Re: [secdir] draft-zorn-radius-pkmv1-05.txt
Donald Eastlake <d3e3e3@gmail.com> Thu, 27 August 2009 02:36 UTC
Return-Path: <d3e3e3@gmail.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id ADFF23A6AAA; Wed, 26 Aug 2009 19:36:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.443
X-Spam-Level:
X-Spam-Status: No, score=-2.443 tagged_above=-999 required=5 tests=[AWL=0.156, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IeoEdqKL0-fz; Wed, 26 Aug 2009 19:36:41 -0700 (PDT)
Received: from mail-ew0-f207.google.com (mail-ew0-f207.google.com [209.85.219.207]) by core3.amsl.com (Postfix) with ESMTP id 43DFD3A6805; Wed, 26 Aug 2009 19:36:41 -0700 (PDT)
Received: by ewy3 with SMTP id 3so781417ewy.42 for <multiple recipients>; Wed, 26 Aug 2009 19:36:42 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:cc:content-type :content-transfer-encoding; bh=71U6AQHRnftJUF0iO3/n2LcPhq2hCCgq/gGeonrry2E=; b=blYRkRkJqjOn6kc6qlcJSffmnLOqKNFTQjrcSJMmwnh/aCIuf+ram8dZ5zhjD+6i1U a13FFlLYkE+iZ/p6O8UOm3e+ZchpWtEbaMoFL96yYxIkpN8d9wK5T4MjRBqnrtiduGHf Pc/w5IeBaT6b1uayD+nKcbUXCLUJ8J/J5HIBo=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; b=ZAFi56HNIXb5PjV3Ia5JaQNoUP+m4wN0YPgolRtWrcbCnN0FjaUNufEVaH7H56qfZg +dKZeAx2lwn0IBfyCgo9cwJc8jpAY402EZruCkQw7fAWmP9VWTafJ/HSGPme2ZXvPSRQ FKEib6N2CL9rETeopicNbdHd/c7sbF7ZAQiZI=
MIME-Version: 1.0
Received: by 10.216.11.84 with SMTP id 62mr1543326wew.148.1251340602397; Wed, 26 Aug 2009 19:36:42 -0700 (PDT)
In-Reply-To: <00a001ca26b5$1b6e9b10$524bd130$@net>
References: <BLU137-W143E886FA45D9D848217FA93F70@phx.gbl> <006b01ca2692$fcda3500$f68e9f00$@net> <00a001ca26b5$1b6e9b10$524bd130$@net>
Date: Wed, 26 Aug 2009 22:36:42 -0400
Message-ID: <1028365c0908261936k4ca79f30i5051be4ae8f11699@mail.gmail.com>
From: Donald Eastlake <d3e3e3@gmail.com>
To: Glen Zorn <gwz@net-zen.net>
Content-Type: text/plain; charset="windows-1252"
Content-Transfer-Encoding: quoted-printable
Cc: Bernard Aboba <bernard_aboba@hotmail.com>, ietf@ietf.org, secdir@ietf.org
Subject: Re: [secdir] draft-zorn-radius-pkmv1-05.txt
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 Aug 2009 02:36:42 -0000
Looks OK to me, Donald On Wed, Aug 26, 2009 at 9:24 PM, Glen Zorn<gwz@net-zen.net> wrote: > … > PKMv1 has some fairly serious security problems that are described here: > http://www2.computer.org/portal/web/csdl/doi/10.1109/SNPD.2008.138 > > So I think the question is whether this document can make those serious > security problems even worse, in a way that has not already been > documented. > > AFAICT, this is not the case. The use of RADIUS doesn’t improve the > security of PKMv2 but it doesn’t seem to reduce it either . The suggested > use of the MS-MPPE-Send-Key Attribute may be problematic but seems pretty > much unavoidable at present. > > I'd suggest that the document reference the known security > issues that are covered in other documents, such as the ones above and > others (such as RFC 3579) that describe weaknesses in the MPPE-Key > attributes. > > OK > > The Security Considerations section now looks like this: > > 7. Security Considerations > > > > Section 4 of RFC 3579 [RFC3579] discusses vulnerabilities of the > > RADIUS protocol. > > > > Section 3 of the paper "Security Enhancements for Privacy and Key > > Management Protocol in IEEE 802.16e-2005" [SecEn] discusses the > > operation and vulnerabilities of the PKMv1 protocol. > > > > If the Access-Request message is not subject to strong integrity > > protection, an attacker may be able to modify the contents of the > > PKM-Cryptosuite-List Attribute, weakening 802.16 security or > > disabling data encryption altogether. > > > > If the Access-Accept message is not subject to strong integrity > > protection, an attacker may be able to modify the contents of the > > PKM-Auth-Key Attribute. For example, the Key field could be replaced > > with a key known to the attacker. > > > > Although it is necessary for a plaintext copy of the Key field in the > > PKM-AUTH-Key Attribute to be transmitted in the Access-Accept > > message, this document does not define a method for doing so > > securely. In order to transfer the key securely, it is RECOMMENDED > > that it be encapsulated in an instance of the MS-MPPE-Send-Key > > Attribute [RFC2548]; however, see section 4.3.4 of RFC 3579 [RFC3579] > > for details regarding weaknesses in the encryption scheme used. > > Is that OK? > …
- [secdir] draft-zorn-radius-pkmv1-05.txt Donald Eastlake
- Re: [secdir] draft-zorn-radius-pkmv1-05.txt Glen Zorn
- Re: [secdir] draft-zorn-radius-pkmv1-05.txt Donald Eastlake
- Re: [secdir] draft-zorn-radius-pkmv1-05.txt Glen Zorn
- Re: [secdir] draft-zorn-radius-pkmv1-05.txt Glen Zorn
- Re: [secdir] draft-zorn-radius-pkmv1-05.txt Glen Zorn
- Re: [secdir] draft-zorn-radius-pkmv1-05.txt Donald Eastlake
- Re: [secdir] draft-zorn-radius-pkmv1-05.txt Donald Eastlake
- Re: [secdir] draft-zorn-radius-pkmv1-05.txt Bernard Aboba