[Isms] FW: COMMENT: draft-ietf-isms-radius-usage

"Dave Nelson" <d.b.nelson@comcast.net> Wed, 06 May 2009 04:52 UTC

Return-Path: <d.b.nelson@comcast.net>
X-Original-To: isms@core3.amsl.com
Delivered-To: isms@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D81BD3A6935 for <isms@core3.amsl.com>; Tue, 5 May 2009 21:52:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.104
X-Spam-Level:
X-Spam-Status: No, score=-2.104 tagged_above=-999 required=5 tests=[AWL=0.495, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9f8Fg7j2CgEn for <isms@core3.amsl.com>; Tue, 5 May 2009 21:52:37 -0700 (PDT)
Received: from QMTA06.emeryville.ca.mail.comcast.net (qmta06.emeryville.ca.mail.comcast.net [76.96.30.56]) by core3.amsl.com (Postfix) with ESMTP id D9E553A68F2 for <isms@ietf.org>; Tue, 5 May 2009 21:52:36 -0700 (PDT)
Received: from OMTA14.emeryville.ca.mail.comcast.net ([76.96.30.60]) by QMTA06.emeryville.ca.mail.comcast.net with comcast id o0aZ1b0081HpZEsA64u4Bt; Wed, 06 May 2009 04:54:04 +0000
Received: from NEWTON603 ([71.232.143.198]) by OMTA14.emeryville.ca.mail.comcast.net with comcast id o4u31b0074H2mdz8a4u4tr; Wed, 06 May 2009 04:54:04 +0000
From: Dave Nelson <d.b.nelson@comcast.net>
To: isms@ietf.org
Date: Wed, 06 May 2009 00:54:18 -0400
Message-ID: <AA4BB503DE3C48B0A16F88C58E8BFDFD@NEWTON603>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Office Outlook 11
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.5579
Thread-Index: AcnL7Q9xalkCzySnQIukKJJMoSkUbgBlBClwACFkEDA=
Subject: [Isms] FW: COMMENT: draft-ietf-isms-radius-usage
X-BeenThere: isms@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Mailing list for the ISMS working group <isms.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/isms>, <mailto:isms-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/isms>
List-Post: <mailto:isms@ietf.org>
List-Help: <mailto:isms-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/isms>, <mailto:isms-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 May 2009 04:52:38 -0000

> -----Original Message-----
> From: Dave Nelson [mailto:d.b.nelson@comcast.net]
> Sent: Tuesday, May 05, 2009 9:06 AM
> To: 'Alexey Melnikov'; iesg@ietf.org
> Cc: draft-ietf-isms-radius-usage@tools.ietf.org; isms-
> chairs@tools.ietf.org
> Subject: RE: [Isms] COMMENT: draft-ietf-isms-radius-usage
> 
> Alexey Melnikov writes...
> 
> > Subject: [Isms] COMMENT: draft-ietf-isms-radius-usage
> >
> > Comment:
> > 2.3.  SNMP Service Authorization
> >
> >  [...]
> >
> >    There are no combinations of RADIUS attributes that denote the
> >    equivalent of SNMP noAuthNoPriv access, as RADIUS always involves the
> >    authentication of a user (i.e. a principal) as a prerequisite for
> >    authorization.  RADIUS can be used to to provide an "Authorize-Only"
> >
> > Extra "to".
> >
> >    service, but only when the request contains a "cookie" from a
> >    previous successful authentication with the same RADIUS server (i.e.
> >    the RADIUS State Attribute).
> 
> Right.
> 
> >
> > 5.  Security Considerations
> >
> >  [...]
> >
> >    The Message-Authenticator (80) attribute [RFC3579] SHOULD be used
> >    with RADIUS messages that are described in this memo.
> >
> > Some explanation of why would be helpful here.
> 
> It is useful because the Message-Authenticator Attribute is the best
> available mechanism in RADIUS as it stands today to provide tamper-evident
> integrity protection of the service provisioning attributes in an
> Access-Accept packet.  It is slightly less important for Access-Request
> packets, although it may be desirable to protect any "hint" attributes
> contained in those messages.  This protection mitigates the fact that
> RADIUS
> messages are not encrypted and attributes could be added, deleted or
> modified by an adversary in a position to intercept the packet.
> 
> This is all pretty standard RADIUS Security Considerations material, and
> could be shortened to a brief explanation for inclusion in this draft.