[saag] RADIUS is deprecating MD5

Alan DeKok <aland@deployingradius.com> Sun, 24 March 2024 18:22 UTC

Return-Path: <aland@deployingradius.com>
X-Original-To: saag@ietfa.amsl.com
Delivered-To: saag@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 514CAC151534 for <saag@ietfa.amsl.com>; Sun, 24 Mar 2024 11:22:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.906
X-Spam-Level:
X-Spam-Status: No, score=-1.906 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3vwR5NEqHAms for <saag@ietfa.amsl.com>; Sun, 24 Mar 2024 11:22:51 -0700 (PDT)
Received: from mail.networkradius.com (mail.networkradius.com [62.210.147.122]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BC56AC151531 for <saag@ietf.org>; Sun, 24 Mar 2024 11:22:50 -0700 (PDT)
Received: from smtpclient.apple (135-23-95-173.cpe.pppoe.ca [135.23.95.173]) by mail.networkradius.com (Postfix) with ESMTPSA id 63270453 for <saag@ietf.org>; Sun, 24 Mar 2024 18:22:48 +0000 (UTC)
Authentication-Results: NetworkRADIUS; dmarc=none (p=none dis=none) header.from=deployingradius.com
From: Alan DeKok <aland@deployingradius.com>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3696.120.41.1.1\))
Message-Id: <755BC73B-B981-4986-B45A-E9796DCC66BC@deployingradius.com>
Date: Sun, 24 Mar 2024 14:22:46 -0400
To: saag@ietf.org
X-Mailer: Apple Mail (2.3696.120.41.1.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/saag/DBRadZ87ucLcvxkqFa9ATCnV_vg>
Subject: [saag] RADIUS is deprecating MD5
X-BeenThere: saag@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Security Area Advisory Group <saag.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/saag>, <mailto:saag-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/saag/>
List-Post: <mailto:saag@ietf.org>
List-Help: <mailto:saag-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/saag>, <mailto:saag-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 24 Mar 2024 18:22:56 -0000

  To follow up on my comments at the mic in Brisbane, the RADEXT group is working on two documents:

* moving TLS to standards track:  https://datatracker.ietf.org/doc/draft-rieckers-radext-rfc6614bis/

* deprecating insecure practices:  https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/

  We expect to submit these documents for publication around IETF 120.

  We will be deprecating the use of RADIUS/UDP, in large part due to it's reliance on MD5.  Everyone shipping RADIUS clients should take a serious look at moving to TLS immediately.

  MD5 isn't getting any more secure, and there are few reasons left for staying with it.

  Alan DeKok.