Re: [saag] RADIUS is deprecating MD5

Jan-Frederik Rieckers <rieckers@uni-bremen.de> Mon, 01 April 2024 12:14 UTC

Return-Path: <rieckers@uni-bremen.de>
X-Original-To: saag@ietfa.amsl.com
Delivered-To: saag@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 32430C14F6A7 for <saag@ietfa.amsl.com>; Mon, 1 Apr 2024 05:14:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.095
X-Spam-Level:
X-Spam-Status: No, score=-2.095 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=uni-bremen.de
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eR2v5t0gQsy2 for <saag@ietfa.amsl.com>; Mon, 1 Apr 2024 05:14:34 -0700 (PDT)
Received: from smtp.zfn.uni-bremen.de (smtp.zfn.uni-bremen.de [134.102.50.21]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E9893C14F6B3 for <saag@ietf.org>; Mon, 1 Apr 2024 05:14:32 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=uni-bremen.de; s=2019; t=1711973670; bh=6suPJJkVe5GuJ199GgEHuMMdyBAVhbDOsGvAFP0rWBM=; h=Date:Subject:To:References:From:In-Reply-To; b=kR9IbWR9IX+5S60trYczXRLTnV+VToBliXMpvUCr1X6qjJW61glOJvAJP/sgV4tLS gltkXftMVbn7OUbrI0dO9aTGlxqxVlW+obSd5DXTanZbkiUUp3IeQxnOsBQSEH95Co HWcyRlQuxhgWtwoYvq+YAxwXDk14Z2BFAN25y30rrxH0erkKEOuwc5xN+gkdIPhsQU vDRsWn3qDq0lEcorZXO949806obZPVvcNpiTeAohz9w2FIbP/lHzWhiVhtIXu447n9 fmey5ceSDFl3AebEQASR7bwidi3KtAihr4hXQdaQdnz2SAaZi1D5I5ho58871WG11f yRk7fMN1Sd6Fg==
Received: from [IPV6:2a02:8106:57:952a:1c8e:df6a:b2a4:7ff9] (unknown [IPv6:2a02:8106:57:952a:1c8e:df6a:b2a4:7ff9]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by smtp.zfn.uni-bremen.de (Postfix) with ESMTPSA id 4V7VLZ1tz1zDCdf for <saag@ietf.org>; Mon, 1 Apr 2024 14:14:30 +0200 (CEST)
Message-ID: <1f145577-1e15-492e-9805-e82de1565565@uni-bremen.de>
Date: Mon, 01 Apr 2024 14:14:27 +0200
MIME-Version: 1.0
User-Agent: Mozilla Thunderbird
To: saag@ietf.org
References: <755BC73B-B981-4986-B45A-E9796DCC66BC@deployingradius.com> <ME0P300MB0713122730DC9574730AC816EE382@ME0P300MB0713.AUSP300.PROD.OUTLOOK.COM> <Zgl6ejdpJNOyUja0@chardros.imrryr.org> <E1B4CCB5-202F-4087-8B56-9E7F3D73D1D0@deployingradius.com> <ZgmDLfNxV2RKSA5o@chardros.imrryr.org> <21309D5A-E824-42C7-8BAB-366AD568E9F4@deployingradius.com> <ZgmPg0qgA9stSeUo@chardros.imrryr.org> <ME0P300MB07133F7BB2C11FA027143127EE3F2@ME0P300MB0713.AUSP300.PROD.OUTLOOK.COM>
Content-Language: en-US
From: Jan-Frederik Rieckers <rieckers@uni-bremen.de>
Autocrypt: addr=rieckers@uni-bremen.de; keydata= xsFNBFq1GKUBEADElkCtqFTHRdFWsYiTNtY5XdlUknbEQI8tNOZtuHdaABg68B0FGVAlUn1e F1/jIU9tke2fBB+7ndmxJpr8IOFzPxDRcnkS3Hltw9MQcR18Art/69Xr/myCtTu50wlMzM8D bM6TMwd1u1c4BxVb0rsOm8AQ+ksVa1HMq6w01GubNH3L3SEgOPM+dYfb20IVgCKMXOsLURc+ juGzofU4K3QLK5SkvS40DSyVx3lJhRl+mz9DlMtXzKJbG47eshoHeKhCDfacFo37kGUQ64sD NgYJlEczcUdq4xC9bujPHrHyoHbrDK6PHg31RA3U7p4esujtSmRV8wGhn/orYgjOQ4U5rpBh Tl+VFVxscahaJELongxnpEn5E/tJbSYLZywPx2/Jumaw8CTeVK4TSff00f3nKP8Kig6bPn1T rLkDR/WOylSEIQmBbXaZs/Fqo/KTdtGGcEIuUQ3D4QZSBYNEjDjDVNZ4TK9JmYhbRHUBwXzE w4yvAiEdyVePUTVv9qlZx3JG5JeAzAUXJ3hJPbcmmJ9LdESCToTfQRjGRmGHUgzH19R4Di5l ONv8kYCu8svdiS9SRs01rNzDqSn80ri4HfCugpCm/h7UBFbZ/UsZ+VaLGOwI2eU2vCESadm2 NQyw/xTs2TfDR/6C0iSaS+85d7sxbJLqzXP8xO0JBoH2TtmXvQARAQABzS5KYW4tRnJlZGVy aWsgUmllY2tlcnMgPHJpZWNrZXJzQHVuaS1icmVtZW4uZGU+wsGXBBMBCABBAhsDBQsJCAcC BhUKCQgLAgQWAgMBAh4BAheAAhkBFiEEO9n8U/6Yuq3qYHN1UHR7NOiKGm0FAmVbGZ0FCQwJ 9fgACgkQUHR7NOiKGm155A/+Jt6EdDQ7LHbOy9WFzm/yqjmaLtMrRyCBbKgebISWlC4Nvz0k mm1E/g6+GqH4JAT/5T9cmTH9fscXmVUToBFGc5prho1vXxJ7TiAZy9no8nnWcAFmSMr4H+gX RdCiJftPEyEkjycV9sQDnWnJnwEBQsVsYTdWxu4+PKMcimasUiAShrNiQB2k9knDqmRCJ2xk TpQy+BEsELd/dwFWl/tRA+iYNZ6t3QQ3kloSNoDZjshZSUNBi5EXpMKrY+5u8m/QGIz7IBTr HDu2bWUvkf4oSaB1JEA8vPfFmnl1Mk7/p1OLa+BmeFaOaXMiZPWO+wHRdx5865IH7p0XOMwN H5pWgM53I/5nVQ3Xf2z8+W1F0uxONRDF+8AY+x2mnMOpBTu6d8yRZVBTOUQef1mpIudMf1w5 aQTjhcVHqmnF0OX5NFZY0xlt7WUZbZWR3xrkQ/YAujmvicEFNrYC8fI/5KAGtWa25jgTG6Eg AiaRO8ErX5HddRvV0cNYrR79drXEuMP70rANmdQnhJuD6bYuqzLJwNB7yRyPqAKzNYEekOGf DuUgaUj+vry/hfqQzI5Kue1xQ/UQRVW0yuP1lbRiHJtn5EDySbsyOZhNWXyrId9ANToLCkzh GwwgFfCiJ/l+w19WD0QIkhGIlRcEb8bacHvF2X397+vvt5QKGW9AXnVA99LOwU0EWrUYpQEQ ALaPdFbeL4O5vaixjMcxGNKqvNwnB4B6RarB07gtYYNgond+h/HVgP6rkKz846LsZkeFhVJg jlsLF0jmKj/uAuUi9IytB+woc4i0BwSbytByMItzh5a2ZgBv6b7WXcaWi3jQJYRWHtHOffLz t4++bbegutUb9PwF8RBfgNUTGfYRX1ERnIMzxkqnSctLDkRVqsHeKEl+XWyXPLdCAfaXq5D8 5i7Yg8vFw+SmMEifrsPNt6bkvW6kXp4//6G8TPk93GBGdpnhJJiSKRU+xlxTzv/2h55L51pc OgCTDRt39e7EWbyHS/FBsxnCMusi7+MWhRjHee11cpl21ktlhbYVZHENLDAkpZozQnRvVz8v bQpJqxwn4VLZemfhoP2OBcB7LbwlmMKXlcNdFQfMy9We9BzXE9SYrUkd4mJWaoqkK1L+Bgk6 POvup93l1IvN6D2Hf+xtieWP0BkR1v/BIzOEi4/s0tE4nSIX3d6tYxuJZeWN+Qe9G9UiHy8m npxlf0Qy/hJXaZT1xNaOvx2Qx58EBsPZyqk0Iv7CeByuNSRD/rapWAd+gTHeR8wEDkguiHtq xp/0C2tP8z+/BCXOkNZVyyw6edJ83BBQEWVTUrjBKIJBervZ3F4Fgqug0Bxzup/qCwuKeuaP 8QuymZz1WSjTOKC57Aq5zYSH2dKXYMXxkPcDABEBAAHCwXwEGAEIACYCGwwWIQQ72fxT/pi6 repgc3VQdHs06IoabQUCZVsZswUJDAn2DgAKCRBQdHs06IoabUgKD/9ISYKD4U/9iCUJVGu/ z08Cwvg80DplwNpv97buZ6bXCHONjKhyQAImX4/dYsJtUvSyP9ZRLT8TKS9T1KLlO3HcBhOg dDNcew5deiQ8gfpxdcgBKIcJ5i7MW105T5mFuCppWUJF+n6xZocvkQjQLrnHbT0eFxuO15pL vVuvWIPgPvQULuY5L1ZU69Ye5QEJq2T1iRnIV0mINXez5KZ9zw9q9JOEtxVE21a/Sgq6d4JL HEfsGeL8legUjJC4I2WBIDKzspvDhJpaMTiMWLJoVgApr1xLc3sJNDI8/bi3xNd5/I8359r/ KZy3yy7a3maN8rNRJZi1SbOXcsfwxG8s42fsgALdQ2ycxzXoEB/ueD4LzBR4vsrmQ42izA4O V62iHzU6CMfoupK5S9uKQiVo1x7lGjA0dPJdisc8wTh71VIrY5Z6mfGdMBijCFuWoJwyZz4Y CBxAQ5WbiuqLTY8bc5IX13EhgbX6uF9RXbf3sWdXX2KozjiX/Y6PcROjGe4FzObF3AIqg9O+ Kwz8qOHZa/puH8zHk+sT4f18FpAptPXRYMDX24LoRKRheSDC09vGeBUNp4YtHGhddQgfdWqv 8CA0URAGJ+6BzUNCA4xLcT3xyfn3enEzK0+5I0PN5HTno51YuRfvwy0p8p1SFi/pDQ1Ohko8 UkWnxdn9gINJsTCxnw==
X-Enigmail-Draft-Status: N11222
In-Reply-To: <ME0P300MB07133F7BB2C11FA027143127EE3F2@ME0P300MB0713.AUSP300.PROD.OUTLOOK.COM>
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg="sha-512"; boundary="------------ms040701020602080803090201"
Archived-At: <https://mailarchive.ietf.org/arch/msg/saag/4csfrbZIs8NS0ufsoJXI1E0lHP8>
Subject: Re: [saag] RADIUS is deprecating MD5
X-BeenThere: saag@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Security Area Advisory Group <saag.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/saag>, <mailto:saag-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/saag/>
List-Post: <mailto:saag@ietf.org>
List-Help: <mailto:saag-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/saag>, <mailto:saag-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 01 Apr 2024 12:14:39 -0000

Hi Peter,

from what you are writing, I get the feeling that you don't know what 
RADIUS actually does and assume that it's only one thing.

You are focusing on one thing only - the authentication part. And yes, 
that is completely right, that is usually EAP based and the actual 
authentication is protected by a TLS layer already. But that's not all.

RADIUS is a AAA protocol, and you are only dealing with the first A 
(Authorization) here, but RADIUS also does Authorization and Accounting, 
and those two A's are done outside of EAP, so outside of the TLS layer.

I tried to think of a good analogy here, and I suppose this one fits:

If you are paying by card at a store, then you have to enter your PIN to 
authenticate (unless you don't, but let's just ignore that here and 
assume you have to enter a PIN)

In the RADIUS equivalent, this PIN entry would be encrypted using 
EAP-TLS, so no one but you and your bank can see the PIN. But everything 
else, your card number, the amount you want to pay, the place where you 
are paying, and on the return path, the information whether or not the 
PIN entry was successful, if you have enough money in your account, etc. 
is sent in the clear and protected against tampering by a weak integrity 
check.

But you need the different layers of encryption.
For the sake of this analogy, just assume that the PIN entry is done by 
a completely different part (some kind of secure enclave), that only 
deals with the PIN entry. So all this metadata (card number, amount, and 
on the return path the success information) needs to be in a different 
encryption layer than the PIN.

So we have two protocol layers that both need protection.
And that's what the problem is.

To bring it back to the actual RADIUS protocol:

There is a ton of metadata that is sent over the RADIUS protocol and a 
lot of authorization data as well, like bandwidth restrictions, the VLAN 
the user should be put in, etc.
All things that directly affect the network security, and if we still 
use RADIUS/UDP, then we can only pray that no on-path attacker is there 
and the security provided by the weak integrity protection mechanism holds.

Cheers,
Janfred

On 01.04.24 09:04, Peter Gutmann wrote:
> Viktor Dukhovni <ietf-dane@dukhovni.org> writes:
> 
>> Others can speak to whether or not the deprecation is or isn't overly
>> disruptive relative to the benefits.
> 
> It depends on whether RADIUS is being used for authentication or as a
> transport layer.  As I've already pointed out, with RADIUS-for-transport
> there's nothing to fix because RADIUS isn't doing anything that matters.
> 
> For those who aren't familiar with how this works, the layering is as follows:
> 
> UDP - Unreliable, and fragments
> RADIUS - Fragments again, but differently to UDP.
> EAP-over-RADIUS
> EAP - Fragments yet again, and differently again.
> A turtle
> More turtles
> Four elephants
> Some form of TLS encapsulation, e.g. EAP-TLS, PEAP, etc
> *** TLS ***
> EAP/DIAMETER/some mess Microsoft invented
> The authentication you're using, often MSCHAPv2 by the time you get here
> 
> Of all that mess, the only parts that matter are the TLS tunnel and the
> authentication run inside it.  Everything before the point marked *** TLS ***
> is irrelevant because its sole purpose is to comply with a decades-long
> accretion of unnecessary layering in various RFCs.
> 
> So when RADIUS is used this way there's nothing to "fix", since the bit that
> matters is already being run inside a TLS tunnel.  It's only when the layering
> is:
> 
> UDP
> RADIUS
> 
> that there's something that needs fixing.
> 
> Peter.
>