1 / 7

DSLF Subscriber Auth Requirements and IETF PANA Protocol

DSLF Subscriber Auth Requirements and IETF PANA Protocol. PANA WG Chairs IETF 70 Dec 7, 2007 – Vancouver, Canada. DSLF. https://datatracker.ietf.org/documents/LIAISON/file457.doc

saad
Télécharger la présentation

DSLF Subscriber Auth Requirements and IETF PANA Protocol

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. DSLF Subscriber Auth Requirementsand IETF PANA Protocol PANA WG Chairs IETF 70 Dec 7, 2007 – Vancouver, Canada

  2. DSLF https://datatracker.ietf.org/documents/LIAISON/file457.doc “In 2006 the DSL Forum initiated a work item on "IP Sessions" with the intention of bringing some of the attributes of PPP to purely IP access scenarios. In particular IP over Ethernet over DSL in the context of our technical report TR-101. In the course of this work we have developed and agreed upon a set of requirements for subscriber authentication (summarized on the following page). We are not currently aware of a solution specified in the industry that meets our requirements. Can you advise us if you have a specified solution or whether a suitable solution is under your consideration. “ IETF 70 – PANA WG

  3. IETF PANA WG • RFC 4508 Appendix A. Problem Statement DSL networks are a specific example where PANA has the potential for addressing some of the deployment scenarios. Some DSL deployments do not use PPP [RFC1661] as the access link-layer (IP is carried over ATM and the subscriber device is either statically or DHCP- configured). The operators of these networks are left either using an application-layer web-based login (captive portal) scheme for subscriber authentication, or providing a best-effort service only as they cannot perform subscriber authentication required for the differentiated services. The captive portal scheme is a non-standard solution that has various limitations and security flaws. IETF 70 – PANA WG

  4. Analysis IETF 70 – PANA WG

  5. Analysis IETF 70 – PANA WG

  6. Analysis IETF 70 – PANA WG

  7. Conclusion • IETF PANA protocol is specifically designed for the problem presented by the DSLF • IETF PANA protocol satisfies the DSFL Subscriber Authentication Requirements as presented in their May 25, 2007 liaison. • IETF should notify DSLF about PANA WG’s conclusion in response to DSLF’s May 25, 2007 liaison letter • DSLF can contact IETF PANA WG for more details IETF 70 – PANA WG

More Related