⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rfc2477.txt

📁 <VC++网络游戏建摸与实现>源代码
💻 TXT
📖 第 1 页 / 共 2 页
字号:
Network Working Group                                          B. AbobaRequest for Comments: 2477                                      G. ZornCategory: Informational                           Microsoft Corporation                                                           January 1999               Criteria for Evaluating Roaming ProtocolsStatus of this Memo   This memo provides information for the Internet community.  It does   not specify an Internet standard of any kind.  Distribution of this   memo is unlimited.Copyright Notice   Copyright (C) The Internet Society (1999).  All Rights Reserved.1.  Abstract   This document describes requirements for the provisioning of "roaming   capability" for dialup Internet users.  "Roaming capability" is   defined as the ability to use multiple Internet service providers   (ISPs), while maintaining a formal, customer-vendor relationship with   only one.2.  Introduction   Operational roaming services are currently providing worldwide   roaming capabilities, and these services continue to grow in   popularity [1].  Interested parties have included:      Regional Internet Service Providers (ISPs) operating within a      particular state or province, looking to combine their efforts      with those of other regional providers to offer services over a      wider area.      National ISPs wishing to combine their operations with those of      one or more ISPs in another nation to provide greater coverage in      a group of countries or on a continent.      Businesses desiring to offer their employees a comprehensive      package of dialup services on a global basis.  Those services can      include Internet access as well as secure access to corporate      intranets via a Virtual Private Network (VPN).Aboba & Zorn                 Informational                      [Page 1]RFC 2477              Evaluating Roaming Protocols          January 1999   This document provides an architectural framework for the   provisioning of roaming capabilities, as well as describing the   requirements that must be met by elements of the architecture.2.1.  Requirements language   In this document, the key words "MAY", "MUST, "MUST NOT", "optional",   "recommended", "SHOULD", and "SHOULD NOT", are to be interpreted as   described in [4].   Please note that the requirements specified in this document are to   be used in evaluating protocol submissions.  As such, the   requirements language refers to capabilities of these protocols; the   protocol documents will specify whether these features are required,   recommended, or optional for use in roaming.  For example, requiring   that a protocol support confidentiality is NOT the same thing as   requiring that all protocol traffic be encrypted.   A protocol submission is not compliant if it fails to satisfy one or   more of the must or must not requirements for the capabilities that   it implements.  A protocol submission that satisfies all the must,   must not, should and should not requirements for its capabilities is   said to be "unconditionally compliant"; one that satisfies all the   must and must not requirements but not all the should or should not   requirements for its protocols is said to be "conditionally   compliant."2.2.  Terminology   This document frequently uses the following terms:   phone book      This is a database or document containing data pertaining to      dialup access, including phone numbers and any associated      attributes.   phone book server      This is a server that maintains the latest version of the phone      book.  Clients communicate with phone book servers in order to      keep their phone books up to date.   Network Access Server      The Network Access Server (NAS) is the device that clients dial in      order to get access to the network.   Authentication server      This is a server which provides for authentication/authorization      within the roaming architecture.Aboba & Zorn                 Informational                      [Page 2]RFC 2477              Evaluating Roaming Protocols          January 1999   Accounting server      This is a server which provides for accounting within the roaming      architecture.   Authentication proxy      Authentication proxies may be deployed within the roaming      architecture for several purposes, including authentication      forwarding, policy implementation, shared secret management, and      attribute editing.  To the NAS, the authentication proxy appears      to act as an authentication server; to the authentication server,      the proxy appears to act as an authentication client.   Accounting proxy      Accounting proxies may be deployed within the roaming architecture      for several purposes, including accounting forwarding, reliability      improvement, auditing, and "pseudo-transactional" capability.  To      the NAS, the accounting proxy appears to act as an accounting      server; to the accounting server, the proxy appears to act as an      accounting client.   Network Access Identifier      In order to provide for the routing of authentication and      accounting packets, user name MAY contain structure.  This      structure provides a means by which the authentication or      accounting proxies will locate the authentication or accounting      server that is to receive the request.3.  Architectural framework   The roaming architecture consists of three major subsystems:      Phone book Subsystem      Authentication Subsystem      Accounting Subsystem   The phone book subsystem is concerned with the maintenance and   updating of the user phone book.  The phone book provides the user   with information on the location and phone numbers of Points of   Presence (POPs) that are roaming enabled.  The function of the   authentication subsystem is to provide authorized users with access   to the POPs in the phonebook, and to deny access to unauthorized   users.  The goal of the accounting subsystem is to provide   information on the resources utilized during the user's session.3.1.  Phone Book Subsystem   The phone book subsystem provides for the following:Aboba & Zorn                 Informational                      [Page 3]RFC 2477              Evaluating Roaming Protocols          January 1999      Phone number presentation      Phone number exchange      Phone book compilation      Phone book update   Phone number presentation      Phone number presentation involves the display of available phone      numbers to the user, and culminates in the choosing of a number.      Since the user interface and sequence of events involved in phone      number presentation is a function of the connection management      software being used, it is likely that individual vendors will      take different approaches to the problem.  These differences can      include variances in the format of the client phone books, varying      approaches to presentation, etc.  There is no inherent problem      with this. As a result, phone number presentation need not be      standardized.   Phone number exchange      Phone number exchange involves propagation of phone number changes      between providers in a roaming association.  Current roaming      implementations do not provide for complete automation of the      phone number exchange process [1].  As a result, phone number      exchange need not be standardized at this time.   Phone book compilation      Once an ISP's phone book server has received its updates it needs      to compile a new phone book and propagate this phone book to all      the phone book servers operated by that ISP.  Given that the      compilation process does not affect protocol interoperability, it      need not be standardized.   Phone book update      Once the phone book is compiled, it needs to be propagated to      users.  Standardization of the phone book update process allows      for providers to update user phone books, independent of their      client software or operating system.3.2.  Authentication Subsystem   The authentication subsystem provides for the following:      Connection management      Authentication      NAS Configuration/Authorization      Address Assignment/Routing      SecurityAboba & Zorn                 Informational                      [Page 4]RFC 2477              Evaluating Roaming Protocols          January 1999   Connection management      In order to be able to use the POPs of the local provider, it is      first necessary to bring up a connection.   Identification      Authentication consists of two parts: the claim of identity (or      identification) and the proof of the claim (or verification).  As      part of the authentication process, users identify themselves to      the Network Access Server (NAS) in a manner that allows the      authentication request to be routed its home destination.   Authentication      Authentication is typically required prior to allowing access to      the network.  CHAP [8] and PAP [9] are the two authentication      protocols most commonly used within the PPP [10] framework today.      Some groups of users are requiring different forms of proof of      identity (e.g., token or smart cards, Kerberos credentials, etc.)      for special purposes (such as acquiring access to corporate      intranets).  The Extensible Authentication Protocol (EAP) [7] was      created in order to provide a general mechanism for support of      these methods.   NAS configuration/authorization      In order to set up the session, authorization parameters need to      be sent to from the home authentication server to the local ISP's      NAS.   Address assignment/routing      If it is desired that the user be able to communicate with the      rest of the Internet, then the session will be assigned a routable      IP address by the NAS.   Security      In the process of authenticating and authorizing the user session,      it may be desirable to provide protection against a variety of      security threats.3.3.  Accounting Subsystem   The function of the accounting subsystem is to enable the   participants in the roaming consortium to keep track of what   resources are used during a session. Relevant information includes   how long the user was connected to the service, connection speed,   port type, etc.Aboba & Zorn                 Informational                      [Page 5]RFC 2477              Evaluating Roaming Protocols          January 19994.  Roaming Requirements4.1.  Phonebook requirements4.1.1.  Phone book update protocol   Portability   The update protocol MUST allow for updating of clients on a range of   platforms and operating systems. Therefore the update mechanism MUST   NOT impose any operating system-specific requirements.   Authentication   The client MUST be able to determine the authenticity of the server   sending the phone book update.  The server MAY also be able to   authenticate the client.   Versioning   The update protocol MUST provide for updating of the phone book from   an arbitrary previous version to the latest available version.   Integrity Checking   The client MUST be able to determine the integrity of the received   update before applying it, and MUST be able to determine the   integrity of the newly produced phone book after updating it.   Light weight transfers   Since the client may be a low-end machine or internet appliance, the   update protocol MUST be lightweight.   Language support   The phone book update mechanism MUST support the ability to request   that the phone book be transmitted in a particular language and   character set.  For example, if the customer has a Russian language   software package, then the propagation and update protocols MUST   provide a mechanism for the user to request a Russian language phone   book.4.1.2.  Phone book format   Phone number attributes   The phone book format MUST support phone number attributes commonly   used by Internet service providers.  These attributes are required in   order to provide users with information on the capabilities of the   available phone numbers.   Provider attributes   In addition to providing information relating to a given phone   number, the phone book MUST provide information on the individualAboba & Zorn                 Informational                      [Page 6]

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -