[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

draft-dekok-radext-dtls-02 comments



Sec 8.1 -

"The previous RADIUS practice of using shared secrets that are minor
   variations of words is NOT RECOMMENDED, as it would negate nearly all
   of the security of DTLS."

I think any statements WRT secret key strength should to be generalized and take into account the properties of the underlying PSK suite as some systems may or may not be subject to offline attack.

"Any shared
   secret used for RADIUS MUST NOT be used for DTLS.  Reusing a shared
   secret between RADIUS and DTLS would negate all of the benefits found
   by using DTLS."

I wonder if a more general warning about the possibility of down-negotiation would be a better fit. I can see the same concept applying to administrative selection of cipher-suites.

Sec 4.1.1 -

"Where the RADIUS specifications require that a
   RADIUS packet received via the DTLS session is to be "silently
   discarded", the entry in the tracking table corresponding to that
   DTLS session MUST also be deleted, the DTLS session MUST be closed,
   and any TLS session resumption parameters for that session MUST be
   discarded."

Why is this still done when DTLS is used for a transport? IIRC in the TCP mapped drafts this was done to mitigate possibility of loss of protocol synchronization - not possible WRT DTLS.

My concern as with the TCP map is silently discarded messages can take down other unrelated exchanges. The inner RADIUS should speak up while the transport is being established if there is no intention on honoring the established channel.

There is an additional concern in that DTLS closure messages have no retransmission timers and are not guaranteed to be delivered. When this occurs future messages will be discarded by the peers DTLS stack until the clients "lifetime" timer expires and the DTLS session is reestablished.

Sec 4.2 -

"RDTLS clients SHOULD NOT send both normal RADIUS and RDTLS packets
   from the same source socket."

" and increases the potential for
   security breaches due to implementation issues."

WRT security only it seems to me servers must know better if not explicitly forbidden whether this is done or not. Encouraging (change SHOULD NOT to MAY) can only shine light on the issue and force implementors to address appropriately.

regards,
Peter

--
to unsubscribe send a message to radiusext-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://psg.com/lists/radiusext/>