[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
RE: RADIUS keywrap attributes
Nelson, David <mailto:dnelson@enterasys.com> supposedly scribbled:
> Glen Zorn writes...
>
>>> So yes, keying attributes are within the RADEXT WG charter.
>>
>> I suppose that, as David mentioned, this is a matter that is open to
>> interpretation. However, the current charter states that "No new
>> security mechanisms will be defined for protecting RADIUS." Taking
>> the position (which I think reasonable) that RADIUS includes
>> attributes and their allowable contents, it would seem to me that an
>> attribute that cryptographically protects its contents is, in fact,
>> a new security mechanism.
>
> The intent of the charter prohibition on "new security mechanisms"
> was to preclude the specification of incompatible revisions to
> RADIUS, that would mandate upgrades to existing RADIUS
> implementations. Since RADIUS was designed without the benefit of a
> security method negotiation or selection mechanism, it's likely quite
> difficult to add new PDU-level security mechanisms in a backwards
> compatible fashion. Since RADIUS implementations have traditionally
> ignored new attributes, introduced after the implementation, adding
> new security within the scope of a single attribute does not present
> the same level of backwards compatibility issues.
Hmm. Since RADIUS clients and servers are required to ignore unknown packet types (by specification, not tradition), I don't really understand why this same logic would not apply to the protocol in general.
Hope this helps,
~gwz
Why is it that most of the world's problems can't be solved by simply
listening to John Coltrane? -- Henry Gabriel
--
to unsubscribe send a message to radiusext-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://psg.com/lists/radiusext/>