Re: [secdir] draft-zorn-radius-pkmv1-05.txt

Donald Eastlake <d3e3e3@gmail.com> Thu, 27 August 2009 02:36 UTC

Return-Path: <d3e3e3@gmail.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id ADFF23A6AAA; Wed, 26 Aug 2009 19:36:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.443
X-Spam-Level:
X-Spam-Status: No, score=-2.443 tagged_above=-999 required=5 tests=[AWL=0.156, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IeoEdqKL0-fz; Wed, 26 Aug 2009 19:36:41 -0700 (PDT)
Received: from mail-ew0-f207.google.com (mail-ew0-f207.google.com [209.85.219.207]) by core3.amsl.com (Postfix) with ESMTP id 43DFD3A6805; Wed, 26 Aug 2009 19:36:41 -0700 (PDT)
Received: by ewy3 with SMTP id 3so781417ewy.42 for <multiple recipients>; Wed, 26 Aug 2009 19:36:42 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:cc:content-type :content-transfer-encoding; bh=71U6AQHRnftJUF0iO3/n2LcPhq2hCCgq/gGeonrry2E=; b=blYRkRkJqjOn6kc6qlcJSffmnLOqKNFTQjrcSJMmwnh/aCIuf+ram8dZ5zhjD+6i1U a13FFlLYkE+iZ/p6O8UOm3e+ZchpWtEbaMoFL96yYxIkpN8d9wK5T4MjRBqnrtiduGHf Pc/w5IeBaT6b1uayD+nKcbUXCLUJ8J/J5HIBo=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; b=ZAFi56HNIXb5PjV3Ia5JaQNoUP+m4wN0YPgolRtWrcbCnN0FjaUNufEVaH7H56qfZg +dKZeAx2lwn0IBfyCgo9cwJc8jpAY402EZruCkQw7fAWmP9VWTafJ/HSGPme2ZXvPSRQ FKEib6N2CL9rETeopicNbdHd/c7sbF7ZAQiZI=
MIME-Version: 1.0
Received: by 10.216.11.84 with SMTP id 62mr1543326wew.148.1251340602397; Wed, 26 Aug 2009 19:36:42 -0700 (PDT)
In-Reply-To: <00a001ca26b5$1b6e9b10$524bd130$@net>
References: <BLU137-W143E886FA45D9D848217FA93F70@phx.gbl> <006b01ca2692$fcda3500$f68e9f00$@net> <00a001ca26b5$1b6e9b10$524bd130$@net>
Date: Wed, 26 Aug 2009 22:36:42 -0400
Message-ID: <1028365c0908261936k4ca79f30i5051be4ae8f11699@mail.gmail.com>
From: Donald Eastlake <d3e3e3@gmail.com>
To: Glen Zorn <gwz@net-zen.net>
Content-Type: text/plain; charset="windows-1252"
Content-Transfer-Encoding: quoted-printable
Cc: Bernard Aboba <bernard_aboba@hotmail.com>, ietf@ietf.org, secdir@ietf.org
Subject: Re: [secdir] draft-zorn-radius-pkmv1-05.txt
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 Aug 2009 02:36:42 -0000

Looks OK to me,
Donald

On Wed, Aug 26, 2009 at 9:24 PM, Glen Zorn<gwz@net-zen.net> wrote:
> …
> PKMv1 has some fairly serious security problems that are described here:
> http://www2.computer.org/portal/web/csdl/doi/10.1109/SNPD.2008.138
>
> So I think the question is whether this document can make those serious
> security problems even worse, in a way that has not already been
> documented.
>
> AFAICT, this is not the case.  The use of RADIUS doesn’t improve the
> security of PKMv2 but it doesn’t seem to reduce it either .  The suggested
> use of the MS-MPPE-Send-Key Attribute may be problematic but seems pretty
> much unavoidable at present.
>
> I'd suggest that the document reference the known security
> issues that are covered in other documents, such as the ones above and
> others (such as RFC 3579) that describe weaknesses in the MPPE-Key
> attributes.
>
> OK
>
> The Security Considerations section now looks like this:
>
> 7.  Security Considerations
>
>
>
>    Section 4 of RFC 3579 [RFC3579] discusses vulnerabilities of the
>
>    RADIUS protocol.
>
>
>
>    Section 3 of the paper "Security Enhancements for Privacy and Key
>
>    Management Protocol in IEEE 802.16e-2005" [SecEn] discusses the
>
>    operation and vulnerabilities of the PKMv1 protocol.
>
>
>
>    If the Access-Request message is not subject to strong integrity
>
>    protection, an attacker may be able to modify the contents of the
>
>    PKM-Cryptosuite-List Attribute, weakening 802.16 security or
>
>    disabling data encryption altogether.
>
>
>
>    If the Access-Accept message is not subject to strong integrity
>
>    protection, an attacker may be able to modify the contents of the
>
>    PKM-Auth-Key Attribute.  For example, the Key field could be replaced
>
>    with a key known to the attacker.
>
>
>
>    Although it is necessary for a plaintext copy of the Key field in the
>
>    PKM-AUTH-Key Attribute to be transmitted in the Access-Accept
>
>    message, this document does not define a method for doing so
>
>    securely.  In order to transfer the key securely, it is RECOMMENDED
>
>    that it be encapsulated in an instance of the MS-MPPE-Send-Key
>
>    Attribute [RFC2548]; however, see section 4.3.4 of RFC 3579 [RFC3579]
>
>    for details regarding weaknesses in the encryption scheme used.
>
> Is that OK?
> …