[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Thoughts on RADIUS Crypto-agility



The RADEXT WG has a work item relating to RADIUS crypto-agility.  In 
looking at this work item and thinking about how to make progress on it, 
we would like to put forward some thoughts. 
 
RADIUS crypto-agility is about the ability of RADIUS implementations to 
negotiate cryptographic algorithms for use in RADIUS exchanges.  This 
includes the cryptographic algorithms used to protect RADIUS packets, 
as well as the algorithms used to hide RADIUS attributes. 

Today, RADIUS packets are protected by the calculation of an MD5-based 
message integrity check (MIC) within the Authenticator field of packets 
other than the Access-Request.  In addition, the Message-Authenticator 
attribute is available, which utilizes  HMAC-MD5 to authenticate and 
integrity protect RADIUS packets.

A number of RADIUS attributes today support "hiding", in order to prevent 
an attacker from snooping contents over the wire.  These attributes 
include the User-Password and Tunnel-Password attributes, in addition to 
vendor-specific attributes.  Generally the "hiding" mechanisms utilize a 
stream cipher based on MD5.  

It should be noted that the recent work on MD5 collisions does not appear 
to enable compromise of any of the MD5-based mechanisms described above, 
absent knowledge of the RADIUS shared secret.  However, the progress 
toward compromise of the basic cryptographic assumptions made by MD5 has 
lead to a movement toward deprecation of MD5 in many contexts. 

Therefore there appears to be good reason for the RADEXT WG to move 
forward toward development of a backward compatible, interoperable 
mechanism for the negotiation of cryptographic algorithms within RADIUS. 

In moving forward, the proposal is for the RADEXT WG to first discuss the 
requirements for RADIUS crypto-agility and come to consensus, and then to 
solicit proposals satisfying those requirements.   

In order to develop consensus on the requirements as well as 
potential solutions, we would propose that the RADEXT WG consider 
the following process:
 
1. Discuss and refine the requirements for a solution to the problem,
coming to consensus at IETF 68 in Prague.  
 
2. Issue a call for document submissions meeting the problem 
requirements, during IETF 68, requesting documents be submitted for 
consideration within 30 days; 
 
3. Discussion of the proposals on the RADEXT WG list; 
 
4. If consensus emerges, adoption of the winning proposal as a 
Standards Track  WG work item. 

5. If consensus does not emerge, acceptance of one or more documents
with substantial support as Experimental Track WG work items. 
 
6. Completion of work and submission of documents to the IESG. 
 
A separate message proposing a straw-man set of requirements will be posted
to the list to get the process started.

Regards,

Bernard Aboba
Dave Nelson

RADEXT Co-Chairs




--
to unsubscribe send a message to radiusext-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://psg.com/lists/radiusext/>