of the CoA-Request. + +2. NAS-Filter-Rule Attribute + + Description + + This attribute indicates filter rules to be applied for this user. + Zero or more NAS-Filter-Rule attributes MAY be sent in Access-Accept, + CoA-Request, or Accounting-Request packets. + + The NAS-Filter-Rule attribute is not intended to be used concurrently + with any other filter rule attribute, including Filter-Id (11) and + NAS-Traffic-Rule [Traffic] attributes. NAS-Filter-Rule and NAS- + Traffic-Rule attributes MUST NOT appear in the same RADIUS packet. + If a NAS-Traffic-Rule attribute is present, a NAS implementing this + specification MUST silently discard any NAS-Filter-Rule attributes + that are present. Filter-Id and NAS-Filter-Rule attributes SHOULD + NOT appear in the same RADIUS packet. Given the absence in [RFC4005] + of well-defined precedence rules for combining Filter-Id and NAS- + Filter-Rule attributes into a single rule set, the behavior of NASes + receiving both attributes is undefined, and therefore a RADIUS server + implementation cannot assume a consistent behavior. + + Where multiple NAS-Filter-Rule attributes are included in a RADIUS + packet, the String field of the attributes are to be concatenated to + form a set of filter rules. As noted in [RFC2865], Section 2.3, "the + forwarding server MUST NOT change the order of any attributes of the + same type", so that RADIUS proxies will not reorder NAS-Filter-Rule + attributes. + + + + +Congdon, et al. Standards Track [Page 3] + +RFC 4849 Filter Rule Attribute April 2007 + + + A summary of the NAS-Filter-Rule Attribute format is shown below. + The fields are transmitted from left to right. + + 0 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Type | Length | String... + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Type + + 92 + + Length + + >=3 + + String + + The String field is one or more octets. It contains filter rules + in the IPFilterRule syntax defined in [RFC3588], Section 4.3, with + individual filter rules separated by a NUL (0x00). A NAS-Filter- + Rule attribute may contain a partial rule, one rule, or more than + one rule. Filter rules may be continued across attribute + boundaries, so implementations cannot assume that individual + filter rules begin or end on attribute boundaries. + + The set of NAS-Filter-Rule attributes SHOULD be created by + concatenating the individual filter rules, separated by a NUL + (0x00) octet. The resulting data should be split on 253-octet + boundaries to obtain a set of NAS-Filter-Rule attributes. On + reception, the individual filter rules are determined by + concatenating the contents of all NAS-Filter-Rule attributes, and + then splitting individual filter rules with the NUL octet (0x00) + as a delimiter. + + + + + + + + + + + + + + + + +Congdon, et al. Standards Track [Page 4] + +RFC 4849 Filter Rule Attribute April 2007 + + +3. Table of Attributes + + The following table provides a guide to which attributes may be found + in which kinds of packets, and in what quantity. + + Access- Access- Access- Access- CoA- Acct- + Request Accept Reject Challenge Req Req # Attribute + 0 0+ 0 0 0+ 0+ 92 NAS-Filter-Rule + + The following table defines the meaning of the above table entries. + + 0 This attribute MUST NOT be present in the packet. + 0+ Zero or more instances of this attribute MAY be + present in the packet. + 0-1 Zero or one instance of this attribute MAY be + present in the packet. + +4. Diameter Considerations + + [RFC4005], Section 6.6, defines the NAS-Filter-Rule AVP (400) with + the same functionality as the RADIUS NAS-Filter-Rule attribute. In + order to support interoperability, Diameter/RADIUS gateways will need + to be configured to translate RADIUS attribute 92 to Diameter NAS- + Filter-Rule AVP (400) and vice versa. + + When translating Diameter NAS-Filter-Rule AVPs to RADIUS NAS-Filter- + Rule attributes, the set of NAS-Filter-Rule attributes is created by + concatenating the individual filter rules, separated by a NUL octet. + The resulting data SHOULD then be split on 253-octet boundaries. + + When translating RADIUS NAS-Filter-Rule attributes to Diameter NAS- + Filter-Rule AVPs, the individual rules are determined by + concatenating the contents of all NAS-Filter-Rule attributes, and + then splitting individual filter rules with the NUL octet as a + delimiter. Each rule is then encoded as a single Diameter NAS- + Filter-Rule AVP. + + Note that a translated Diameter message can be larger than the + maximum RADIUS packet size (4096 bytes). Where a Diameter/RADIUS + gateway receives a Diameter message containing a NAS-Filter-Rule AVP + that is too large to fit into a RADIUS packet, the Diameter/RADIUS + gateway will respond to the originating Diameter peer with a Result- + Code AVP with the value DIAMETER_RADIUS_AVP_UNTRANSLATABLE (5018), + and with a Failed-AVP AVP containing the NAS-Filter-Rule AVP. Since + repairing the error will probably require re-working the filter + rules, the originating peer should treat the combination of a + Result-Code AVP with value DIAMETER_RADIUS_AVP_UNTRANSLATABLE and a + Failed-AVP AVP containing a NAS-Filter-Rule AVP as a terminal error. + + + +Congdon, et al. Standards Track [Page 5] + +RFC 4849 Filter Rule Attribute April 2007 + + +5. IANA Considerations + + This specification does not create any new registries. + + This document uses the RADIUS [RFC2865] namespace, see + <http://www.iana.org/assignments/radius-types>. One value has been + allocated in the section "RADIUS Attribute Types". The RADIUS + attribute for which a value has been assigned is: + + 92 - NAS-Filter-Rule + + This document also utilizes the Diameter [RFC3588] namespace. A + Diameter Result-Code AVP value for the + DIAMETER_RADIUS_AVP_UNTRANSLATABLE error has been allocated. Since + this is a permanent failure, the allocation (5018) is in the 5xxx + range. + +6. Security Considerations + + This specification describes the use of RADIUS for purposes of + authentication, authorization and accounting. Threats and security + issues for this application are described in [RFC3579] and [RFC3580]; + security issues encountered in roaming are described in [RFC2607]. + + This document specifies a new attribute that can be included in + existing RADIUS packets, which are protected as described in + [RFC3579] and [RFC3576]. See those documents for a more detailed + description. + + The security mechanisms supported in RADIUS and Diameter are focused + on preventing an attacker from spoofing packets or modifying packets + in transit. They do not prevent an authorized RADIUS/Diameter server + or proxy from modifying, inserting, or removing attributes with + malicious intent. Filter attributes modified or removed by a + RADIUS/Diameter proxy may enable a user to obtain network access + without the appropriate filters; if the proxy were also to modify + accounting packets, then the modification would not be reflected in + the accounting server logs. + + Since the RADIUS protocol currently does not support capability + negotiation, a RADIUS server cannot automatically discover whether a + NAS supports the NAS-Filter-Rule attribute. A legacy NAS not + compliant with this specification may silently discard the NAS- + Filter-Rule attribute while permitting the user to access the + network. This can cause users to improperly receive unfiltered + access to the network. As a result, the NAS-Filter-Rule attribute + SHOULD only be sent to a NAS that is known to support it. + + + + +Congdon, et al. Standards Track [Page 6] + +RFC 4849 Filter Rule Attribute April 2007 + + +7. References + +7.1. Normative References + + [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate + Requirement Levels", BCP 14, RFC 2119, March, 1997. + + [RFC2865] Rigney, C., Willens, S., Rubens, A., and W. Simpson, + "Remote Authentication Dial In User Service (RADIUS)", RFC + 2865, June 2000. + + [RFC3588] Calhoun, P., Loughney, J., Guttman, E., Zorn, G., and J. + Arkko, "Diameter Base Protocol", RFC 3588, September 2003. + + [RFC4005] Calhoun, P., Zorn, G., Spence, D., and D. Mitton, "Diameter + Network Access Server Application", RFC 4005, August 2005. + +7.2. Informative References + + [RFC2607] Aboba, B. and J. Vollbrecht, "Proxy Chaining and Policy + Implementation in Roaming", RFC 2607, June 1999. + + [RFC3576] Chiba, M., Dommety, G., Eklund, M., Mitton, D., and B. + Aboba, "Dynamic Authorization Extensions to Remote + Authentication Dial In User Service (RADIUS)", RFC 3576, + July 2003. + + [RFC3579] Aboba, B. and P. Calhoun, "RADIUS (Remote Authentication + Dial In User Service) Support For Extensible Authentication + Protocol (EAP)", RFC 3579, September 2003. + + [RFC3580] Congdon, P., Aboba, B., Smith, A., Zorn, G., and J. Roese, + "IEEE 802.1X Remote Authentication Dial In User Service + (RADIUS) Usage Guidelines", RFC 3580, September 2003. + + [Traffic] Congdon, P., Sanchez, M., Lior, A., Adrangi, F., and B. + Aboba, "RADIUS Attributes for Filtering and Redirection", + Work in Progress, March 2007. + +8. Acknowledgments + + The authors would like to acknowledge Emile Bergen, Alan DeKok, Greg + Weber, Glen Zorn, Pasi Eronen, David Mitton, and David Nelson for + contributions to this document. + + + + + + + +Congdon, et al. Standards Track [Page 7] + +RFC 4849 Filter Rule Attribute April 2007 + + +Authors' Addresses + + Paul Congdon + Hewlett Packard Company + ProCurve Networking by HP + 8000 Foothills Blvd, M/S 5662 + Roseville, CA 95747 + + EMail: paul.congdon@hp.com + Phone: +1 916 785 5753 + Fax: +1 916 785 8478 + + + Mauricio Sanchez + Hewlett Packard Company + ProCurve Networking by HP + 8000 Foothills Blvd, M/S 5559 + Roseville, CA 95747 + + EMail: mauricio.sanchez@hp.com + Phone: +1 916 785 1910 + Fax: +1 916 785 1815 + + + Bernard Aboba + Microsoft Corporation + One Microsoft Way + Redmond, WA 98052 + + EMail: bernarda@microsoft.com + Phone: +1 425 706 6605 + Fax: +1 425 936 7329 + + + + + + + + + + + + + + + + + + + +Congdon, et al. Standards Track [Page 8] + +RFC 4849 Filter Rule Attribute April 2007 + + +Full Copyright Statement + + Copyright (C) The IETF Trust (2007). + + This document is subject to the rights, licenses and restrictions + contained in BCP 78, and except as set forth therein, the authors + retain all their rights. + + This document and the information contained herein are provided on an + "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS + OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND + THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS + OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF + THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED + WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. + +Intellectual Property + + The IETF takes no position regarding the validity or scope of any + Intellectual Property Rights or other rights that might be claimed to + pertain to the implementation or use of the technology described in + this document or the extent to which any license under such rights + might or might not be available; nor does it represent that it has + made any independent effort to identify any such rights. Information + on the procedures with respect to rights in RFC documents can be + found in BCP 78 and BCP 79. + + Copies of IPR disclosures made to the IETF Secretariat and any + assurances of licenses to be made available, or the result of an + attempt made to obtain a general license or permission for the use of + such proprietary rights by implementers or users of this + specification can be obtained from the IETF on-line IPR repository at + http://www.ietf.org/ipr. + + The IETF invites any interested party to bring to its attention any + copyrights, patents or patent applications, or other proprietary + rights that may cover technology that may be required to implement + this standard. Please address the information to the IETF at + ietf-ipr@ietf.org. + +Acknowledgement + + Funding for the RFC Editor function is currently provided by the + Internet Society. + + + + + + + +Congdon, et al. Standards Track [Page 9] + |