Re: [radext] Proposed charter text based on IETF-115 BoF

Bernard Aboba <bernard.aboba@gmail.com> Thu, 24 November 2022 15:14 UTC

Return-Path: <bernard.aboba@gmail.com>
X-Original-To: radext@ietfa.amsl.com
Delivered-To: radext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 14B97C14F725 for <radext@ietfa.amsl.com>; Thu, 24 Nov 2022 07:14:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hl_A0-sU0wmE for <radext@ietfa.amsl.com>; Thu, 24 Nov 2022 07:14:25 -0800 (PST)
Received: from mail-ej1-x631.google.com (mail-ej1-x631.google.com [IPv6:2a00:1450:4864:20::631]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CF455C14F732 for <radext@ietf.org>; Thu, 24 Nov 2022 07:14:25 -0800 (PST)
Received: by mail-ej1-x631.google.com with SMTP id f18so4807252ejz.5 for <radext@ietf.org>; Thu, 24 Nov 2022 07:14:25 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=k2nBu++5Sbm35gEKKuRQiVNr2xdkTcGet+R7PFaDXes=; b=Z7fISJdpYKTIL5dunjHiZRgqEqGz8qaM3J7L93xe7Tiv/l50h4h3tvyDQkzFJ7OdZD j0og3GmUaqBDFA5xsw300t4CngEtuAC0NYLPY28TmvDOmyO5+3bBzz2W4GPPF/l5SHq2 0uGu47CRjQl9CjI/MOjC1zNEeKQS0ZtlDNo7oW71YpfJXLQp5h5Zy7apQLJh2ly2EiLU 03NiJik1mdpZt5n2P0Buq++5SLkFGIYVmSCwMy/A3xdBhxhtJy3lPGwIi9u8tB7Q2BPX 62rvgujpggjaQadSFT5RNf4dd7Y28zHMEXuKeZE3+ap/jtYy9Tna3Qa00I4wPpaW+HjH vY4A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=k2nBu++5Sbm35gEKKuRQiVNr2xdkTcGet+R7PFaDXes=; b=maxY0PJC31sRL7UdE3U9tpMItHlP06UiIYBUZEdjOJpyP8s68Uurz13Cf+l7Y6bc8Y TZizwxDQRPfLgZpwJ4KS3TJxi8G2C5tr1OJRB6qEmjjtC4/253i078GvhdYnYbaQ81wQ V1LFT0MuKXvabZPXUpDDSqSwGeTikRyWAsp/cpQFczXZ+j2vg8yba9ftJYlsojcgl6iL tL3X5M1cGgOWWyM9HwoSFFdEDMlNl3zqkJzxx25F7N8grZjEnlVs+I55WFhnezi/KGY4 xxBdM2l3+dBtKQzgrbH2XLLaxr1SI8/UoaoSvwg7H88sneFdJLkmLwsrxAaXUx/qBQFD 3MUg==
X-Gm-Message-State: ANoB5pnfiLtrlJYmcvCIdgEhIbNuSYngTFBlR5EYkzzGjLX/fdFmsDrD lIaCfFZvnpFs4eRO9FIt/mIuyF9NYGKSTHNOpJo=
X-Google-Smtp-Source: AA0mqf5tC7Oi/ZcNKU2onvqbPQV8roelBp6mIB0SSE2ns/uRCbhXq8ulX3wrLvQlFBm+k/u3hKYZU78JYos2TPiNKFM=
X-Received: by 2002:a17:906:3096:b0:7ae:eae9:25a5 with SMTP id 22-20020a170906309600b007aeeae925a5mr28290724ejv.394.1669302860759; Thu, 24 Nov 2022 07:14:20 -0800 (PST)
MIME-Version: 1.0
References: <FD0507D4-2C1D-478A-97E0-ECEEF1A5613B@deployingradius.com> <E82B0ECD-4580-4F35-B07B-35685CFC5C44@aiven.io> <883f3572-121f-5ed8-7378-1a91c5525f88@iea-software.com> <EAAC2507-5D29-4453-8881-BC8D9D5314D8@deployingradius.com> <CAOW+2dsKg_H9f3zRUnanCpgGO+G=VPyxzWa9hsrCJCpsnoBsxA@mail.gmail.com> <7CB701B8-BD8F-4ADC-9265-12FC7EBE8FB6@deployingradius.com>
In-Reply-To: <7CB701B8-BD8F-4ADC-9265-12FC7EBE8FB6@deployingradius.com>
From: Bernard Aboba <bernard.aboba@gmail.com>
Date: Thu, 24 Nov 2022 07:14:10 -0800
Message-ID: <CAOW+2dtDkN3Hvk1vmuyJYGP9KS5WaGDenwQBb7-g12e6SxvEzw@mail.gmail.com>
To: Alan DeKok <aland@deployingradius.com>
Cc: Peter Deacon <peterd@iea-software.com>, Paul Wouters <paul.wouters=40aiven.io@dmarc.ietf.org>, "radext@ietf.org" <radext@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000009d41405ee38dce1"
Archived-At: <https://mailarchive.ietf.org/arch/msg/radext/Ze9leBy3TwAIomsk0OigkywIdwU>
Subject: Re: [radext] Proposed charter text based on IETF-115 BoF
X-BeenThere: radext@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: RADIUS EXTensions working group discussion list <radext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/radext>, <mailto:radext-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/radext/>
List-Post: <mailto:radext@ietf.org>
List-Help: <mailto:radext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/radext>, <mailto:radext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 24 Nov 2022 15:14:29 -0000

Alan said:

"  But the issue of variants is a problem.  It would be ideal to just
re-use RADIUS/TLS port 2083, and then do some kind of negotiation.  Since
RADIUS doesn't include per-hop negotiation, that's difficult to do."

[BA] I'm wondering why negotiation is needed. Installations know whether
they want to conform to FIPS or not. If they do, then failure of MD5
operations is not a bug, it's the desired outcome.

For backwards compatibility, servers probably need to support RADIUS and
the existing RADIUS over (D)TLS anyway.  So really we're talking about an
"SRADIUS" configuration flag.  If a site requires FIPS, why can't it flip
the SRADIUS flag and run its SRADIUS server on port 2083?  If some devices
can't connect to an SRADIUS-configured server, then those devices don't
support SRADIUS and presumably the site wants to point them at another
server (one without the SRADIUS flag set), and eventually replace them with
devices that support SRADIUS.

On Thu, Nov 24, 2022 at 6:15 AM Alan DeKok <aland@deployingradius.com>
wrote:

> On Nov 23, 2022, at 6:58 PM, Bernard Aboba <bernard.aboba@gmail.com>
> wrote:
> > If the intent is to integrate those portions of the draft that garner WG
> consensus into the RADIUS over (D)TLS specifications, then the document
> represents a useful contribution.
>
>   OK.
>
> > But if the end result is a specification for each transport in addition
> to a separate SRADIUS specification, then this seems problematic to me,
> because you'd effectively have 4+ protocol variants (2 transports + SRADIUS
> on or off), each of which could declare itself a "Proposed Standard".
>
>   The goal of the draft is to define a (D)TLS transport profile for
> RADIUS.  Everything else is 100% RADIUS.
>
>   But the issue of variants is a problem.  It would be ideal to just
> re-use RADIUS/TLS port 2083, and then do some kind of negotiation.  Since
> RADIUS doesn't include per-hop negotiation, that's difficult to do.
>
> > Since protocol variants and "options" greatly expand the test matrix and
> certification cost, if the WG produces 4+ variants of "secure RADIUS" there
> will be a temptation for industry consortia to produce their own "profiles"
> of SRADIUS + (D)TLS in order to reduce the complexity.
>
>   I'm not sure I see how that will happen.  The only profiles available
> for customization are TLS parameters.  Everything else is mandated by the
> RADIUS specifications.
>
> > But there is also an awful lot of "amateur lawyering" in the document,
> including statements relating to the implications of FIPS-140 requirements
> that differ very substantially from NIST documentation and official
> guidance.
>
>   That text can be updated, of course.
>
>   Until there's an official statement from NIST, we're largely left with
> amateur lawyering.  What would be ideal is for NIST to publish an explicit
> statement about RADIUS and it's use of MD5.
>
>   When people point at NIST specifications and make claims, it is very
> difficult to counter those claims with logical arguments.  After all, I'm
> just a random internet commenter, and NIST is an official organization.
>
>   Why would anyone believe me?  I have a hard enough time convincing
> people to believe the documentation I write about the software I've
> written.  It's essentially impossible to convince people that I somehow
> know more / better than their reading of NIST specifications.
>
>   The only practical way to counter NIST documentation saying "MD5 is not
> allowed" is another bit of NIST documentation saying "It's OK for RADIUS to
> use MD5 with (D)TLS".
>
>   Alan DeKok.
>
>