[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[radext] #85: Confidentiality Requirements



#85: Confidentiality Requirements

 Section 4.3 states:

    Proposals MUST support the negotiation of cryptographic algorithms
    for per-packet integrity/authentication protection.  Support for
    confidentiality of entire RADIUS packets is OPTIONAL.  However,
    proposals MUST support the negotiation of algorithms for encryption
    (sometimes referred to as "hiding") of RADIUS attributes.  It is
    RECOMMENDED for proposals to provide for the encryption
    of existing attributes.  This includes existing "hidden" attributes
    as well as attributes (such as location attributes) that require
    confidentiality.

 This paragraph is confusing along multiple dimensions.

 Since RADIUS is a transactional protocol, it is not possible to
 "negotiate" algorithms for use in a RADIUS request; algorithm(s) must be
 chosen.  Also, it is not clear whether negotiation as referred to here
 would refer to encryption of entire RADIUS packets or just individual
 attributes.  Also does "encryption of existing attributes" imply that
 attributes can be doubly encrypted?

-- 
---------------------------------------+------------------------------------
 Reporter:  bernard_aboba@â            |       Owner:            
     Type:  defect                     |      Status:  new       
 Priority:  major                      |   Milestone:  milestone1
Component:  Crypto-Agility             |     Version:  1.0       
 Severity:  Active WG Document         |    Keywords:            
---------------------------------------+------------------------------------

Ticket URL: <http://trac.tools.ietf.org/wg/radext/trac/ticket/85>
radext <http://tools.ietf.org/radext/>


--
to unsubscribe send a message to radiusext-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://psg.com/lists/radiusext/>