[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: Crypto-agility requirements: Credentials issue



During the Virtual Interim, we discussed the potential drawbacks of requiring that NASes support certificate-based authentication.
Given this, what types of credentials need to be supported in a crypto-agility solution?  Should it be necessary for a solution to support a shared secret or pre-shared key?



From: bernard_aboba@hotmail.com
To: radiusext@ops.ietf.org
Subject: Crypto-agility requirements: Credentials issue
Date: Sun, 28 Jun 2009 13:59:01 -0700

In Issue 303, Pasi Eronen brought up the following concern:

Authentication/long-term credentials:

Authenticating the RADIUS client and server will require (manual)
configuration of some kinds of credentials (currently, the RADIUS
shared secret). The document should say something about what kinds of
long-term authentication credentials (for RADIUS entities) the
crypto-agility solutions are expected to support.

Presumably, they MUST support pair-wise shared secrets. Other
possibilities for long-term credentials could include e.g. X.509
certificates with PKI, public keys without certification
infrastructure (generate keypair + configure fingerprint of peer's
key), or Kerberos. Even if the conclusion is that nothing else than
pairwise shared secrets is needed, that should be said in the document
(with rationale explaining why).