On Aug 2, 2023, at 1:49 PM, Eliot Lear <l...@lear.ch> wrote:
> I don't think this is a substantive change, because what Heikki is raising is 
> entirely a matter of server-side policy.  I also am not sure it's the right 
> change.  For one thing, if a server is willing to issue a new certificate, 
> that's likely a policy statement that everything is AOK.  For another, this 
> ISN'T a change of identity, and so there is really no need to re-evaluate 
> other policy aspects.

  The "change of identity" is the important bit, I think.  How about this:

If the identity changes, as with some provisioning flows. the server SHOULD 
cause the EAP peer to re-authenticate.  This reauthentication can be done by 
returning an EAP Failure in order to cause the client to reconnect, or via a 
RADIUS Disconnect-Request packet after authentication, or change the 
authorization via a RADIUS CoA-Request, via other means.  This reauthentication 
is done in order to ensure that the user or device is accessing the network not 
only with the correct credentials, 

Note: this means EAP-Failure is *not* a "provisioning failed" message!

On the other hand, if a users credentials are re-provisioned, then the identity 
is unchanged, and there is no need to change the authorization of the current 
session.

>  Finally, in my opinion, it makes sense that during onboarding a device might 
> need to be classified into a policy group, but if that is to change, then a 
> COA seems more appropriate at the radius level, rather than forcing a 
> re-connect.
> 
> Keep this in mind: end devices should be presumed to be pressed for 
> resources, and anything requiring additional unnecessary authentications 
> should be avoided in that case.
> 
> But again, this is all server side policy.  The only aspect for the client is 
> that it should know when to re-authenticate if the server requires it.

  Agreed.

  Alan DeKok.

_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to