Re: [radext] Review of draft-ietf-radext-radsec

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi,

>    If peer communication between two devices is configured for both
>    RADIUS/TLS transport (using TLS security) and RADIUS/UDP (using
>    shared secret security),and where the RADIUS/UDP transport is the
>    failover option if the TLS session cannot be established, a down-
>    bidding attack can occur if an adversary can maliciously close the
>    TCP connection, or prevent it from being established.  Situations
>    where clients are configured in such a way are likely to occur during
>    a migration phase from RADIUS/UDP to RADIUS/TLS.  By preventing the
>    TLS session setup, the attacker can reduce the security of the packet
>    payload from the selected TLS cipher suite packet encryption to the
>    classic MD5 per-attribute encryption.  The situation should be
>    avoided by disabling the weaker RADIUS/UDP transport as soon as the
>    new RADIUS/TLS transport is established and tested.  Disabling can
>    happen at either the RADIUS client or server side:
>  
>    o  Client side: de-configure the failover setup, leaving RADIUS/TLS
>       as the only communication option
>  
>    o  Server side: de-configure the RADIUS/UDP client from the list of
>       valid RADIUS clients
>  
> I hope that makes my intended statement clearer.
>  
> [BA] My issue is the use of a "well known" shared secret with RADIUS/UDP. 
> This could be fixed by requiring that a server supporting RADIUS/TLS MUST
> check for a RADIUS/TLS connection before allowing use of the "well known"
> shared secret. 

Ah, I see. The spec does not mandate a fixed well-known shared secret
for RADIUS/UDP at all. It only specifies that when TLS transport is
used, security is provided on the transport layer, so the shared secret
that used to protect the RADIUS payload is useless is set to this fixed
term.

When using RADIUS/UDP, the shared secret is still chosen by the
administrator by configuration.

Would it help to clarify the first lines to read:

    If peer communication between two devices is configured for both
    RADIUS/TLS transport (i.e. TLS security on the transport layer,
    shared secret fixed to "radsec") and RADIUS/UDP (i.e. shared secret
    security with a secret manually configured by the administrator),
    and where the RADIUS/UDP transport is the failover option if the
    TLS session cannot be established, a down-bidding attack can occur
    if an adversary can maliciously close the TCP connection, or
    prevent it from being established.

Just to make sure people realise that RADIUS/UDP security is untouched
by this spec?

Greetings,

Stefan Winter

-- 
Stefan WINTER
Ingenieur de Recherche
Fondation RESTENA - Réseau Téléinformatique de l'Education Nationale et
de la Recherche
6, rue Richard Coudenhove-Kalergi
L-1359 Luxembourg

Tel: +352 424409 1
Fax: +352 422473

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
Ietf mailing list
Ietf@xxxxxxxx
https://www.ietf.org/mailman/listinfo/ietf

[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Fedora Users]