idnits 2.17.1 draft-ietf-softwire-dslite-radius-ext-05.txt: Checking boilerplate required by RFC 5378 and the IETF Trust (see https://trustee.ietf.org/license-info): ---------------------------------------------------------------------------- No issues found here. Checking nits according to https://www.ietf.org/id-info/1id-guidelines.txt: ---------------------------------------------------------------------------- No issues found here. Checking nits according to https://www.ietf.org/id-info/checklist : ---------------------------------------------------------------------------- No issues found here. Miscellaneous warnings: ---------------------------------------------------------------------------- == The copyright year in the IETF Trust and authors Copyright Line does not match the current year == The document seems to contain a disclaimer for pre-RFC5378 work, but was first submitted on or after 10 November 2008. The disclaimer is usually necessary only for documents that revise or obsolete older RFCs, and that take significant amounts of text from those RFCs. If you can contact all authors of the source material and they are willing to grant the BCP78 rights to the IETF Trust, you can and should remove the disclaimer. Otherwise, the disclaimer is needed and you can ignore this comment. (See the Legal Provisions document at https://trustee.ietf.org/license-info for more information.) -- The document date (August 10, 2011) is 4635 days in the past. Is this intentional? Checking references for intended status: Proposed Standard ---------------------------------------------------------------------------- (See RFCs 3967 and 4897 for information about using normative references to lower-maturity documents in RFCs) ** Obsolete normative reference: RFC 3315 (Obsoleted by RFC 8415) == Outdated reference: A later version (-16) exists of draft-ietf-radext-ipv6-access-05 Summary: 1 error (**), 0 flaws (~~), 3 warnings (==), 1 comment (--). Run idnits with the --verbose option for more detailed information about the items above. -------------------------------------------------------------------------------- 2 softwire R. Maglione 3 Internet-Draft Telecom Italia 4 Intended status: Standards Track A. Durand 5 Expires: February 11, 2012 Juniper Networks 6 August 10, 2011 8 RADIUS Extensions for Dual-Stack Lite 9 draft-ietf-softwire-dslite-radius-ext-05 11 Abstract 13 Dual-Stack Lite is a solution to offer both IPv4 and IPv6 14 connectivity to customers which are addressed only with an IPv6 15 prefix. Dual-Stack Lite requires to pre-configure the Dual-Stack 16 Lite Address Family Transition Router (AFTR) tunnel information on 17 the Basic Bridging BroadBand (B4) element. In many networks, the 18 customer profile information may be stored in Authentication 19 Authorization and Accounting (AAA) servers while client 20 configurations are mainly provided through Dynamic Host Configuration 21 Protocol (DHCP). This document specifies a new Remote Authentication 22 Dial In User Service (RADIUS) attribute to carry Dual-Stack Lite 23 Address Family Transition Router Tunnel name; the RADIUS attribute is 24 defined based on the equivalent DHCPv6 OPTION_AFTR_NAME option. This 25 RADIUS attribute is meant to be used between the RADIUS Server and 26 the Network Access Server (NAS), it is not intended to be used 27 directly between the Basic Bridging BroadBand element and the RADIUS 28 Server. 30 Status of this Memo 32 This Internet-Draft is submitted in full conformance with the 33 provisions of BCP 78 and BCP 79. 35 Internet-Drafts are working documents of the Internet Engineering 36 Task Force (IETF). Note that other groups may also distribute 37 working documents as Internet-Drafts. The list of current Internet- 38 Drafts is at http://datatracker.ietf.org/drafts/current/. 40 Internet-Drafts are draft documents valid for a maximum of six months 41 and may be updated, replaced, or obsoleted by other documents at any 42 time. It is inappropriate to use Internet-Drafts as reference 43 material or to cite them other than as "work in progress." 45 This Internet-Draft will expire on February 11, 2012. 47 Copyright Notice 48 Copyright (c) 2011 IETF Trust and the persons identified as the 49 document authors. All rights reserved. 51 This document is subject to BCP 78 and the IETF Trust's Legal 52 Provisions Relating to IETF Documents 53 (http://trustee.ietf.org/license-info) in effect on the date of 54 publication of this document. Please review these documents 55 carefully, as they describe your rights and restrictions with respect 56 to this document. Code Components extracted from this document must 57 include Simplified BSD License text as described in Section 4.e of 58 the Trust Legal Provisions and are provided without warranty as 59 described in the Simplified BSD License. 61 This document may contain material from IETF Documents or IETF 62 Contributions published or made publicly available before November 63 10, 2008. The person(s) controlling the copyright in some of this 64 material may not have granted the IETF Trust the right to allow 65 modifications of such material outside the IETF Standards Process. 66 Without obtaining an adequate license from the person(s) controlling 67 the copyright in such materials, this document may not be modified 68 outside the IETF Standards Process, and derivative works of it may 69 not be created outside the IETF Standards Process, except to format 70 it for publication as an RFC or to translate it into languages other 71 than English. 73 Table of Contents 75 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 4 76 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 4 77 3. DS-Lite Configuration with RADIUS and DHCPv6 . . . . . . . . . 5 78 4. RADIUS Attribute . . . . . . . . . . . . . . . . . . . . . . . 7 79 4.1. DS-Lite-Tunnel-Name . . . . . . . . . . . . . . . . . . . 8 80 5. Table of attributes . . . . . . . . . . . . . . . . . . . . . 9 81 6. Security Considerations . . . . . . . . . . . . . . . . . . . 10 82 7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 10 83 8. References . . . . . . . . . . . . . . . . . . . . . . . . . . 10 84 8.1. Normative References . . . . . . . . . . . . . . . . . . . 10 85 8.2. Informative References . . . . . . . . . . . . . . . . . . 11 86 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 11 88 1. Introduction 90 Dual-Stack Lite [RFC6333] is a solution to offer both IPv4 and IPv6 91 connectivity to customers which are addressed only with an IPv6 92 prefix (no IPv4 address is assigned to the attachment device). One 93 of its key components is an IPv4-over-IPv6 tunnel, but a Dual-Stack- 94 Lite Basic Bridging BroadBand (B4) will not know if the network it is 95 attached to offers Dual-Stack Lite support, and if it did, would not 96 know the remote end of the tunnel to establish a connection. 98 To inform the Basic Bridging BroadBand (B4) of the Address Family 99 Transition Router's (AFTR) location, a Fully Qualified Domain Name 100 (FQDN) may be used. Once this information is conveyed, the presence 101 of the configuration indicating the AFTR's location also informs a 102 host to initiate Dual-Stack Lite (DS-Lite) service and become a 103 Softwire Initiator. 105 [RFC6334] specifies a DHCPv6 option which is meant to be used by a 106 Dual-Stack Lite client (Basic Bridging BroadBand element, B4) to 107 discover its Address Family Transition Router (AFTR) name. In order 108 to be able to populate such option the DHCPv6 Server must be pre- 109 provisioned with the Address Family Transition Router (AFTR) name. 111 In Broadband environments, customer profile may be managed by AAA 112 servers, together with user Authentication, Authorization, and 113 Accounting (AAA). Remote Authentication Dial In User Service 114 (RADIUS) protocol [RFC2865] is usually used by AAA Servers to 115 communicate with network elements. [I-D.ietf-radext-ipv6-access] 116 describes a typical broadband network scenario in which the Network 117 Access Server (NAS) acts as the access gateway for the users (hosts 118 or CPEs) and the NAS embeds a DHCPv6 Server function that allows it 119 to locally handle any DHCPv6 requests issued by the clients. 121 Since the DS-Lite AFTR information can be stored in AAA servers and 122 the client configuration is mainly provided through Dynamic Host 123 Configuration Protocol (DHCP) running between the NAS and the 124 requesting clients, a new RADIUS attribute is needed to send AFTR 125 information from AAA server to the NAS. 127 This document aims at defining a new RADIUS attribute to be used for 128 carrying the DS-Lite Tunnel Name, based on the equivalent DHCPv6 129 option already specified in [RFC6334] 131 2. Terminology 133 The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", 134 "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this 135 document are to be interpreted as described in [RFC2119]. 137 The terms DS-Lite Basic Bridging BroadBand element (B4) and the DS- 138 Lite Address Family Transition Router element (AFTR) are defined in 139 [RFC6333] 141 3. DS-Lite Configuration with RADIUS and DHCPv6 143 The Figure 1 illustrates how the RADIUS protocol and DHCPv6 work 144 together to accomplish DS-Lite configuration on the B4 element when a 145 PPP Session is used to provide connectivity to the user. 147 The Network Access Server (NAS) operates as a client of RADIUS and as 148 DHCP Server for DHC protocol. The NAS initially sends a RADIUS 149 Access Request message to the RADIUS server, requesting 150 authentication. Once the RADIUS server receives the request, it 151 validates the sending client and if the request is approved, the AAA 152 server replies with an Access Accept message including a list of 153 attribute-value pairs that describe the parameters to be used for 154 this session. This list may also contain the AFTR Tunnel Name. When 155 the NAS receives a DHCPv6 client request containing the DS-Lite 156 tunnel Option, the NAS shall use the name returned in the RADIUS DS- 157 Lite-Tunnel-Name attribute to populate the DHCPv6 OPTION_AFTR_NAME 158 option in the DHCPv6 reply message. 160 B4 NAS AAA 161 | | Server 162 | | | 163 |----PPP LCP Config Request------> | | 164 | | | 165 | |----Access-Request ---->| 166 | | | 167 | |<---- Access-Accept-----| 168 | | (DS-Lite-Tunnel-Name) | 169 |<-----PPP LCP Config ACK ----- | | 170 | | | 171 | | | 172 |------ PPP IPv6CP Config Req ---->| | 173 | | | 174 |<----- PPP IPv6CP Config ACK -----| | 175 | | | 176 |------- DHCPv6 Solicit -------->| | 177 | | | 178 |<-------DHCPv6 Advertisement -----| | 179 | (DHCPv6 OPTION_AFTR_NAME) | | 180 | | | 181 |------- DHCPv6 Request -------->| | 182 | | | 183 |<-------- DHCPv6 Reply --------- | | 184 | (DHCPv6 OPTION_AFTR_NAME) | | 186 DHCPv6 RADIUS 188 Figure 1: RADIUS and DHCPv6 Message Flow for a PPP Session 190 The Figure 2 illustrates how the RADIUS protocol and DHCPv6 work 191 together to accomplish DS-Lite configuration on the B4 element when 192 an IP Session is used to provide connectivity to the user. 194 The only difference between this message flow and previous one is 195 that in this scenario the interaction between NAS and AAA/ RADIUS 196 Server is triggered by the DHCPv6 Solicit message received by the NAS 197 from the B4 acting as DHCPv6 client, while in case of a PPP Session 198 the trigger is the PPP LCP Config Request message received by the 199 NAS. 201 B4 NAS AAA 202 | | Server 203 |------ DHCPv6 Solicit ---------> | | 204 | | | 205 | |----Access-Request ---->| 206 | | | 207 | |<-Access-Accept---------| 208 | | (DS-Lite-Tunnel-Name) | 209 | | | 210 |<-------DHCPv6 Advertisement------| | 211 | (DHCPv6 OPTION_AFTR_NAME) | | 212 | | | 213 |------- DHCPv6 Request -------->| | 214 | | | 215 | | | 216 | <---- DHCPv6 Reply ---- | | 217 | (DHCPv6 OPTION_AFTR_NAME) | | 219 DHCPv6 RADIUS 221 Figure 2: RADIUS and DHCPv6 Message Flow for an IP Session 223 After receiving the DS-Lite-Tunnel-Name in the initial Access-Accept 224 the NAS MUST store the received AFTR Tunnel Name locally. When the 225 B4 sends a DHCPv6 Renew message to request an extension of the 226 lifetimes for the assigned address or prefix, the NAS does not have 227 to initiate a new Access-Request towards the AAA server to request 228 the AFTR tunnel name. The NAS retrieves the previously stored AFTR 229 tunnel name and uses it in its reply. 231 According to [RFC3315] if the DHCPv6 server to which the DHCPv6 Renew 232 message was sent at time T1 has not responded, the DHCPv6 client 233 initiates a Rebind/Reply message exchange with any available server. 234 In this scenario the NAS receiving the DHCPv6 rebind message MUST 235 initiate a new Access-Request towards the AAA server. The NAS MAY 236 include the DS-Lite-Tunnel-Name attribute in its Access-Request. 238 If the NAS does not receive the DS-Lite-Tunnel-Name attribute in the 239 Access-Accept it MAY fallback to a pre-configured default tunnel 240 name, if any. If the NAS does not have any pre-configured default 241 tunnel name or if the NAS receives an Access-Reject, the tunnel 242 cannot be established and NAS MUST terminate the session towards the 243 B4. 245 4. RADIUS Attribute 247 This section specifies the format of the new RADIUS attribute. 249 4.1. DS-Lite-Tunnel-Name 251 Description 253 The DS-Lite-Tunnel-Name RADIUS attribute contains a Fully Qualified 254 Domain Name that refers to the AFTR the client is requested to 255 establish a connection with. The NAS SHALL use the name returned in 256 the RADIUS DS-Lite-Tunnel-Name attribute to populate the DHCPv6 257 OPTION_AFTR_NAME option [RFC6334] 259 This attribute MAY be used in Access-Request packets as a hint to the 260 RADIUS server; for example if the NAS is pre-configured with a 261 default tunnel name, this name MAY be inserted in the attribute. The 262 RADIUS server MAY ignore the hint sent by the NAS and it MAY assign a 263 different AFTR tunnel name. 265 If the NAS includes the DS-Lite-Tunnel-Name attribute, but the AAA 266 server does not recognize it, this attribute MUST be ignored by the 267 AAA Server. 269 If the NAS does not receive DS-Lite-Tunnel-Name attribute in the 270 Access-Accept it MAY fallback to a pre-configured default tunnel 271 name, if any. If the NAS does not have any pre-configured default 272 tunnel name, the tunnel can not be established. 274 If the NAS is pre-provisioned with a default AFTR tunnel name and the 275 AFTR tunnel name received in Access-Accept is different from the 276 configured default, then the AFTR tunnel name received in the Access- 277 Accept message MUST be used for the session. 279 If the NAS cannot support the received AFTR tunnel name for any 280 reason, the tunnel should not be established. 282 When the Access-Request is triggered by a DHCPv6 Rebind message if 283 the AFTR tunnel name received in the Access-Accept is different from 284 the currently used one for that session, the NAS MUST force the B4 to 285 re-establish the tunnel using the new AFTR name received in the 286 Access-Accept message. 288 If an implementation includes the Change-of-Authorization (CoA) 289 messages [RFC5176], they could be used to modify the current 290 established DS-Lite tunnel. When the NAS receives a CoA Request 291 message containing the DS-Lite-Tunnel-Name attribute, the NAS MUST 292 send a Reconfigure message to a B4 to inform the B4 that the NAS has 293 new or updated configuration parameters and that the B4 is to 294 initiate a Renew/Reply or Information-request/Reply transaction with 295 the NAS in order to receive the updated information. 297 Upon receiving an AFTR tunnel name different from the currently used 298 one, the B4 MUST terminate the current DS-Lite tunnel and the B4 MUST 299 establish a new DS-LITE tunnel with the specified AFTR. 301 The DS-Lite-Tunnel-Name RADIUS attribute MAY be present in 302 Accounting-Request records where the Acct-Status-Type is set to 303 Start, Stop or Interim-Update. The DS-Lite-Tunnel-Name RADIUS 304 attribute MUST NOT appear more than once in a message. 306 A summary of the DS-Lite-Tunnel-Name RADIUS attribute format is shown 307 below. The fields are transmitted from left to right. 309 0 1 2 3 310 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 311 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 312 | Type | Length | DS-Lite-Tunnel-Name(FQDN)... 313 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 315 Type: 317 TBA1 for DS-Lite-Tunnel-Name. 318 Length: 319 This field indicates the total length in octets of this 320 attribute including the Type, the Length fields and the length 321 in octets of the DS-Lite-Tunnel-Name field 323 DS-Lite-Tunnel-Name: 324 A single Fully Qualified Domain Name of the remote tunnel 325 endpoint, located at the DS-Lite AFTR. 327 As the DS-Lite-Tunnel-Name attribute is used to populate the DHCPv6 328 OPTION_AFTR_NAME option, the DS-Lite-Tunnel-Name field is formatted 329 as required in DHCPv6 (Section 8 of [RFC3315] "Representation and Use 330 of Domain Names"). Briefly, the format described is using a single 331 octet noting the length of one DNS label (limited to at most 63 332 octets), followed by the label contents. This repeats until all 333 labels in the FQDN are exhausted, including a terminating zero-length 334 label. Any updates to Section 8 of [RFC3315] also apply to encoding 335 of this field. 337 5. Table of attributes 339 The following tables provide a guide to which attributes may be found 340 in which kinds of packets, and in what quantity. 342 Access- Access- Access- Challenge Accounting # Attribute 343 Request Accept Reject Request 344 0-1 0-1 0 0 0-1 TBA1 DS-Lite-Tunnel-Name 346 CoA-Request CoA-ACK CoA-NACK # Attribute 347 0-1 0 0 TBA1 DS-Lite-Tunnel-Name 349 The following table defines the meaning of the above table entries. 351 0 This attribute MUST NOT be present in packet. 352 0+ Zero or more instances of this attribute MAY be present in 353 packet. 354 0-1 Zero or one instance of this attribute MAY be present in packet. 356 6. Security Considerations 358 This document has no additional security considerations beyond those 359 already identified in [RFC2865] 361 [RFC6333] discusses Dual-Stack Lite related security issues. 363 7. IANA Considerations 365 This document requests the allocation of a new Radius attribute types 366 from the IANA registry "Radius Attribute Types" located at 367 http://www.iana.org/assignments/radius-types 369 DS-Lite-Tunnel-Name - TBA1 371 8. References 373 8.1. Normative References 375 [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate 376 Requirement Levels", BCP 14, RFC 2119, March 1997. 378 [RFC2865] Rigney, C., Willens, S., Rubens, A., and W. Simpson, 379 "Remote Authentication Dial In User Service (RADIUS)", 380 RFC 2865, June 2000. 382 [RFC3315] Droms, R., Bound, J., Volz, B., Lemon, T., Perkins, C., 383 and M. Carney, "Dynamic Host Configuration Protocol for 384 IPv6 (DHCPv6)", RFC 3315, July 2003. 386 [RFC6333] Durand, A., Droms, R., Woodyatt, J., and Y. Lee, "Dual- 387 Stack Lite Broadband Deployments Following IPv4 388 Exhaustion", RFC 6333, August 2011. 390 [RFC6334] Hankins, D. and T. Mrugalski, "Dynamic Host Configuration 391 Protocol for IPv6 (DHCPv6) Option for Dual-Stack Lite", 392 RFC 6334, August 2011. 394 8.2. Informative References 396 [I-D.ietf-radext-ipv6-access] 397 Lourdelet, B., Dec, W., Sarikaya, B., Zorn, G., and D. 398 Miles, "RADIUS attributes for IPv6 Access Networks", 399 draft-ietf-radext-ipv6-access-05 (work in progress), 400 July 2011. 402 [RFC5176] Chiba, M., Dommety, G., Eklund, M., Mitton, D., and B. 403 Aboba, "Dynamic Authorization Extensions to Remote 404 Authentication Dial In User Service (RADIUS)", RFC 5176, 405 January 2008. 407 Authors' Addresses 409 Roberta Maglione 410 Telecom Italia 411 Via Reiss Romoli 274 412 Torino 10148 413 Italy 415 Phone: 416 Email: roberta.maglione@telecomitalia.it 418 Alain Durand 419 Juniper Networks 420 1194 North Mathilda Avenue 421 Sunnyvale, CA 94089-1206 422 USA 424 Phone: 425 Fax: 426 Email: adurand@juniper.net 427 URI: