Re: [radext] Proposed charter text based on IETF-115 BoF

Alan DeKok <aland@deployingradius.com> Tue, 22 November 2022 11:36 UTC

Return-Path: <aland@deployingradius.com>
X-Original-To: radext@ietfa.amsl.com
Delivered-To: radext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BE933C14CE41 for <radext@ietfa.amsl.com>; Tue, 22 Nov 2022 03:36:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id t4_xp_NzsyWO for <radext@ietfa.amsl.com>; Tue, 22 Nov 2022 03:36:52 -0800 (PST)
Received: from mail.networkradius.com (mail.networkradius.com [62.210.147.122]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 48EADC14CEE2 for <radext@ietf.org>; Tue, 22 Nov 2022 03:36:50 -0800 (PST)
Received: from smtpclient.apple (135-23-95-173.cpe.pppoe.ca [135.23.95.173]) by mail.networkradius.com (Postfix) with ESMTPSA id F1A8C29F; Tue, 22 Nov 2022 11:36:45 +0000 (UTC)
Authentication-Results: NetworkRADIUS; dmarc=none (p=none dis=none) header.from=deployingradius.com
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3696.120.41.1.1\))
From: Alan DeKok <aland@deployingradius.com>
In-Reply-To: <CAOW+2dsSDXX=gdrXtnViNP88KMtFH2BiBfNhP5AQw_K+mDg+hQ@mail.gmail.com>
Date: Tue, 22 Nov 2022 06:36:44 -0500
Cc: Paul Wouters <paul.wouters=40aiven.io@dmarc.ietf.org>, radext@ietf.org
Content-Transfer-Encoding: quoted-printable
Message-Id: <FD0507D4-2C1D-478A-97E0-ECEEF1A5613B@deployingradius.com>
References: <CAGL5yWYTzvN1SgL8ordMvenhDGMs-EZw32+U32_4jeR9mqGciQ@mail.gmail.com> <CAOW+2dsSDXX=gdrXtnViNP88KMtFH2BiBfNhP5AQw_K+mDg+hQ@mail.gmail.com>
To: Bernard Aboba <bernard.aboba@gmail.com>
X-Mailer: Apple Mail (2.3696.120.41.1.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/radext/wggebVefyJiUmyTtM5Cg-h9vIlw>
Subject: Re: [radext] Proposed charter text based on IETF-115 BoF
X-BeenThere: radext@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: RADIUS EXTensions working group discussion list <radext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/radext>, <mailto:radext-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/radext/>
List-Post: <mailto:radext@ietf.org>
List-Help: <mailto:radext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/radext>, <mailto:radext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 22 Nov 2022 11:36:54 -0000

On Nov 21, 2022, at 11:07 PM, Bernard Aboba <bernard.aboba@gmail.com> wrote:
> >  Until RADIUS over (D)TLS can meet the requirements for publication as a Proposed Standard, it would not be appropriate to deprecate the RADIUS protocol, and the Charter should not lower the bar established in RFC 6421. 

  That is a good point on document ordering. 

> "- Defining a secure variant of RADIUS which can be used in a FIPS-140 compliant environment"
> 
> [BA] As was discussed at the BOF, RADIUS over IPsec, defined in RFC 3579, has been deployed for more than 20 years in environments requiring FIPS-140 compliance.  To enforce FIPS-140 compliance, RADIUS servers are configured in "FIPS mode", which leaves them capable of using only FIPS-compliant cryptographic primitives.  As a result, attempts to utilize MD5 in transport security such as IPsec or (D)TLS, EAP methods, or within the RADIUS authenticator will fail. Rather than "defining a secure variant of RADIUS",  it is only necessary for the RADIUS over (D)TLS documents to describe how implementations should behave in the absence of MD5 or other FIPS-prohibited cryptographic primitives. For example, this would preclude negotiation of (D)TLS ciphersuites utilizing MD5 or other prohibited cryptographic operations. 

  Avoiding MD5 at the TLS layer won't help.  MD5 is baked into RADIUS.  The Request Authenticator, Reply Authenticator, and Message-Authenticator require the use of MD5.

  In order for RADIUS to work in a FIPS -140 environment, the RADIUS protocol has to be purged of dependencies on MD5.

  The SRADIUS draft essentially says "don't use Message-Authenticator, and don't sign packets with MD5".  That allows it to be used in a FIPS-140 environment.

  Alan DeKok.