[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Sterman Issue#8 and Some Other Issues
Hi folks,
The following comments and questions are related to issue #8 and some other
new issues.
1) The title of Issue #8 indicates that "Rspauth generation not possible if
RADIUS server chooses nonces and qop=auth-int"
This issue exists regardless of whether the RADIUS Server or Client chooses
the nonces. We think the current approach proposed by Wolfgang can apply
for both cases.
2) Section 2.19 (Digest-HA1 attribute) first paragraph states:
"If this attribute is present, the RADIUS server did not accept the nonce
value."
This statement seems incorrect. It should be replaced with: "This attribute
holds H(A1) as described in RFC2617 to be used for constructing the
Authentication-Info header by the RADIUS client."
3) There several places (like sections 2.19, 3.1, and 3.2) which state
something like: ".... MUST NOT...., unless....". We think it will be
better to reword the sentences along the lines provided in the examples below.
a) Section 2.19 under string definition, states the following:
"If the 'algorithm' directive's value is 'MD5' or 'AKAv1-MD5', the
Digest-HA1 attribute MUST NOT be sent by the RADIUS server or processed by
the RADIUS client, unless the authenticity and integrity of the
Access-Accept message was secured by cryptographic or equivalently secure
means."
We can replace the above text to:
If the 'algorithm' directive's value is 'MD5' or 'AKAv1-MD5', and the
authenticity and integrity of the Access-Accept message was not secured by
cryptographic or equivalent secure means, the Digest-HA1 attribute MUST NOT
be sent by the RADIUS server or processed by the RADIUS client.
b) Text in Sections 3.1 and 3.2 states:
"If the Digest-Qop attribute's value is 'auth-int' and the Digest-Algorithm
attribute's value is 'MD5' or 'AKAv1-MD5', the RADIUS client MUST NOT use
the Digest-HA1 attribute, unless it knows for sure that the Access-Accept
message was encrypted or otherwise protected against eavesdropping".
We can replace the above text to:
The RADIUS client MUST NOT use the Digest-HA1 attribute if all of the
following conditions are true:
- The Digest-Qop attribute's value is 'auth-int';
- The Digest-Algorithm attribute's value is 'MD5' or 'AKAv1-MD5'; and
- The authenticity and integrity of the Access-Accept message was not
secured by cryptographic or other equivalent secure means.
4) Section 2.4 (Digest-Response-Auth attribute) states:
"This attribute is only used in Access-Accept messages if the RADIUS server
is configured to choose nonces."
Why is this attribute not applicable when RADIUS client chooses nonces? It
seems that this attribute is needed as long as the mutual authentication is
performed (see section 3.2.3 of RFC 2617.)
5) This comment is applicable to all attributes in Section 2. All attribute
definitions should clearly specify in which RADIUS messages (Access
Request, Access Accept, Access-Challenge, Access-Reject) these are valid.
For example, section 2.9 only mentions Access Accept message. However, the
Digest-Algorithm attribute can also be present in Access-Challenge message.
6) The definition of Digest-Stale attribute in Section 2.18 is not clear.
It should be clarified as follows:
2.18 Digest-Stale attribute
This attribute indicates whether the RADIUS server accepted the nonce value
received from the RADIUS client.
Type
DIG-STALE
Length
3
String
The string consists of a single character. If the nonce
presented by the RADIUS client was stale, the character is '1' and is '0'
otherwise. If the RADIUS sever does not accept the nonce received in
Access Request message but authentication was successful, the RADIUS server
MUST include this attribute in Access Accept message and set it to '1'; the
RADIUS server MUST also set the 'next-nonce' attribute in the Access-Accept
message to the valid nonce-value.
7) In Section 3.1, the text on Digest-Stale attribute is not clear. It
should be clarified as follows:
If the RADIUS client receives an Access-Accept message from the RADIUS
Server with the Digest-Stale attribute set to '1', the RADIUS client sends
an error (401 or 407) response to the HTTP-style client containing
WWW-/Proxy-Authenticate header with the stale flag set to "TRUE and the
nonce value set to the 'next-nonce' value received in the Access-Accept
message.
8) The following RADIUS Server procedure should be added to section 3.2:
If the RADIUS sever does not accept the nonce received in Access Request
message but authentication was successful, the RADIUS server MUST include
this attribute in Access Accept message and set it to '1'; the RADIUS
server MUST also set the 'next-nonce' attribute in the Access-Accept
message to the valid nonce-value.
9) More general question related to comments 6), 7) & 8) above.
The current text assumes that if the nonce is stale and authentication is
successful, the RADIUS server will indicate it to the RADIUS client using
Access-Accept message. Shouldn't this be indicated in Access-Challenge
message? So, Access-Accept messages should be sent only when nonce is valid
and authentication is successful. For any other purpose, Access-Challenge
or Access-Reject should be used.
Thanks,
Jun
--
to unsubscribe send a message to radiusext-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://psg.com/lists/radiusext/>