I'm not sure if I understand. A short timeout will only make ser timeout
faster and without a retransmission configured, ser should respond with a
NAK to the UA. How fast the UA tries again is dependent on the UA
implementation.
Anyway, I believe the expiry of the nonce (default 300 seconds) controls
when a new auth is done, although I have never verified it (never had
registration intervals below 300 seconds). I don't know the security impact
of increasing the expiry time.
I think ser caches the nonce in mysql, so unless the nonce is in memory,
it will be loaded to check against it, if it has expired, a new auth attempt
will be made. I'm not sure about the ser behavior for a timeout with mysql.
BTW, makes me recall another thing we have seen: Some UAs actually do
two auths against the DB every time a registration arrives. Once for the
first INVITE (which receives an "auth required") and then another time with
a new nonce. I think it has something to do with the UA including the old
credentials in the first INVITE even though the nonce has expired and an
auth must be done to verify that the credentials are incorrect. Have you
seen this behavior?
g-)
Klaus Darilion wrote:
Greger V. Teigre wrote:
Yes, I understand your problem. Handling RADIUS
retries demands a
server design made for it. I don't know if it is allowed, but
wouldn't it be better to reduce timeout to 1 (or 2) and retries to 0?
The problem is short timeouts: faster retransmission - thus, a
overloaded radius server will be over-overloaded.
The radiusclient.conf does not allow:
radius_retries 0
maybe the mean "total requests" and not "retransmissions".
I think the problem is not only radius related, but related to remote
authentication. What about mysql authentication: does ser cache the
password or does it query the database for each REGISTER? I there is
no caching, than there would also be a problem if the mysql database
is on a remote site and the query takes some time.
Thus, a good starting point would be transaction stateful REGISTER
handling in ser to avoid increasing load on a slow radius server.
regards,
klaus
I mean, if
> you don't get a response within one second (dependent on your network
> setup), why wait or retry? I have never really understood the wait
> and retry of RADIUS, we tend to failover to secondary or tertiary
> RADIUS as fast as possible. The only point I see of using long
> waits and maybe 1 retry is if you are running auths across an
> (unstable) Internet connection. I guess it's part of the legacy.
> g-)
>
> Klaus Darilion wrote:
>
>> Greger V. Teigre wrote:
>>
>>> Hi Klaus,
>>> Just a quick response to what you describe below:
>>> We have a different scenario based on three facts:
>>> - We have complete control and monitoring of all participating
>>> RADIUS servers
>>> - Each ser has a RADIUS server on the local LAN where the server
>>> center is managed as a whole (i.e. individual components should not
>>> be unavailable)
>>> - We do not tolerate RADIUS downtime at all. Our 24x7 operations
>>> center will immediately respond and correct the situation
>>>
>>> Thus, we have never experienced the scenario below. However, if
>>> something happens, it is actually more likely that we start to NAK
>>> all requests as a default. This of course causes the clients to
>>> re-register, but ser does not slow down.
>>> As you proxy the requests, you probably have a re-send from the
>>> RADIUS proxy to the other servers as well, in addition to ser's
>>> resend.
>>
>>
>> We have disabled retransmissions at the radius proxy. In
>> radiusclient.conf we have:
>> radius_timeout 3
>> radius_retries 1
>>
>> Now, our setup works, but it's not a fien working solution. The
>> problem is that an oingoing radius request will block a thread
>> completly. Thus, having lots of clients (lots of REGISTERs) and
>> having a slow radius backend is like a DoS attack.
>>
>> regards,
>> klaus