⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rfc2904.txt

📁 著名的RFC文档,其中有一些文档是已经翻译成中文的的.
💻 TXT
📖 第 1 页 / 共 5 页
字号:
Vollbrecht, et al.           Informational                     [Page 22]RFC 2904              AAA Authorization Framework            August 2000   new request.  To do this, each of the administrations in the   authorization path must be informed and agree to the change (this   could be considered to be "authorizing the new value").6.1.  Session Management and State Synchronization   When an AAA Server grants authorization of some resource to an AAA   requester (either a User or another AAA Server), the server may need   to maintain session state information.  This is used to make   decisions about new sessions based on the state of current sessions,   and to allow monitoring of sessions by all interested AAA Servers.   Each session is identified by a session identifier, which must be   unique within each AAA Server.  Communication between AAA Servers   must include the session identifier.  It is desirable that the   session identifier is the same across all AAA servers, otherwise each   server will have to map identifiers from other servers to its own   identifiers.  A single session identifier significantly simplifies   auditing and session control functions.   Maintaining session state across AAA administrative boundaries   increases the complexity of the problem, especially if each AAA   Server in the trust chain must keep state as well.  This can be   viewed as an interdomain database replication problem.  The protocol   must include tools to help manage replicated state.  Some of the   problems to be addressed are:   a) Service Equipment must be able to notify its Resource Manager when      a session terminates or changes state in some other way.  The      Resource Manager must inform other Resource Managers which keep      state for this session.   b) The Resource Manager will need to set a time limit for each      session which must be refreshed by having the Resource Manager      query for authoritative status or by having the authoritative      source send periodic keep alive messages that are forwarded to all      Resource Managers in the authorization chain.  Determining the      appropriate session lifetime may be application specific and      depends on the acceptable level of risk.  If the service being      offered is billed based on time, the session lifetime may need to      be relatively small; if the service is billed on usage, the      lifetime may be relatively large.   c) Any Resource Manager in the chain must have the ability to      terminate a session.  This requires the Resource Manager to have      knowledge of at least the adjacent AAA Servers in the      authorization chain.Vollbrecht, et al.           Informational                     [Page 23]RFC 2904              AAA Authorization Framework            August 2000   An example of how resource management can be used is in the PPP   dialin application.  A home ISP may wish to restrict the number of   concurrent sessions that a user can have at any given time.  This is   particularly important when service providers give all-you-can-eat   Internet access.  The possibility for fraud is quite large, since a   user could provide his or her username/password to many people,   causing a loss of revenue.  Resource management would allow the home   ISP AAA server to identify when a user is active and to reject any   authorization request for the user until termination indication is   received from the NAS or until the session expires.6.2.  The Resource Manager   This section describes the functions of the Resource Manager in more   detail.   The Resource Manager is the component which tracks the state of   sessions associated with an AAA Server or Service Equipment.  It also   may allocate resources to a session (e.g. IP addresses) and may track   use of resources allocated by peer resource managers to a session   (e.g. bandwidth in a foreign administrative domain).  The resource   manager also provides interfaces to allow the User to acquire or   release authorized sessions.   The Resource Manager maintains all session specific AAA state   information required by the AAA Server.  That state information may   include pointers to peer Resource Managers in other administrative   domains that possess additional AAA state information that refers to   the same session.  The Resource Manager is the anchor point in the   AAA Server from which a session can be controlled, monitored, and   coordinated even if that session is consuming network resources or   services across multiple Service Provider administrative domains.   The Resource Manager has several important functions:   a) It allows a Service Provider operations staff to inspect the      status of any of the allocated resources and services including      resources that span foreign Service Provider administrative      boundaries.  The peer Resource Managers will cooperatively share      only the state information subset that is required to assist in      diagnosing cross-domain trouble tickets.  The network operator may      also modify or altogether cancel one of the User's active      authorizations.   b) It is the process contacted by other Resource Managers to inform      the AAA Server that a specific session has been cancelled.  This      information is relayed to the other peer Resource Managers that      also know about that session and hence must cancel it.Vollbrecht, et al.           Informational                     [Page 24]RFC 2904              AAA Authorization Framework            August 2000   c) The Resource Manager conceals the identity and location of its      private internal AAA components from other administrative domains      and from the User, while at the same time facilitating cooperation      between those domains.   d) The Resource Manager cooperates with "policy servers" or Policy      Decision Points (PDPs).  The Resource Manager maintains internal      state information, possibly complex cross-administrative domain      information, supported by dialogues with its peer Resource      Managers.  A policy server can use the state information when      evaluating a particular policy.   e) The separation of the Resource Manager and the policy server into      two distinct architectural components allows a single session to      span multiple administrative domains, where each administrative      domain has one or more policy server cooperating with its Resource      Manager.   AAA resource managers will normally use the same trust relationships   needed for authorization sequences.  It is possible for independent   relationships to be established, but that is discouraged.7.  AAA Message Forwarding and Delivery   An AAA Server is responsible for securely forwarding AAA messages to   the correct destination system or process in the AAA infrastructure.   Two well known examples are forwarding AAA messages for a roaming AAA   service, and forwarding AAA messages for a distributed AAA service.   The same principle can also be applied to intra-domain   communications.  The message forwarding is done in one of two modes.   The first mode is when an AAA server needs to forward a message to a   peer AAA server that has a known "logical destination address" that   must be resolved by an application-specific procedure into its actual   network address.  Typically the forwarding procedure indexes into a   database by an application-specific identifier to discover the peer's   network address.  For example, in the roaming dialin application, the   application-specific identifier may be an NAI. A bandwidth brokerage   application would use other search indices unique to its problem   domain to select the addressed peer AAA server. After the address   resolution procedure has completed successfully, then the AAA server   transmits the message to its peer over the connection associated with   that destination network address.   The second mode is when the AAA server already has an established   session representing an authorization.  The session's state contains   the addressing and context used to direct the message to its   destination peer AAA server, PDP, PEP, or User.  The message is sentVollbrecht, et al.           Informational                     [Page 25]RFC 2904              AAA Authorization Framework            August 2000   over the AAA server's connection to that destination peer,   multiplexed with other session's messages. The message must be   qualified by a session identifier that is understood by both end   points.  The AAA message's destination may be either intra-   administrative domain, or inter-administrative domain.  In the former   case, the destination process may reside on the same system as the   AAA server.   In addition to the above message forwarding processing, the   underlying message delivery service must meet the following   requirements:   -  Unicast capability -- An end system can send a message to any      other end system with minimal latency of session setup/disconnect      overhead messages, and no end system overhead of keeping state      information about every potential peer.   -  Data integrity and error detection -- This data transport protocol      assumes an underlying datagram network layer service that includes      packet discard on error detection, and data integrity protection      against third party modifications.   -  Reliable data transport assurance -- When an end system      successfully receives a message marked receipt requested, it must      acknowledge that message to the sending system by either      piggybacking the acknowledgement on an application-specific reply      message, or else as a standalone acknowledgement message.  The      sending system maintains a retry timer; when the timer expires,      the sending system retransmits a copy of its original message. It      gives up after a configurable number of unsuccessful retries.   -  Sequenced data delivery -- If multiple messages are sent between a      pair of end systems, those messages are delivered to the addressed      application in the same order as they were transmitted.      Duplicates are silently suppressed.   -  Responsive to network congestion feedback -- When the network      enters into congestion, the end systems must detect that      condition, and they must back off their transmission rate until      the congestion subsides.  The back off and recovery algorithms      must avoid oscillations.8.  End-to-End Security   When AAA servers communicate through intermediate AAA servers, such   as brokers, it may be necessary that a part of the payload be secure   between the originator and the target AAA server.  The security   requirement may consist of one or more of the following: end-to-endVollbrecht, et al.           Informational                     [Page 26]RFC 2904              AAA Authorization Framework            August 2000   message integrity, confidentiality, replay protection, and   nonrepudiation.  Furthermore, it is a requirement that intermediate   AAA servers be able to append information such as local policy to a   message before forwarding the message to its intended destination.   It may also be required that an intermediate AAA Server sign such   appended information.   This requirement has been clearly documented in [10], which describes   many current weaknesses of the RADIUS protocol [11] in roaming   networks since RADIUS does not provide such functionality.  One   well-known attack is the ability for the intermediate nodes to modify   critical accounting information, such as a session time.   Most popular security protocols (e.g. IPSec, SSL, etc.) do not   provide the ability to secure a portion of the payload. Therefore, it   may be necessary for the AAA protocol to implement its own security   extensions to provide end-to-end security.9.  Streamlined Authorization Process   The techniques described above allow for great flexibility in   distributing the components required for authentication and   authorization.  However, working groups such as Roamops and MobileIP   have identified requirements to minimize Internet traversals in order   to reduce latency.  To support these requirements, data fields   necessary for both authentication and authorization SHOULD be able to   be carried in a single message set.  This is especially important   when there are intermediate servers (such as Brokers) in the AAA   chain.   Furthermore, it should be possible for the Brokers to allow end-to-   end (direct) authentication and authorization.  This can be done as   follows. The User Home Organization generates a ticket which is   signed using the UHO's private key.  The ticket is carried in the   accounting messages. The accounting messages must flow through the   Broker since the Broker is acting as the settlement agent and   requires this information.  There are Brokers that will require to be   in the authentication and authorization path as well since they will   use this information to detect fraudulent activity, so the above   should be optional.   In order for end-to-end authentication and authorization to occur, it   may be necessary for the Broker to act as a certificate authority.   All members of the roaming consortium would be able to trust each   other (to an extent) using the certificates.  A Service Provider's   AAA server that sends a request to the Broker should be able to   receive a redirect message which would allow the two peers (Service   Provider and UHO) to interact directly.  The redirect message fromVollbrecht, et al.           Informational                     [Page 27]RFC 2904              AAA Authorization Framework            August 2000   the Broker should include the UHO's certificate, which eliminates the   Service Provider from accessing the certificate archive.  The request   from the Service Provider could include its own certificate, and a   token from the Broker's redirect message that is timestamped and   guarantees that the Service Provider is in good standing with the   Broker.  This eliminates the home domain from accessing the   Certificate Revocation List (CRL).10.  Summary of the Authorization Framework   The above has introduced the basic players in an authorization   transaction as User, User Home Organization, Service Provider's AAA   Server, and Service Equipment.  It has discussed relationships   between entities based on agreements or contracts, and on "trust".   Examples of authorization sequences have been given.   Concepts of roaming and distributed services have been briefly   described.  Combination of roaming and distributed services was also   considered and the concept of a "wholesaler" or Broker was   introduced. We have considered the use of policies and attribute   certificates to store and transmit auth

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -