⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rfc2906.txt

📁 著名的RFC文档,其中有一些文档是已经翻译成中文的的.
💻 TXT
📖 第 1 页 / 共 4 页
字号:
2.1.18  A AAA protocol MUST allow authorization rules to be expressed in   terms of combinations of other authorization rules which have been   evaluated.   For example, access may only be granted if the requestor is member of   the backup users group and not a member of the administrator's group.   Note that this requirement does not state which types of combinations   are to be supported.Farrell, et al.              Informational                      [Page 6]RFC 2906             AAA Authorization Requirements          August 20002.1.19  It SHOULD be possible to make authorization decisions based on   the geographic location of a requestor, service or AAA entity.   This is just an example of an authorization attribute type, notable   because it requires different underlying implementation mechanisms.2.1.20  It SHOULD be possible to make authorization decisions based on   the identity or the equipment used by a requestor, service or AAA   entity.   This is just an example of an authorization attribute type, notable   because it may require different underlying implementation mechanisms   (if IPSec isn't available).2.1.21  When there are multiple instances of a given attribute, there   must be an unambiguous mechanism by which a receiving peer can   determine the value of specified instance.2.2 Security of authorization information2.2.1   It MUST be possible for authorization information to be   communicated securely in AAA and application protocols.  Mechanisms   that preserve authenticity, integrity and privacy for this   information MUST be specified.   This states that there must be a well-defined method for securing   authorization information, not that such methods must always be used.   Whether support for these mechanisms is to be required for   conformance is left open. In particular, mechanisms must be provided   so that a service administrator in the middle of a chain cannot read   or change authorization information being sent between other AAA   entities.2.2.2   AAA protocols MUST allow for use of an appropriate level of   security for authorization information. AAA protocols MUST be able to   support both highly secure and less secure mechanisms for data   integrity/confidentiality etc.   It is important that AAA protocols do not mandate too heavy a   security overhead, thus the security mechanisms specified don't   always need to be used (though not using them may affect the   authorization decision).2.2.3   The security requirements MAY differ between different parts of   a package of authorization information.   Some parts may require confidentiality and integrity, some may only   require integrity. This effectively states that we require somethingFarrell, et al.              Informational                      [Page 7]RFC 2906             AAA Authorization Requirements          August 2000   like selective field security mechanisms. For example, information   required to gain access to a network may have to be in clear, whilst   information required for access to an application within that network   may have to be encrypted in the AAA protocol.2.2.4   AAA protocols MUST provide mechanisms that prevent intermediate   administrators breaching security.   This is a basic requirement to prevent man-in-the-middle attacks, for   example where an intermediate administrator changes AAA messages on   the fly.2.2.5   AAA protocols MUST NOT open up replay attacks based on replay of   the authorization information.   For example, a AAA protocol should not allow flooding attacks where   the attacker replays AAA messages that require the recipient to use a   lot of CPU or communications before the replay is detected.2.2.6   AAA protocols MUST be capable of leveraging any underlying peer   entity authentication mechanisms that may have been applied - this   MAY provide additional assurance that the owner of the authorization   information is the same as the authenticated entity.  For example, if   IPSec provides sufficient authentication, then it must be possible to   omit AAA protocol authentication.2.2.7   End-to-end confidentiality, integrity, peer-entity-   authentication, or non-repudiation MAY be required for packages of   authorization information.   This states that confidentiality, (resp. the other security   services), may have to be provided for parts of a AAA message, even   where it is transmitted via other AAA entities. It does allow that   such a AAA message may also contain non-confidential, resp. the other   security services), parts. In addition, intermediate AAA entities may   themselves be considered end-points for end-to-end security services   applied to other parts of the AAA message.2.2.8   AAA protocols MUST be usable even in environments where no peer   entity authentication is required (e.g. a network address on a secure   LAN may be enough to decide).   This requirement (in a sense the opposite of 2.2.6), indicates the   level of flexibility that is required in order to make the AAA   protocol useful across a broad range of applications/services.Farrell, et al.              Informational                      [Page 8]RFC 2906             AAA Authorization Requirements          August 20002.2.9   AAA protocols MUST specify "secure" defaults for all protocol   options. Implementations of AAA entities MUST use these "secure"   defaults unless otherwise configured/administered.   This states that the out-of-the-box configuration must be "secure",   for example, authorization decisions should result in denial of   access until a AAA entity is configured. Note that the interpretation   of "secure" will vary on a case-by-case basis, though the principle   remains the same.2.3 Time2.3.1   Authorization information MUST be timely, which means that it   MUST expire and in some cases MAY be revoked before expiry.   This states that authorization information itself is never to be   considered valid for all time, every piece of authorization   information must have associated either an explicit or implicit   validity period or time-to-live.2.3.2   AAA protocols MUST provide mechanisms for revoking authorization   information, in particular privileges.   Where the validity or time-to-live is long, it may be necessary to   revoke the authorization information, e.g. where someone leaves a   company. Note that this requirement does not mandate a particular   scheme for revocation, so that it is not a requirement for blacklists   or CRLs.2.3.3   A set of attributes MAY have an associated validity period -   such that that the set MUST only be used for authorization decisions   during that period. The validity period may be relatively long, (e.g.   months) or short (hours, minutes).   This states that explicit validity periods are, in some cases, needed   at the field level.2.3.4   Authorization decisions MAY be time sensitive. Support for e.g.   "working hours" or equivalent MUST be possible.   This states that the AAA protocol must be able to support the   transmission of time control attributes, although it does not mandate   that AAA protocols must include a standard way of expressing the   "working hours" type constraint.Farrell, et al.              Informational                      [Page 9]RFC 2906             AAA Authorization Requirements          August 20002.3.5   It MUST be possible to support authorization decisions that   produce time dependent results.   For example, an authorization result may be that service should be   provided for a certain period. In such cases a AAA protocol must be   able to transport this information, possibly as a specific result of   the authorization decision, or, as an additional "termination of   service" AAA message transmitted later.2.3.6   It MUST be possible to support models where the authorization   information is issued in well in advance of an authorization decision   rather than near the time of the authorization decision.   This is required in order to support pre-paid (as opposed to   subscription) scenarios (e.g. for VoIP).2.3.7   It SHOULD be possible to support models where the authorization   decision is made in advance of a service request.   This is for some applications such as backup, where actions are   scheduled for future dates. It also covers applications that require   reservation of resources.2.3.8   A AAA mechanism must allow time stamp information to be carried   along with authorization information (e.g. for non-repudiation).   The PKIX WG is developing a time stamp protocol, which can be used as   part of a non-repudiation solution. In some environments it may be   necessary that certain AAA protocol messages are timestamped (by a   trusted authority) and that the timestamps are forwarded within   subsequent AAA messages.2.4 Topology2.4.1   AAA protocols MUST be able to support the use of the push, pull   and agent models.   This states that a protocol that only supported one model, say pull,   would not meet the requirements of all the applications. The models   are defined in [FRMW].2.4.2   In transactions/sessions, which involve more than one AAA   entity, each "hop" MAY use a different push/pull/agent model.   For example, in the mobile IP case, a "foreign" AAA server might pull   authorization information from a broker, whereas the broker might   push some authorization information to a "home" AAA server.Farrell, et al.              Informational                     [Page 10]RFC 2906             AAA Authorization Requirements          August 20002.4.3   AAA Protocols MUST cater for applications and services where the   entities involved in the application or AAA protocols belong to   different (security) domains.   This states that it must be possible for any AAA protocol message to   cross security or administrative domain boundaries. Typically, higher   levels of security will be applied when crossing such boundaries, and   accounting mechanisms may also have to be more stringent.2.4.4   AAA protocols MUST support roaming.   Roaming here may also be thought of as "away-from-home" operation.   For example, this is a fundamental requirement for the mobile IP   case.2.4.5   AAA protocols SHOULD support dynamic mobility   Dynamic mobility here means that a client moves from one domain to   another, without having to completely re-establish e.g. whatever AAA   session information is being maintained.2.4.6   An authorization decision MAY have to be made before the   requestor has any other connection to a network.   For example, this means that the requestor can't go anywhere on the   network to fetch anything and must do requests via an   application/service or via an intermediate AAA entity. The AAA   protocol should not overexpose such a server to denial-of-service   attacks.2.4.7   AAA protocols MUST support the use of intermediate AAA entities   which take part in authorization transactions but which don't "own"   any of the end entities or authorization data.   In some environments (e.g. roamops), these entities are termed   brokers (though these are not the same as bandwidth brokers in the   QoS environment).2.4.8   AAA protocols MAY support cases where an intermediate AAA entity   returns a forwarding address to a requestor or AAA entity, in order   that the requestor or originating AAA entity can contact another AAA   entity.   This requirement recognizes that there will be routing issues with   AAA servers, and that this requires that AAA protocols are able to   help with such routing. For example, in the mobile IP case, a broker   may be required, in part to allow the foreign and home AAA servers to   get in contact.Farrell, et al.              Informational                     [Page 11]RFC 2906             AAA Authorization Requirements          August 20002.4.9   It MUST be possible for an access decision function to discover   the AAA server of a requestor. If the requestor provides information   used in this discovery process then the access decision function MUST   be able to verify this information in a trusted manner.   This states that not only do AAA servers have to be able to find one   another, but that sometimes an application entity may have to find an   appropriate AAA server.2.5 Application Proxying2.5.1   AAA protocols MUST support cases where applications use proxies,   that is, an application entity (C), originates a service request to a   peer (I) and this intermediary (I) also initiates a service request   on behalf of the client (C) to a final target (T).  AAA protocols   MUST be such that the authorization decision made at T, MAY depend on   the authorization information associated with C and/or with I. This   "application proxying" must not introduce new security weaknesses in   the AAA protocols. There MAY be chains of application proxies of any   length.   Note that this requirement addresses application layer proxying - not   chains of AAA servers. For example, a chain of HTTP proxies might   each want to restrict the content they serve to the "outside".  As

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -