📄 rfc2477.txt
字号:
Network Working Group B. Aboba
Request for Comments: 2477 G. Zorn
Category: Informational Microsoft Corporation
January 1999
Criteria for Evaluating Roaming Protocols
Status of this Memo
This memo provides information for the Internet community. It does
not specify an Internet standard of any kind. Distribution of this
memo is unlimited.
Copyright Notice
Copyright (C) The Internet Society (1999). All Rights Reserved.
1. Abstract
This document describes requirements for the provisioning of "roaming
capability" for dialup Internet users. "Roaming capability" is
defined as the ability to use multiple Internet service providers
(ISPs), while maintaining a formal, customer-vendor relationship with
only one.
2. Introduction
Operational roaming services are currently providing worldwide
roaming capabilities, and these services continue to grow in
popularity [1]. Interested parties have included:
Regional Internet Service Providers (ISPs) operating within a
particular state or province, looking to combine their efforts
with those of other regional providers to offer services over a
wider area.
National ISPs wishing to combine their operations with those of
one or more ISPs in another nation to provide greater coverage in
a group of countries or on a continent.
Businesses desiring to offer their employees a comprehensive
package of dialup services on a global basis. Those services can
include Internet access as well as secure access to corporate
intranets via a Virtual Private Network (VPN).
Aboba & Zorn Informational [Page 1]
RFC 2477 Evaluating Roaming Protocols January 1999
This document provides an architectural framework for the
provisioning of roaming capabilities, as well as describing the
requirements that must be met by elements of the architecture.
2.1. Requirements language
In this document, the key words "MAY", "MUST, "MUST NOT", "optional",
"recommended", "SHOULD", and "SHOULD NOT", are to be interpreted as
described in [4].
Please note that the requirements specified in this document are to
be used in evaluating protocol submissions. As such, the
requirements language refers to capabilities of these protocols; the
protocol documents will specify whether these features are required,
recommended, or optional for use in roaming. For example, requiring
that a protocol support confidentiality is NOT the same thing as
requiring that all protocol traffic be encrypted.
A protocol submission is not compliant if it fails to satisfy one or
more of the must or must not requirements for the capabilities that
it implements. A protocol submission that satisfies all the must,
must not, should and should not requirements for its capabilities is
said to be "unconditionally compliant"; one that satisfies all the
must and must not requirements but not all the should or should not
requirements for its protocols is said to be "conditionally
compliant."
2.2. Terminology
This document frequently uses the following terms:
phone book
This is a database or document containing data pertaining to
dialup access, including phone numbers and any associated
attributes.
phone book server
This is a server that maintains the latest version of the phone
book. Clients communicate with phone book servers in order to
keep their phone books up to date.
Network Access Server
The Network Access Server (NAS) is the device that clients dial in
order to get access to the network.
Authentication server
This is a server which provides for authentication/authorization
within the roaming architecture.
Aboba & Zorn Informational [Page 2]
RFC 2477 Evaluating Roaming Protocols January 1999
Accounting server
This is a server which provides for accounting within the roaming
architecture.
Authentication proxy
Authentication proxies may be deployed within the roaming
architecture for several purposes, including authentication
forwarding, policy implementation, shared secret management, and
attribute editing. To the NAS, the authentication proxy appears
to act as an authentication server; to the authentication server,
the proxy appears to act as an authentication client.
Accounting proxy
Accounting proxies may be deployed within the roaming architecture
for several purposes, including accounting forwarding, reliability
improvement, auditing, and "pseudo-transactional" capability. To
the NAS, the accounting proxy appears to act as an accounting
server; to the accounting server, the proxy appears to act as an
accounting client.
Network Access Identifier
In order to provide for the routing of authentication and
accounting packets, user name MAY contain structure. This
structure provides a means by which the authentication or
accounting proxies will locate the authentication or accounting
server that is to receive the request.
3. Architectural framework
The roaming architecture consists of three major subsystems:
Phone book Subsystem
Authentication Subsystem
Accounting Subsystem
The phone book subsystem is concerned with the maintenance and
updating of the user phone book. The phone book provides the user
with information on the location and phone numbers of Points of
Presence (POPs) that are roaming enabled. The function of the
authentication subsystem is to provide authorized users with access
to the POPs in the phonebook, and to deny access to unauthorized
users. The goal of the accounting subsystem is to provide
information on the resources utilized during the user's session.
3.1. Phone Book Subsystem
The phone book subsystem provides for the following:
Aboba & Zorn Informational [Page 3]
RFC 2477 Evaluating Roaming Protocols January 1999
Phone number presentation
Phone number exchange
Phone book compilation
Phone book update
Phone number presentation
Phone number presentation involves the display of available phone
numbers to the user, and culminates in the choosing of a number.
Since the user interface and sequence of events involved in phone
number presentation is a function of the connection management
software being used, it is likely that individual vendors will
take different approaches to the problem. These differences can
include variances in the format of the client phone books, varying
approaches to presentation, etc. There is no inherent problem
with this. As a result, phone number presentation need not be
standardized.
Phone number exchange
Phone number exchange involves propagation of phone number changes
between providers in a roaming association. Current roaming
implementations do not provide for complete automation of the
phone number exchange process [1]. As a result, phone number
exchange need not be standardized at this time.
Phone book compilation
Once an ISP's phone book server has received its updates it needs
to compile a new phone book and propagate this phone book to all
the phone book servers operated by that ISP. Given that the
compilation process does not affect protocol interoperability, it
need not be standardized.
Phone book update
Once the phone book is compiled, it needs to be propagated to
users. Standardization of the phone book update process allows
for providers to update user phone books, independent of their
client software or operating system.
3.2. Authentication Subsystem
The authentication subsystem provides for the following:
Connection management
Authentication
NAS Configuration/Authorization
Address Assignment/Routing
Security
Aboba & Zorn Informational [Page 4]
RFC 2477 Evaluating Roaming Protocols January 1999
Connection management
In order to be able to use the POPs of the local provider, it is
first necessary to bring up a connection.
Identification
Authentication consists of two parts: the claim of identity (or
identification) and the proof of the claim (or verification). As
part of the authentication process, users identify themselves to
the Network Access Server (NAS) in a manner that allows the
authentication request to be routed its home destination.
Authentication
Authentication is typically required prior to allowing access to
the network. CHAP [8] and PAP [9] are the two authentication
protocols most commonly used within the PPP [10] framework today.
Some groups of users are requiring different forms of proof of
identity (e.g., token or smart cards, Kerberos credentials, etc.)
for special purposes (such as acquiring access to corporate
intranets). The Extensible Authentication Protocol (EAP) [7] was
created in order to provide a general mechanism for support of
these methods.
NAS configuration/authorization
In order to set up the session, authorization parameters need to
be sent to from the home authentication server to the local ISP's
NAS.
Address assignment/routing
If it is desired that the user be able to communicate with the
rest of the Internet, then the session will be assigned a routable
IP address by the NAS.
Security
In the process of authenticating and authorizing the user session,
it may be desirable to provide protection against a variety of
security threats.
3.3. Accounting Subsystem
The function of the accounting subsystem is to enable the
participants in the roaming consortium to keep track of what
resources are used during a session. Relevant information includes
how long the user was connected to the service, connection speed,
port type, etc.
Aboba & Zorn Informational [Page 5]
RFC 2477 Evaluating Roaming Protocols January 1999
4. Roaming Requirements
4.1. Phonebook requirements
4.1.1. Phone book update protocol
Portability
The update protocol MUST allow for updating of clients on a range of
platforms and operating systems. Therefore the update mechanism MUST
NOT impose any operating system-specific requirements.
Authentication
The client MUST be able to determine the authenticity of the server
sending the phone book update. The server MAY also be able to
authenticate the client.
Versioning
The update protocol MUST provide for updating of the phone book from
an arbitrary previous version to the latest available version.
Integrity Checking
The client MUST be able to determine the integrity of the received
update before applying it, and MUST be able to determine the
integrity of the newly produced phone book after updating it.
Light weight transfers
Since the client may be a low-end machine or internet appliance, the
update protocol MUST be lightweight.
Language support
The phone book update mechanism MUST support the ability to request
that the phone book be transmitted in a particular language and
character set. For example, if the customer has a Russian language
software package, then the propagation and update protocols MUST
provide a mechanism for the user to request a Russian language phone
book.
4.1.2. Phone book format
Phone number attributes
The phone book format MUST support phone number attributes commonly
used by Internet service providers. These attributes are required in
order to provide users with information on the capabilities of the
available phone numbers.
Provider attributes
In addition to providing information relating to a given phone
number, the phone book MUST provide information on the individual
Aboba & Zorn Informational [Page 6]
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -