[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
RE: DISCUSS and COMMENT: draft-ietf-radext-filter
How about if we change Section 6 to the following:
"6. Security Considerations
This specification describes the use of RADIUS for purposes of
authentication, authorization and accounting. Threats and security
issues for this application are described in [RFC3579] and [RFC3580];
security issues encountered in roaming are described in [RFC2607].
This document specifies a new attribute that can be included in
existing RADIUS packets, which are protected as described in
[RFC3579] and [RFC3576]. See those documents for a more detailed
description.
The security mechanisms supported in RADIUS and Diameter are focused
on preventing an attacker from spoofing packets or modifying packets
in transit. They do not prevent an authorized RADIUS/Diameter server
or proxy from modifying, inserting or removing attributes with
malicious intent. Filter attributes modified or removed by a
RADIUS/Diameter proxy may enable a user to obtain network access
without the appropriate filters; if the proxy were also to modify
accounting packets, then the modification would not be reflected in
the accounting server logs.
Since the RADIUS protocol currently does not support capability
negotiation, a RADIUS server cannot automatically discover whether a
NAS supports the NAS-Filter-Rule attribute. A legacy NAS not
compliant with this specification may silently discard the NAS-
Filter-Rule attribute while permitting the user to access the
network. This can lead to users improperly receiving unfiltered
access to the network. As a result, the NAS-Filter-Rule attribute
SHOULD only be sent to a NAS that is known to support it."
From: Russ Housley <housley@vigilsec.com>
To: iesg@ietf.org
CC: radext-chairs@tools.ietf.org
Subject: DISCUSS and COMMENT: draft-ietf-radext-filter Date: Thu, 11 Jan
2007 11:07:43 -0500
Discuss:
It is clear that the integrity protection of the filter list is
beyond the scope of this document. However, I do think that the
security considerations ought to say something about the impact if
that protection is not provided. What are the consequences of a
modification to the filter list. Consider adding entries, removing
entries and altering entries.
Comment:
From the SecDir Review by Sam Weiler:
These concerns may stem, in part, from the document's brevity and
propensity to cite other docs -- as someone not steeped in RADIUS and
Diameter lore, I found it a bit hard to decipher. The table in
section 3, for instance, seems like it must be there to mirror some
table in other specs. Plainer language throughout might be helpful.
--
to unsubscribe send a message to radiusext-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://psg.com/lists/radiusext/>