230 likes | 238 Views
This talk will introduce the data structure of the Access Bind PIB and discuss its dependencies on other documents. Topics covered include session creation, other related drafts, and a conclusion.
E N D
Accessor Issuesin the Access Bind PIB Freek Dijkstra Utrecht University, the Netherlands
Goal • Make you familiar with datastructure of the Access Bind PIB. • Make you aware of the dependency of the draft on other documents. Auth PIB Accessor Issues
Talk Outline • Introduction of keywords and physical model. • Discuss how and when new sessions are created. • Explain how this is implemented in our model. • Tell about other drafts where our data-structure refers to. • Conclusion. Auth PIB Accessor Issues
Device Names time U S E R P E P P D P Access request USER = Requester of the services PEP = Policy Enforcement Point (a NAD, Network Access Device, in AAA-terminology) PDP = Policy Decision Point (an AAA-Server) Access notification Access decision Access decision Access PIB Auth PIB Accessor Issues
Definitions • PEP = Policy Enforcement Point • PDP = Policy Decision Point • Sessions are created when an authentication dialogue starts • PIB = Policy Information Base • PRC, PRI, PRID = Part of PIB: Provisioning class, -instance, -identifier • Accessor = A table in our PIB Auth PIB Accessor Issues
time U S E R P E P P D P Connection Steps PEP notices user traffic/access request Access request to PDP Retrieve PEP knowledge about the user Credential negotiation (not shown) Provision PEP with policies Access decision (approval or denial) Access decision notification to user Usage of service Auth PIB Accessor Issues
Capability Exchange time P E P P D P “Capabilities” “Behaviour” U S E R Access request Access notification Access decision Access decision Access PIB Auth PIB Accessor Issues
Accessor The Accessor table: • … Is installed in the PEP by the PDP. • Specifies when a new session is created. • Specifies what information to sent along with a new authentication request. • Specifies how to retrieve this information (using which authentication protocol: PAP, CHAP, EAP-MD5, EAP-TLS, etc.). Auth PIB Accessor Issues
PIB Datastructure Accessor AccessorAuthProtocol AccessorAuthProtocol ContextData ContextData ContextData Accessor Element SessionScope Filter SessionScope Filter SessionScope DataPath Filter Auth PIB Accessor Issues
PIB Datastructure AuthProtocol Accessor AccessorAuthProtocol AccessorAuthProtocol ContextData ContextData ContextData Accessor Element SessionScope Filter SessionScope Filter SessionScope DataPath Filter Auth PIB Accessor Issues
PIB Datastructure Accessor AccessorAuthProtocol AccessorAuthProtocol AuthContext ContextData ContextData ContextData Accessor Element SessionScope Filter SessionScope Filter SessionScope DataPath Filter Auth PIB Accessor Issues
PIB Datastructure Accessor AccessorAuthProtocol AccessorAuthProtocol ElmRef ContextData ContextData ContextData Accessor Element SessionScope Filter SessionScope Filter SessionScope DataPath Filter Auth PIB Accessor Issues
PIB Datastructure Accessor AccessorAuthProtocol AccessorAuthProtocol ContextData ContextData ContextData Accessor Element ElementScope SessionScope Filter SessionScope Filter SessionScope DataPath Filter Auth PIB Accessor Issues
PIB Datastructure Accessor AccessorAuthProtocol AccessorAuthProtocol ContextData ContextData ContextData Accessor Element SessionScope Filter SessionScope Filter SessionScope DataPath Filter Auth PIB Accessor Issues
Framework PIB Filters • IP filter • 802 filter • Internal label filter Auth PIB Accessor Issues
Conclusion • Our model is potentially powerful; It can support any kind of trigger to create new sessions. • We depend on other framework PIBs which may or may not need be sufficient. There should go some effort in those as well, and that is out of scope of our draft, but in scope of the IETF in general. Auth PIB Accessor Issues
Freek Dijkstra Utrecht University, the Netherlands
PEP 17.1.13.15 17.5.8.1 17.0.0.0/8 17.1.2.4 meter other meter Auth PIB Accessor Issues
Example: Wireless Auth PIB Accessor Issues
Example: Dial-up Auth PIB Accessor Issues
Example: LAN Auth PIB Accessor Issues
Example: HTTP Auth PIB Accessor Issues
Example: Pizza phone orders Auth PIB Accessor Issues