⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rfc2882.txt

📁 gnu 的radius服务器很好用的
💻 TXT
📖 第 1 页 / 共 3 页
字号:
   done to support a superset of competing vendor's extensions, as well   as it's own, and include an extensions from a sister product.3.  Attribute Data Types   The base RFCs define only has 4 basic data types:   -    integer, 32 bit unsigned   -    string, 1-253 bytes, counted.   -    ipaddr, 32 bit IPv4   -    date, 32 bit Unix format.   Since then, various variations have been added:   The tunnel authentication document [6] adds an optional compound   "tag" byte to tunnel attributes.  These are a single byte prepended   to the data field in order to support sets of attributes to be   returned.  The byte value must be in the range 01-3F hex or it is   considered to be data.   Note that there is no native support for IPv6 addresses. In fact IPv6   support is missing in some fixed message components too.   There have been special attribute types created within servers.  For   packet filters, the format called "abinary" was created.  The user   enters an ASCII string filter description in the user profile, but   the server parses it into a binary string before passing it to the   NAS.  This lowers the complexity of the NAS parser.  Also a   "phonestring" server data type allows additional data type checking   at the entry application.Mitton                       Informational                      [Page 6]RFC 2882               Extended RADIUS Practices               July 20004.  New Messages   A number of new message types have been introduced by various parties   over time. The base specification has 6, vendors have added 26.   These fall into a number of categories which are described in the   next section below. Some of these messages are actually used between   the RADIUS server and some other resource server, using a RADIUS-like   protocol to implement new functions.         6 Accounting Status                  (now Interim Accounting [5])         7 Password Request         8 Password Ack         9 Password Reject         10 Accounting Message         21 Resource Free Request         22 Resource Free Response         23 Resource Query Request         24 Resource Query Response         25 Alternate Resource Reclaim Request         26 NAS Reboot Request         27 NAS Reboot Response         29 Next Passcode         30 New Pin         31 Terminate Session         32 Password Expired         33 Event Request         34 Event Response         40 Disconnect Request         41 Disconnect Ack         42 Disconnect Nak         43 Change Filters Request         44 Change Filters Ack         45 Change Filters Nak         50 IP Address Allocate         51 IP Address Release5.  Additional Functions   These are operations performed using RADIUS extensions and additional   messages types.Mitton                       Informational                      [Page 7]RFC 2882               Extended RADIUS Practices               July 20005.1.  Password Change   Remotely requested password change operations were described and   proposed, but rejected by the working group.  None the less, the   feature is still deployed in a number of products.   Message types:    - Password Request    - Password Ack or Reject5.2.  Authentication Modes   Additional message types have been added to negotiate passcode   changes for token card servers.    - Next Passcode    - New PIN    - Password Expired   They allow the NAS or RADIUS server negotiate passcode changes with   an external security server.5.3.  Menus   At least two vendors have built menuing interaction systems for use   with terminal dial-ins.   One implementation uses the Reply-Message string as the menu text to   be displayed, and the State attribute to keep track of the place in   the menu.  The menu is displayed using the Access-Challenge message.   The response is encoded in the User-Password field like an ordinary   challenge sequence would.   Some RADIUS clients have problems with this because they cannot   handle long or multiple Reply-Message attributes that may have   embedded carriage returns and line-feeds.  The new Echo attribute   should also control echo behavior on the menu response.   Use of the   State attribute to keep track of a Challenge sequence is also   standard behavior.   Another implementation uses two vendor attributes (VSA-Menu-Item, and   VSA-Menu-Selector as well as VSA-Third-Prompt) to convey this   information.  This implementation is vendor specific.Mitton                       Informational                      [Page 8]RFC 2882               Extended RADIUS Practices               July 20005.4.  Pseudo Users   One client implementation takes advantage of your vanilla RADIUS   server's ability to be used as a remote database server.  By using   some well-known, implementation specific, strings for Username and   Password attributes, the NAS can request information from the server,   such as:  Static IP routes, Static IPX routes, or the Message of the   Day.   These are called pseudo-user requests, because they use a user entry   with this manufactured name, for purposes other than authentication.   Another client also uses a pseudo-user technique for resolving   unknown Filter-ID(11) values.  An Access-Request message is sent to   the RADIUS server with the Filter-ID as the Username value, the   password is a known string, and the Service-Type is VSE-   Authorization-Only.  The response must also be of the same Service-   Type, or the response will be ignored.  The responding profile should   contain the IP-Filter VSA attributes that will define the desired   filter.   It should be noticed that pseudo-user profiles could be a security   problem if a specific or operationally invalid Service-Type is not   attached to the profile. The client should test for this returned   value, to prevent normal dial-in users from gaining access via this   profile.6.  Resource Management   Authorized sessions may need to be allocated additional dynamic   resources in order to perform their services.  The most typical is IP   addresses.  The allocation may want to be delayed until needed or   coordinated on a scale independent of the RADIUS server.  Additional   messages may be used to allocate and free these resources.  The   RADIUS server may proxy these requests to another server.   Examples: Certain servers can allocate addresses local to the NAS or   use an outboard address server.  Other servers have an internal   address pool capability, which will fill in the Framed-IP-Address   attribute with an assigned value based on pool selected.6.1.  Managed Resources:   Resources managed include: IP Addresses, Concurrent Logins, Dial-in   Port allocation policies, Tunnel limits and load distribution.Mitton                       Informational                      [Page 9]RFC 2882               Extended RADIUS Practices               July 2000   There are several different types of implementation techniques:    - Explicit request/free resource requests    - Monitor usage with deamons watching the state    - Explicit messages to a state deamon    - Monitor Accounting messages for state changes6.2.  Resource Management Messages   Messages used for resource management    - IP Address Allocate    - IP Address Release    - Resource Request    - Resource Response    - Resource Free Request    - Resource Free Response    - Resource Reclaim Request    - NAS Reboot Request/Response   These messages are used to allocate and free resources for a NAS from   a centralized server.  These mechanisms allows the service provider   better administrative control than some automated LAN services, which   don't have policy inputs or controls.6.3.  Concurrent Logins   The RADIUS protocol was designed to allow stateless servers.  That   is, servers that don't know the status of the active sessions.   However, it is very important for many service providers to keep   track of how many sessions a given user may have open, and   accordingly disallow access.   There are several different techniques used to implement login limits   on a RADIUS environment.  Some vendors have build NAS monitoring   tools either into their RADIUS servers, either directly or as   auxiliary deamons, that can check the session status of the   controlled NASes by SNMP or proprietary methods.   Other vendors monitor the RADIUS accesses and accounting messages and   derive state information from the requests.  This monitoring is not   as reliable as directly auditing the NAS, but it is also less vendor   specific, and can work with any RADIUS NAS, provided it sends both   streams to the same server.   Some of the approaches used:Mitton                       Informational                     [Page 10]RFC 2882               Extended RADIUS Practices               July 2000    - SNMP commands    - Telnet monitor deamon    - Accounting monitor6.4.  Authorization Changes:   To implement an active changes to a running session, such as filter   changes or timeout and disconnect, at least one vendor has added a   RADIUS "server" to his NAS. This server accepts messages sent from an   application in the network, and upon matching some session   information, will perform such operations.   Messages sent from Server to NAS    - Change Filter Request    - Change Filter Ack / Nak    - Disconnect Request    - Disconnect Response   Filters are used to limit the access the user has to the network by   restricting the systems and protocols he can send packets to.  Upon   fulfilling some registration with an authorization server, the   service provider may wish to remove those restrictions, or disconnect   the user.7.  Policy Services   Some vendors have implemented policy servers using RADIUS as the   control protocol.  Two prominent Policy Managers act as RADIUS proxy   filters and use RADIUS messages to deny access to new sessions that   exceed active policy limits.   One implementation behaves like a RADIUS proxy server, but with a   policy process governing it's forward decisions. Typically a pre-

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -