Internet Engineering Task Force (IETF)                    L. Morand, Ed.
Request for Comments: 7423                                   Orange Labs
BCP: 193                                                      V. Fajardo
Category: Best Current Practice                           Fluke Networks
ISSN: 2070-1721                                            H. Tschofenig
                                                           November 2014
Internet Engineering Task Force (IETF)                    L. Morand, Ed.
Request for Comments: 7423                                   Orange Labs
BCP: 193                                                      V. Fajardo
Category: Best Current Practice                           Fluke Networks
ISSN: 2070-1721                                            H. Tschofenig
                                                           November 2014

Diameter Applications Design Guidelines




The Diameter base protocol provides facilities for protocol extensibility enabling the definition of new Diameter applications or modification of existing applications. This document is a companion document to the Diameter base protocol that further explains and clarifies the rules to extend Diameter. Furthermore, this document provides guidelines to Diameter application designers reusing/ defining Diameter applications or creating generic Diameter extensions.


Status of This Memo


This memo documents an Internet Best Current Practice.


This document is a product of the Internet Engineering Task Force (IETF). It represents the consensus of the IETF community. It has received public review and has been approved for publication by the Internet Engineering Steering Group (IESG). Further information on BCPs is available in Section 2 of RFC 5741.

本文件是互联网工程任务组(IETF)的产品。它代表了IETF社区的共识。它已经接受了公众审查,并已被互联网工程指导小组(IESG)批准出版。有关BCP的更多信息,请参见RFC 5741第2节。

Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at


Copyright Notice


Copyright (c) 2014 IETF Trust and the persons identified as the document authors. All rights reserved.

版权所有(c)2014 IETF信托基金和确定为文件作者的人员。版权所有。

This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents ( in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.

本文件受BCP 78和IETF信托有关IETF文件的法律规定的约束(自本文件出版之日起生效。请仔细阅读这些文件,因为它们描述了您对本文件的权利和限制。从本文件中提取的代码组件必须包括信托法律条款第4.e节中所述的简化BSD许可证文本,并提供简化BSD许可证中所述的无担保。

This document may contain material from IETF Documents or IETF Contributions published or made publicly available before November 10, 2008. The person(s) controlling the copyright in some of this material may not have granted the IETF Trust the right to allow modifications of such material outside the IETF Standards Process. Without obtaining an adequate license from the person(s) controlling the copyright in such materials, this document may not be modified outside the IETF Standards Process, and derivative works of it may not be created outside the IETF Standards Process, except to format it for publication as an RFC or to translate it into languages other than English.


Table of Contents


   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   4
   2.  Terminology . . . . . . . . . . . . . . . . . . . . . . . . .   5
   3.  Overview  . . . . . . . . . . . . . . . . . . . . . . . . . .   5
   4.  Reusing Existing Diameter Applications  . . . . . . . . . . .   6
     4.1.  Adding a New Command  . . . . . . . . . . . . . . . . . .   7
     4.2.  Deleting an Existing Command  . . . . . . . . . . . . . .   8
     4.3.  Reusing Existing Commands . . . . . . . . . . . . . . . .   8
       4.3.1.  Adding AVPs to a Command  . . . . . . . . . . . . . .   8
       4.3.2.  Deleting AVPs from a Command  . . . . . . . . . . . .  10
       4.3.3.  Changing the Flag Settings of AVP in Existing
               Commands  . . . . . . . . . . . . . . . . . . . . . .  11
     4.4.  Reusing Existing AVPs . . . . . . . . . . . . . . . . . .  11
       4.4.1.  Setting of the AVP Flags  . . . . . . . . . . . . . .  11
       4.4.2.  Reuse of AVP of Type Enumerated . . . . . . . . . . .  12
   5.  Defining New Diameter Applications  . . . . . . . . . . . . .  12
     5.1.  Introduction  . . . . . . . . . . . . . . . . . . . . . .  12
     5.2.  Defining New Commands . . . . . . . . . . . . . . . . . .  12
     5.3.  Use of Application Id in a Message  . . . . . . . . . . .  13
     5.4.  Application-Specific Session State Machines . . . . . . .  14
     5.5.  Session-Id AVP and Session Management . . . . . . . . . .  14
     5.6.  Use of Enumerated Type AVPs . . . . . . . . . . . . . . .  15
     5.7.  Application-Specific Message Routing  . . . . . . . . . .  17
     5.8.  Translation Agents  . . . . . . . . . . . . . . . . . . .  18
     5.9.  End-to-End Application Capabilities Exchange  . . . . . .  18
     5.10. Diameter Accounting Support . . . . . . . . . . . . . . .  19
     5.11. Diameter Security Mechanisms  . . . . . . . . . . . . . .  21
   6.  Defining Generic Diameter Extensions  . . . . . . . . . . . .  21
   7.  Guidelines for Registrations of Diameter Values . . . . . . .  23
   8.  Security Considerations . . . . . . . . . . . . . . . . . . .  25
   9.  References  . . . . . . . . . . . . . . . . . . . . . . . . .  25
     9.1.  Normative References  . . . . . . . . . . . . . . . . . .  25
     9.2.  Informative References  . . . . . . . . . . . . . . . . .  25
   Contributors . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
   Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . .  28
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  29
   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   4
   2.  Terminology . . . . . . . . . . . . . . . . . . . . . . . . .   5
   3.  Overview  . . . . . . . . . . . . . . . . . . . . . . . . . .   5
   4.  Reusing Existing Diameter Applications  . . . . . . . . . . .   6
     4.1.  Adding a New Command  . . . . . . . . . . . . . . . . . .   7
     4.2.  Deleting an Existing Command  . . . . . . . . . . . . . .   8
     4.3.  Reusing Existing Commands . . . . . . . . . . . . . . . .   8
       4.3.1.  Adding AVPs to a Command  . . . . . . . . . . . . . .   8
       4.3.2.  Deleting AVPs from a Command  . . . . . . . . . . . .  10
       4.3.3.  Changing the Flag Settings of AVP in Existing
               Commands  . . . . . . . . . . . . . . . . . . . . . .  11
     4.4.  Reusing Existing AVPs . . . . . . . . . . . . . . . . . .  11
       4.4.1.  Setting of the AVP Flags  . . . . . . . . . . . . . .  11
       4.4.2.  Reuse of AVP of Type Enumerated . . . . . . . . . . .  12
   5.  Defining New Diameter Applications  . . . . . . . . . . . . .  12
     5.1.  Introduction  . . . . . . . . . . . . . . . . . . . . . .  12
     5.2.  Defining New Commands . . . . . . . . . . . . . . . . . .  12
     5.3.  Use of Application Id in a Message  . . . . . . . . . . .  13
     5.4.  Application-Specific Session State Machines . . . . . . .  14
     5.5.  Session-Id AVP and Session Management . . . . . . . . . .  14
     5.6.  Use of Enumerated Type AVPs . . . . . . . . . . . . . . .  15
     5.7.  Application-Specific Message Routing  . . . . . . . . . .  17
     5.8.  Translation Agents  . . . . . . . . . . . . . . . . . . .  18
     5.9.  End-to-End Application Capabilities Exchange  . . . . . .  18
     5.10. Diameter Accounting Support . . . . . . . . . . . . . . .  19
     5.11. Diameter Security Mechanisms  . . . . . . . . . . . . . .  21
   6.  Defining Generic Diameter Extensions  . . . . . . . . . . . .  21
   7.  Guidelines for Registrations of Diameter Values . . . . . . .  23
   8.  Security Considerations . . . . . . . . . . . . . . . . . . .  25
   9.  References  . . . . . . . . . . . . . . . . . . . . . . . . .  25
     9.1.  Normative References  . . . . . . . . . . . . . . . . . .  25
     9.2.  Informative References  . . . . . . . . . . . . . . . . .  25
   Contributors . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
   Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . .  28
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  29
1. Introduction
1. 介绍

The Diameter base protocol [RFC6733] is intended to provide an Authentication, Authorization, and Accounting (AAA) framework for applications such as network access or IP mobility in both local and roaming situations. This protocol provides the ability for Diameter peers to exchange messages carrying data in the form of Attribute-Value Pairs (AVPs).


The Diameter base protocol provides facilities to extend Diameter (see Section 1.3 of [RFC6733]) to support new functionality. In the context of this document, extending Diameter means one of the following:


1. The addition of new functionality to an existing Diameter application without defining a new application.

1. 向现有Diameter应用程序添加新功能而不定义新应用程序。

2. The addition of new functionality to an existing Diameter application that requires the definition of a new application.

2. 向现有Diameter应用程序添加新功能,需要定义新应用程序。

3. The definition of an entirely new Diameter application to offer functionality not supported by existing applications.

3. 定义全新的Diameter应用程序,以提供现有应用程序不支持的功能。

4. The definition of a new generic functionality that can be reused across different applications.

4. 可在不同应用程序之间重用的新通用功能的定义。

All of these extensions are design decisions that can be carried out by any combination of reusing existing or defining new commands, AVPs, or AVP values. However, application designers do not have complete freedom when making their design. A number of rules have been defined in [RFC6733] that place constraints on when an extension requires the allocation of a new Diameter application identifier or a new command code value. The objective of this document is the following:


o Clarify the Diameter extensibility rules as defined in the Diameter base protocol.

o 阐明Diameter基本协议中定义的Diameter扩展性规则。

o Discuss design choices and provide guidelines when defining new applications.

o 讨论设计选择,并在定义新应用程序时提供指导。

o Present trade-off choices.

o 提出权衡选择。

2. Terminology
2. 术语

This document reuses the terminology defined in [RFC6733]. Additionally, the following terms and acronyms are used in this application:


Application: Extension of the Diameter base protocol [RFC6733] via the addition of new commands or AVPs. Each application is uniquely identified by an IANA-allocated application identifier value.


Command: Diameter request or answer carrying AVPs between Diameter endpoints. Each command is uniquely identified by an IANA-allocated Command Code value and is described by a Command Code Format (CCF) for an application.


The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119].


3. Overview
3. 概述

As designed, the Diameter base protocol [RFC6733] can be seen as a two-layer protocol. The lower layer is mainly responsible for managing connections between neighboring peers and for message routing. The upper layer is where the Diameter applications reside. This model is in line with a Diameter node having an application layer and a peer-to-peer delivery layer. The Diameter base protocol document defines the architecture and behavior of the message delivery layer and then provides the framework for designing Diameter applications on the application layer. This framework includes definitions of application sessions and accounting support (see Sections 8 and 9 of [RFC6733]). Accordingly, a Diameter node is seen in this document as a single instance of a Diameter message delivery layer and one or more Diameter applications using it.


The Diameter base protocol is designed to be extensible and the principles are described in Section 1.3 of [RFC6733]. In summary, Diameter can be extended by the following:

Diameter base协议设计为可扩展,其原理在[RFC6733]的第1.3节中进行了描述。总之,直径可以通过以下方式扩展:

1. Defining new AVP values

1. 定义新的AVP值

2. Creating new AVPs

2. 创建新的AVP

3. Creating new commands

3. 创建新命令

4. Creating new applications

4. 创建新的应用程序

As a main guiding principle, application designers SHOULD comply with the following recommendation: "try to reuse as much as possible!". It will reduce the time to finalize specification writing, and it will lead to a smaller implementation effort as well as reduce the need for testing. In general, it is clever to avoid duplicate effort when possible.


However, reuse is not appropriate when the existing functionality does not fit the new requirement and/or the reuse leads to ambiguity.


The impact on extending existing applications can be categorized into two groups:


Minor Extension: Enhancing the functional scope of an existing application by the addition of optional features to support it. Such enhancement has no backward-compatibility issue with the existing application.


A typical example would be the definition of a new optional AVP for use in an existing command. Diameter implementations supporting the existing application but not the new AVP will simply ignore it, without consequences for the Diameter message handling, as described in [RFC6733]. The standardization effort will be fairly small.


Major Extension: Enhancing an application that requires the definition of a new Diameter application. Such enhancement causes a backward-compatibility issue with existing implementations supporting the application.


Typical examples would be the creation of a new command for providing functionality not supported by existing applications or the definition of a new AVP to be carried in an existing command with the M-bit set in the AVP flags (see Section 4.1 of [RFC6733] for definition of "M-bit"). For such an extension, a significant specification effort is required, and a careful approach is recommended.


4. Reusing Existing Diameter Applications
4. 重用现有的Diameter应用程序

An existing application may need to be enhanced to fulfill new requirements, and these modifications can be at the command level and/or at the AVP level. The following sections describe the possible modifications that can be performed on existing applications and their related impact.


4.1. Adding a New Command
4.1. 添加新命令

Adding a new command to an existing application is considered to be a major extension and requires a new Diameter application to be defined, as stated in Section 1.3.4 of [RFC6733]. The need for a new application is because a Diameter node that is not upgraded to support the new command(s) within the (existing) application would reject any unknown command with the protocol error DIAMETER_COMMAND_UNSUPPORTED and cause the failure of the transaction. The new application ensures that Diameter nodes only receive commands within the context of applications they support.


Adding a new command means either defining a completely new command or importing the command's Command Code Format (CCF) syntax from another application whereby the new application inherits some or all of the functionality of the application from which the command came. In the former case, the decision to create a new application is straightforward, since this is typically a result of adding a new functionality that does not exist yet. For the latter, the decision to create a new application will depend on whether importing the command in a new application is more suitable than simply using the existing application as it is in conjunction with any other application.


An example considers the Diameter Extensible Authentication Protocol (EAP) application [RFC4072] and the Diameter Network Access Server application [RFC7155]. When network access authentication using EAP is required, the Diameter EAP commands (Diameter-EAP-Request/ Diameter-EAP-Answer) are used; otherwise, the Diameter Network Access Server application will be used. When the Diameter EAP application is used, the accounting exchanges defined in the Diameter Network Access Server may be used.

示例考虑Diameter可扩展身份验证协议(EAP)应用程序[RFC4072]和Diameter网络访问服务器应用程序[RFC7155]。当需要使用EAP进行网络访问身份验证时,使用Diameter EAP命令(Diameter EAP Request/Diameter EAP Answer);否则,将使用Diameter网络访问服务器应用程序。使用Diameter EAP应用程序时,可以使用Diameter网络访问服务器中定义的记帐交换。

However, in general, it is difficult to come to a hard guideline, and so a case-by-case study of each application requirement should be applied. Before adding or importing a command, application designers should consider the following:


o Can the new functionality be fulfilled by creating a new command independent from any existing command? In this case, the resulting new application and the existing application can work independent of, but cooperating with, each other.

o 是否可以通过创建独立于任何现有命令的新命令来实现新功能?在这种情况下,生成的新应用程序和现有应用程序可以相互独立但相互协作地工作。

o Can the existing command be reused without major extensions and, therefore, without the need for the definition of a new application, e.g., new functionality introduced by the creation of new optional AVPs.

o 现有命令是否可以在没有主要扩展的情况下重用,因此不需要定义新的应用程序,例如,创建新的可选AVP引入的新功能。

It is important to note that importing commands too liberally could result in a monolithic and hard-to-manage application supporting too many different features.


4.2. Deleting an Existing Command
4.2. 删除现有命令

Although this process is not typical, removing a command from an application requires a new Diameter application to be defined, and then it is considered as a major extension. This is due to the fact that the reception of the deleted command would systematically result in a protocol error (i.e., DIAMETER_COMMAND_UNSUPPORTED).


It is unusual to delete an existing command from an application for the sake of deleting it or the functionality it represents. An exception might be if the intent of the deletion is to create a newer variance of the same application that is somehow simpler than the application initially specified.


4.3. Reusing Existing Commands
4.3. 重用现有命令

This section discusses rules in adding and/or deleting AVPs from an existing command of an existing application. The cases described in this section may not necessarily result in the creation of new applications.


From a historical point of view, it is worth noting that there was a strong recommendation to reuse existing commands in [RFC3588] to prevent rapid depletion of code values available for vendor-specific commands. However, [RFC6733] has relaxed the allocation policy and enlarged the range of available code values for vendor-specific applications. Although reuse of existing commands is still RECOMMENDED, protocol designers can consider defining a new command when it provides a solution more suitable than the twisting of an existing command's use and applications.


4.3.1. Adding AVPs to a Command
4.3.1. 将AVP添加到命令

Based on the rules in [RFC6733], AVPs that are added to an existing command can be categorized as either:


o Mandatory (to understand) AVPs. As defined in [RFC6733], these are AVPs with the M-bit flag set in this command, which means that the Diameter node receiving them is required to understand not only their values but also their semantics. Failure to do so will cause a message handling error: either an error message with the result-code set to DIAMETER_AVP_UNSUPPORTED if the AVP is not understood in a request or an application-specific error handling if the given AVP is in an answer.

o 强制(理解)AVP。如[RFC6733]中所定义,这些AVP在该命令中设置了M位标志,这意味着接收它们的Diameter节点不仅需要了解它们的值,还需要了解它们的语义。否则将导致消息处理错误:如果请求中未理解AVP,则返回结果代码设置为DIAMETER_AVP_的错误消息;如果给定AVP在应答中,则返回特定于应用程序的错误处理。

o Optional (to understand) AVPs. As defined in [RFC6733], these are AVPs with the M-bit flag cleared in this command. A Diameter node receiving these AVPs can simply ignore them if it does not support them.

o 可选(理解)AVPs。如[RFC6733]中所定义,这些是在该命令中清除M位标志的AVP。如果接收这些AVP的Diameter节点不支持这些AVP,则可以忽略它们。

It is important to note that the definitions given above are independent of whether these AVPs are required or optional in the command as specified by the command's CCF syntax [RFC6733].


NOTE: As stated in [RFC6733], the M-bit setting for a given AVP is relevant to an application and each command within that application that includes the AVP.


The rules are strict in the case where the AVPs to be added in an exiting command are mandatory to understand, i.e., they have the M-bit set. A mandatory AVP MUST NOT be added to an existing command without defining a new Diameter application, as stated in [RFC6733]. This falls into the "Major Extensions" category. Despite the clarity of the rule, ambiguity still arises when evaluating whether a new AVP being added should be mandatory to begin with. Application designers should consider the following questions when deciding about the M-bit for a new AVP:


o Would it be required for the receiving side to be able to process and understand the AVP and its content?

o 接收方是否需要能够处理和理解AVP及其内容?

o Would the new AVPs change the state machine of the application?

o 新的AVP会改变应用程序的状态机吗?

o Would the presence of the new AVP lead to a different number of round trips, effectively changing the state machine of the application?

o 新AVP的出现是否会导致不同数量的往返,从而有效地改变应用程序的状态机?

o Would the new AVP be used to differentiate between old and new variances of the same application whereby the two variances are not backward compatible?

o 新的AVP是否会用于区分同一应用程序的新旧差异,因为这两个差异不向后兼容?

o Would the new AVP have duality in meaning, i.e., be used to carry application-related information as well as to indicate that the message is for a new application?

o 新的AVP在意义上是否具有双重性,即用于承载应用程序相关信息以及指示消息是针对新应用程序的?

If the answer to at least one of the questions is "yes", then the M-bit MUST be set for the new AVP, and a new Diameter application MUST be defined. This list of questions is non-exhaustive, and other criteria MAY be taken into account in the decision process.


If application designers are instead contemplating the use of optional AVPs, i.e., with the M-bit cleared, there are still pitfalls that will cause interoperability problems; therefore, they must be avoided. Some examples of these pitfalls are as follows:


o Use of optional AVPs with intersecting meaning. One AVP has partially the same usage and meaning as another AVP. The presence of both can lead to confusion.

o 使用具有交叉含义的可选AVP。一个AVP与另一个AVP具有部分相同的用法和含义。两者的存在可能导致混淆。

o Optional AVPs with dual purpose, i.e., to carry application data as well as to indicate support for one or more features. This has a tendency to introduce interpretation issues.

o 具有双重用途的可选AVP,即携带应用程序数据以及指示支持一个或多个功能。这有一种倾向,即引入解释问题。

o Adding one or more optional AVPs and indicating (usually within descriptive text for the command) that at least one of them has to be understood by the receiver of the command. This would be equivalent to adding a mandatory AVP, i.e., an AVP with the M-bit set, to the command.

o 添加一个或多个可选AVP,并指示(通常在命令的描述性文本中)命令接收者必须理解其中至少一个AVP。这相当于向命令添加一个强制AVP,即设置了M位的AVP。

4.3.2. Deleting AVPs from a Command
4.3.2. 从命令中删除AVP

Application designers may want to reuse an existing command, but some of the AVPs present in the command's CCF syntax specification may be irrelevant for the functionality foreseen to be supported by this command. It may be then tempting to delete those AVPs from the command.


The impacts of deleting an AVP from a command depends on its Command Code format specification and M-bit setting:


o Case 1: Deleting an AVP that is indicated as a required AVP (noted as {AVP}) in the command's CCF syntax specification (regardless of the M-bit setting).

o 情况1:删除命令的CCF语法规范中指示为必需AVP(注为{AVP})的AVP(无论M位设置如何)。

In this case, a new Command Code, and subsequently a new Diameter application, MUST be specified.


o Case 2: Deleting an AVP, which has the M-bit set, and is indicated as an optional AVP (noted as [AVP] in the command CCF) in the command's CCF syntax specification.

o 情况2:删除AVP,该AVP具有M位集,并在命令的CCF语法规范中指示为可选AVP(在命令CCF中标记为[AVP])。

In this case, no new Command Code has to be specified, but the definition of a new Diameter application is REQUIRED.


o Case 3: Deleting an AVP, which has the M-bit cleared, and is indicated as [AVP] in the command's CCF syntax specification.

o 情况3:删除一个AVP,该AVP清除了M位,并在命令的CCF语法规范中指示为[AVP]。

In this case, the AVP can be deleted without consequences.


Application designers SHOULD attempt to reuse the command's CCF syntax specification without modification and simply ignore (but not delete) any optional AVPs that will not be used. This is to maintain compatibility with existing applications that will not know about the new functionality as well as to maintain the integrity of existing dictionaries.


4.3.3. Changing the Flag Settings of AVP in Existing Commands
4.3.3. 更改现有命令中AVP的标志设置

Although unusual, implementors may want to change the setting of the AVP flags a given AVP used in a command.


Into an existing command, an AVP that was initially defined as a mandatory AVP to understand, i.e., an AVP with the M-bit flag set in the command MAY be safely turned to an optional AVP, i.e., with the M-bit cleared. Any node supporting the existing application will still understand the AVP, whatever the setting of the M-bit. On the contrary, an AVP initially defined as an optional AVP to understand, i.e., an AVP with the M-bit flag cleared in the command MUST NOT be changed into a mandatory AVP with the M-bit flag set without defining a new Diameter application. Setting the M-bit for an AVP that was defined as an optional AVP is equivalent to adding a new mandatory AVP to an existing command, and the rules given in Section 4.3.1 apply.


All other AVP flags (V-bit, P-bit, reserved bits) MUST remain unchanged.


4.4. Reusing Existing AVPs
4.4. 重用现有AVP

This section discusses rules in reusing existing AVPs when reusing an existing command or defining a new command in a new application.


4.4.1. Setting of the AVP Flags
4.4.1. AVP标志的设置

When reusing existing AVPs in a new application, application designers MUST specify the setting of the M-bit flag for a new Diameter application and, if necessary, for every command of the application that can carry these AVPs. In general, for AVPs defined outside of the Diameter base protocol, the characteristics of an AVP are tied to its role within a given application and the commands used in this application.

在新应用程序中重用现有AVP时,应用程序设计人员必须为新的Diameter应用程序指定M位标志的设置,如有必要,还必须为可携带这些AVP的应用程序的每个命令指定M位标志的设置。一般来说,对于Diameter base协议之外定义的AVP,AVP的特性与其在给定应用程序中的角色以及在此应用程序中使用的命令有关。

All other AVP flags (V-bit, P-bit, reserved bits) MUST remain unchanged.


4.4.2. Reuse of AVP of Type Enumerated
4.4.2. 枚举类型的AVP的重用

When reusing an AVP of type Enumerated in a command for a new application, it is RECOMMENDED to avoid modifying the set of valid values defined for this AVP. Modifying the set of Enumerated values includes adding a value or deprecating the use of a value defined initially for the AVP. Modifying the set of values will impact the application defining this AVP and all the applications using this AVP, causing potential interoperability issues: a value used by a peer that will not be recognized by all the nodes between the client and the server will cause an error response with the Result-Code AVP set to DIAMETER_INVALID_AVP_VALUE. When the full range of values defined for this Enumerated AVP is not suitable for the new application, it is RECOMMENDED that a new AVP be defined to avoid backward-compatibility issues with existing implementations.

在为新应用程序重用命令中枚举的AVP类型时,建议避免修改为此AVP定义的有效值集。修改枚举值集包括添加值或禁止使用最初为AVP定义的值。修改值集将影响定义此AVP的应用程序和使用此AVP的所有应用程序,导致潜在的互操作性问题:客户端和服务器之间的所有节点都无法识别对等方使用的值将导致错误响应,结果代码AVP设置为DIAMETER\u INVALID\u AVP\u value。当为该枚举AVP定义的全部值不适用于新应用程序时,建议定义一个新的AVP,以避免与现有实现的向后兼容性问题。

5. Defining New Diameter Applications
5. 定义新的直径应用程序
5.1. Introduction
5.1. 介绍

This section discusses the case where new applications have requirements that cannot be fulfilled by existing applications and would require definition of completely new commands, AVPs, and/or AVP values. Typically, there is little ambiguity about the decision to create these types of applications. Some examples are the interfaces defined for the IP Multimedia Subsystem of 3GPP, e.g., Cx/Dx ([TS29.228] and [TS29.229]), Sh ([TS29.328] and [TS29.329]), etc.


Application designers SHOULD try to import existing AVPs and AVP values for any newly defined commands. In certain cases where accounting will be used, the models described in Section 5.10 SHOULD also be considered.


Additional considerations are described in the following sections.


5.2. Defining New Commands
5.2. 定义新命令

As a general recommendation, commands SHOULD NOT be defined from scratch. It is instead RECOMMENDED to reuse an existing command offering similar functionality and use it as a starting point. Code reuse leads to a smaller implementation effort as well as reduces the need for testing.


Moreover, the new command's CCF syntax specification SHOULD be carefully defined when considering applicability and extensibility of the application. If most of the AVPs contained in the command are indicated as fixed or required, it might be difficult to reuse the same command and, therefore, the same application in a slightly


changed environment. Defining a command with most of the AVPs indicated as optional is considered as a good design choice in many cases, despite the flexibility it introduces in the protocol. Protocol designers MUST clearly state the reasons why these optional AVPs might or might not be present and properly define the corresponding behavior of the Diameter nodes when these AVPs are absent from the command.


NOTE: As a hint for protocol designers, it is not sufficient to just look at the command's CCF syntax specification. It is also necessary to carefully read through the accompanying text in the specification.


In the same way, the CCF syntax specification SHOULD be defined such that it will be possible to add any arbitrary optional AVPs with the M-bit cleared (including vendor-specific AVPs) without modifying the application. For this purpose, "* [AVP]" SHOULD be added in the command's CCF, which allows the addition of any arbitrary number of optional AVPs as described in [RFC6733].


5.3. Use of Application Id in a Message
5.3. 在消息中使用应用程序Id

When designing new applications, application designers SHOULD specify that the Application Id carried in all session-level messages is the Application Id of the application using those messages. This includes the session-level messages defined in the Diameter base protocol, i.e., Re-Auth-Request (RAR) / Re-Auth-Answer (RAA), Session-Termination-Request (STR) / Session-Termination-Answer (STA), Abort-Session-Request (ASR) / Abort-Session-Answer (ASA), and possibly Accounting-Request (ACR) / Accounting Answer (ACA) in the coupled accounting model; see Section 5.10. Some existing specifications do not adhere to this rule for historical reasons. However, this guidance SHOULD be followed by new applications to avoid routing problems.


When a new application has been allocated with a new Application Id and it also reuses existing commands with or without modifications, the commands SHOULD use the newly allocated Application Id in the header and in all relevant Application-Id AVPs (Auth-Application-Id or Acct-Application-Id) present in the commands message body.

当为新应用程序分配了一个新的应用程序Id,并且该应用程序还重用了现有命令(无论有无修改),这些命令应在标头和命令消息体中存在的所有相关应用程序Id AVP(Auth application Id或Acct application Id)中使用新分配的应用程序Id。

Additionally, application designers using a vendor-specific Application-Id AVP SHOULD NOT use the Vendor-Id AVP to further dissect or differentiate the vendor-specification Application Id. Diameter routing is not based on the Vendor Id. As such, the Vendor Id SHOULD NOT be used as an additional input for routing or delivery of messages. The Vendor-Id AVP is an informational AVP only and kept for backward compatibility reasons.

此外,使用供应商特定应用程序Id AVP的应用程序设计师不应使用供应商Id AVP进一步剖析或区分供应商规范应用程序Id。直径路由不基于供应商Id。因此,供应商Id不应用作路由或消息传递的附加输入。供应商Id AVP仅为信息性AVP,出于向后兼容的原因而保留。

5.4. Application-Specific Session State Machines
5.4. 特定于应用程序的会话状态机

Section 8 of [RFC6733] provides session state machines for AAA services, and these session state machines are not intended to cover behavior outside of AAA. If a new application cannot clearly be categorized into any of these AAA services, it is RECOMMENDED that the application define its own session state machine. Support for a server-initiated request is a clear example where an application-specific session state machine would be needed, for example, the Rw interface for the ITU-T push model (cf. [Q.3303.3]).


5.5. Session-Id AVP and Session Management
5.5. 会话Id AVP和会话管理

Diameter applications are usually designed with the aim of managing user sessions (e.g., Diameter Network Access Server (NAS) application [RFC4005]) or a specific service access session (e.g., Diameter SIP application [RFC4740]). In the Diameter base protocol, session state is referenced using the Session-Id AVP. All Diameter messages that use the same Session-Id will be bound to the same session. Diameter-based session management also implies that both the Diameter client and server (and potentially proxy agents along the path) maintain session state information.

Diameter应用程序通常设计用于管理用户会话(例如Diameter网络访问服务器(NAS)应用程序[RFC4005])或特定服务访问会话(例如Diameter SIP应用程序[RFC4740])。在Diameter基本协议中,使用会话Id AVP引用会话状态。使用相同会话Id的所有Diameter消息都将绑定到同一会话。基于Diameter的会话管理还意味着Diameter客户端和服务器(以及路径上的潜在代理)都维护会话状态信息。

However, some applications may not need to rely on the Session-Id to identify and manage sessions because other information can be used instead to correlate Diameter messages. Indeed, the User-Name AVP or any other specific AVP can be present in every Diameter message and used, therefore, for message correlation. Some applications might not require the notion of the Diameter-session concept at all. For such applications, the Auth-Session-State AVP is usually set to NO_STATE_MAINTAINED in all Diameter messages, and these applications are, therefore, designed as a set of stand-alone transactions. Even if an explicit access session termination is required, application-specific commands are defined and used instead of the STR/STA or ASR/ ASA defined in the Diameter base protocol [RFC6733]. In such a case, the Session-Id is not significant.

但是,有些应用程序可能不需要依赖会话Id来识别和管理会话,因为可以使用其他信息来关联Diameter消息。实际上,用户名AVP或任何其他特定AVP可以出现在每个Diameter消息中,并因此用于消息关联。有些应用程序可能根本不需要Diameter会话概念。对于此类应用程序,通常将AUH会话状态AVP设置为在所有Diameter消息中维护的NO_状态,因此,这些应用程序被设计为一组独立事务。即使需要显式访问会话终止,也会定义和使用特定于应用程序的命令,而不是Diameter base协议[RFC6733]中定义的STR/STA或ASR/ASA。在这种情况下,会话Id不重要。

Based on these considerations, protocol designers should carefully appraise whether the Diameter application being defined relies on the session management specified in the Diameter base protocol:


o If it is, the Diameter command defined for the new application MUST include the Session-Id AVP defined in the Diameter base protocol [RFC6733], and the Session-Id AVP MUST be used for correlation of messages related to the same session. Guidance on the use of the Auth-Session-State AVP is given in the Diameter base protocol [RFC6733].

o 如果是,为新应用程序定义的Diameter命令必须包括Diameter基本协议[RFC6733]中定义的会话Id AVP,并且会话Id AVP必须用于与同一会话相关的消息的关联。Diameter基本协议[RFC6733]中给出了有关使用身份验证会话状态AVP的指导。

o Otherwise, because session management is not required or the application relies on its own session management mechanism, Diameter commands for the application need not include the Session-Id AVP. If any specific session management concept is supported by the application, the application documentation MUST clearly specify how the session is handled between the client and server (and possibly Diameter agents in the path). Moreover, because the application is not maintaining session state at the Diameter base protocol level, the Auth-Session-State AVP MUST be included in all Diameter commands for the application and MUST be set to NO_STATE_MAINTAINED.

o 否则,由于不需要会话管理,或者应用程序依赖于自己的会话管理机制,因此应用程序的Diameter命令不需要包括会话Id AVP。如果应用程序支持任何特定的会话管理概念,则应用程序文档必须明确指定如何在客户机和服务器(可能还有路径中的Diameter代理)之间处理会话。此外,由于应用程序未在Diameter基本协议级别维护会话状态,因此应用程序的所有Diameter命令中必须包含身份验证会话状态AVP,并且必须将其设置为NO_state_mainted。

5.6. Use of Enumerated Type AVPs
5.6. 枚举型AVP的使用

The type Enumerated was initially defined to provide a list of valid values for an AVP with their respective interpretation described in the specification. For instance, AVPs of type Enumerated can be used to provide further information on the reason for the termination of a session or a specific action to perform upon the reception of the request.


As described in Section 4.4.2 above, defining an AVP of type Enumerated presents some limitations in terms of extensibility and reusability. Indeed, the finite set of valid values defined in the definition of the AVP of type Enumerated cannot be modified in practice without causing backward-compatibility issues with existing implementations. As a consequence, AVPs of type Enumerated MUST NOT be extended by adding new values to support new capabilities. Diameter protocol designers SHOULD carefully consider before defining an Enumerated AVP whether the set of values will remain unchanged or new values may be required in the near future. If such an extension is foreseen or cannot be avoided, it is RECOMMENDED to define AVPs of type Unsigned32 or Unsigned64 in which the data field would contain an address space representing "values" that would have the same use of Enumerated values. Whereas only the initial values defined at the definition of the AVP of type Enumerated are valid as described in Section 4.4.2, any value from the address space from 0 to 2^32 - 1 for AVPs of type Unsigned32 or from 0 to 2^64 - 1 for AVPs of type Unsigned64 is valid at the Diameter base protocol level and will not cause interoperability issues for intermediary nodes between clients and servers. Only clients and servers will be able to process the values at the application layer.


For illustration, an AVP describing possible access networks would be defined as follows:


Access-Network-Type AVP (XXX) is of type Unsigned32 and contains a 32-bit address space representing types of access networks. This application defines the following classes of access networks, all identified by the thousands digit in the decimal notation:


o 1xxx (Mobile Access Networks)

o 1xx(移动接入网络)

o 2xxx (Fixed Access Networks)

o 2xxx(固定接入网络)

o 3xxx (Wireless Access Networks)

o 3xxx(无线接入网络)

Values that fall within the Mobile Access Networks category are used to inform a peer that a request has been sent for a user attached to a mobile access network. The following values are defined in this application:


1001: 3GPP-GERAN


The user is attached to a Global System for Mobile Communications (GSM) Enhanced Data rates for GSM Evolution (EDGE) Radio Access Network.




The user is attached to a Universal Mobile Telecommunications System (UMTS) access network that uses frequency-division duplexing for duplexing.


Unlike Enumerated AVP, any new value can be added in the address space defined by this Unsigned32 AVP without modifying the definition of the AVP. There is, therefore, no risk of backward-compatibility issues, especially when intermediate nodes may be present between Diameter endpoints.

与枚举AVP不同,可以在该无符号32 AVP定义的地址空间中添加任何新值,而无需修改AVP的定义。因此,不存在向后兼容性问题的风险,特别是当Diameter端点之间可能存在中间节点时。

Along the same line, AVPs of type Enumerated are too often used as a simple Boolean flag, indicating, for instance, a specific permission or capability; therefore, only three values are defined, e.g., TRUE/ FALSE, AUTHORIZED/UNAUTHORIZED, or SUPPORTED/UNSUPPORTED. This is a sub-optimal design since it limits the extensibility of the application: any new capability/permission would have to be supported by a new AVP or new Enumerated value of the already-defined AVP, with the backward-compatibility issues described above. Instead of using an Enumerated AVP for a Boolean flag, protocol designers SHOULD use AVPs of type Unsigned32 or Unsigned64 in which the data field would


be defined as a bit mask whose bit settings are described in the relevant Diameter application specification. Such AVPs can be reused and extended without major impact on the Diameter application. The bit mask SHOULD leave room for future additions. Examples of AVPs that use bit masks are the Session-Binding AVP defined in [RFC6733] and the MIP6-Feature-Vector AVP defined in [RFC5447].


5.7. Application-Specific Message Routing
5.7. 特定于应用程序的消息路由

As described in [RFC6733], a Diameter request that needs to be sent to a home server serving a specific realm, but not to a specific server (such as the first request of a series of round trips), will contain a Destination-Realm AVP and no Destination-Host AVP.


For such a request, the message routing usually relies only on the Destination-Realm AVP and the Application Id present in the request message header. However, some applications may need to rely on the User-Name AVP or any other application-specific AVPs present in the request to determine the final destination of a request, e.g., to find the target AAA server hosting the authorization information for a given user when multiple AAA servers are addressable in the realm.


In such a context, basic routing mechanisms described in [RFC6733] are not fully suitable, and additional application-level routing mechanisms MUST be described in the application documentation to provide such specific AVP-based routing. Such functionality will be basically hosted by an application-specific proxy agent that will be responsible for routing decisions based on the received specific AVPs.


Examples of such application-specific routing functions can be found in the Cx/Dx applications ([TS29.228] and [TS29.229]) of the 3GPP IP Multimedia Subsystem, in which the proxy agent (Subscriber Location Function, aka SLF) uses specific application-level identities found in the request to determine the final destination of the message.

此类特定于应用程序的路由功能的示例可在3GPP IP多媒体子系统的Cx/Dx应用程序([TS29.228]和[TS29.229])中找到,其中代理(订户定位功能,又称SLF)使用在请求中找到的特定应用程序级标识来确定消息的最终目的地。

Whatever the criteria used to establish the routing path of the request, the routing of the answer MUST follow the reverse path of the request, as described in [RFC6733], with the answer being sent to the source of the received request, using transaction states and hop-by-hop identifier matching. This ensures that the Diameter relay or proxy agents in the request routing path will be able to release the transaction state upon receipt of the corresponding answer, avoiding unnecessary failover. Moreover, especially in roaming cases, proxy agents in the path must be able to apply local policies when receiving the answer from the server during authentication/ authorization and/or accounting procedures and maintain up-to-date session state information by keeping track of all authorized active


sessions. Therefore, application designers MUST NOT modify the answer-routing principles described in [RFC6733] when defining a new application.


5.8. Translation Agents
5.8. 翻译代理

As defined in [RFC6733], a translation agent is a device that provides interworking between Diameter and another AAA protocol, such as RADIUS.


In the case of RADIUS, it was initially thought that defining the translation function would be straightforward by adopting a few basic principles, e.g., by the use of a shared range of code values for RADIUS attributes and Diameter AVPs. Guidelines for implementing a RADIUS-Diameter translation agent were put into the Diameter NAS Application [RFC4005].

在RADIUS的情况下,最初认为通过采用一些基本原则(例如,通过使用RADIUS属性和Diameter AVP的共享代码值范围),定义转换函数将是简单的。Diameter NAS应用程序[RFC4005]中加入了实施RADIUS Diameter转换代理的指南。

However, it was acknowledged that such a translation mechanism was not so obvious and deeper protocol analysis was required to ensure efficient interworking between RADIUS and Diameter. Moreover, the interworking requirements depend on the functionalities provided by the Diameter application under specification, and a case-by-case analysis is required. As a consequence, all the material related to RADIUS-to-Diameter translation is removed from the new version of the Diameter NAS Application specification [RFC7155], which deprecates RFC 4005 [RFC4005].

然而,人们承认,这种转换机制并不明显,需要进行更深入的协议分析,以确保半径和直径之间的有效互通。此外,互通要求取决于规范下Diameter应用程序提供的功能,需要进行个案分析。因此,与半径到直径转换相关的所有材料都从新版的Diameter NAS应用规范[RFC7155]中删除,该规范反对RFC 4005[RFC4005]。

Therefore, protocol designers SHOULD NOT assume the availability of a "standard" Diameter-to-RADIUS gateway agent when planning to interoperate with the RADIUS infrastructure. They SHOULD specify the required translation mechanism along with the Diameter application, if needed. This recommendation applies for any kind of translation.


5.9. End-to-End Application Capabilities Exchange
5.9. 端到端应用程序功能交换

Diameter applications can rely on optional AVPs to exchange application-specific capabilities and features. These AVPs can be exchanged on an end-to-end basis at the application layer. Examples of this can be found with the MIP6-Feature-Vector AVP in [RFC5447] and the QoS-Capability AVP in [RFC5777].


End-to-end capabilities AVPs can be added as optional AVPs with the M-bit cleared to existing applications to announce support of new functionality. Receivers that do not understand these AVPs or the AVP values can simply ignore them, as stated in [RFC6733]. When supported, receivers of these AVPs can discover the additional functionality supported by the Diameter endpoint originating the request and behave accordingly when processing the request. Senders


of these AVPs can safely assume the receiving endpoint does not support any functionality carried by the AVP if it is not present in the corresponding response. This is useful in cases where deployment choices are offered, and the generic design can be made available for a number of applications.


When used in a new application, these end-to-end capabilities AVPs SHOULD be added as an optional AVP into the CCF of the commands used by the new application. Protocol designers SHOULD clearly specify this end-to-end capabilities exchange and the corresponding behavior of the Diameter nodes supporting the application.


It is also important to note that this end-to-end capabilities exchange relying on the use of optional AVPs is not meant as a generic mechanism to support extensibility of Diameter applications with arbitrary functionality. When the added features drastically change the Diameter application or when Diameter agents must be upgraded to support the new features, a new application SHOULD be defined, as recommended in [RFC6733].


5.10. Diameter Accounting Support
5.10. 直径会计支持

Accounting can be treated as an auxiliary application that is used in support of other applications. In most cases, accounting support is required when defining new applications. This document provides two possible models for using accounting:


Split Accounting Model:


In this model, the accounting messages will use the Diameter base accounting Application Id (value of 3). The design implication for this is that the accounting is treated as an independent application, especially for Diameter routing. This means that accounting commands emanating from an application may be routed separately from the rest of the other application messages. This may also imply that the messages end up in a central accounting server. A split accounting model is a good design choice when:


* The application itself does not define its own accounting commands.

* 应用程序本身不定义自己的记帐命令。

* The overall system architecture permits the use of centralized accounting for one or more Diameter applications.

* 整个系统架构允许对一个或多个Diameter应用程序使用集中计费。

Centralizing accounting may have advantages, but there are also drawbacks. The model assumes that the accounting server can differentiate received accounting messages. Since the received accounting messages can be for any application and/or service, the


accounting server MUST have a method to match accounting messages with applications and/or services being accounted for. This may mean defining new AVPs; checking the presence, absence, or contents of existing AVPs; or checking the contents of the accounting record itself. One of these means could be to insert into the request sent to the accounting server an Auth-Application-Id AVP containing the identifier of the application for which the accounting request is sent. But in general, there is no clean and generic scheme for sorting these messages. Therefore, this model SHOULD NOT be used when all received accounting messages cannot be clearly identified and sorted. For most cases, the use of the Coupled Accounting Model is RECOMMENDED.

记帐服务器必须具有将记帐消息与要记帐的应用程序和/或服务相匹配的方法。这可能意味着定义新的AVP;检查现有AVP的存在、缺失或内容;或者检查会计记录本身的内容。其中一种方法是在发送给记帐服务器的请求中插入一个Auth应用程序Id AVP,其中包含为其发送记帐请求的应用程序的标识符。但总的来说,没有一个干净的通用方案来对这些消息进行排序。因此,当无法清楚地识别和排序所有收到的会计信息时,不应使用此模型。对于大多数情况,建议使用耦合会计模型。

Coupled Accounting Model:


In this model, the accounting messages will use the Application Id of the application using the accounting service. The design implication for this is that the accounting messages are tightly coupled with the application itself, meaning that accounting messages will be routed like the other application messages. It would then be the responsibility of the application server (application entity receiving the ACR message) to send the accounting records carried by the accounting messages to the proper accounting server. The application server is also responsible for formulating a proper response (ACA). A coupled accounting model is a good design choice when:


* The system architecture or deployment does not provide an accounting server that supports Diameter. Consequently, the application server MUST be provisioned to use a different protocol to access the accounting server, e.g., via the Lightweight Directory Access Protocol (LDAP), SOAP, etc. This case includes the support of older accounting systems that are not Diameter aware.

* 系统体系结构或部署未提供支持Diameter的记帐服务器。因此,应用服务器必须设置为使用不同的协议来访问记帐服务器,例如,通过轻量级目录访问协议(LDAP)、SOAP等。这种情况包括支持不支持Diameter的旧记帐系统。

* The system architecture or deployment requires that the accounting service for the specific application should be handled by the application itself.

* 系统架构或部署要求特定应用程序的记帐服务应由应用程序本身处理。

In all cases above, there will generally be no direct Diameter access to the accounting server.


These models provide a basis for using accounting messages. Application designers may obviously deviate from these models provided that the factors being addressed here have also been taken


into account. As a general recommendation, application designers SHOULD NOT define a new set of commands to carry application-specific accounting records.


5.11. Diameter Security Mechanisms
5.11. 直径安全机制

As specified in [RFC6733], the Diameter message exchange SHOULD be secured between neighboring Diameter peers using Transport Layer Security (TLS) / TCP or Datagram Transport Layer Security (DTLS) / Stream Control Transmission Protocol (SCTP). However, IPsec MAY also be deployed to secure communication between Diameter peers. When IPsec is used instead of TLS or DTLS, the following recommendations apply.


IPsec Encapsulating Security Payload (ESP) [RFC4301] in transport mode with non-null encryption and authentication algorithms MUST be used to provide per-packet authentication, integrity protection, and confidentiality and to support the replay protection mechanisms of IPsec. Internet Key Exchange Protocol Version 2 (IKEv2) [RFC7296] SHOULD be used for performing mutual authentication and for establishing and maintaining security associations (SAs).


Version 1 of IKE (IKEv1), defined in [RFC2409], was initially used for peer authentication, negotiation of security associations, and key management in RFC 3588 [RFC3588]. For easier migration from the obsoleted implementations based on IKEv1 to IKEv2, both RSA digital signatures and pre-shared keys SHOULD be supported in IKEv2. However, if IKEv1 is used, implementors SHOULD follow the guidelines given in Section 13.1 of RFC 3588 [RFC3588].

[RFC2409]中定义的IKE(IKEv1)版本1最初用于RFC 3588[RFC3588]中的对等身份验证、安全关联协商和密钥管理。为了更容易地从基于IKEv1的过时实现迁移到IKEv2,IKEv2中应同时支持RSA数字签名和预共享密钥。但是,如果使用IKEv1,实施者应遵循RFC 3588[RFC3588]第13.1节中给出的指南。

6. Defining Generic Diameter Extensions
6. 定义通用直径扩展

Generic Diameter extensions are AVPs, commands, or applications that are designed to support other Diameter applications. They are auxiliary applications meant to improve or enhance the Diameter protocol itself or Diameter applications/functionality. Some examples include the extensions to support realm-based redirection of Diameter requests (see [RFC7075]), conveying a specific set of priority parameters influencing the distribution of resources (see [RFC6735]), and the support for QoS AVPs (see [RFC5777]).

通用直径扩展是用于支持其他直径应用程序的AVP、命令或应用程序。它们是辅助应用程序,旨在改进或增强Diameter协议本身或Diameter应用程序/功能。一些示例包括支持基于领域的Diameter请求重定向的扩展(请参见[RFC7075])、传递影响资源分配的一组特定优先级参数(请参见[RFC6735])以及对QoS AVP的支持(请参见[RFC5777])。

Since generic extensions may cover many aspects of Diameter and Diameter applications, it is not possible to enumerate all scenarios. However, some of the most common considerations are as follows:


Backward Compatibility:


When defining generic extensions designed to be supported by existing Diameter applications, protocol designers MUST consider the potential impacts of the introduction of the new extension on the behavior of the node that would not be yet upgraded to support/understand this new extension. Designers MUST also ensure that new extensions do not break expected message delivery layer behavior.


Forward Compatibility:


Protocol designers MUST ensure that their design will not introduce undue restrictions for future applications.


Trade-off in Signaling:


Designers may have to choose between the use of optional AVPs piggybacked onto existing commands versus defining new commands and applications. Optional AVPs are simpler to implement and may not need changes to existing applications. However, this ties the sending of extension data to the application's transmission of a message. This has consequences if the application and the extensions have different timing requirements. The use of commands and applications solves this issue, but the trade-off is the additional complexity of defining and deploying a new application. It is left up to the designer to find a good balance among these trade-offs based on the requirements of the extension.


In practice, generic extensions often use optional AVPs because they are simple and non-intrusive to the application that would carry them. Peers that do not support the generic extensions need not understand nor recognize these optional AVPs. However, it is RECOMMENDED that the authors of the extension specify the context or usage of the optional AVPs. As an example, in the case that the AVP can be used only by a specific set of applications, then the specification MUST enumerate these applications and the scenarios when the optional AVPs will be used. In the case where the optional AVPs can be carried by any application, it should be sufficient to specify such a use case and perhaps provide specific examples of applications using them.


In most cases, these optional AVPs piggybacked by applications would be defined as a Grouped AVP, and it would encapsulate all the functionality of the generic extension. In practice, it is not uncommon that the Grouped AVP will encapsulate an existing AVP that has previously been defined as mandatory ('M'-bit set), e.g., 3GPP IP Multimedia Subsystems (IMS) Cx/Dx interfaces ([TS29.228] and [TS29.229]).

在大多数情况下,这些由应用程序搭载的可选AVP将被定义为一个分组AVP,它将封装通用扩展的所有功能。在实践中,分组AVP将封装先前被定义为强制性(“M’-位集”)的现有AVP,例如3GPP IP多媒体子系统(IMS)Cx/Dx接口([TS29.228]和[TS29.229]),这种情况并不少见。

7. Guidelines for Registrations of Diameter Values
7. 直径值登记指南

As summarized in Section 3 of this document and further described in Section 1.3 of [RFC6733], there are four main ways to extend Diameter. The process for defining new functionality slightly varies based on the different extensions. This section provides protocol designers with some guidance regarding the definition of values for possible Diameter extensions and the necessary interaction with IANA to register the new functionality.


a. Defining New AVP Values

a. 定义新的AVP值

The specifications defining AVPs and AVP values MUST provide guidance for defining new values and the corresponding policy for adding these values. For example, RFC 5777 [RFC5777] defines the Treatment-Action AVP, which contains a list of valid values corresponding to predefined actions (drop, shape, mark, permit). This set of values can be extended following the Specification Required policy defined in [RFC5226]. As a second example, the Diameter base specification [RFC6733] defines the Result-Code AVP that contains a 32-bit address space used to identity possible errors. According to Section 11.3.2 of [RFC6733], new values can be assigned by IANA via an IETF Review process [RFC5226].

定义AVP和AVP值的规范必须提供定义新值的指南以及添加这些值的相应策略。例如,RFC 5777[RFC5777]定义了治疗动作AVP,其中包含与预定义动作(下降、形状、标记、允许)相对应的有效值列表。这组值可以按照[RFC5226]中定义的规范要求策略进行扩展。作为第二个示例,Diameter base规范[RFC6733]定义了结果代码AVP,该代码包含用于识别可能错误的32位地址空间。根据[RFC6733]第11.3.2节,IANA可通过IETF评审过程[RFC5226]分配新值。

b. Creating New AVPs

b. 创建新的AVP

Two different types of AVP Codes namespaces can be used to create a new AVP:


* IETF AVP Codes namespace.

* IETF AVP代码名称空间。

* Vendor-specific AVP Codes namespace.

* 供应商特定的AVP代码命名空间。

In the latter case, a vendor needs to be first assigned by IANA with a private enterprise number, which can be used within the Vendor-Id field of the vendor-specific AVP. This enterprise number delimits a private namespace in which the vendor is responsible for vendor-specific AVP code value assignment. The absence of a Vendor Id or a Vendor-Id value of zero (0) in the AVP header identifies standard AVPs from the IETF AVP Codes namespace

在后一种情况下,IANA首先需要为供应商分配一个私有企业编号,该编号可在供应商特定AVP的供应商Id字段中使用。此企业编号界定了一个私有名称空间,供应商在其中负责供应商特定的AVP代码值分配。AVP头中没有供应商Id或供应商Id值为零(0)表示IETF AVP代码命名空间中的标准AVP

managed by IANA. The allocation of code values from the IANA-managed namespace is conditioned by an Expert Review of the specification defining the AVPs or an IETF Review if a block of AVPs needs to be assigned. Moreover, the remaining bits of the AVP Flags field of the AVP header are also assigned via Standards Action if the creation of new AVP flags is desired.


c. Creating New Commands

c. 创建新命令

Unlike the AVP Codes namespace, the Command Code namespace is flat, but the range of values is subdivided into three chunks with distinct IANA registration policies:


* A range of standard Command Code values that are allocated via IETF Review;

* 通过IETF评审分配的一系列标准命令代码值;

* A range of vendor-specific Command Code values that are allocated on a first-come, first-served basis; and

* 按先到先得原则分配的一系列特定于供应商的命令代码值;和

* A range of values reserved only for experimental and testing purposes.

* 仅为实验和测试目的保留的一系列值。

As for AVP flags, the remaining bits of the Command Flags field of the Diameter header are also assigned via a Standards Action to create new Command flags if required.


d. Creating New Applications

d. 创建新的应用程序

Similarly, to the Command Code namespace, the Application-Id namespace is flat but divided into two distinct ranges:


* A range of values reserved for standard Application Ids, allocated after Expert Review of the specification defining the standard application.

* 为标准应用程序ID保留的一系列值,在专家审查定义标准应用程序的规范后分配。

* A range for values for vendor-specific applications, allocated by IANA on a first-come, first-served basis.

* 供应商特定应用程序的值范围,由IANA按照先到先得的原则分配。

The IANA AAA parameters page can be found at <>, and the enterprise number IANA page is available at < enterprise-numbers>. More details on the policies followed by IANA for namespace management (e.g., first-come, first-served; Expert Review; IETF Review; etc.) can be found in [RFC5226].

IANA AAA参数页面可在以下位置找到:<>,企业编号IANA页面可在< 企业编号>。有关IANA遵循的命名空间管理政策(例如,先到先得;专家评审;IETF评审等)的更多详细信息,请参见[RFC5226]。

NOTE: When the same functionality/extension is used by more than one vendor, it is RECOMMENDED that a standard extension be defined. Moreover, a vendor-specific extension SHOULD be registered to avoid interoperability issues in the same network. With this aim, the registration policy of a vendor-specific extension has been simplified with the publication of [RFC6733], and the namespace reserved for vendor-specific extensions is large enough to avoid exhaustion.


8. Security Considerations
8. 安全考虑

This document provides guidelines and considerations for extending Diameter and Diameter applications. Although such an extension may be related to a security functionality, the document does not explicitly give additional guidance on enhancing Diameter with respect to security. However, as a general guideline, it is recommended that any Diameter extension SHOULD NOT break the security concept given in [RFC6733]. In particular, it is reiterated here that any command defined or reused in a new Diameter application SHOULD be secured by using TLS [RFC5246] or DTLS/SCTP [RFC6083] and MUST NOT be used without one of the following: TLS, DTLS, or IPsec [RFC4301]. When defining a new Diameter extension, any possible impact of the existing security principles described in [RFC6733] MUST be carefully appraised and documented in the Diameter application specification.


9. References
9. 工具书类
9.1. Normative References
9.1. 规范性引用文件

[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997, <>.

[RFC2119]Bradner,S.,“RFC中用于表示需求水平的关键词”,BCP 14,RFC 2119,1997年3月<>.

[RFC6733] Fajardo, V., Arkko, J., Loughney, J., and G. Zorn, "Diameter Base Protocol", RFC 6733, October 2012, <>.

[RFC6733]Fajardo,V.,Arkko,J.,Loughney,J.,和G.Zorn,“直径基准协议”,RFC 67332012年10月<>.

9.2. Informative References
9.2. 资料性引用

[Q.3303.3] International Telecommunications Union, "Resource control protocol No. 3: Protocols at the Rw interface between the policy decision physical entity (PD-PE) and a policy enforcement physical entity (PE-PE): Diameter profile version 3", ITU-T Recommendation Q.3303.3, August 2008.


[RFC2409] Harkins, D. and D. Carrel, "The Internet Key Exchange (IKE)", RFC 2409, November 1998, <>.

[RFC2409]Harkins,D.和D.Carrel,“互联网密钥交换(IKE)”,RFC 2409,1998年11月<>.

[RFC3588] Calhoun, P., Loughney, J., Guttman, E., Zorn, G., and J. Arkko, "Diameter Base Protocol", RFC 3588, September 2003, <>.

[RFC3588]Calhoun,P.,Loughney,J.,Guttman,E.,Zorn,G.,和J.Arkko,“直径基础协议”,RFC 3588,2003年9月<>.

[RFC4005] Calhoun, P., Zorn, G., Spence, D., and D. Mitton, "Diameter Network Access Server Application", RFC 4005, August 2005, <>.

[RFC4005]Calhoun,P.,Zorn,G.,Spence,D.,和D.Mitton,“Diameter网络访问服务器应用”,RFC 4005,2005年8月<>.

[RFC4072] Eronen, P., Hiller, T., and G. Zorn, "Diameter Extensible Authentication Protocol (EAP) Application", RFC 4072, August 2005, <>.

[RFC4072]Eronen,P.,Hiller,T.,和G.Zorn,“直径可扩展认证协议(EAP)应用”,RFC 4072,2005年8月<>.

[RFC4301] Kent, S. and K. Seo, "Security Architecture for the Internet Protocol", RFC 4301, December 2005, <>.

[RFC4301]Kent,S.和K.Seo,“互联网协议的安全架构”,RFC 43012005年12月<>.

[RFC4740] Garcia-Martin, M., Belinchon, M., Pallares-Lopez, M., Canales-Valenzuela, C., and K. Tammi, "Diameter Session Initiation Protocol (SIP) Application", RFC 4740, November 2006, <>.

[RFC4740]Garcia Martin,M.,Belinchon,M.,Pallares Lopez,M.,Canales Valenzuela,C.,和K.Tammi,“Diameter会话启动协议(SIP)应用”,RFC 47402006年11月<>.

[RFC5226] Narten, T. and H. Alvestrand, "Guidelines for Writing an IANA Considerations Section in RFCs", BCP 26, RFC 5226, May 2008, <>.

[RFC5226]Narten,T.和H.Alvestrand,“在RFCs中编写IANA注意事项部分的指南”,BCP 26,RFC 5226,2008年5月<>.

[RFC5246] Dierks, T. and E. Rescorla, "The Transport Layer Security (TLS) Protocol Version 1.2", RFC 5246, August 2008, <>.

[RFC5246]Dierks,T.和E.Rescorla,“传输层安全(TLS)协议版本1.2”,RFC 5246,2008年8月<>.

[RFC5447] Korhonen, J., Bournelle, J., Tschofenig, H., Perkins, C., and K. Chowdhury, "Diameter Mobile IPv6: Support for Network Access Server to Diameter Server Interaction", RFC 5447, February 2009, <>.

[RFC5447]Korhonen,J.,Bournelle,J.,Tschofenig,H.,Perkins,C.,和K.Chowdhury,“Diameter移动IPv6:支持网络访问服务器到Diameter服务器的交互”,RFC 5447,2009年2月<>.

[RFC5777] Korhonen, J., Tschofenig, H., Arumaithurai, M., Jones, M., and A. Lior, "Traffic Classification and Quality of Service (QoS) Attributes for Diameter", RFC 5777, February 2010, <>.

[RFC5777]Korhonen,J.,Tschofenig,H.,Arumaithurai,M.,Jones,M.,和A.Lior,“直径的流量分类和服务质量(QoS)属性”,RFC 57772010年2月<>.

[RFC6083] Tuexen, M., Seggelmann, R., and E. Rescorla, "Datagram Transport Layer Security (DTLS) for Stream Control Transmission Protocol (SCTP)", RFC 6083, January 2011, <>.

[RFC6083]Tuexen,M.,Seggelmann,R.,和E.Rescorla,“流控制传输协议(SCTP)的数据报传输层安全性(DTLS)”,RFC 6083,2011年1月<>.

[RFC6735] Carlberg, K. and T. Taylor, "Diameter Priority Attribute-Value Pairs", RFC 6735, October 2012, <>.

[RFC6735]Carlberg,K.和T.Taylor,“直径优先级属性值对”,RFC 67352012年10月<>.

[RFC7075] Tsou, T., Hao, R., and T. Taylor, "Realm-Based Redirection In Diameter", RFC 7075, November 2013, <>.

[RFC7075]Tsou,T.,Hao,R.,和T.Taylor,“基于领域的直径重定向”,RFC 70752013年11月<>.

[RFC7155] Zorn, G., "Diameter Network Access Server Application", RFC 7155, April 2014, <>.

[RFC7155]Zorn,G.“Diameter网络访问服务器应用”,RFC 7155,2014年4月<>.

[RFC7296] Kaufman, C., Hoffman, P., Nir, Y., Eronen, P., and T. Kivinen, "Internet Key Exchange Protocol Version 2 (IKEv2)", STD 79, RFC 7296, October 2014, <>.

[RFC7296]Kaufman,C.,Hoffman,P.,Nir,Y.,Eronen,P.,和T.Kivinen,“互联网密钥交换协议版本2(IKEv2)”,STD 79,RFC 72962014年10月<>.

[TS29.228] 3rd Generation Partnership Project, "Technical Specification Group Core Network and Terminals; IP Multimedia (IM) Subsystem Cx and Dx Interfaces; Signalling flows and message contents", 3GPP TS 29.228, September 2014, <>.

[TS29.228]第三代合作伙伴项目,“技术规范组核心网络和终端;IP多媒体(IM)子系统Cx和Dx接口;信令流和消息内容”,3GPP TS 29.228,2014年9月<>.

[TS29.229] 3rd Generation Partnership Project, "Technical Specification Group Core Network and Terminals; Cx and Dx interfaces based on the Diameter protocol; Protocol details", 3GPP TS 29.229, September 2014, <>.

[TS29.229]第三代合作伙伴项目,“技术规范组核心网络和终端;基于Diameter协议的Cx和Dx接口;协议详情”,3GPP TS 29.229,2014年9月<>.

[TS29.328] 3rd Generation Partnership Project, "Technical Specification Group Core Network and Terminals; IP Multimedia (IM) Subsystem Sh interface; Signalling flows and message contents", 3GPP TS 29.328, September 2014, <>.

[TS29.328]第三代合作伙伴项目,“技术规范组核心网络和终端;IP多媒体(IM)子系统Sh接口;信令流和消息内容”,3GPP TS 29.328,2014年9月<>.

[TS29.329] 3rd Generation Partnership Project, "Technical Specification Group Core Network and Terminals; Sh Interface based on the Diameter protocol; Protocol details", 3GPP TS 29.329, September 2014, <>.

[TS29.329]第三代合作伙伴项目,“技术规范组核心网络和终端;基于Diameter协议的Sh接口;协议细节”,3GPP TS 29.3292014年9月<>.



The content of this document was influenced by a design team created to revisit the Diameter extensibility rules. The team was formed in February 2008 and finished its work in June 2008. In addition to those individuals listed in the Authors' Addresses section, the design team members were:


o Avi Lior

o 阿维利奥

o Glen Zorn

o 格伦·佐恩

o Jari Arkko

o 贾里·阿克科

o Jouni Korhonen

o 朱尼·科霍宁

o Mark Jones

o 马克·琼斯

o Tolga Asveren

o 托尔加·阿斯维伦

o Glenn McGregor

o 格伦·麦克格雷戈

o Dave Frascone

o 戴夫·弗拉斯科恩

We would like to thank Tolga Asveren, Glenn McGregor, and John Loughney for their contributions as coauthors to earlier versions of this document.

我们要感谢Tolga Asveren、Glenn McGregor和John Loughney作为本文件早期版本的合著者所作的贡献。



We greatly appreciate the insight provided by Diameter implementors who have highlighted the issues and concerns being addressed by this document. The authors would also like to thank Jean Mahoney, Ben Campbell, Sebastien Decugis, and Benoit Claise for their invaluable, detailed reviews and comments on this document.

我们非常感谢Diameter实施者提供的见解,他们强调了本文档所解决的问题和关注点。作者还要感谢Jean Mahoney、Ben Campbell、Sebastien Decugis和Benoit Claise对本文件的宝贵、详细的评论和评论。

Authors' Addresses


Lionel Morand (editor) Orange Labs 38/40 rue du General Leclerc Issy-Les-Moulineaux Cedex 9 92794 France

莱昂内尔·莫兰德(编辑)橙色实验室法国莱克勒将军街38/40号莱克勒·伊西·勒·穆莱诺·塞德克斯9 92794

   Phone: +33145296257
   Phone: +33145296257

Victor Fajardo Fluke Networks



Hannes Tschofenig Hall in Tirol 6060 Austria