[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: Comments on "Crypto-Agility Requirements for RADIUS"



David B. Nelson <mailto://dnelson@elbrysnetworks.com> writes:

> Glen Zorn writes...
> 
> > The WG Charter states that all of the existing crypto-agility
> > proposals are to be published as Experimental RFCs.  In that case,
> > how can the requirement that " at least one mandatory to implement
> > algorithm will be defined" (section 1.2) be fulfilled?
> 
> Why not?  The algorithms are defined in existing documents.

What documents?  Since an Experimental RFC holds no standing as a standard,
how can it specify _anything_ as mandatory?

...

> > Technical comments:
> >
> > Section 2, paragraph 2 states:
> >
> >    In the specific context of the RADIUS protocol and RADIUS
> >    implementations, crypto-agility may be better defined as the
> ability
> >    of RADIUS implementations to negotiate cryptographic algorithms
> for
> >    use in RADIUS exchanges, including the cryptographic algorithms
> used
> >    to protect RADIUS packets and to hide RADIUS Attributes.  This
> >    capability covers all RADIUS message types: Access-
> Request/Response,
> >    Accounting-Request/Response, and CoA/Disconnect-Request/Response.
> >
> > Since RADIUS has no negotiation method of I'm aware (hint &
> > accept/ignore is hardly a negotiation mechanism)...
> 
> Yeah, but it's what we've got.
> 
> >... I find these statements very curious, especially in light of the
> > earlier statement (section 2, paragraph 3) that the password-hiding
> > function will be negotiable.  Basically, what is being called for is
> > impossible in the context of the RADIUS protocol, implying that the
> > negotiations would take place outside of RADIUS (e.g., in TLS).
> 
> That wasn't what I understood when I transcribed that text.  It's true
> that
> "hint and consent" is a bit crude, but I'd like to see a more in-depth
> technical exploration of why you think it makes crypto-agility
> impossible
> within RADIUS

The last time I checked (please correct me if I'm wrong), the "hint" was
from a NAS to a server regarding what the NAS wanted returned.  In many
cases, these "hints" would not be anything of the sort; instead, they will
be a simple statement of the algorithm used by the NAS.  Examples are the
User-Password Attribute & request authentication/integrity protection.  The
only way that I can think of for the server to refuse the "hint" would be if
we were to hi-jack the Access-Challenge message, which in itself constitutes
a novel negotiation method for RADIUS.

> 
> > Section 4.1:
> > Once again, assuming a solution.  State the requirements that a
> solution
> > must meet, not your personal assumptions about the form which the
> solution
> > will take.  I say "personal" because a fair subset of the active WG
> (of
> > which this document is purportedly a product) _does not_ share the
> > expectation that " proposals will utilize other techniques".
> 
> I take that text to means that RADIUS over IPSec has already been
> defined,
> and therefore proposing RADIUS over IPSec is not what we're looking for
> to
> address RADIUS crypto-agility.  After all, if an existing solution
> needs
> everyone's needs, why waste time on a requirements document, never mind
> a
> solution document?  Therefore, it's reasonable to say that "Just use
> IPSec."
> is out of scope for RADIUS crypto-agility.

The text to which I was referring is "Therefore, it is expected that
proposals will utilize other techniques".

> 
> > Section 4.2, paragraph 2 states:
> >
> >    Included in negotiation techniques are "hint and consent"
> mechanisms
> >    where the NAS provides a list of algorithms and the server selects
> >    one.
> >
> > If the server is required to select from the list it can hardly be
> > called a hint.  Once again, I can't see at all how this mechanism
> > could be made to work in the case of the Access-Request message.
> 
> Please explain.

See above.

> 
> > Section 4.3, paragraph 1 states:
> >
> >    Solutions to the problem MUST demonstrate backward compatibility
> >    with existing RADIUS implementations.
> >
> > I would _really_ like to see some rationale for this requirement
> > (aside from "backward compatibility is sacred and must never be
> > questioned" ;-).
> 
> Given that the RADIUS protocol doesn't have a protocol version field,
> maintaining backward compatibility seems pretty basic.

OK, so that sounds an awful lot like " backward compatibility is sacred and
must never be questioned" to me.  

> 
> > Given that this is new and presumably desirable functionality,
> > why is a simple upgrade path not sufficient?
> 
> A "fork-lift" upgrade?  :-)

Hardly. New messages and or capabilities can fairly easily be introduced in
a piece-meal fashion, as long as it is done with care.
 
> 
> 
> 
> --
> to unsubscribe send a message to radiusext-request@ops.ietf.org with
> the word 'unsubscribe' in a single line as the message text body.
> archive: <http://psg.com/lists/radiusext/>



--
to unsubscribe send a message to radiusext-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://psg.com/lists/radiusext/>