[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

AW: Comments on draft-sterman-aaa-sip-03



Pete McCann wrote:

> Document should start with an overview of the assumed architecture, as
> shown in e.g. Figure 1 of Section 1.3.  However, the text of Section
> 1.3 dives into a particular scenario and a broader overview is
> necessary first.  (I think Miguel made this comment earlier)
> Section 1.2 (although I think this text should be deleted):
When I started working on the draft, people asked for a motivational
section.

I'll do an overview section which includes the 2 scenario sections

     1.3   Overview . . . . . . . . . . . . . . . . . . . . . . . . .  4
       1.3.1   Scenario 1, RADIUS client chooses nonces . . . . . . .  5
       1.3.2   Scenario 2, RADIUS server chooses nonces . . . . . . .  6

Section 1.3 will be the '1.5 Approach' section of -03 without the last
paragraph.

>   However, in
>   some cases the RADIUS server is better off with pre-computed hashes.
>   Section 1.4 describes an mechanism that enables this style of
>   authentication.
> This paragraph mentions "precomputed hashes" but then the issue is never
> revisited.  Is it true that precomputed hashes can be used with arbitrary
> message contents, or is some other coordination required between the
> home RADIUS server and the client?
Proposal:
"1.3.2  Scenario 2, RADIUS server chooses nonces

   In most cases, the operation outlined in Section 1.3.1 is sufficient.
   It reduces the load on the RADIUS server to a minimum.  However, when
   using AKA [RFC3310] the nonce is partially derived from a precomputed
   authentication vector.  These authentication vectors are often stored
   centrally.

   Figure 3 depicts an scenario, where the RADIUS server chooses nonces."

> Section 2:
> Reformat list of attributes into a table, and use values like "TBD-DIG-RES"
> in the table.  Create an IANA considerations section which requests allocations.
There is a IANA consideration section at the end of the document. I didn't want
to use DIG-RES etc. in the sub sections of 2. before explaining that they are
attribute names.

Proposal:
"2.  New RADIUS attributes

   DIG-RES, DIG-REALM, DIG-NONCE, DIG-METHOD, DIG-URI, DIG-QOP, DIG-ALG,
   DIG-BODY, DIG-CNONCE, DIG-NC, DIG-USER, DIG-OPAQUE, DIG-AUTHP,
   DIG-AUTS, DIG-DOMAIN and DIG-STALE are placeholders for values that
   are taken from the RADIUS attribute type number space (see Section 
   <IANA considerations>)."

> Don't use text like "if this specification becomes a working group or IESG
> document..."
> [..]
> Get rid of " Early implementations have used the experimental type
> 206."
Ok.

The following is confusing:

> 3.1  RADIUS Client Behaviour
> 
>    A RADIUS client without an encrypted or otherwise secured connection
>    to its RADIUS server only accepts unsecured connections from its
>    HTTP-style clients (or else the clients would have a false sense of
>    security).
> 
> It is not quite clear what is meant by "encrypted or otherwise
> secured", because there are several different security mechanisms
> available in RADIUS, including the hop-by-hop message authenticator
> and the shared-key method of obfuscating individual attributes.  I
"encrypted" ~ eg. IPSEC or proprietary tunnel technology
"otherwise secured" ~ eg. RADIUS client and server are in a closed MPLS
VPN.

> assume this would not be adequate to provide the protection you are
> looking for.  Also, what counts as an "unsecured connection" from an
> HTTP-style client?  Do you mean one that doesn't use either TLS or
> IPSec?
Yes. I'll insert a reference to the security considerations section,
which has this paragraph:
  "HTTP-style clients can use TLS with server side certificates together
   with HTTP-Digest authentication.  IPSec can be used in a similar way.
   TLS or IPSec secure the connection while Digest Authentication
   authenticates the user.  If a RADIUS client accepts such connections,
   it MUST have a secure connection to the RADIUS server."

> Maybe this paragraph is adequately covered by the security
> considerations (or should be) and could be deleted.
I disagree. If a SIP client wants the signalling to be secure,
it uses sips: URLs. All SIP proxies along the way must use TLS
connections to forward requests with sips: URLs. I don't think
the SIP proxies (=RADIUS clients) should expose parts of the SIP
message by using a unencrypted RADIUS messages in this case.

As this is part of the client behaviour, I put it into that section.


Thank you very much for your help,

Wolfgang


--
to unsubscribe send a message to radiusext-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://psg.com/lists/radiusext/>