summaryrefslogtreecommitdiff
path: root/doc/rfc3576.txt
diff options
context:
space:
mode:
Diffstat (limited to 'doc/rfc3576.txt')
-rw-r--r--doc/rfc3576.txt1683
1 files changed, 0 insertions, 1683 deletions
diff --git a/doc/rfc3576.txt b/doc/rfc3576.txt
deleted file mode 100644
index 89fd9eb9..00000000
--- a/doc/rfc3576.txt
+++ /dev/null
@@ -1,1683 +0,0 @@
-
-
-
-
-
-
-Network Working Group M. Chiba
-Request for Comments: 3576 G. Dommety
-Category: Informational M. Eklund
- Cisco Systems, Inc.
- D. Mitton
- Circular Logic, UnLtd.
- B. Aboba
- Microsoft Corporation
- July 2003
-
-
- Dynamic Authorization Extensions to Remote
- Authentication Dial In User Service (RADIUS)
-
-Status of this Memo
-
- This memo provides information for the Internet community. It does
- not specify an Internet standard of any kind. Distribution of this
- memo is unlimited.
-
-Copyright Notice
-
- Copyright (C) The Internet Society (2003). All Rights Reserved.
-
-Abstract
-
- This document describes a currently deployed extension to the Remote
- Authentication Dial In User Service (RADIUS) protocol, allowing
- dynamic changes to a user session, as implemented by network access
- server products. This includes support for disconnecting users and
- changing authorizations applicable to a user session.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-Chiba, et al. Informational [Page 1]
-
-RFC 3576 Dynamic Authorization Extensions to RADIUS July 2003
-
-
-Table of Contents
-
- 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
- 1.1. Applicability. . . . . . . . . . . . . . . . . . . . . . 3
- 1.2. Requirements Language . . . . . . . . . . . . . . . . . 5
- 1.3. Terminology. . . . . . . . . . . . . . . . . . . . . . . 5
- 2. Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
- 2.1. Disconnect Messages (DM) . . . . . . . . . . . . . . . . 5
- 2.2. Change-of-Authorization Messages (CoA) . . . . . . . . . 6
- 2.3. Packet Format. . . . . . . . . . . . . . . . . . . . . . 7
- 3. Attributes . . . . . . . . . . . . . . . . . . . . . . . . . . 11
- 3.1. Error-Cause. . . . . . . . . . . . . . . . . . . . . . . 13
- 3.2. Table of Attributes. . . . . . . . . . . . . . . . . . . 16
- 4. IANA Considerations. . . . . . . . . . . . . . . . . . . . . . 20
- 5. Security Considerations. . . . . . . . . . . . . . . . . . . . 21
- 5.1. Authorization Issues . . . . . . . . . . . . . . . . . . 21
- 5.2. Impersonation. . . . . . . . . . . . . . . . . . . . . . 22
- 5.3. IPsec Usage Guidelines . . . . . . . . . . . . . . . . . 22
- 5.4. Replay Protection. . . . . . . . . . . . . . . . . . . . 25
- 6. Example Traces . . . . . . . . . . . . . . . . . . . . . . . . 26
- 7. References . . . . . . . . . . . . . . . . . . . . . . . . . . 26
- 7.1. Normative References . . . . . . . . . . . . . . . . . . 26
- 7.2. Informative References . . . . . . . . . . . . . . . . . 27
- 8. Intellectual Property Statement. . . . . . . . . . . . . . . . 28
- 9. Acknowledgements. . . . . . . . . . . . . . . . . . . . . . . 28
- 10. Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . 29
- 11. Full Copyright Statement . . . . . . . . . . . . . . . . . . . 30
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-Chiba, et al. Informational [Page 2]
-
-RFC 3576 Dynamic Authorization Extensions to RADIUS July 2003
-
-
-1. Introduction
-
- The RADIUS protocol, defined in [RFC2865], does not support
- unsolicited messages sent from the RADIUS server to the Network
- Access Server (NAS).
-
- However, there are many instances in which it is desirable for
- changes to be made to session characteristics, without requiring the
- NAS to initiate the exchange. For example, it may be desirable for
- administrators to be able to terminate a user session in progress.
- Alternatively, if the user changes authorization level, this may
- require that authorization attributes be added/deleted from a user
- session.
-
- To overcome these limitations, several vendors have implemented
- additional RADIUS commands in order to be able to support unsolicited
- messages sent from the RADIUS server to the NAS. These extended
- commands provide support for Disconnect and Change-of-Authorization
- (CoA) messages. Disconnect messages cause a user session to be
- terminated immediately, whereas CoA messages modify session
- authorization attributes such as data filters.
-
-1.1. Applicability
-
- This protocol is being recommended for publication as an
- Informational RFC rather than as a standards-track RFC because of
- problems that cannot be fixed without creating incompatibilities with
- deployed implementations. This includes security vulnerabilities, as
- well as semantic ambiguities resulting from the design of the
- Change-of-Authorization (CoA) commands. While fixes are recommended,
- they cannot be made mandatory since this would be incompatible with
- existing implementations.
-
- Existing implementations of this protocol do not support
- authorization checks, so that an ISP sharing a NAS with another ISP
- could disconnect or change authorizations for another ISP's users.
- In order to remedy this problem, a "Reverse Path Forwarding" check is
- recommended. See Section 5.1. for details.
-
- Existing implementations utilize per-packet authentication and
- integrity protection algorithms with known weaknesses [MD5Attack].
- To provide stronger per-packet authentication and integrity
- protection, the use of IPsec is recommended. See Section 5.3. for
- details.
-
-
-
-
-
-
-
-Chiba, et al. Informational [Page 3]
-
-RFC 3576 Dynamic Authorization Extensions to RADIUS July 2003
-
-
- Existing implementations lack replay protection. In order to support
- replay detection, it is recommended that the Event-Timestamp
- Attribute be added to all messages in situations where IPsec replay
- protection is not employed. Implementations should be configurable
- to silently discard messages lacking the Event-Timestamp Attribute.
- See Section 5.4. for details.
-
- The approach taken with CoA commands in existing implementations
- results in a semantic ambiguity. Existing implementations of the
- CoA-Request identify the affected session, as well as supply the
- authorization changes. Since RADIUS Attributes included within
- existing implementations of the CoA-Request can be used for session
- identification or authorization change, it may not be clear which
- function a given attribute is serving.
-
- The problem does not exist within [Diameter], in which authorization
- change is requested by a command using Attribute Value Pairs (AVPs)
- solely for identification, resulting in initiation of a standard
- Request/Response sequence where authorization changes are supplied.
- As a result, in no command can Diameter AVPs have multiple potential
- meanings.
-
- Due to differences in handling change-of-authorization requests in
- RADIUS and Diameter, it may be difficult or impossible for a
- Diameter/RADIUS gateway to successfully translate existing
- implementations of this specification to equivalent messages in
- Diameter. For example, a Diameter command changing any attribute
- used for identification within existing CoA-Request implementations
- cannot be translated, since such an authorization change is
- impossible to carry out in existing implementations. Similarly,
- translation between existing implementations of Disconnect-Request or
- CoA-Request messages and Diameter is tricky because a Disconnect-
- Request or CoA-Request message will need to be translated to multiple
- Diameter commands.
-
- To simplify translation between RADIUS and Diameter, a Service-Type
- Attribute with value "Authorize Only" can (optionally) be included
- within a Disconnect-Request or CoA-Request. Such a Request contains
- only identification attributes. A NAS supporting the "Authorize
- Only" Service-Type within a Disconnect-Request or CoA-Request
- responds with a NAK containing a Service-Type Attribute with value
- "Authorize Only" and an Error-Cause Attribute with value "Request
- Initiated". The NAS will then send an Access-Request containing a
- Service-Type Attribute with a value of "Authorize Only". This usage
- sequence is akin to what occurs in Diameter and so is more easily
- translated by a Diameter/RADIUS gateway.
-
-
-
-
-
-Chiba, et al. Informational [Page 4]
-
-RFC 3576 Dynamic Authorization Extensions to RADIUS July 2003
-
-
-1.2. Requirements Language
-
- In this document, several words are used to signify the requirements
- of the specification. These words are often capitalized. The key
- words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD",
- "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document
- are to be interpreted as described in [RFC2119].
-
-1.3. Terminology
-
- This document frequently uses the following terms:
-
- Network Access Server (NAS): The device providing access to the
- network.
-
- service: The NAS provides a service to the user,
- such as IEEE 802 or PPP.
-
- session: Each service provided by the NAS to a
- user constitutes a session, with the
- beginning of the session defined as the
- point where service is first provided
- and the end of the session defined as
- the point where service is ended. A
- user may have multiple sessions in
- parallel or series if the NAS supports
- that.
-
- silently discard: This means the implementation discards
- the packet without further processing.
- The implementation SHOULD provide the
- capability of logging the error,
- including the contents of the silently
- discarded packet, and SHOULD record the
- event in a statistics counter.
-
-2. Overview
-
- This section describes the most commonly implemented features of
- Disconnect and Change-of-Authorization messages.
-
-2.1. Disconnect Messages (DM)
-
- A Disconnect-Request packet is sent by the RADIUS server in order to
- terminate a user session on a NAS and discard all associated session
- context. The Disconnect-Request packet is sent to UDP port 3799, and
- identifies the NAS as well as the user session to be terminated by
- inclusion of the identification attributes described in Section 3.
-
-
-
-Chiba, et al. Informational [Page 5]
-
-RFC 3576 Dynamic Authorization Extensions to RADIUS July 2003
-
-
- +----------+ Disconnect-Request +----------+
- | | <-------------------- | |
- | NAS | | RADIUS |
- | | Disconnect-Response | Server |
- | | ---------------------> | |
- +----------+ +----------+
-
- The NAS responds to a Disconnect-Request packet sent by a RADIUS
- server with a Disconnect-ACK if all associated session context is
- discarded and the user session is no longer connected, or a
- Disconnect-NAK, if the NAS was unable to disconnect the session and
- discard all associated session context. A NAS MUST respond to a
- Disconnect-Request including a Service-Type Attribute with value
- "Authorize Only" with a Disconnect-NAK; a Disconnect-ACK MUST NOT be
- sent. A NAS MUST respond to a Disconnect-Request including a
- Service-Type Attribute with an unsupported value with a Disconnect-
- NAK; an Error-Cause Attribute with value "Unsupported Service" MAY be
- included. A Disconnect-ACK MAY contain the Attribute
- Acct-Terminate-Cause (49) [RFC2866] with the value set to 6 for
- Admin-Reset.
-
-2.2. Change-of-Authorization Messages (CoA)
-
- CoA-Request packets contain information for dynamically changing
- session authorizations. This is typically used to change data
- filters. The data filters can be of either the ingress or egress
- kind, and are sent in addition to the identification attributes as
- described in section 3. The port used, and packet format (described
- in Section 2.3.), are the same as that for Disconnect-Request
- Messages.
-
- The following attribute MAY be sent in a CoA-Request:
-
- Filter-ID (11) - Indicates the name of a data filter list to be
- applied for the session that the identification
- attributes map to.
-
- +----------+ CoA-Request +----------+
- | | <-------------------- | |
- | NAS | | RADIUS |
- | | CoA-Response | Server |
- | | ---------------------> | |
- +----------+ +----------+
-
- The NAS responds to a CoA-Request sent by a RADIUS server with a
- CoA-ACK if the NAS is able to successfully change the authorizations
- for the user session, or a CoA-NAK if the Request is unsuccessful. A
- NAS MUST respond to a CoA-Request including a Service-Type Attribute
-
-
-
-Chiba, et al. Informational [Page 6]
-
-RFC 3576 Dynamic Authorization Extensions to RADIUS July 2003
-
-
- with value "Authorize Only" with a CoA-NAK; a CoA-ACK MUST NOT be
- sent. A NAS MUST respond to a CoA-Request including a Service-Type
- Attribute with an unsupported value with a CoA-NAK; an Error-Cause
- Attribute with value "Unsupported Service" MAY be included.
-
-2.3. Packet Format
-
- For either Disconnect-Request or CoA-Request messages UDP port 3799
- is used as the destination port. For responses, the source and
- destination ports are reversed. Exactly one RADIUS packet is
- encapsulated in the UDP Data field.
-
- A summary of the data format is shown below. The fields are
- transmitted from left to right.
-
- The packet format consists of the fields: Code, Identifier, Length,
- Authenticator, and Attributes in Type:Length:Value (TLV) format. All
- fields hold the same meaning as those described in RADIUS [RFC2865].
- The Authenticator field MUST be calculated in the same way as is
- specified for an Accounting-Request in [RFC2866].
-
- 0 1 2 3
- 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Code | Identifier | Length |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | |
- | Authenticator |
- | |
- | |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Attributes ...
- +-+-+-+-+-+-+-+-+-+-+-+-+-
-
- Code
-
- The Code field is one octet, and identifies the type of RADIUS
- packet. Packets received with an invalid Code field MUST be
- silently discarded. RADIUS codes (decimal) for this extension are
- assigned as follows:
-
- 40 - Disconnect-Request [RFC2882]
- 41 - Disconnect-ACK [RFC2882]
- 42 - Disconnect-NAK [RFC2882]
- 43 - CoA-Request [RFC2882]
- 44 - CoA-ACK [RFC2882]
- 45 - CoA-NAK [RFC2882]
-
-
-
-
-Chiba, et al. Informational [Page 7]
-
-RFC 3576 Dynamic Authorization Extensions to RADIUS July 2003
-
-
- Identifier
-
- The Identifier field is one octet, and aids in matching requests
- and replies. The RADIUS client can detect a duplicate request if
- it has the same server source IP address and source UDP port and
- Identifier within a short span of time.
-
- Unlike RADIUS as defined in [RFC2865], the responsibility for
- retransmission of Disconnect-Request and CoA-Request messages lies
- with the RADIUS server. If after sending these messages, the
- RADIUS server does not receive a response, it will retransmit.
-
- The Identifier field MUST be changed whenever the content of the
- Attributes field changes, or whenever a valid reply has been
- received for a previous request. For retransmissions where the
- contents are identical, the Identifier MUST remain unchanged.
-
- If the RADIUS server is retransmitting a Disconnect-Request or
- CoA-Request to the same client as before, and the Attributes have
- not changed, the same Request Authenticator, Identifier and source
- port MUST be used. If any Attributes have changed, a new
- Authenticator and Identifier MUST be used.
-
- Note that if the Event-Timestamp Attribute is included, it will be
- updated when the packet is retransmitted, changing the content of
- the Attributes field and requiring a new Identifier and Request
- Authenticator.
-
- If the Request to a primary proxy fails, a secondary proxy must be
- queried, if available. Issues relating to failover algorithms are
- described in [AAATransport]. Since this represents a new request,
- a new Request Authenticator and Identifier MUST be used. However,
- where the RADIUS server is sending directly to the client,
- failover typically does not make sense, since Disconnect or CoA
- messages need to be delivered to the NAS where the session
- resides.
-
- Length
-
- The Length field is two octets. It indicates the length of the
- packet including the Code, Identifier, Length, Authenticator and
- Attribute fields. Octets outside the range of the Length field
- MUST be treated as padding and ignored on reception. If the
- packet is shorter than the Length field indicates, it MUST be
- silently discarded. The minimum length is 20 and the maximum
- length is 4096.
-
-
-
-
-
-Chiba, et al. Informational [Page 8]
-
-RFC 3576 Dynamic Authorization Extensions to RADIUS July 2003
-
-
- Authenticator
-
- The Authenticator field is sixteen (16) octets. The most
- significant octet is transmitted first. This value is used to
- authenticate the messages between the RADIUS server and client.
-
- Request Authenticator
-
- In Request packets, the Authenticator value is a 16 octet MD5
- [RFC1321] checksum, called the Request Authenticator. The Request
- Authenticator is calculated the same way as for an Accounting-
- Request, specified in [RFC2866].
-
- Note that the Request Authenticator of a Disconnect or CoA-Request
- cannot be done the same way as the Request Authenticator of a
- RADIUS Access-Request, because there is no User-Password Attribute
- in a Disconnect-Request or CoA-Request.
-
- Response Authenticator
-
- The Authenticator field in a Response packet (e.g. Disconnect-ACK,
- Disconnect-NAK, CoA-ACK, or CoA-NAK) is called the Response
- Authenticator, and contains a one-way MD5 hash calculated over a
- stream of octets consisting of the Code, Identifier, Length, the
- Request Authenticator field from the packet being replied to, and
- the response Attributes if any, followed by the shared secret.
- The resulting 16 octet MD5 hash value is stored in the
- Authenticator field of the Response packet.
-
- Administrative note: As noted in [RFC2865] Section 3, the secret
- (password shared between the client and the RADIUS server) SHOULD be
- at least as large and unguessable as a well-chosen password. RADIUS
- clients MUST use the source IP address of the RADIUS UDP packet to
- decide which shared secret to use, so that requests can be proxied.
-
- Attributes
-
- In Disconnect and CoA-Request messages, all Attributes are treated
- as mandatory. A NAS MUST respond to a CoA-Request containing one
- or more unsupported Attributes or Attribute values with a CoA-NAK;
- a Disconnect-Request containing one or more unsupported Attributes
- or Attribute values MUST be answered with a Disconnect-NAK. State
- changes resulting from a CoA-Request MUST be atomic: if the
- Request is successful, a CoA-ACK is sent, and all requested
- authorization changes MUST be made. If the CoA-Request is
- unsuccessful, a CoA-NAK MUST be sent, and the requested
-
-
-
-
-
-Chiba, et al. Informational [Page 9]
-
-RFC 3576 Dynamic Authorization Extensions to RADIUS July 2003
-
-
- authorization changes MUST NOT be made. Similarly, a state change
- MUST NOT occur as a result of an unsuccessful Disconnect-Request;
- here a Disconnect-NAK MUST be sent.
-
- Since within this specification attributes may be used for
- identification, authorization or other purposes, even if a NAS
- implements an attribute for use with RADIUS authentication and
- accounting, it may not support inclusion of that attribute within
- Disconnect-Request or CoA-Request messages, given the difference
- in attribute semantics. This is true even for attributes
- specified within [RFC2865], [RFC2868], [RFC2869] or [RFC3162] as
- allowable within Access-Accept messages.
-
- As a result, attributes beyond those specified in Section 3.2.
- SHOULD NOT be included within Disconnect or CoA messages since
- this could produce unpredictable results.
-
- When using a forwarding proxy, the proxy must be able to alter the
- packet as it passes through in each direction. When the proxy
- forwards a Disconnect or CoA-Request, it MAY add a Proxy-State
- Attribute, and when the proxy forwards a response, it MUST remove
- its Proxy-State Attribute if it added one. Proxy-State is always
- added or removed after any other Proxy-States, but no other
- assumptions regarding its location within the list of Attributes
- can be made. Since Disconnect and CoA responses are authenticated
- on the entire packet contents, the stripping of the Proxy-State
- Attribute invalidates the integrity check - so the proxy needs to
- recompute it. A forwarding proxy MUST NOT modify existing Proxy-
- State, State, or Class Attributes present in the packet.
-
- If there are any Proxy-State Attributes in a Disconnect-Request or
- CoA-Request received from the server, the forwarding proxy MUST
- include those Proxy-State Attributes in its response to the
- server. The forwarding proxy MAY include the Proxy-State
- Attributes in the Disconnect-Request or CoA-Request when it
- forwards the request, or it MAY omit them in the forwarded
- request. If the forwarding proxy omits the Proxy-State Attributes
- in the request, it MUST attach them to the response before sending
- it to the server.
-
-
-
-
-
-
-
-
-
-
-
-
-Chiba, et al. Informational [Page 10]
-
-RFC 3576 Dynamic Authorization Extensions to RADIUS July 2003
-
-
-3. Attributes
-
- In Disconnect-Request and CoA-Request packets, certain attributes are
- used to uniquely identify the NAS as well as a user session on the
- NAS. All NAS identification attributes included in a Request message
- MUST match in order for a Disconnect-Request or CoA-Request to be
- successful; otherwise a Disconnect-NAK or CoA-NAK SHOULD be sent.
- For session identification attributes, the User-Name and Acct-
- Session-Id Attributes, if included, MUST match in order for a
- Disconnect-Request or CoA-Request to be successful; other session
- identification attributes SHOULD match. Where a mismatch of session
- identification attributes is detected, a Disconnect-NAK or CoA-NAK
- SHOULD be sent. The ability to use NAS or session identification
- attributes to map to unique/multiple sessions is beyond the scope of
- this document. Identification attributes include NAS and session
- identification attributes, as described below.
-
- NAS identification attributes
-
- Attribute # Reference Description
- --------- --- --------- -----------
- NAS-IP-Address 4 [RFC2865] The IPv4 address of the NAS.
- NAS-Identifier 32 [RFC2865] String identifying the NAS.
- NAS-IPv6-Address 95 [RFC3162] The IPv6 address of the NAS.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-Chiba, et al. Informational [Page 11]
-
-RFC 3576 Dynamic Authorization Extensions to RADIUS July 2003
-
-
- Session identification attributes
-
- Attribute # Reference Description
- --------- --- --------- -----------
- User-Name 1 [RFC2865] The name of the user
- associated with the session.
- NAS-Port 5 [RFC2865] The port on which the
- session is terminated.
- Framed-IP-Address 8 [RFC2865] The IPv4 address associated
- with the session.
- Called-Station-Id 30 [RFC2865] The link address to which
- the session is connected.
- Calling-Station-Id 31 [RFC2865] The link address from which
- the session is connected.
- Acct-Session-Id 44 [RFC2866] The identifier uniquely
- identifying the session
- on the NAS.
- Acct-Multi-Session-Id 50 [RFC2866] The identifier uniquely
- identifying related sessions.
- NAS-Port-Type 61 [RFC2865] The type of port used.
- NAS-Port-Id 87 [RFC2869] String identifying the port
- where the session is.
- Originating-Line-Info 94 [NASREQ] Provides information on the
- characteristics of the line
- from which a session
- originated.
- Framed-Interface-Id 96 [RFC3162] The IPv6 Interface Identifier
- associated with the session;
- always sent with
- Framed-IPv6-Prefix.
- Framed-IPv6-Prefix 97 [RFC3162] The IPv6 prefix associated
- with the session, always sent
- with Framed-Interface-Id.
-
- To address security concerns described in Section 5.1., the User-Name
- Attribute SHOULD be present in Disconnect-Request or CoA-Request
- packets; one or more additional session identification attributes MAY
- also be present. To address security concerns described in Section
- 5.2., one or more of the NAS-IP-Address or NAS-IPv6-Address
- Attributes SHOULD be present in Disconnect-Request or CoA-Request
- packets; the NAS-Identifier Attribute MAY be present in addition.
-
- If one or more authorization changes specified in a CoA-Request
- cannot be carried out, or if one or more attributes or attribute-
- values is unsupported, a CoA-NAK MUST be sent. Similarly, if there
- are one or more unsupported attributes or attribute values in a
- Disconnect-Request, a Disconnect-NAK MUST be sent.
-
-
-
-
-Chiba, et al. Informational [Page 12]
-
-RFC 3576 Dynamic Authorization Extensions to RADIUS July 2003
-
-
- Where a Service-Type Attribute with value "Authorize Only" is
- included within a CoA-Request or Disconnect-Request, attributes
- representing an authorization change MUST NOT be included; only
- identification attributes are permitted. If attributes other than
- NAS or session identification attributes are included in such a CoA-
- Request, implementations MUST send a CoA-NAK; an Error-Cause
- Attribute with value "Unsupported Attribute" MAY be included.
- Similarly, if attributes other than NAS or session identification
- attributes are included in such a Disconnect-Request, implementations
- MUST send a Disconnect-NAK; an Error-Cause Attribute with value
- "Unsupported Attribute" MAY be included.
-
-3.1. Error-Cause
-
- Description
-
- It is possible that the NAS cannot honor Disconnect-Request or
- CoA-Request messages for some reason. The Error-Cause Attribute
- provides more detail on the cause of the problem. It MAY be
- included within Disconnect-ACK, Disconnect-NAK and CoA-NAK
- messages.
-
- A summary of the Error-Cause Attribute format is shown below. The
- fields are transmitted from left to right.
-
- 0 1 2 3
- 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Type | Length | Value
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- Value (cont) |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
-
- Type
-
- 101 for Error-Cause
-
- Length
-
- 6
-
- Value
-
- The Value field is four octets, containing an integer specifying
- the cause of the error. Values 0-199 and 300-399 are reserved.
- Values 200-299 represent successful completion, so that these
- values may only be sent within Disconnect-ACK or CoA-ACK message
- and MUST NOT be sent within a Disconnect-NAK or CoA-NAK. Values
-
-
-
-Chiba, et al. Informational [Page 13]
-
-RFC 3576 Dynamic Authorization Extensions to RADIUS July 2003
-
-
- 400-499 represent fatal errors committed by the RADIUS server, so
- that they MAY be sent within CoA-NAK or Disconnect-NAK messages,
- and MUST NOT be sent within CoA-ACK or Disconnect-ACK messages.
- Values 500-599 represent fatal errors occurring on a NAS or RADIUS
- proxy, so that they MAY be sent within CoA-NAK and Disconnect-NAK
- messages, and MUST NOT be sent within CoA-ACK or Disconnect-ACK
- messages. Error-Cause values SHOULD be logged by the RADIUS
- server. Error-Code values (expressed in decimal) include:
-
- # Value
- --- -----
- 201 Residual Session Context Removed
- 202 Invalid EAP Packet (Ignored)
- 401 Unsupported Attribute
- 402 Missing Attribute
- 403 NAS Identification Mismatch
- 404 Invalid Request
- 405 Unsupported Service
- 406 Unsupported Extension
- 501 Administratively Prohibited
- 502 Request Not Routable (Proxy)
- 503 Session Context Not Found
- 504 Session Context Not Removable
- 505 Other Proxy Processing Error
- 506 Resources Unavailable
- 507 Request Initiated
-
- "Residual Session Context Removed" is sent in response to a
- Disconnect-Request if the user session is no longer active, but
- residual session context was found and successfully removed. This
- value is only sent within a Disconnect-ACK and MUST NOT be sent
- within a CoA-ACK, Disconnect-NAK or CoA-NAK.
-
- "Invalid EAP Packet (Ignored)" is a non-fatal error that MUST NOT be
- sent by implementations of this specification.
-
- "Unsupported Attribute" is a fatal error sent if a Request contains
- an attribute (such as a Vendor-Specific or EAP-Message Attribute)
- that is not supported.
-
- "Missing Attribute" is a fatal error sent if critical attributes
- (such as NAS or session identification attributes) are missing from a
- Request.
-
- "NAS Identification Mismatch" is a fatal error sent if one or more
- NAS identification attributes (see Section 3.) do not match the
- identity of the NAS receiving the Request.
-
-
-
-
-Chiba, et al. Informational [Page 14]
-
-RFC 3576 Dynamic Authorization Extensions to RADIUS July 2003
-
-
- "Invalid Request" is a fatal error sent if some other aspect of the
- Request is invalid, such as if one or more attributes (such as EAP-
- Message Attribute(s)) are not formatted properly.
-
- "Unsupported Service" is a fatal error sent if a Service-Type
- Attribute included with the Request is sent with an invalid or
- unsupported value.
-
- "Unsupported Extension" is a fatal error sent due to lack of support
- for an extension such as Disconnect and/or CoA messages. This will
- typically be sent by a proxy receiving an ICMP port unreachable
- message after attempting to forward a Request to the NAS.
-
- "Administratively Prohibited" is a fatal error sent if the NAS is
- configured to prohibit honoring of Request messages for the specified
- session.
-
- "Request Not Routable" is a fatal error which MAY be sent by a RADIUS
- proxy and MUST NOT be sent by a NAS. It indicates that the RADIUS
- proxy was unable to determine how to route the Request to the NAS.
- For example, this can occur if the required entries are not present
- in the proxy's realm routing table.
-
- "Session Context Not Found" is a fatal error sent if the session
- context identified in the Request does not exist on the NAS.
-
- "Session Context Not Removable" is a fatal error sent in response to
- a Disconnect-Request if the NAS was able to locate the session
- context, but could not remove it for some reason. It MUST NOT be
- sent within a CoA-ACK, CoA-NAK or Disconnect-ACK, only within a
- Disconnect-NAK.
-
- "Other Proxy Processing Error" is a fatal error sent in response to a
- Request that could not be processed by a proxy, for reasons other
- than routing.
-
- "Resources Unavailable" is a fatal error sent when a Request could
- not be honored due to lack of available NAS resources (memory, non-
- volatile storage, etc.).
-
- "Request Initiated" is a fatal error sent in response to a Request
- including a Service-Type Attribute with a value of "Authorize Only".
- It indicates that the Disconnect-Request or CoA-Request has not been
- honored, but that a RADIUS Access-Request including a Service-Type
- Attribute with value "Authorize Only" is being sent to the RADIUS
- server.
-
-
-
-
-
-Chiba, et al. Informational [Page 15]
-
-RFC 3576 Dynamic Authorization Extensions to RADIUS July 2003
-
-
-3.2. Table of Attributes
-
- The following table provides a guide to which attributes may be found
- in which packets, and in what quantity.
-
- Change-of-Authorization Messages
-
- Request ACK NAK # Attribute
- 0-1 0 0 1 User-Name [Note 1]
- 0-1 0 0 4 NAS-IP-Address [Note 1]
- 0-1 0 0 5 NAS-Port [Note 1]
- 0-1 0 0-1 6 Service-Type [Note 6]
- 0-1 0 0 7 Framed-Protocol [Note 3]
- 0-1 0 0 8 Framed-IP-Address [Note 1]
- 0-1 0 0 9 Framed-IP-Netmask [Note 3]
- 0-1 0 0 10 Framed-Routing [Note 3]
- 0+ 0 0 11 Filter-ID [Note 3]
- 0-1 0 0 12 Framed-MTU [Note 3]
- 0+ 0 0 13 Framed-Compression [Note 3]
- 0+ 0 0 14 Login-IP-Host [Note 3]
- 0-1 0 0 15 Login-Service [Note 3]
- 0-1 0 0 16 Login-TCP-Port [Note 3]
- 0+ 0 0 18 Reply-Message [Note 2]
- 0-1 0 0 19 Callback-Number [Note 3]
- 0-1 0 0 20 Callback-Id [Note 3]
- 0+ 0 0 22 Framed-Route [Note 3]
- 0-1 0 0 23 Framed-IPX-Network [Note 3]
- 0-1 0-1 0-1 24 State [Note 7]
- 0+ 0 0 25 Class [Note 3]
- 0+ 0 0 26 Vendor-Specific [Note 3]
- 0-1 0 0 27 Session-Timeout [Note 3]
- 0-1 0 0 28 Idle-Timeout [Note 3]
- 0-1 0 0 29 Termination-Action [Note 3]
- 0-1 0 0 30 Called-Station-Id [Note 1]
- 0-1 0 0 31 Calling-Station-Id [Note 1]
- 0-1 0 0 32 NAS-Identifier [Note 1]
- 0+ 0+ 0+ 33 Proxy-State
- 0-1 0 0 34 Login-LAT-Service [Note 3]
- 0-1 0 0 35 Login-LAT-Node [Note 3]
- 0-1 0 0 36 Login-LAT-Group [Note 3]
- 0-1 0 0 37 Framed-AppleTalk-Link [Note 3]
- 0+ 0 0 38 Framed-AppleTalk-Network [Note 3]
- 0-1 0 0 39 Framed-AppleTalk-Zone [Note 3]
- 0-1 0 0 44 Acct-Session-Id [Note 1]
- 0-1 0 0 50 Acct-Multi-Session-Id [Note 1]
- 0-1 0-1 0-1 55 Event-Timestamp
- 0-1 0 0 61 NAS-Port-Type [Note 1]
- Request ACK NAK # Attribute
-
-
-
-Chiba, et al. Informational [Page 16]
-
-RFC 3576 Dynamic Authorization Extensions to RADIUS July 2003
-
-
- Request ACK NAK # Attribute
- 0-1 0 0 62 Port-Limit [Note 3]
- 0-1 0 0 63 Login-LAT-Port [Note 3]
- 0+ 0 0 64 Tunnel-Type [Note 5]
- 0+ 0 0 65 Tunnel-Medium-Type [Note 5]
- 0+ 0 0 66 Tunnel-Client-Endpoint [Note 5]
- 0+ 0 0 67 Tunnel-Server-Endpoint [Note 5]
- 0+ 0 0 69 Tunnel-Password [Note 5]
- 0-1 0 0 71 ARAP-Features [Note 3]
- 0-1 0 0 72 ARAP-Zone-Access [Note 3]
- 0+ 0 0 78 Configuration-Token [Note 3]
- 0+ 0-1 0 79 EAP-Message [Note 2]
- 0-1 0-1 0-1 80 Message-Authenticator
- 0+ 0 0 81 Tunnel-Private-Group-ID [Note 5]
- 0+ 0 0 82 Tunnel-Assignment-ID [Note 5]
- 0+ 0 0 83 Tunnel-Preference [Note 5]
- 0-1 0 0 85 Acct-Interim-Interval [Note 3]
- 0-1 0 0 87 NAS-Port-Id [Note 1]
- 0-1 0 0 88 Framed-Pool [Note 3]
- 0+ 0 0 90 Tunnel-Client-Auth-ID [Note 5]
- 0+ 0 0 91 Tunnel-Server-Auth-ID [Note 5]
- 0-1 0 0 94 Originating-Line-Info [Note 1]
- 0-1 0 0 95 NAS-IPv6-Address [Note 1]
- 0-1 0 0 96 Framed-Interface-Id [Note 1]
- 0+ 0 0 97 Framed-IPv6-Prefix [Note 1]
- 0+ 0 0 98 Login-IPv6-Host [Note 3]
- 0+ 0 0 99 Framed-IPv6-Route [Note 3]
- 0-1 0 0 100 Framed-IPv6-Pool [Note 3]
- 0 0 0+ 101 Error-Cause
- Request ACK NAK # Attribute
-
- Disconnect Messages
-
- Request ACK NAK # Attribute
- 0-1 0 0 1 User-Name [Note 1]
- 0-1 0 0 4 NAS-IP-Address [Note 1]
- 0-1 0 0 5 NAS-Port [Note 1]
- 0-1 0 0-1 6 Service-Type [Note 6]
- 0-1 0 0 8 Framed-IP-Address [Note 1]
- 0+ 0 0 18 Reply-Message [Note 2]
- 0-1 0-1 0-1 24 State [Note 7]
- 0+ 0 0 25 Class [Note 4]
- 0+ 0 0 26 Vendor-Specific
- 0-1 0 0 30 Called-Station-Id [Note 1]
- 0-1 0 0 31 Calling-Station-Id [Note 1]
- 0-1 0 0 32 NAS-Identifier [Note 1]
- 0+ 0+ 0+ 33 Proxy-State
- Request ACK NAK # Attribute
-
-
-
-Chiba, et al. Informational [Page 17]
-
-RFC 3576 Dynamic Authorization Extensions to RADIUS July 2003
-
-
- Request ACK NAK # Attribute
- 0-1 0 0 44 Acct-Session-Id [Note 1]
- 0-1 0-1 0 49 Acct-Terminate-Cause
- 0-1 0 0 50 Acct-Multi-Session-Id [Note 1]
- 0-1 0-1 0-1 55 Event-Timestamp
- 0-1 0 0 61 NAS-Port-Type [Note 1]
- 0+ 0-1 0 79 EAP-Message [Note 2]
- 0-1 0-1 0-1 80 Message-Authenticator
- 0-1 0 0 87 NAS-Port-Id [Note 1]
- 0-1 0 0 94 Originating-Line-Info [Note 1]
- 0-1 0 0 95 NAS-IPv6-Address [Note 1]
- 0-1 0 0 96 Framed-Interface-Id [Note 1]
- 0+ 0 0 97 Framed-IPv6-Prefix [Note 1]
- 0 0+ 0+ 101 Error-Cause
- Request ACK NAK # Attribute
-
- [Note 1] Where NAS or session identification attributes are included
- in Disconnect-Request or CoA-Request messages, they are used for
- identification purposes only. These attributes MUST NOT be used for
- purposes other than identification (e.g. within CoA-Request messages
- to request authorization changes).
-
- [Note 2] The Reply-Message Attribute is used to present a displayable
- message to the user. The message is only displayed as a result of a
- successful Disconnect-Request or CoA-Request (where a Disconnect-ACK
- or CoA-ACK is subsequently sent). Where EAP is used for
- authentication, an EAP-Message/Notification-Request Attribute is sent
- instead, and Disconnect-ACK or CoA-ACK messages contain an EAP-
- Message/Notification-Response Attribute.
-
- [Note 3] When included within a CoA-Request, these attributes
- represent an authorization change request. When one of these
- attributes is omitted from a CoA-Request, the NAS assumes that the
- attribute value is to remain unchanged. Attributes included in a
- CoA-Request replace all existing value(s) of the same attribute(s).
-
- [Note 4] When included within a successful Disconnect-Request (where
- a Disconnect-ACK is subsequently sent), the Class Attribute SHOULD be
- sent unmodified by the client to the accounting server in the
- Accounting Stop packet. If the Disconnect-Request is unsuccessful,
- then the Class Attribute is not processed.
-
- [Note 5] When included within a CoA-Request, these attributes
- represent an authorization change request. Where tunnel attribute(s)
- are sent within a successful CoA-Request, all existing tunnel
- attributes are removed and replaced by the new attribute(s).
-
-
-
-
-
-Chiba, et al. Informational [Page 18]
-
-RFC 3576 Dynamic Authorization Extensions to RADIUS July 2003
-
-
- [Note 6] When included within a Disconnect-Request or CoA-Request, a
- Service-Type Attribute with value "Authorize Only" indicates that the
- Request only contains NAS and session identification attributes, and
- that the NAS should attempt reauthorization by sending an Access-
- Request with a Service-Type Attribute with value "Authorize Only".
- This enables a usage model akin to that supported in Diameter, thus
- easing translation between the two protocols. Support for the
- Service-Type Attribute is optional within CoA-Request and
- Disconnect-Request messages; where it is not included, the Request
- message may contain both identification and authorization attributes.
- A NAS that does not support the Service-Type Attribute with the value
- "Authorize Only" within a Disconnect-Request MUST respond with a
- Disconnect-NAK including no Service-Type Attribute; an Error-Cause
- Attribute with value "Unsupported Service" MAY be included. A NAS
- that does not support the Service-Type Attribute with the value
- "Authorize Only" within a CoA-Request MUST respond with a CoA-NAK
- including no Service-Type Attribute; an Error-Cause Attribute with
- value "Unsupported Service" MAY be included.
-
- A NAS supporting the "Authorize Only" Service-Type value within
- Disconnect-Request or CoA-Request messages MUST respond with a
- Disconnect-NAK or CoA-NAK respectively, containing a Service-Type
- Attribute with value "Authorize Only", and an Error-Cause Attribute
- with value "Request Initiated". The NAS then sends an Access-Request
- to the RADIUS server with a Service-Type Attribute with value
- "Authorize Only". This Access-Request SHOULD contain the NAS
- attributes from the Disconnect or CoA-Request, as well as the session
- attributes from the Request legal for inclusion in an Access-Request
- as specified in [RFC2865], [RFC2868], [RFC2869] and [RFC3162]. As
- noted in [RFC2869] Section 5.19, a Message-Authenticator attribute
- SHOULD be included in an Access-Request that does not contain a
- User-Password, CHAP-Password, ARAP-Password or EAP-Message Attribute.
- The RADIUS server should send back an Access-Accept to (re-)authorize
- the session or an Access-Reject to refuse to (re-)authorize it.
-
- [Note 7] The State Attribute is available to be sent by the RADIUS
- server to the NAS in a Disconnect-Request or CoA-Request message and
- MUST be sent unmodified from the NAS to the RADIUS server in a
- subsequent ACK or NAK message. If a Service-Type Attribute with
- value "Authorize Only" is included in a Disconnect-Request or CoA-
- Request along with a State Attribute, then the State Attribute MUST
- be sent unmodified from the NAS to the RADIUS server in the resulting
- Access-Request sent to the RADIUS server, if any. The State
- Attribute is also available to be sent by the RADIUS server to the
- NAS in a CoA-Request that also includes a Termination-Action
- Attribute with the value of RADIUS-Request. If the client performs
- the Termination-Action by sending a new Access-Request upon
- termination of the current session, it MUST include the State
-
-
-
-Chiba, et al. Informational [Page 19]
-
-RFC 3576 Dynamic Authorization Extensions to RADIUS July 2003
-
-
- Attribute unchanged in that Access-Request. In either usage, the
- client MUST NOT interpret the Attribute locally. A Disconnect-
- Request or CoA-Request packet must have only zero or one State
- Attribute. Usage of the State Attribute is implementation dependent.
- If the RADIUS server does not recognize the State Attribute in the
- Access-Request, then it MUST send an Access-Reject.
-
- The following table defines the meaning of the above table entries.
-
- 0 This attribute MUST NOT be present in packet.
- 0+ Zero or more instances of this attribute MAY be present in
- packet.
- 0-1 Zero or one instance of this attribute MAY be present in packet.
- 1 Exactly one instance of this attribute MUST be present in packet.
-
-4. IANA Considerations
-
- This document uses the RADIUS [RFC2865] namespace, see
- <http://www.iana.org/assignments/radius-types>. There are six
- updates for the section: RADIUS Packet Type Codes. These Packet
- Types are allocated in [RADIANA]:
-
- 40 - Disconnect-Request
- 41 - Disconnect-ACK
- 42 - Disconnect-NAK
- 43 - CoA-Request
- 44 - CoA-ACK
- 45 - CoA-NAK
-
- Allocation of a new Service-Type value for "Authorize Only" is
- requested. This document also uses the UDP [RFC768] namespace, see
- <http://www.iana.org/assignments/port-numbers>. The authors request
- a port assignment from the Registered ports range. Finally, this
- specification allocates the Error-Cause Attribute (101) with the
- following decimal values:
-
- # Value
- --- -----
- 201 Residual Session Context Removed
- 202 Invalid EAP Packet (Ignored)
- 401 Unsupported Attribute
- 402 Missing Attribute
- 403 NAS Identification Mismatch
- 404 Invalid Request
- 405 Unsupported Service
- 406 Unsupported Extension
- 501 Administratively Prohibited
- 502 Request Not Routable (Proxy)
-
-
-
-Chiba, et al. Informational [Page 20]
-
-RFC 3576 Dynamic Authorization Extensions to RADIUS July 2003
-
-
- 503 Session Context Not Found
- 504 Session Context Not Removable
- 505 Other Proxy Processing Error
- 506 Resources Unavailable
- 507 Request Initiated
-
-5. Security Considerations
-
-5.1. Authorization Issues
-
- Where a NAS is shared by multiple providers, it is undesirable for
- one provider to be able to send Disconnect-Request or CoA-Requests
- affecting the sessions of another provider.
-
- A NAS or RADIUS proxy MUST silently discard Disconnect-Request or
- CoA-Request messages from untrusted sources. By default, a RADIUS
- proxy SHOULD perform a "reverse path forwarding" (RPF) check to
- verify that a Disconnect-Request or CoA-Request originates from an
- authorized RADIUS server. In addition, it SHOULD be possible to
- explicitly authorize additional sources of Disconnect-Request or
- CoA-Request packets relating to certain classes of sessions. For
- example, a particular source can be explicitly authorized to send
- CoA-Request messages relating to users within a set of realms.
-
- To perform the RPF check, the proxy uses the session identification
- attributes included in Disconnect-Request or CoA-Request messages, in
- order to determine the RADIUS server(s) to which an equivalent
- Access-Request could be routed. If the source address of the
- Disconnect-Request or CoA-Request is within this set, then the
- Request is forwarded; otherwise it MUST be silently discarded.
-
- Typically the proxy will extract the realm from the Network Access
- Identifier [RFC2486] included within the User-Name Attribute, and
- determine the corresponding RADIUS servers in the proxy routing
- tables. The RADIUS servers for that realm are then compared against
- the source address of the packet. Where no RADIUS proxy is present,
- the RPF check will need to be performed by the NAS itself.
-
- Since authorization to send a Disconnect-Request or CoA-Request is
- determined based on the source address and the corresponding shared
- secret, the NASes or proxies SHOULD configure a different shared
- secret for each RADIUS server.
-
-
-
-
-
-
-
-
-
-Chiba, et al. Informational [Page 21]
-
-RFC 3576 Dynamic Authorization Extensions to RADIUS July 2003
-
-
-5.2. Impersonation
-
- [RFC2865] Section 3 states:
-
- A RADIUS server MUST use the source IP address of the RADIUS UDP
- packet to decide which shared secret to use, so that RADIUS
- requests can be proxied.
-
- When RADIUS requests are forwarded by a proxy, the NAS-IP-Address or
- NAS-IPv6-Address Attributes will typically not match the source
- address observed by the RADIUS server. Since the NAS-Identifier
- Attribute need not contain an FQDN, this attribute may not be
- resolvable to the source address observed by the RADIUS server, even
- when no proxy is present.
-
- As a result, the authenticity check performed by a RADIUS server or
- proxy does not verify the correctness of NAS identification
- attributes. This makes it possible for a rogue NAS to forge NAS-IP-
- Address, NAS-IPv6-Address or NAS-Identifier Attributes within a
- RADIUS Access-Request in order to impersonate another NAS. It is
- also possible for a rogue NAS to forge session identification
- attributes such as the Called-Station-Id, Calling-Station-Id, or
- Originating-Line-Info [NASREQ]. This could fool the RADIUS server
- into sending Disconnect-Request or CoA-Request messages containing
- forged session identification attributes to a NAS targeted by an
- attacker.
-
- To address these vulnerabilities RADIUS proxies SHOULD check whether
- NAS identification attributes (see Section 3.) match the source
- address of packets originating from the NAS. Where one or more
- attributes do not match, Disconnect-Request or CoA-Request messages
- SHOULD be silently discarded.
-
- Such a check may not always be possible. Since the NAS-Identifier
- Attribute need not correspond to an FQDN, it may not be resolvable to
- an IP address to be matched against the source address. Also, where
- a NAT exists between the RADIUS client and proxy, checking the NAS-
- IP-Address or NAS-IPv6-Address Attributes may not be feasible.
-
-5.3. IPsec Usage Guidelines
-
- In addition to security vulnerabilities unique to Disconnect or CoA
- messages, the protocol exchanges described in this document are
- susceptible to the same vulnerabilities as RADIUS [RFC2865]. It is
- RECOMMENDED that IPsec be employed to afford better security.
-
-
-
-
-
-
-Chiba, et al. Informational [Page 22]
-
-RFC 3576 Dynamic Authorization Extensions to RADIUS July 2003
-
-
- Implementations of this specification SHOULD support IPsec [RFC2401]
- along with IKE [RFC2409] for key management. IPsec ESP [RFC2406]
- with a non-null transform SHOULD be supported, and IPsec ESP with a
- non-null encryption transform and authentication support SHOULD be
- used to provide per-packet confidentiality, authentication, integrity
- and replay protection. IKE SHOULD be used for key management.
-
- Within RADIUS [RFC2865], a shared secret is used for hiding
- Attributes such as User-Password, as well as used in computation of
- the Response Authenticator. In RADIUS accounting [RFC2866], the
- shared secret is used in computation of both the Request
- Authenticator and the Response Authenticator.
-
- Since in RADIUS a shared secret is used to provide confidentiality as
- well as integrity protection and authentication, only use of IPsec
- ESP with a non-null transform can provide security services
- sufficient to substitute for RADIUS application-layer security.
- Therefore, where IPsec AH or ESP null is used, it will typically
- still be necessary to configure a RADIUS shared secret.
-
- Where RADIUS is run over IPsec ESP with a non-null transform, the
- secret shared between the NAS and the RADIUS server MAY NOT be
- configured. In this case, a shared secret of zero length MUST be
- assumed. However, a RADIUS server that cannot know whether incoming
- traffic is IPsec-protected MUST be configured with a non-null RADIUS
- shared secret.
-
- When IPsec ESP is used with RADIUS, per-packet authentication,
- integrity and replay protection MUST be used. 3DES-CBC MUST be
- supported as an encryption transform and AES-CBC SHOULD be supported.
- AES-CBC SHOULD be offered as a preferred encryption transform if
- supported. HMAC-SHA1-96 MUST be supported as an authentication
- transform. DES-CBC SHOULD NOT be used as the encryption transform.
-
- A typical IPsec policy for an IPsec-capable RADIUS client is
- "Initiate IPsec, from me to any destination port UDP 1812". This
- IPsec policy causes an IPsec SA to be set up by the RADIUS client
- prior to sending RADIUS traffic. If some RADIUS servers contacted by
- the client do not support IPsec, then a more granular policy will be
- required: "Initiate IPsec, from me to IPsec-Capable-RADIUS-Server,
- destination port UDP 1812."
-
- For a client implementing this specification, the policy would be
- "Accept IPsec, from any to me, destination port UDP 3799". This
- causes the RADIUS client to accept (but not require) use of IPsec.
- It may not be appropriate to require IPsec for all RADIUS servers
- connecting to an IPsec-enabled RADIUS client, since some RADIUS
- servers may not support IPsec.
-
-
-
-Chiba, et al. Informational [Page 23]
-
-RFC 3576 Dynamic Authorization Extensions to RADIUS July 2003
-
-
- For an IPsec-capable RADIUS server, a typical IPsec policy is "Accept
- IPsec, from any to me, destination port 1812". This causes the
- RADIUS server to accept (but not require) use of IPsec. It may not
- be appropriate to require IPsec for all RADIUS clients connecting to
- an IPsec-enabled RADIUS server, since some RADIUS clients may not
- support IPsec.
-
- For servers implementing this specification, the policy would be
- "Initiate IPsec, from me to any, destination port UDP 3799". This
- causes the RADIUS server to initiate IPsec when sending RADIUS
- extension traffic to any RADIUS client. If some RADIUS clients
- contacted by the server do not support IPsec, then a more granular
- policy will be required, such as "Initiate IPsec, from me to IPsec-
- capable-RADIUS-client, destination port UDP 3799".
-
- Where IPsec is used for security, and no RADIUS shared secret is
- configured, it is important that the RADIUS client and server perform
- an authorization check. Before enabling a host to act as a RADIUS
- client, the RADIUS server SHOULD check whether the host is authorized
- to provide network access. Similarly, before enabling a host to act
- as a RADIUS server, the RADIUS client SHOULD check whether the host
- is authorized for that role.
-
- RADIUS servers can be configured with the IP addresses (for IKE
- Aggressive Mode with pre-shared keys) or FQDNs (for certificate
- authentication) of RADIUS clients. Alternatively, if a separate
- Certification Authority (CA) exists for RADIUS clients, then the
- RADIUS server can configure this CA as a trust anchor [RFC3280] for
- use with IPsec.
-
- Similarly, RADIUS clients can be configured with the IP addresses
- (for IKE Aggressive Mode with pre-shared keys) or FQDNs (for
- certificate authentication) of RADIUS servers. Alternatively, if a
- separate CA exists for RADIUS servers, then the RADIUS client can
- configure this CA as a trust anchor for use with IPsec.
-
- Since unlike SSL/TLS, IKE does not permit certificate policies to be
- set on a per-port basis, certificate policies need to apply to all
- uses of IPsec on RADIUS clients and servers. In IPsec deployment
- supporting only certificate authentication, a management station
- initiating an IPsec-protected telnet session to the RADIUS server
- would need to obtain a certificate chaining to the RADIUS client CA.
- Issuing such a certificate might not be appropriate if the management
- station was not authorized as a RADIUS client.
-
- Where RADIUS clients may obtain their IP address dynamically (such as
- an Access Point supporting DHCP), Main Mode with pre-shared keys
- [RFC2409] SHOULD NOT be used, since this requires use of a group
-
-
-
-Chiba, et al. Informational [Page 24]
-
-RFC 3576 Dynamic Authorization Extensions to RADIUS July 2003
-
-
- pre-shared key; instead, Aggressive Mode SHOULD be used. Where
- RADIUS client addresses are statically assigned, either Aggressive
- Mode or Main Mode MAY be used. With certificate authentication, Main
- Mode SHOULD be used.
-
- Care needs to be taken with IKE Phase 1 Identity Payload selection in
- order to enable mapping of identities to pre-shared keys, even with
- Aggressive Mode. Where the ID_IPV4_ADDR or ID_IPV6_ADDR Identity
- Payloads are used and addresses are dynamically assigned, mapping of
- identities to keys is not possible, so that group pre-shared keys are
- still a practical necessity. As a result, the ID_FQDN identity
- payload SHOULD be employed in situations where Aggressive mode is
- utilized along with pre-shared keys and IP addresses are dynamically
- assigned. This approach also has other advantages, since it allows
- the RADIUS server and client to configure themselves based on the
- fully qualified domain name of their peers.
-
- Note that with IPsec, security services are negotiated at the
- granularity of an IPsec SA, so that RADIUS exchanges requiring a set
- of security services different from those negotiated with existing
- IPsec SAs will need to negotiate a new IPsec SA. Separate IPsec SAs
- are also advisable where quality of service considerations dictate
- different handling RADIUS conversations. Attempting to apply
- different quality of service to connections handled by the same IPsec
- SA can result in reordering, and falling outside the replay window.
- For a discussion of the issues, see [RFC2983].
-
-5.4. Replay Protection
-
- Where IPsec replay protection is not used, the Event-Timestamp (55)
- Attribute [RFC2869] SHOULD be included within all messages. When
- this attribute is present, both the NAS and the RADIUS server MUST
- check that the Event-Timestamp Attribute is current within an
- acceptable time window. If the Event-Timestamp Attribute is not
- current, then the message MUST be silently discarded. This implies
- the need for time synchronization within the network, which can be
- achieved by a variety of means, including secure NTP, as described in
- [NTPAUTH].
-
- Both the NAS and the RADIUS server SHOULD be configurable to silently
- discard messages lacking an Event-Timestamp Attribute. A default
- time window of 300 seconds is recommended.
-
-
-
-
-
-
-
-
-
-Chiba, et al. Informational [Page 25]
-
-RFC 3576 Dynamic Authorization Extensions to RADIUS July 2003
-
-
-6. Example Traces
-
- Disconnect Request with User-Name:
-
- 0: xxxx xxxx xxxx xxxx xxxx 2801 001c 1b23 .B.....$.-(....#
- 16: 624c 3543 ceba 55f1 be55 a714 ca5e 0108 bL5C..U..U...^..
- 32: 6d63 6869 6261
-
- Disconnect Request with Acct-Session-ID:
-
- 0: xxxx xxxx xxxx xxxx xxxx 2801 001e ad0d .B..... ~.(.....
- 16: 8e53 55b6 bd02 a0cb ace6 4e38 77bd 2c0a .SU.......N8w.,.
- 32: 3930 3233 3435 3637 90234567
-
- Disconnect Request with Framed-IP-Address:
-
- 0: xxxx xxxx xxxx xxxx xxxx 2801 001a 0bda .B....."2.(.....
- 16: 33fe 765b 05f0 fd9c c32a 2f6b 5182 0806 3.v[.....*/kQ...
- 32: 0a00 0203
-
-7. References
-
-7.1. Normative References
-
- [RFC1305] Mills, D., "Network Time Protocol (version 3)
- Specification, Implementation and Analysis", RFC 1305,
- March 1992.
-
- [RFC1321] Rivest, R., "The MD5 Message-Digest Algorithm", RFC
- 1321, April 1992.
-
- [RFC2104] Krawczyk, H., Bellare, M. and R. Canetti, "HMAC:
- Keyed-Hashing for Message Authentication", RFC 2104,
- February 1997.
-
- [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
- Requirement Levels", BCP 14, RFC 2119, March 1997.
-
- [RFC2401] Kent, S. and R. Atkinson, "Security Architecture for
- the Internet Protocol", RFC 2401, November 1998.
-
- [RFC2406] Kent, S. and R. Atkinson, "IP Encapsulating Security
- Payload (ESP)", RFC 2406, November 1998.
-
- [RFC2409] Harkins, D. and D. Carrel, "The Internet Key Exchange
- (IKE)", RFC 2409, November 1998.
-
-
-
-
-
-Chiba, et al. Informational [Page 26]
-
-RFC 3576 Dynamic Authorization Extensions to RADIUS July 2003
-
-
- [RFC2434] Narten, T. and H. Alvestrand, "Guidelines for Writing
- an IANA Considerations Section in RFCs", BCP 26, RFC
- 2434, October 1998.
-
- [RFC2486] Aboba, B. and M. Beadles, "The Network Access
- Identifier", RFC 2486, January 1999.
-
- [RFC2865] Rigney, C., Willens, S., Rubens, A. and W. Simpson,
- "Remote Authentication Dial In User Service (RADIUS)",
- RFC 2865, June 2000.
-
- [RFC2866] Rigney, C., "RADIUS Accounting", RFC 2866, June 2000.
-
- [RFC2869] Rigney, C., Willats, W. and P. Calhoun, "RADIUS
- Extensions", RFC 2869, June 2000.
-
- [RFC3162] Aboba, B., Zorn, G. and D. Mitton, "RADIUS and IPv6",
- RFC 3162, August 2001.
-
- [RFC3280] Housley, R., Polk, W., Ford, W. and D. Solo, "Internet
- X.509 Public Key Infrastructure Certificate and
- Certificate Revocation List (CRL) Profile", RFC 3280,
- April 2002.
-
- [RADIANA] Aboba, B., "IANA Considerations for RADIUS (Remote
- Authentication Dial In User Service)", RFC 3575, July
- 2003.
-
-7.2. Informative References
-
- [RFC2882] Mitton, D., "Network Access Server Requirements:
- Extended RADIUS Practices", RFC 2882, July 2000.
-
- [RFC2983] Black, D. "Differentiated Services and Tunnels", RFC
- 2983, October 2000.
-
- [AAATransport] Aboba, B. and J. Wood, "Authentication, Authorization
- and Accounting (AAA) Transport Profile", RFC 3539,
- June 2003.
-
- [Diameter] Calhoun, P., et al., "Diameter Base Protocol", Work in
- Progress.
-
- [MD5Attack] Dobbertin, H., "The Status of MD5 After a Recent
- Attack", CryptoBytes Vol.2 No.2, Summer 1996.
-
- [NASREQ] Calhoun, P., et al., "Diameter Network Access Server
- Application", Work in Progress.
-
-
-
-Chiba, et al. Informational [Page 27]
-
-RFC 3576 Dynamic Authorization Extensions to RADIUS July 2003
-
-
- [NTPAUTH] Mills, D., "Public Key Cryptography for the Network
- Time Protocol", Work in Progress.
-
-8. Intellectual Property Statement
-
- The IETF takes no position regarding the validity or scope of any
- intellectual property or other rights that might be claimed to
- pertain to the implementation or use of the technology described in
- this document or the extent to which any license under such rights
- might or might not be available; neither does it represent that it
- has made any effort to identify any such rights. Information on the
- IETF's procedures with respect to rights in standards-track and
- standards- related documentation can be found in BCP-11. Copies of
- claims of rights made available for publication and any assurances of
- licenses to be made available, or the result of an attempt made to
- obtain a general license or permission for the use of such
- proprietary rights by implementers or users of this specification can
- be obtained from the IETF Secretariat.
-
- The IETF invites any interested party to bring to its attention any
- copyrights, patents or patent applications, or other proprietary
- rights which may cover technology that may be required to practice
- this standard. Please address the information to the IETF Executive
- Director.
-
-9. Acknowledgments
-
- This protocol was first developed and distributed by Ascend
- Communications. Example code was distributed in their free server
- kit.
-
- The authors would like to acknowledge the valuable suggestions and
- feedback from the following people:
-
- Avi Lior <avi@bridgewatersystems.com>,
- Randy Bush <randy@psg.net>,
- Steve Bellovin <smb@research.att.com>
- Glen Zorn <gwz@cisco.com>,
- Mark Jones <mjones@bridgewatersystems.com>,
- Claudio Lapidus <clapidus@hotmail.com>,
- Anurag Batta <Anurag_Batta@3com.com>,
- Kuntal Chowdhury <chowdury@nortelnetworks.com>, and
- Tim Moore <timmoore@microsoft.com>.
- Russ Housley <housley@vigilsec.com>
-
-
-
-
-
-
-
-Chiba, et al. Informational [Page 28]
-
-RFC 3576 Dynamic Authorization Extensions to RADIUS July 2003
-
-
-10. Authors' Addresses
-
- Murtaza Chiba
- Cisco Systems, Inc.
- 170 West Tasman Dr.
- San Jose CA, 95134
-
- EMail: mchiba@cisco.com
- Phone: +1 408 525 7198
-
- Gopal Dommety
- Cisco Systems, Inc.
- 170 West Tasman Dr.
- San Jose, CA 95134
-
- EMail: gdommety@cisco.com
- Phone: +1 408 525 1404
-
- Mark Eklund
- Cisco Systems, Inc.
- 170 West Tasman Dr.
- San Jose, CA 95134
-
- EMail: meklund@cisco.com
- Phone: +1 865 671 6255
-
- David Mitton
- Circular Logic UnLtd.
- 733 Turnpike Street #154
- North Andover, MA 01845
-
- EMail: david@mitton.com
- Phone: +1 978 683 1814
-
- Bernard Aboba
- Microsoft Corporation
- One Microsoft Way
- Redmond, WA 98052
-
- EMail: bernarda@microsoft.com
- Phone: +1 425 706 6605
- Fax: +1 425 936 7329
-
-
-
-
-
-
-
-
-
-Chiba, et al. Informational [Page 29]
-
-RFC 3576 Dynamic Authorization Extensions to RADIUS July 2003
-
-
-11. Full Copyright Statement
-
- Copyright (C) The Internet Society (2003). All Rights Reserved.
-
- This document and translations of it may be copied and furnished to
- others, and derivative works that comment on or otherwise explain it
- or assist in its implementation may be prepared, copied, published
- and distributed, in whole or in part, without restriction of any
- kind, provided that the above copyright notice and this paragraph are
- included on all such copies and derivative works. However, this
- document itself may not be modified in any way, such as by removing
- the copyright notice or references to the Internet Society or other
- Internet organizations, except as needed for the purpose of
- developing Internet standards in which case the procedures for
- copyrights defined in the Internet Standards process must be
- followed, or as required to translate it into languages other than
- English.
-
- The limited permissions granted above are perpetual and will not be
- revoked by the Internet Society or its successors or assignees.
-
- This document and the information contained herein is provided on an
- "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
- TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
- BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
- HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
- MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
-
-Acknowledgement
-
- Funding for the RFC Editor function is currently provided by the
- Internet Society.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-Chiba, et al. Informational [Page 30]
-