Re: [radext] Gathering opinions on draft-xue-radext-key-management
Bernard Aboba <bernard_aboba@hotmail.com> Tue, 08 July 2014 04:15 UTC
Return-Path: <bernard_aboba@hotmail.com>
X-Original-To: radext@ietfa.amsl.com
Delivered-To: radext@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9F1771B2A29 for <radext@ietfa.amsl.com>; Mon, 7 Jul 2014 21:15:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.551
X-Spam-Level:
X-Spam-Status: No, score=-2.551 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RP_MATCHES_RCVD=-0.651, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Uj7zg5hqbgVE for <radext@ietfa.amsl.com>; Mon, 7 Jul 2014 21:15:34 -0700 (PDT)
Received: from BLU004-OMC1S21.hotmail.com (blu004-omc1s21.hotmail.com [65.55.116.32]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CEBE61B2A25 for <radext@ietf.org>; Mon, 7 Jul 2014 21:15:33 -0700 (PDT)
Received: from BLU406-EAS386 ([65.55.116.9]) by BLU004-OMC1S21.hotmail.com with Microsoft SMTPSVC(7.5.7601.22712); Mon, 7 Jul 2014 21:15:32 -0700
X-TMN: [eh1KTHNneXXECeeg7t3Mi0rSBIxBS/mj]
X-Originating-Email: [bernard_aboba@hotmail.com]
Message-ID: <BLU406-EAS386A2680F97E72ECDE57CF2930C0@phx.gbl>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
References: <01FE63842C181246BBE4CF183BD159B448FD2EA1@nkgeml504-mbx.china.huawei.com> <53BB5816.90704@deployingradius.com>
From: Bernard Aboba <bernard_aboba@hotmail.com>
MIME-Version: 1.0 (1.0)
In-Reply-To: <53BB5816.90704@deployingradius.com>
Date: Mon, 07 Jul 2014 21:15:28 -0700
To: Alan DeKok <aland@deployingradius.com>
X-OriginalArrivalTime: 08 Jul 2014 04:15:32.0787 (UTC) FILETIME=[42A96030:01CF9A63]
Archived-At: http://mailarchive.ietf.org/arch/msg/radext/TaBMLqTfWXxtb5J0xycWg1bk_yY
Cc: "radext@ietf.org" <radext@ietf.org>, Xueli <xueli@huawei.com>
Subject: Re: [radext] Gathering opinions on draft-xue-radext-key-management
X-BeenThere: radext@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: RADIUS EXTensions working group discussion list <radext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/radext>, <mailto:radext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/radext/>
List-Post: <mailto:radext@ietf.org>
List-Help: <mailto:radext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/radext>, <mailto:radext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 08 Jul 2014 04:15:35 -0000
RFC 5247 provides the Key Management model for EAP. It is standards track - and updates are outside the Charter of RADEXT WG. > On Jul 7, 2014, at 7:32 PM, "Alan DeKok" <aland@deployingradius.com> wrote: > > Xueli wrote: >> As you know, we presented the draft-xue-radext-key-management (new version http://tools.ietf.org/id/draft-xue-radext-key-management-03.txt ) >> Which defines the Radius extensions for key delivery between BNG and AC in some specific scenario. > > I think the general consensus was that this was outside of the scope > of RADIUS. > >> Now the argument is that whether this item is the genuine Radius/RADEXT problem? > > RADIUS is usually about end-users. Authenticating them, authorizing > them, and performing accounting for them. If you want a general purpose > "remote API" protocol, see Diameter. > >> Radius packet is proposed to resolve this issue because of following reasons: >> 1 transmit session authorization attributes >> (Key, which is produced during authentication and delivered by Radius from Server to NAS) > > If the key is transmitted between a RADIUS client and server, then the > transmission can be done as part of a normal RADIUS conversation. If > the key is transmitted somewhere else, then that's a *huge* security > problem. And it doesn't fit the standard RADIUS model. > >> 2 unsolicited messages >> 3 It is not the issue of Radius, it may be the issue of EAP over Radius.. >> >> At this stage, the authors appreciate your opinions very much for the next step of this draft. >> Can it be solved in RADEXT? If not, which WG could be the place? > > I think this proposal would have a hard time finding traction anywhere > in the IETF. The security problems with sharing keys are very serious. > > Alan DeKok. > > _______________________________________________ > radext mailing list > radext@ietf.org > https://www.ietf.org/mailman/listinfo/radext
- [radext] Gathering opinions on draft-xue-radext-k… Xueli
- Re: [radext] Gathering opinions on draft-xue-rade… Alan DeKok
- Re: [radext] Gathering opinions on draft-xue-rade… Bernard Aboba
- Re: [radext] Gathering opinions on draft-xue-rade… Sam Hartman
- Re: [radext] Gathering opinions on draft-xue-rade… Xueli
- Re: [radext] Gathering opinions on draft-xue-rade… Xueli
- Re: [radext] Gathering opinions on draft-xue-rade… Xueli