chilli features...
JB
list.coovachilli at mac.com
Sun Feb 10 21:30:22 UTC 2008
Counterquestion: Why would an administrator or developer activate/
implement the "chilli:drop" response, although there is no Chilli in
use at all? I still think that Reply-Message would perfectly suit our
needs, but don't get me wrong: While I also think that RFC compliance
is very important, if having this feature in one of the next releases
means to add a CoovaChilli VSA, that's fine with me.
Just let me know if I can be of any assistance.
JB
wlan at mac.com (10.02.2008):
> Admittedly, it wouldn't be the first time I've gone outside the
> scope of the noted RFCs for vendor specific features. While I agree
> RFC compliance is important and should be maintained as much as
> possible, I also believe RADIUS is now being used for more than it
> was intended and bending the rules are sometimes necessary. My
> opinion is that it's better to interoperate with RFC compliant
> vendors rather than being RFC compliant yourself. Meaning, if a non-
> chilli RADIUS client got an Access-Reject with a Chilli VSA, I doubt
> it would care much. But, if given an Access-Reject with reply-
> message "chilli:drop", it'll likely show this message to the user.
> What is better, changing the meaning of an attribute for a feature
> or extending RADIUS (which was designed to be extendable)? I suppose
> the right answer is to raise these issues in the working group,
> which could happen, but that doesn't mean it can't be tried and
> tested first.
>
> That notwithstanding, one could argue the extra VSA fits into the
> RFC 5080 clause:
>
> Attributes within an Access-Reject are
> restricted to those necessary to route the message (e.g., Proxy-
> State), attributes providing the user with an indication that
> access
> has been denied (e.g., an EAP-Message attribute containing an EAP-
> Failure), or attributes conveying an error message (e.g., a Reply-
> Message or Error-Cause attribute).
>
> Ok, not really, but maybe a little.
>
> David
>
> On Feb 10, 2008, at 9:44 AM, JB wrote:
>
>> Hi,
>>
>> you're welcome.
>>
>> I guess using a chilli VSA would break the RADIUS RFCs, which say
>> that only very few attributes are allowed in an Access-Reject
>> response ([1] and [2]). Reply-Message is one of them.
>>
>> You're right, having an optional parameter like "droptimeout" is
>> probably a good idea. Not sending a "normal" Access-Reject (with an
>> explanatory message) means that nothing good came from this MAC
>> address. Administrators may like to block them for a longer period
>> than the normal session/dhcp/idle timeouts without increasing the
>> load of the RADIUS server or its database backend.
>>
>> Just let me know if I can help testing this feature.
>>
>> JB
>>
>> [1] http://rfc.net/rfc2865.html#p20
>> [2] http://rfc.net/rfc5080.html#s2.6.1.
>>
>>
>> wlan at mac.com (10.02.2008):
>>
>>> Hi, and thanks for your feedback.
>>>
>>> I have been working with the feature, but it still needs more
>>> testing before I put it in the wild.
>>>
>>> Your suggestion for using the Reply-Message is a good one. Though,
>>> might as well use a different attribute; probably a new chilli VSA.
>>>
>>> 'Sessions' are maintained in chilli, subject to various timeouts
>>> for dhcp lease, idle timeout, etc. So, sessions (or 'connections',
>>> as referred to in the code) are handled the same way - keyed on
>>> the client's MAC address. When a session is in drop state, of
>>> course, all packets are immediately dropped until the session gets
>>> cleared. Perhaps it would be an idea to set a specific time period
>>> for this state.
>>>
>>> David
>>>
>>> On Feb 9, 2008, at 8:08 PM, JB wrote:
>>>
>>>> Hi,
>>>>
>>>> I just stumbled across this idea for a new feature for CoovaChilli:
>>>>
>>>> wlan at mac.com wrote:
>>>>> Right now, when you use MAC authentication, if an access-reject
>>>>> is returned, the user will still get assigned an IP address and
>>>>> will then be given the captive portal. This is good as a way to
>>>>> have certain devices bypass the captive portal. But, it would
>>>>> also be nice to use MAC authentication as a way to manage
>>>>> blocked devices. I'm considering an option which will have
>>>>> chilli drop all traffic from clients that get an access-reject
>>>>> during mac authentication. When clients are in the 'drop' state,
>>>>> all traffic from them is ignored.
>>>>
>>>>
>>>> I think that would be a great feature! Or has this been already
>>>> implemented? If not, here are my two cents:
>>>>
>>>> Why not (mis)use the Reply-Message attribute from RADIUS to
>>>> achieve this? If the value of Reply-Message is a certain "code",
>>>> like "chilli:drop", then Chilli knows it should ignore all
>>>> further requests from this MAC address. Basically, there would be
>>>> three ways to handle a response from an Access-Request request
>>>> (apart from errors or the like):
>>>>
>>>> Access-Accept -> UAM "success"
>>>> Access-Reject and Reply-Message is not "chilli:drop" -> UAM
>>>> "failed"
>>>> Access-Reject and Reply-Message is "chilli:drop" -> Drop request(s)
>>>>
>>>> This way, we would neither break the current behaviour nor the
>>>> RFCs. No need to turn this feature on or off in chilli because
>>>> the logic (maybe along with black-/white-lists) resides in the
>>>> RADIUS server.
>>>>
>>>> Would there still be some sort of session handling? How long
>>>> would chilli drop requests until it "asks" RADIUS again?
>>>>
>>>> JB
>>>>
>>
More information about the Chilli
mailing list