⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rfc2989.txt

📁 著名的RFC文档,其中有一些文档是已经翻译成中文的的.
💻 TXT
📖 第 1 页 / 共 4 页
字号:
Network Working Group                                 B. Aboba, MicrosoftRequest for Comments: 2989   P. Calhoun, S. Glass, Sun Microsystems, Inc.Category: Informational T. Hiller, P. McCann, H. Shiino, P. Walsh, Lucent                                 G. Zorn, G. Dommety, Cisco Systems, Inc.                           C. Perkins, B. Patil, Nokia Telecommunications                                   D. Mitton, S. Manning, Nortel Networks                                              M. Beadles, SmartPipes Inc.                                                         X. Chen, Alcatel                         S. Sivalingham, Ericsson Wireless Communications                                                       A. Hameed, Fujitsu                                                  M. Munson, GTE Wireless                                              S. Jacobs, GTE Laboratories                            B. Lim, LG Information & Communications, Ltd.                                                   B. Hirschman, Motorola                                                   R. Hsu, Qualcomm, Inc.                         H. Koo, Samsung Telecommunications America, Inc.                                                   M. Lipford, Sprint PCS                                            E. Campbell, 3Com Corporation                                                Y. Xu, Watercove Networks                                  S. Baba, Toshiba America Research, Inc.                                            E. Jaques, Vodaphone Airtouch                                                            November 2000        Criteria for Evaluating AAA Protocols for Network AccessStatus of this Memo   This memo provides information for the Internet community.  It does   not specify an Internet standard of any kind.  Distribution of this   memo is unlimited.Copyright Notice   Copyright (C) The Internet Society (2000).  All Rights Reserved.Abstract   This document represents a summary of Authentication, Authorization,   Accounting (AAA) protocol requirements for network access.  In   creating this document, inputs were taken from documents produced by   the Network Access Server Requirements Next Generation (NASREQ),   Roaming Operations (ROAMOPS), and MOBILEIP working groups, as well as   from TIA 45.6.Aboba, et al.                Informational                      [Page 1]RFC 2989         Network Access AAA Evaluation Criteria    November 2000   This document summarizes the requirements collected from those   sources, separating requirements for authentication, authorization   and accounting.  Details on the requirements are available in the   original documents.1.  Introduction   This document represents a summary of AAA protocol requirements for   network access.  In creating this documents, inputs were taken from   documents produced by the NASREQ [3], ROAMOPS [2], and MOBILEIP [5]   working groups, as well as from TIA 45.6 [4].  This document   summarizes the requirements collected from those sources, separating   requirements for authentication, authorization and accounting.   Details on the requirements are available in the original documents.1.1.  Requirements language   In this document, the key words "MAY", "MUST, "MUST NOT", "optional",   "recommended", "SHOULD", and "SHOULD NOT", are to be interpreted as   described in [1].   Please note that the requirements specified in this document are to   be used in evaluating AAA protocol submissions.  As such, the   requirements language refers to capabilities of these protocols; the   protocol documents will specify whether these features are required,   recommended, or optional.  For example, requiring that a protocol   support confidentiality is NOT the same thing as requiring that all   protocol traffic be encrypted.   A protocol submission is not compliant if it fails to satisfy one or   more of the MUST or MUST NOT requirements for the capabilities that   it implements.  A protocol submission that satisfies all the MUST,   MUST NOT, SHOULD and SHOULD NOT requirements for its capabilities is   said to be "unconditionally compliant"; one that satisfies all the   MUST and MUST NOT requirements but not all the SHOULD or SHOULD NOT   requirements for its protocols is said to be "conditionally   compliant."Aboba, et al.                Informational                      [Page 2]RFC 2989         Network Access AAA Evaluation Criteria    November 20001.2.  Terminology   Accounting             The act of collecting information on resource usage for the             purpose of trend analysis, auditing, billing, or cost             allocation.   Administrative Domain             An internet, or a collection of networks, computers, and             databases under a common administration.  Computer entities             operating in a common administration may be assumed to             share administratively created security associations.   Attendant A node designed to provide the service interface between a             client and the local domain.   Authentication             The act of verifying a claimed identity, in the form of a             pre-existing label from a mutually known name space, as the             originator of a message (message authentication) or as the             end-point of a channel (entity authentication).   Authorization             The act of determining if a particular right, such as             access to some resource, can be granted to the presenter of             a particular credential.   Billing   The act of preparing an invoice.   Broker    A Broker is an entity that is in a different administrative             domain from both the home AAA server and the local ISP, and             which provides services, such as facilitating payments             between the local ISP and home administrative entities.             There are two different types of brokers; proxy and             routing.   Client    A node wishing to obtain service from an attendant within             an administrative domain.   End-to-End             End-to-End is the security model that requires that             security information be able to traverse, and be validated             even when an AAA message is processed by intermediate nodes             such as proxies, brokers, etc.Aboba, et al.                Informational                      [Page 3]RFC 2989         Network Access AAA Evaluation Criteria    November 2000   Foreign Domain             An administrative domain, visited by a Mobile IP client,             and containing the AAA infrastructure needed to carry out             the necessary operations enabling Mobile IP registrations.             From the point of view of the foreign agent, the foreign             domain is the local domain.   Home Domain             An administrative domain, containing the network whose             prefix matches that of a mobile node's home address, and             containing the AAA infrastructure needed to carry out the             necessary operations enabling Mobile IP registrations.             From the point of view of the home agent, the home domain             is the local domain.   Hop-by-hop             Hop-by-hop is the security model that requires that each             direct set of peers in a proxy network share a security             association, and the security information does not traverse             a AAA entity.   Inter-domain Accounting             Inter-domain accounting is the collection of information on             resource usage of an entity within an administrative             domain, for use within another administrative domain.  In             inter-domain accounting, accounting packets and session             records will typically cross administrative boundaries.   Intra-domain Accounting             Intra-domain accounting is the collection of information on             resource within an administrative domain, for use within             that domain.  In intra-domain accounting, accounting             packets and session records typically do not cross             administrative boundaries.   Local Domain             An administrative domain containing the AAA infrastructure             of immediate interest to a Mobile IP client when it is away             from home.   Proxy     A AAA proxy is an entity that acts as both a client and a             server.  When a request is received from a client, the             proxy acts as a AAA server.  When the same request needs to             be forwarded to another AAA entity, the proxy acts as a AAA             client.Aboba, et al.                Informational                      [Page 4]RFC 2989         Network Access AAA Evaluation Criteria    November 2000   Local Proxy             A Local Proxy is a AAA server that satisfies the definition             of a Proxy, and exists within the same administrative             domain as the network device (e.g., NAS) that issued the             AAA request.  Typically, a local proxy will enforce local             policies prior to forwarding responses to the network             devices, and are generally used to multiplex AAA messages             from a large number of network devices.   Network Access Identifier             The Network Access Identifier (NAI) is the userID submitted             by the client during network access authentication.  In             roaming, the purpose of the NAI is to identify the user as             well as to assist in the routing of the authentication             request.  The NAI may not necessarily be the same as the             user's e-mail address or the user-ID submitted in an             application layer authentication.   Routing Broker             A Routing Broker is a AAA entity that satisfies the             definition of a Broker, but is NOT in the transmission path             of AAA messages between the local ISP and the home domain's             AAA servers.  When a request is received by a Routing             Broker, information is returned to the AAA requester that             includes the information necessary for it to be able to             contact the Home AAA server directly.  Certain             organizations providing Routing Broker services MAY also             act as a Certificate Authority, allowing the Routing Broker             to return the certificates necessary for the local ISP and             the home AAA servers to communicate securely.   Non-Proxy Broker             A Routing Broker is occasionally referred to as a Non-Proxy             Broker.   Proxy Broker             A Proxy Broker is a AAA entity that satisfies the             definition of a Broker, and acts as a Transparent Proxy by             acting as the forwarding agent for all AAA messages between             the local ISP and the home domain's AAA servers.   Real-time Accounting             Real-time accounting involves the processing of information             on resource usage within a defined time window.  Time             constraints are typically imposed in order to limit             financial risk.Aboba, et al.                Informational                      [Page 5]RFC 2989         Network Access AAA Evaluation Criteria    November 2000   Roaming Capability             Roaming capability can be loosely defined as the ability to             use any one of multiple Internet service providers (ISPs),             while maintaining a formal, customer-vendor relationship             with only one.  Examples of cases where roaming capability             might be required include ISP "confederations" and ISP-             provided corporate network access support.   Session record             A session record represents a summary of the resource             consumption of a user over the entire session.  Accounting             gateways creating the session record may do so by             processing interim accounting events.   Transparent Proxy             A Transparent Proxy is a AAA server that satisfies the             definition of a Proxy, but does not enforce any local             policies (meaning that it does not add, delete or modify             attributes or modify information within messages it             forwards).2.  Requirements Summary   The AAA protocol evaluation criteria for network access are   summarized below.  For details on the requirements, please consult   the documents referenced in the footnotes.Aboba, et al.                Informational                      [Page 6]RFC 2989         Network Access AAA Evaluation Criteria    November 20002.1.  General requirements   These requirements apply to all aspects of AAA and thus are   considered general requirements.   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |                           |         |         |         |   |  General                  | NASREQ  | ROAMOPS | MOBILE  |   |  Reqts.                   |         |         |   IP    |   |                           |         |         |         |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |                           |         |         |         |   |   Scalability             |    M    |   M     |    M    |   |      a                    |   12    |   3     |  30 39  |   |                           |         |         |         |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |                           |         |         |         |   |   Fail-over               |    M    |         |    M    |   |      b                    |   12    |         |   31    |   |                           |         |         |         |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |                           |         |         |         |   |   Mutual auth             |    M    |         |    M    |   |   AAA client/server       |   16    |         |   30    |   |      c                    |         |         |         |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |                           |         |         |         |   |   Transmission level      |         |   M     |    S    |   |   security                |         |   6     |  31 39  |   |      d                    |         |         |         |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |                           |         |         |         |   |  Data object              |    M    |   M     |    M    |   |  Confidentiality          |   26    |   6     |   40    |   |      e                    |         |         |         |   |                           |         |         |         |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |                           |         |         |         |   |  Data object              |    M    |   M     |    M    |   |  Integrity                |   16    |   6     |  31 39  |   |      f                    |         |         |         |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |                           |         |         |         |   |  Certificate transport    |    M    |         |  S/M    |   |      g                    |   42    |         |31,33/46 |   |                           |         |         |         |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -