[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
RE: RADEXT Milestone revisions
The crypto-agility work item will focus on the negotiation of cryptographic
algorithms within existing RADIUS security mechanisms.
As has been discussed recently in SAAG, the recent attacks against popular
hashes such as MD5 and SHA1 have raised awareness of this problem. The IETF
will be undertaking work on crypto-agility within a number of protocols,
including TLS. It has been suggested that the issue is serious in RADIUS
because the protocol uses straight MD5 in places, rather than HMAC-MD5 or
HMAC-SHA1. Given the rate of advance of hash attacks, and the lag time
involved in producing standards, it is best to get work on RADIUS
crypto-agility underway sooner rather than later.
Note that this work item does not require solving all the security problems
in RADIUS, just providing support for the negotiation of algorithms within
exitsing security mechanisms. For example, issues relating to end-to-end
encryption of RADIUS attributes or integration of RADIUS and Kerberos are
out of scope. It is also not an explicit goal to enable RADIUS to be
certified for FIPS 140-2, although support for negotiation of FIPS approved
algorithms is likely to be an end result.
--
to unsubscribe send a message to radiusext-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://psg.com/lists/radiusext/>