rfc2905.txt

来自「中、英文RFC文档大全打包下载完全版 .」· 文本 代码 · 共 1,607 行 · 第 1/5 页

TXT
1,607
字号
   9. The AAA protocol must allow for unsolicited messages to be sent to      a "client", such as the AAA client running on the Home Agent.4.  Bandwidth Broker   This section describes authorization aspects derived from the   Bandwidth Broker architecture as discussed within the Internet2 Qbone   BB Advisory Council.  We use authorization model concepts to identify   contract relationships and trust relationships, and we present   possible message exchanges.  We will derive a set of authorization   requirements for Bandwidth Brokers from our architectural model.  The   Internet 2 Qbone BB Advisory Council researches a single and multi-   domain implementation based on 2-tier authorization concepts.  A 3-   tier model is considered as a future work item and therefore not part   of this description. Information concerning the Internet 2 Bandwidth   Broker work and its concepts can be found at:      http://www.merit.edu/working.groups/i2-qbone-bb   The material in this section is based on [13] which is a work in   progress of the Internet2 Qbone BB Advisory Council.Vollbrecht, et al.           Informational                     [Page 12]RFC 2905         AAA Authorization Application Examples      August 20004.1.  Model Description   The establishment of a model involves four steps:   1. identification of the components that are involved and what they      are called in this specific environment,   2. identification of the relationships between the involved parties      that are based on some form of agreement,   3. identification of the relationships that are based on trust, and   4. consideration of the sequence of messages exchanged between      components.4.2.  Components of the Two-Tier Model for Bandwidth Brokerage   We will consider the components of a bandwidth broker transaction in   the context of the conceptual entities defined in [2].  The bandwidth   broker two-tier model recognizes a User and the Service Provider   controlling the Service Equipment.   The components are as follows:   -  The Service User (User) -- A person or process willing to use      certain level of QoS by requesting the allocation of a      quantifiable amount of resource between a selected destination and      itself.  In bandwidth broker terms, the User is called a Service      User, capable of generating a Resource Allocation Request (RAR).   -  The Bandwidth Broker (Service Provider) -- a function that      authorizes allocation of a specified amount of bandwidth resource      between an identified source and destination based on a set of      policies.  In this context we refer to this function as the      Bandwidth Broker.  A Bandwidth Broker is capable of managing the      resource availability within a network domain it controls.   Note: a 3-tier model involving a User Home Organization is recognized   in [13], however its development is left for future study and   therefore it is not discussed in this document.4.3.  Identification of Contractual Relationships   Authorizations to obtain bandwidth are based on contractual   relationships. In both the single and multi-domain cases, the current   Bandwidth Broker model assumes that a User always has a contractual   relationship with the service domain to which it is connected.Vollbrecht, et al.           Informational                     [Page 13]RFC 2905         AAA Authorization Application Examples      August 20004.3.1.  Single-Domain Case   In the single-domain case, the User has a contract with a single   Service Provider in a single service domain.                                    +-------------+                                    |             |                                    | +---------+ |                                    | |Bandwidth| |                  +-------+         | |Broker   | |                  |       |         | |         | |                  |Service|         | +---------+ |                  |User   |=========|             |                  |       |         | +---------+ |                  |       |         | | Network | |                  +-------+         | | Routing | |                                    | | Devices | |                                    | +---------+ |                                    | Autonomous  |                                    | Service     |                                    | Domain      |                                    +-------------+                  ==== contractual                       relationship     Fig. 5 -- Two-Tier Single Domain Contractual RelationshipsVollbrecht, et al.           Informational                     [Page 14]RFC 2905         AAA Authorization Application Examples      August 20004.3.2.  Multi-Domain Case   In the multi-domain case, the User has a contract with a single   Service Provider.  This Service Provider has a contract with   neighboring Service Providers.  This model is used when independent   autonomous networks establish contracts with each other.                        +-------------+        +-------------+                        |             |        |             |                        | +---------+ |        | +---------+ |                        | |Bandwidth| |        | |Bandwidth| |      +-------+         | |Broker   | |        | |Broker   | |      |       |         | |         | |        | |         | |      |Service|         | +---------+ |        | +---------+ |      |User   |=========|             |========|             |      |       |         | +---------+ |        | +---------+ |      |       |         | | Network | |        | | Network | |      +-------+         | | Routing | |        | | Routing | |                        | | Devices | |        | | Devices | |                        | +---------+ |        | +---------+ |                        | Autonomous  |        | Autonomous  |                        | Service     |        | Service     |                        | Domain A    |        | Domain B    |                        +-------------+        +-------------+      ==== contractual           relationship     Fig. 6 -- Two-Tier Multi-Domain Contractual RelationshipsVollbrecht, et al.           Informational                     [Page 15]RFC 2905         AAA Authorization Application Examples      August 20004.4.  Identification of Trust Relationships   Contractual relationships may be independent of how trust, which is   necessary to facilitate authenticated and possibly secure   communication, is implemented.  There are several alternatives in the   Bandwidth Broker environment to create trusted relationships.   Figures 7 and 8 show two alternatives that are options in the two-   tier Bandwidth Broker model.                        +-------------+        +-------------+                        |             |        |             |                        | +---------+ |        | +---------+ |                        | |Bandwidth| |        | |Bandwidth| |      +-------+         | |Broker   | |        | |Broker   | |      |       O***********O         O************O         | |      |Service|         | +----O----+ |        | +----O----+ |      |User   |=========|      *      |========|      *      |      |       |         | +----0----+ |        | +----O----+ |      |       |         | |Network  | |        | |Network  | |      +-------+         | |Routing  | |        | |Routing  | |                        | |Devices  | |        | |Devices  | |                        | +---------+ |        | +---------+ |                        | Autonomous  |        | Autonomous  |                        | Service     |        | Service     |                        | Domain A    |        | Domain B    |                        +-------------+        +-------------+      ==== contractual relationship      O**O trust relationship     Fig. 7 -- Two-Tier Multi-Domain Trust Relationships, alt 1Vollbrecht, et al.           Informational                     [Page 16]RFC 2905         AAA Authorization Application Examples      August 2000                        +-------------+        +-------------+                        |             |        |             |                        | +---------+ |        | +---------+ |                        | |Bandwidth| |        | |Bandwidth| |      +-------+         | |Broker   | |        | |Broker   | |      |       |         | |         | |        | |         | |      |Service|         | +----O----+ |        | +----O----+ |      |User   |=========|      *      |========|      *      |      |       |         | +----O----+ |        | +----O----+ |      |       O***********O Network O************O Network | |      +-------+         | | Routing | |        | | Routing | |                        | | Devices | |        | | Devices | |                        | +---------+ |        | +---------+ |                        | Autonomous  |        | Autonomous  |                        | Service     |        | Service     |                        | Domain A    |        | Domain B    |                        +-------------+        +-------------+      ==== contractual relationship      O**O trust relationship     Fig. 8 -- Two-Tier Multi-Domain Trust Relationships, alt 2   Although [13] does not recommend specifics regarding this question,   the document recognizes the need for trust relationships.  In the   first model, a trust relationship, based on some form of   authentication method, is created between the User and the Bandwidth   Broker and among Bandwidth Brokers.  In the second model, which   enjoys some popularity in enterprise networks, the trust relationship   may be established via the wiring closet and the knowledge of which   physical router port or MAC address is connected to which user.  The   router-Bandwidth Broker relationship may be established physically or   by some other authentication method or secure channel.   A Certificate Authority (CA) based trust relationship is shown in   figure 9.  In this figure, a CA signs public key certificates, which   then can be used in encrypted message exchanges using public keys   that are trusted by all involved.  As a first step, each involved   party must register with the CA so it can join a trust domain.  The   Router-Bandwidth Broker relationship may be established as described   in the two previous figures.  An interesting observation regarding   this kind of model is that the bandwidth broker in domain B may route   information to the user via the bandwidth broker in domain A without   BB1 being able to read the information (using end-to-end security).   This model creates a meshed trust relationship via a tree like CA   structure.Vollbrecht, et al.           Informational                     [Page 17]RFC 2905         AAA Authorization Application Examples      August 2000                               +-------------------+                               |  Certificate      |           ....................|  Authority        |          :                  ..|                   |..          :                 :  +-------------------+  :          :                 :                         :          :                 :                         :          :  ***************:***********************  :

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?