[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: Comments on "Crypto-Agility Requirements for RADIUS"



Glen Zorn writes...

> What documents?

Those defining the cipher suites to be used.  Surely we're not going to
attempt to define them within a RADIUS document?

> Since an Experimental RFC holds no standing as a standard, how can it
> specify _anything_ as mandatory?

Sorry to be repetitive, buy why not?

> The last time I checked (please correct me if I'm wrong), the "hint" was
> from a NAS to a server regarding what the NAS wanted returned.  In many
> cases, these "hints" would not be anything of the sort; instead, they will
> be a simple statement of the algorithm used by the NAS.

How is that not a hint?  Sorry, but I simply don't see where you're going
with this.

> Examples are the User-Password Attribute & request
> authentication/integrity protection.

Eh?

> The only way that I can think of for the server to refuse the
> "hint" would be if we were to hi-jack the Access-Challenge message,
> which in itself constitutes a novel negotiation method for RADIUS.

Well, yes.  We discussed that briefly during an ill-fated attempt to add
generic capabilities negotiation to RADIUS.  So, yes there is no "NAK" and
counter-proposal capability, simply offer and accept or offer and reject.  I
fail to see why that would not allow a rudimentary form of crypto-agility.
The way a server refuses the hint by means of an Access-Reject message.

> > Therefore, it's reasonable to say that "Just use IPSec."
> > is out of scope for RADIUS crypto-agility.
> 
> The text to which I was referring is "Therefore, it is expected that
> proposals will utilize other techniques".

Well, if "Just use IPSec" is out of scope, doesn't it follow that "proposals
will use other methods" [besides IPSec)?  Again, I simply don't see where
you're going with this.

> > > I would _really_ like to see some rationale for this requirement
> > > (aside from "backward compatibility is sacred and must never be
> > > questioned" ;-).
> >
> > Given that the RADIUS protocol doesn't have a protocol version field,
> > maintaining backward compatibility seems pretty basic.
> 
> OK, so that sounds an awful lot like " backward compatibility is sacred
> and must never be questioned" to me.

If you say so...

> > > Given that this is new and presumably desirable functionality,
> > > why is a simple upgrade path not sufficient?
> >
> > A "fork-lift" upgrade?  :-)
> 
> Hardly. New messages and or capabilities can fairly easily be introduced
> in a piece-meal fashion, as long as it is done with care.

Well _that_ sounds a bit like "and a miracle occurs here".  That which is a
simple upgrade path to some is a deployment nightmare to others.  We need to
be a bit more specific, I think.



--
to unsubscribe send a message to radiusext-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://psg.com/lists/radiusext/>