On Apr 18, 2020, at 2:05 PM, Rick van Rein <r...@openfortress.nl> wrote:
> The reason for Diameter is that it scales up to the Internet (in terms
> of connection pooling / efficiency and in terms of security).  RADIUS is
> really useful for internal networks, but becomes rather clumsy when
> crossing the Internet -- it is not suited for worldwide public service.

  Uh.... what?

  RADIUS is used in Eduroam, which is a worldwide public service.  There are 
many other roaming groups using RADIUS.

  It seems to be fine.  I'm not sure why you think otherwise.

>>  TBH, I can't recall seeing many WiFi deployments which use Diameter.  None 
>> of the access points support it. Similarly, EAP over LAN is implemented in 
>> most switches, but they definitely don't do Diameter.
> 
> Catch-22 -- no use case, no software.  That's why I'm describing the use
> case here.

  That is definitely *not* the reason people avoided Diameter.

  The reason is simple: RADIUS does everything that the enterprises and ISPS 
need.  Even Telcos use RADIUS for many things.

  Diameter won in the Telco space because (at a high level) it was mandated in 
the 3G standards.  And even it seems to be dropped in 5G, in favour of JSON 
over QUIC.

  So your starting assumptions are wrong, which makes it easier for your 
conclusions to end up in the wrong place.

> A patchy solution is possible for closed routers; RADIUS and Diameter
> can crossover, so a local node doing that is possible.

  The Diameter protocol is about 100x more complex than RADIUS.  It will take 
*years* before router vendors release inter-operable Diameter clients.  Their 
best bet is to just do RADIUS, and rely on a Diameter server in order to do 
RADIUS to Diameter translation.

  There is just too little benefit for vendors to implement this in their 
client products.

>>  Is there a specific reason why Diameter was chosen?
> 
> Certainly,
> 
> - It enforces mutually authenticated TLS for peer-validation

  There is a RADIUS over TLS transport, which is widely implemented and 
deployed.  There's also dynamic peer discovery.  Less widely implemented, but 
definitely used.

> - It does not silently assume a profile but negotiates at startup

  A profile for... what?

> - It can pool validated TLS connections for reuse

  RADIUS implementations already do this.  Source code is available.

> - It runs over SCTP for realiability without head-of-line blocing

  It *theoretically* runs over SCTP.  In practice, SCTP is not widely used.

> Yes it is separate, and just here to give you some context.  There are
> several AVP sets for tunneling in RADIUS / Diameter, and making a choice
> would probably help the crossover to work in general.

  In RADIUS, those attributes provide for VLAN assignment.  They don't provide 
for secure tunnels to "home" networks.

  Diameter may be different, as I haven't looked at in detail.

  The short summary is that if you want this to be widely used in the short 
term, you should define a RADIUS transport. 

  While freeDiameter exists, it doesn't seem to have an active mailing list.  
It's policy capability appears small.  It seems to be mainly a proxy.  Which 
means that you are limiting the market for this idea to people who are willing 
to pay $100K+ for a commercial Diameter product.

  Such a strong limitation means that this idea is likely to be dead in the 
water even before it starts.  I would therefore suggest expanding the use-case 
for this proposal.

  Alan DeKok.

_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to