[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Sterman Issue 7] Message Authenticator: Options



Hi folks,
We would like to get closure on the issue of the use of Message
Authenticator for draft-sterman-aaa-sip-04.

Everyone seems to agree that we need to use some sort of RADIUS Message
Authenticator.

There was a discussion on the strength of HMAC-MD5.  Some suggested that we
should stregthen the RADIUS Message-Authenticator to HMAC-SHA1.

-HMAC-MD5 is not busted (yet).
-draft-sterman-aaa-sip-04 carries HTTP digest which are based on MD5.
-draft-sterman-aaa-sip-04 seems to be addressing legacy deployements.
Recommending that greenfield implementation use Diameter.
-There is a push to get draft-sterman-aaa-sip-04 out quickly.
-keywrap proposes a new message authenticator Message-Authentication-Code
which supports either HMAC-MD5 or MHAC-SHA1 methods.

Options:
========
1) Allow draft-sterman-aaa-sip to use Message-Authenticator(80). And when
keywrap is ready we can state in keywrap that RADIUS implmentation should
upgrade to Message-Authentication-Code.

2) Require draft-sterman-aaa-sip to use Message-Authentication-Code.


Questions:
==========

-Will IESG accept a new RFC based on HMAC-MD5?
If not then we don't really have a choice.

-Will keywrap be ready in time?
This is important but the authors feel that it is ready to go.  However,
note that Keywrap allows Message-Authentication-Code to be HMAC-MD5 isn't
this a problem?

Your comments and opinion would be appreciated.

Avi

--
to unsubscribe send a message to radiusext-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://psg.com/lists/radiusext/>