[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: RADEXT Milestone revisions



The crypto-agility work item will focus on the negotiation of cryptographic algorithms within existing RADIUS security mechanisms.
As has been discussed recently in SAAG, the recent attacks against popular 
hashes such as MD5 and SHA1 have raised awareness of this problem.  The IETF 
will be undertaking work on crypto-agility within a number of protocols, 
including TLS.  It has been suggested that the issue is serious in RADIUS 
because the protocol uses straight MD5 in places, rather than HMAC-MD5 or 
HMAC-SHA1.  Given the rate of advance of hash attacks, and the lag time 
involved in producing standards, it is best to get work on RADIUS 
crypto-agility underway sooner rather than later.
Note that this work item does not require solving all the security problems 
in RADIUS, just providing support for the negotiation of algorithms within 
exitsing security mechanisms.  For example, issues relating to end-to-end 
encryption of RADIUS attributes or integration of RADIUS and Kerberos are 
out of scope.  It is also not an explicit goal to enable RADIUS to be 
certified for FIPS 140-2, although support for negotiation of FIPS approved 
algorithms is likely to be an end result.


--
to unsubscribe send a message to radiusext-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://psg.com/lists/radiusext/>