[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
draft-ietf-radext-digest-auth, Securit Considerations section
This looks good, and resolves my issue.
-Pete
Beck01, Wolfgang writes:
> Here's a proposal for the text regarding the encryption of RADIUS
> which is required when accepting sips/https:
>
> HTTP-style clients can use TLS with server side certificates together
> with HTTP-Digest authentication. Instead of TLS, IPSec can be used,
> too. TLS or IPSec secure the connection while Digest Authentication
> authenticates the user. The RADIUS connection can be regarded as one
> leg on the path between the HTTP-style client and the HTTP-style
> server. To prevent the RADIUS link from being the weakest hop on the
> path, a RADIUS client receiving an HTTP-style request via TLS or
> IPSec MUST use an equally secure connection to the RADIUS server.
> There are two ways to achieve this:
> o the RADIUS client rejects HTTP-style requests received over TLS or
> IPSec
> o the operator of the RADIUS client takes actions to ensure that
> RADIUS traffic is exclusively sent and received using IPSec.
> When using IPSec, it MUST be set up as described [RFC3579] section
> 4.2.
>
>
> Wolfgang
>
> --
> T-Systems
> Internet Platforms
> +49 6151 937 2863
> Am Kavalleriesand 3
> 64295 Darmstadt
> Germany
>
> --
> to unsubscribe send a message to radiusext-request@ops.ietf.org with
> the word 'unsubscribe' in a single line as the message text body.
> archive: <http://psg.com/lists/radiusext/>
--
to unsubscribe send a message to radiusext-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://psg.com/lists/radiusext/>