and answer command CCF Friday, April 5th 2016

Slides:



Advertisements
Similar presentations
Re-INVITE Handling draft-camarillo-sipping-reinvite-00.txt
Advertisements

Diameter Credit Control Application Tutorial - IETF67
Draft-ietf-dime-agent-overload- 01.txt. Agenda Extensions to DOIC Questions Review of representative use cases.
Lionel Morand DIME WG IETF 79 Diameter Design Guidelines Thursday, November 11, 2010 Lionel Morand.
Diameter Base Protocol (RFC6733)
IETF 58 PANA WG PANA Update and Open Issues (draft-ietf-pana-pana-02.txt) Dan Forsberg, Yoshihiro Ohba, Basavaraj Patil, Hannes Tschofenig, Alper Yegin.
© Mobile Platform Laboratory | SAMSUNG Electronics IPv6 DAD Optimization Goals and Requirements Soohong Daniel Park / Youn-Hee Han / Greg Daley
RTSP Interoperability Bakeoff Ron Frederick
DNS: Revising the Current Protocol Matt Gustafson Matt Weaver CS522 Computer Communications University of Colorado, Colorado Springs.
Internet Command Message Protocol (ICMP) CS-431 Dick Steflik.
Session Policy Framework using EAP draft-mccann-session-policy-framework-using-eap-00.doc IETF 76 – Hiroshima Stephen McCann, Mike Montemurro.
Request History – Solution Mary Barnes SIP WG Meeting IETF-57 draft-ietf-sip-history-info-00.txt.
ICMP (Internet Control Message Protocol) Computer Networks By: Saeedeh Zahmatkesh spring.
S New Security Developments in DICOM Lawrence Tarbox, Ph.D Chair, DICOM WG 14 (Security) Siemens Corporate Research.
Draft-campbell-dime-load- considerations-01 IETF 92 DIME Working Group Meeting Dallas, Texas.
DIME Rechartering Hannes Tschofenig & Dave Frascone.
IETF71 DIME WG RFC3588bis and Extensibility Status Victor Fajardo (draft-ietf-dime-rfc3588bis-10.txt)
DIME WG IETF 82 Dime WG Agenda & Status THURSDAY, November 17, 2011 Jouni Korhonen & Lionel Morand.
Diameter Group Signaling Tuesday, July 31 st, 2012 draft-ietf-diameter-group-signaling-00 Mark Jones, Marco Liebsch IETF 84 Vancouver, Canada.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: MIH_Handover primitives and scenarios Date Submitted: April, 30,
Diameter Group Signaling Thursday, November 07 th, 2013 draft-ietf-dime-group-signaling-02 Mark Jones, Marco Liebsch, Lionel Morand IETF 88 Vancouver,
IETF 60 – San Diegodraft-ietf-mmusic-rfc2326bis-07 Magnus Westerlund Real-Time Streaming Protocol draft-ietf-mmusic-rfc2326bis-07 Magnus Westerlund Aravind.
Dime WG Status Update IETF#80, 1-April Agenda overview Agenda bashing WG status update Active drafts Recently expired IESG processing Current milestones.
SIP Interconnect Guidelines draft-hancock-sip-interconnect-guidelines-01 David Hancock, Daryl Malas.
SIP working group IETF#70 Essential corrections Keith Drage.
SRI International 1 Topology Dissemination Based on Reverse-Path Forwarding (TBRPF) Richard Ogier September 21, 2002.
Real-Time Streaming Protocol draft-ietf-mmusic-rfc2326bis-01.txt Magnus Westerlund.
IETF66 DIME WG John Loughney, Hannes Tschofenig and Victor Fajardo 3588-bis: Current Issues.
IETF68 DIME WG Open Issues for RFC3588bis Victor Fajardo (draft-ietf-dime-rfc3588bis-02.txt)
Nov. 9, 2004IETF61 PANA WG PANA Specification Last Call Issues Yoshihiro Ohba, Alper Yegin, Basavaraj Patil, D. Forsberg, Hannes Tschofenig.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt RTSP draft-ietf-mmusic-rfc2396bis-10 Magnus Westerlund Co-auhtors: Henning Schulzrinne, Rob Lanphier,
MSRP Again! draft-ietf-simple-message- session-09.
RFC 2716bis Wednesday, July 12, 2006 Draft-simon-emu-rfc2716bis-02.txt Dan Simon Bernard Aboba IETF 66, Montreal, Canada.
Diameter Group Signaling Thursday, August 02 nd, 2013 draft-ietf-diameter-group-signaling-01 Mark Jones, Marco Liebsch, Lionel Morand IETF 87 Berlin, Germany.
Diameter Group Signaling draft-jones-diameter-group-signaling-00 Mark Jones Taipei, Taiwan November 2011.
Diameter Group Signaling Thursday, March 6 th, 2014 draft-ietf-diameter-group-signaling-03 Mark Jones, Marco Liebsch, Lionel Morand IETF 89 London, U.K.
DIME WG IETF 84 Diameter Design Guidelines draft-ietf-dime-app-design-guide-15 Tuesday, July 31, 2012 Lionel Morand.
IETF68 DIME WG Diameter Applications Design Guidelines Document (draft-fajardo-dime-app-design-guide-00.txt)
11/20/2002IETF 55 - AAA WG, NASREQ-101 Diameter-Nasreq-10 Dave Mitton, Most recent Document Editor With Contributions from David Spence & Glen Zorn.
CCNA 2 Router and Routing Basics Module 8 TCP/IP Suite Error and Control Messages.
EAP Applicability IETF-86 Joe Salowey. Open Issues Open Issues with Retransmission and re- authentication Remove text about lack of differentiation in.
SCVP 18 Tim Polk. Mea Culpa ● Draft -19 omits some promised changes from the March IETF meeting – Document management problems compounded by ID submission.
Pre-authentication Problem Statement (draft-ohba-hokeyp-preauth-ps-00
SIP over MANETs Introduction to SIP SIP vs MANETs Open Issues
Open issues with PANA Protocol
RADEXT WG RADIUS Attributes for WLAN Draft-aboba-radext-wlan-00.txt
CSE Retargeting to AE, IPE, and NoDN Hosted Resources
PANA Discussion and Open Issues (draft-ietf-pana-pana-01.txt)
PANA Issues and Resolutions
Kumiko Ono End-to-middle Security in SIP draft-ietf-sipping-e2m-sec-reqs-04 draft-ono-sipping-end2middle-security-03 Kumiko Ono.
draft-ietf-dime-erp-02
21-2 ICMP(Internet control message protocol)
AAA and AAAS URI Miguel A. Garcia draft-garcia-dime-aaa-uri-00.txt
draft-asveren-dime-cong-02 com ;
Diameter Base and CCA MIBs
draft-ietf-simple-message-session-09
Host of Troubles : Multiple Host Ambiguities in HTTP Implementations
IETF80, Prague Diameter Maintenance and Extensions (DIME) WG
ERP extension for EAP Early-authentication Protocol (EEP)
Proposed solutions to comments on section 7
Byungchul Park ICMP & ICMPv DPNM Lab. Byungchul Park
Internet Control Message Protocol (ICMP)
Lecture 4: RPC Remote Procedure Call Coulouris et al: Chapter 5
NSIS Operation Over IP Tunnels draft-shen-nsis-tunnel-01.txt
Lecture 4: RPC Remote Procedure Call CDK: Chapter 5
NSIS Operation Over IP Tunnels draft-ietf-nsis-tunnel-04.txt
William Stallings Data and Computer Communications
Internet Control Message Protocol
Handling YANG Revisions – Discussion Kickoff
Diameter ABFAB Application
Presentation transcript:

and answer command CCF Friday, April 5th 2016 DIME WG IETF 95 Buenos Aires, Argentina Protocol errors, 'E' bit and answer command CCF Friday, April 5th 2016 Presenter: Lionel Morand

'E' bit used in RFC6733 E(rror) If set, the message contains a protocol error, and the message will not conform to the CCF described for this command. Messages with the 'E' bit set are commonly referred to as error messages. This bit MUST NOT be set in request messages (see Section 7.2).

Generic answer CCF The 'E' (Error Bit) in the Diameter header is set when the request caused a protocol-related error (see Section 7.1.3). A message with the 'E' bit MUST NOT be sent as a response to an answer message. Note that a message with the 'E' bit set is still subjected to the processing rules defined in Section 6.2. When set, the answer message will not conform to the CCF specification for the command; instead, it and will conform to the following CCF: Message Format <answer-message> ::= < Diameter Header: code, ERR [, PXY] > 0*1< Session-Id > { Origin-Host } { Origin-Realm } { Result-Code } [ Origin-State-Id ] [ Error-Message ] [ Error-Reporting-Host ] [ Failed-AVP ] [ Experimental-Result ] * [ Proxy-Info ] * [ AVP ]

Protocol Errors Errors that fall within the Protocol Error category SHOULD be treated on a per-hop basis, and Diameter proxies MAY attempt to correct the error, if it is possible. Note that these errors MUST only be used in answer messages whose 'E' bit is set. DIAMETER_COMMAND_UNSUPPORTED (3001) DIAMETER_UNABLE_TO_DELIVER (3002) DIAMETER_REALM_NOT_SERVED (3003) DIAMETER_TOO_BUSY (3004) DIAMETER_LOOP_DETECTED (3005) DIAMETER_REDIRECT_INDICATION (3006) DIAMETER_APPLICATION_UNSUPPORTED (3007) DIAMETER_INVALID_HDR_BITS (3008) DIAMETER_INVALID_AVP_BITS (3009) DIAMETER_UNKNOWN_PEER (3010)

So… When a protocol error occurs (e.g. DIAMETER_UNABLE_TO_DELIVER (3002) or DIAMETER_REDIRECT_INDICATION (3006)) when processing a request (e.g. DER), the answer must not conform to the normal CCF grammar of the answer command (e.g. DEA) but must conform to the grammar given in the section 7.2.

But… In the specific redirection error case, the trouble comes from that redirect information is put as potential information that you can find in normal answers for a lot of answer commands including in the base protocol commands, e.g. Session-Termination-Answer <STA> ::= < Diameter Header: 275, PXY > < Session-Id > { Result-Code } { Origin-Host } { Origin-Realm } [ User-Name ] * [ Class ] [ Error-Message ] [ Error-Reporting-Host ] [ Failed-AVP ] [ Origin-State-Id ] --> * [ Redirect-Host ] --> [ Redirect-Host-Usage ] --> [ Redirect-Max-Cache-Time ] * [ Proxy-Info ] * [ AVP ]

But… imply that the normal answer CCF is used instead of the generic one defined in the section 7.2 of RFC 6733. Not a real issue with the STA CCF syntax compliant with the generic answer message CCF. But same principle applied to a lot of application commands, e.g. DEA <Diameter-EAP-Answer> ::= < Diameter Header: 268, PXY > < Session-Id > { Auth-Application-Id } { Auth-Request-Type } { Result-Code } { Origin-Host } { Origin-Realm } [ User-Name ] [ ...... ] [ Error-Message ] [ Error-Reporting-Host ] * [ Failed-AVP ] [ Origin-State-Id ] * [ Redirect-Host ] [ Redirect-Host-Usage ] [ Redirect-Max-Cache-Time ] * [ Proxy-Info ] * [ AVP ]

And even worse… The redirection error case is a specific example but the issue exists for any protocol error (e.g. DIAMETER_UNABLE_TO_DELIVER) or even for permanent error when: In error conditions where it is not possible or efficient to compose application-specific answer grammar, answer messages with the 'E' bit set and which comply to the grammar described in Section 7.2 MAY also be used for permanent errors.

Basic Assumption the RFC6733 is correct regarding the generation of answers with the 'E' bit set. As a consequence, any answer command CCF grammar including the redirection information related AVPs are not correct (or not relevant regarding base protocol commands). As a consequence, a general update procedure should be initiated to correct this issue. OK/NOK on the assumption and the issue?

Proposed way forward A new RFC updating all the existing IETF RFCs. Also used as trigger for other vendors (including SDOs) to correct their own specification. Could be used to clarify that some protocol errors are meant to be handled on a per-hop basis and that some errors should not be forwarded to other peers. ex: Redirection

Your view? Good solution? If yes, volunteers to work on it? If not, what is the proposed alternative?