[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Comments on draft-sterman-aaa-sip-03
Hi,
Attached are some review comments on draft-sterman-aaa-sip-03.
-Pete
Document should start with an overview of the assumed architecture, as
shown in e.g. Figure 1 of Section 1.3. However, the text of Section
1.3 dives into a particular scenario and a broader overview is
necessary first. (I think Miguel made this comment earlier)
Section 1.2 (although I think this text should be deleted):
Change:
lacking support, too: even two years
To:
lacking support, too; even two years
Change:
SIP service providers whishing
To:
SIP service providers wishing
Section 1.5:
Change:
Section 1.4 describes an mechanism
To:
Section 1.4 describes a mechanism
However, in
some cases the RADIUS server is better off with pre-computed hashes.
Section 1.4 describes an mechanism that enables this style of
authentication.
This paragraph mentions "precomputed hashes" but then the issue is never
revisited. Is it true that precomputed hashes can be used with arbitrary
message contents, or is some other coordination required between the
home RADIUS server and the client?
Section 2:
Reformat list of attributes into a table, and use values like "TBD-DIG-RES"
in the table. Create an IANA considerations section which requests allocations.
Don't use text like "if this specification becomes a working group or IESG
document..."
Get rid of " Early implementations have used the experimental type
206."
The following is confusing:
3.1 RADIUS Client Behaviour
A RADIUS client without an encrypted or otherwise secured connection
to its RADIUS server only accepts unsecured connections from its
HTTP-style clients (or else the clients would have a false sense of
security).
It is not quite clear what is meant by "encrypted or otherwise
secured", because there are several different security mechanisms
available in RADIUS, including the hop-by-hop message authenticator
and the shared-key method of obfuscating individual attributes. I
assume this would not be adequate to provide the protection you are
looking for. Also, what counts as an "unsecured connection" from an
HTTP-style client? Do you mean one that doesn't use either TLS or
IPSec? Maybe this paragraph is adequately covered by the security
considerations (or should be) and could be deleted.
--
to unsubscribe send a message to radiusext-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://psg.com/lists/radiusext/>