Hi, Alan:
----- Original Message ----- 
From: "Alan DeKok" <al...@deployingradius.com>
To: "Joseph Salowey (jsalowey)" <jsalo...@cisco.com>
Cc: <emu@ietf.org>
Sent: Friday, August 14, 2009 2:16 PM
Subject: Re: [Emu] EAP and authorization


> Joseph Salowey (jsalowey) wrote:
>> There are other ways in which EAP has proposed authorization
>> enhancements.  Other proposals have dealt with requesting authorizations
>> for or providing authorization data to services other than the one that
>> is performing the authentication.  In addition proposals have discussed
>> authorization after the initial authentication to the service.  
> 
>  I think part of the concern here is that authorization has
> traditionally involved the PDP telling the PEP how the user should be
> treated.  The proposals on the table for EAP do not communicate
> authorization information over EAP to the PEP.  As such, they do not fit
> well into the traditional model.
> 
>> I think carrying channel bindings within EAP is useful and necessary.  I
>> believe it is also reasonable to carry other exchanges to establish data
>> for authorization.
> 
>  ... of who, to what?  This could be made clearer in the document.
> 
>>  However, I think there are some limitations.  For
>> example carrying large amounts of data is probably not a good thing.  I
>> also think we have to be careful to not leave end stations with the only
>> means to communicate is through EAP.  I don't think we should be
>> applying patches or browsing the web through EAP (I don't think anyone
>> is proposing this, but I'm not certain).
> 
>  I can propose EAP-IP: carrying IP packets in EAP.  It's crazy, but
> possible.  The main limitation on bulk data transfer is that most EAP to
> RADIUS gateways (AP's, etc.) will terminate an EAP session after ~50
> packets.

[Qin] Why not carry EAP over Http, in this way, you can browse Web through EAP.
Actually there are still other way for Web Authentication, e.g., SIP.

>> When we get into the realm of using EAP for establishing authorization
>> data for other services, requesting authorization or invoking
>> authorization at times other than authentication I think there is a much
>> bigger gray area.  
> 
>  ERP is leveraging EAP to obtain authentication and authorization at
> later points in time.  This seems to be acceptable.

[Qin]: I agree that the authorization is well integrated into ERP 
authentication. 
However these authorization data (i.e., authorization indication described in 
section 5.3.4 of ERP)
is only limited to Called-Station-Id ,Calling-Station-Id , NAS-Identifier, 
NAS-IP-address, NAS-IPv6-address which is listed in RFC3748.
What's more, ERP has nothing to do with EAP method.

>  Alan DeKok.
> _______________________________________________
> Emu mailing list
> Emu@ietf.org
> https://www.ietf.org/mailman/listinfo/emu
_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to