[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: Crypto-agility requirements: Hop-by-hop vs. end-to-end (from Issue 303)



A proposal for addressing this would be to state explicitly that solutions are only required to address hop-by-hop security.   If more explanation is required, one or more of the following points might be included:

a. RADIUS currently does not support the Redirect facilities of Diameter, which allows a NAS to directly talk to a Diameter server assuming that appropriate credentials are available.

b. End-to-end protection requires that the NAS and RADIUS server can authenticate directly.  Where pre-shared keys are used for authentication, this creates a scaling problem.  Where certificates are available *and* re-direct (or automatic discovery) is available, the NAS can talk directly to the RADIUS server.   However, this is an ongoing area of research/experimentation, which is not yet mature enough for standardization.




From: bernard_aboba@hotmail.com
To: radiusext@ops.ietf.org
Subject: Crypto-agility requirements: Hop-by-hop vs. end-to-end (from Issue 303)
Date: Sun, 28 Jun 2009 14:01:41 -0700


Hop-by-hop/end-to-end:

The document currently considers only "hop-by-hop" security
mechanisms, not any "end-to-end" protection (across proxies). I think
this is OK and perfectly reasonable -- but the document should say this,
and explain what this means for interpreting RFC 4962

Much of RFC 4962 is open to multiple interpretations, and some parts
of it can be read as requiring more than hop-by-hop security. IMHO
exactly the same parts can also be read as saying hop-by-hop can be
sufficient (when done properly), and I think this document should
explicitly say it's interpreting 4962 the latter way. (And once the
document has this explanation, you might want to run it by some other
ADs, too -- e.g. Tim and Russ)