Re: AD review of draft-zorn-radius-pkmv1-04.txt

2009-08-17 Thread Alan DeKok
Glen Zorn wrote:
 But none of the Attributes mentioned in Appendix B have anything to do with
 RADIUS security as I understand it.  Can you explain?

  From the document:

   Appendix B includes a
   listing of complex attributes used within [RFC2865], [RFC2868],
   [RFC2869], [RFC3162], [RFC4818], and [RFC4675].  The discussion of
   these attributes includes reasons why a complex type is acceptable,
   or suggestions for how the attribute could have been defined to
   follow the RADIUS data model.

  The intent of Appendix B is to explain what is *wrong* about the use
of complex attributes in previous RFCs.

  Alan DeKok.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: AD review of draft-zorn-radius-pkmv1-04.txt

2009-08-17 Thread Alan DeKok
Glen Zorn wrote:
 Alan DeKok wrote:
 ... It would have been preferable ...


 To which I reply:
 
 So it seems that what you _really_ meant was ... well, screw 'em.  

  I think there is a miscommunication here.

  Alan DeKok.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: AD review of draft-zorn-radius-pkmv1-04.txt

2009-08-16 Thread Glen Zorn
Alan DeKok [mailto:al...@deployingradius.com] writes:

 Glen Zorn wrote:
  But none of the Attributes mentioned in Appendix B have anything to
 do with
  RADIUS security as I understand it.  Can you explain?
 
   From the document:
 
Appendix B includes a
listing of complex attributes used within [RFC2865], [RFC2868],
[RFC2869], [RFC3162], [RFC4818], and [RFC4675].  The discussion of
these attributes includes reasons why a complex type is acceptable,
or suggestions for how the attribute could have been defined to
follow the RADIUS data model.
 
   The intent of Appendix B is to explain what is *wrong* about the use
 of complex attributes in previous RFCs.

You seem to be honing you mastery of the non sequitur ;-).  My original
question was:

quote
  Yeah. I've always been a bit uncomfortable with the security 
  functionality escape clause in the RADIUS Design Guidelines draft.
  Lots of things can reasonably be claimed to be security related. I 
  would have preferred the exception to be crafted a bit narrower, 
  just for this reason. But, unless wording of Design Guidelines is 
  changed, you have a legitimate argument.
 
 I believe the intent was related to RADIUS security. 

This statement puzzles me: section 2.1.3 of the design guidelines document
says:

   As can be seen in Appendix B, most of the existing complex attributes
   involve authentication or security functionality.  Supporting this
   functionality requires code changes on both the RADIUS client and
   server, regardless of the attribute format.  As a result, in most
   cases, the use of complex attributes to represent these methods is
   acceptable, and does not create additional interoperability or
   deployment issues.

But none of the Attributes mentioned in Appendix B have anything to do with
RADIUS security as I understand it.  Can you explain?
/quote

How does your response relate to my original question? 

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: AD review of draft-zorn-radius-pkmv1-04.txt

2009-08-16 Thread Glen Zorn
Alan DeKok wrote:

Both the PKM-SS-Cert and PKM-CA-Cert attributes provide 'ad-hoc' 
extension of the RADIUS attribute size, much like the EAP-Message 
attribute. It would have been preferable to follow the extended 
attribute format [2]. This provides a standardized way of carrying data 
larger than a 253 bytes. 

However, that document has not yet been published. My question is 
that if there are no current implementations of the PKM specification, 
it may be preferable to wait until the extended attributes document is 
finished, and then to use that format. 

To which I replied:

No. There _are_ implementations as I rather clearly stated at the meeting 
in SF, using the Experimental attribute space. 
 
To which he replied:

So the implementations have to be updated to use the IANA code points, 
independent of them possibly using the extended attributes format. 
 
To which I reply:

So it seems that what you _really_ meant was If there are no current
implementations of the PKM specification, 
it may be preferable to wait until the extended attributes document is 
finished, and then to use that format but if there are current
implementations, well, screw 'em.  

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: AD review of draft-zorn-radius-pkmv1-04.txt

2009-08-16 Thread Glen Zorn
...

 Following on Dan's review, I've reviewed the document for agreement 
 with the RADIUS design guidelines document [1] 
 
 
 Both the PKM-SS-Cert and PKM-CA-Cert attributes provide 'ad-hoc' 
 extension of the RADIUS attribute size, much like the EAP-Message 
 attribute. 

Actually, the method specified is identical to that in RFC 3579.

? It would have been preferable to follow the extended 
 attribute format [2]. This provides a standardized way of carrying data 
 larger than a 253 bytes. 

Yet again, I'm puzzled: RFC 3579 is ad-hoc but an Internet-Draft is a
standard?

...
 
 In Section 3.4. PKM-Cryptosuite-List, can the attribute be longer 
 than 253 bytes? If so, do the same ad-hoc rules as above apply? The 
 IEEE specification seems to permit attributes up to 32768 octets in
length. 

It also defines exactly 6 supported cryptographic suites.  The maximum
length of the PKM-Cryptosuite-List Attribute is therefore 20 octets
(2+3(6)).
 
...

 Section 3.5. PKM-SAID, defines an attribute containing 2 octets of 
 data. It would be preferable to use a 4-octet type, and to specify that 
 the upper 2 octets are zero. This would allow the attribute to fit 
? within the existing RADIUS data model, as discussed in Section 2.1.1 of 
 the design guidelines document: 
? 
 It is worth noting that since RADIUS only supports unsigned integers 
 of 32 or 64 bits, attributes using signed integer data types or 
 unsigned integer types of other sizes will require code changes, and 
 SHOULD be avoided. 

I guess that it's not worth noting that the Salt field in the
Tunnel-Password Attribute (RFC 2868) is 16 bits long (I'm just not sure
why).

 Section3.6. PKM-SA-Descriptor defines another complex attribute as 
 discussed above. It would be good to define this as a 64-bit integer, 
 which would fit within the RADIUS data model. 

It would be good to define dinosaurs are imaginary, too -- that would fit
the Biblical data model.  Unfortunately, dinosaurs did exist and the
PKM-SA-Descriptor is not a 64-bit integer.

...
 

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: AD review of draft-zorn-radius-pkmv1-04.txt

2009-08-15 Thread Glen Zorn
d.b.nel...@comcast.net wrote: 

  Yeah. I've always been a bit uncomfortable with the security 
  functionality escape clause in the RADIUS Design Guidelines draft.  
  Lots of things can reasonably be claimed to be security related. I 
  would have preferred the exception to be crafted a bit narrower, just 
  for this reason. But, unless wording of Design Guidelines is changed, 
  you have a legitimate argument. 
 
 I believe the intent was related to RADIUS security. 

This statement puzzles me: section 2.1.3 of the design guidelines document
says:

   As can be seen in Appendix B, most of the existing complex attributes
   involve authentication or security functionality.  Supporting this
   functionality requires code changes on both the RADIUS client and
   server, regardless of the attribute format.  As a result, in most
   cases, the use of complex attributes to represent these methods is
   acceptable, and does not create additional interoperability or
   deployment issues.

But none of the Attributes mentioned in Appendix B have anything to do with
RADIUS security as I understand it.  Can you explain?

 The guidelines 
 document could be updated to address this. 
  
 RADIUS could transport parameters for *another* protocol. 

Like EAP?

 Those 
 attributes are not security related. 

I see.  What attributes (besides Message-Authenticator) are related to
RADIUS security?

 They either follow the RADIUS data 
 model (int, IP address, etc.), or they are opaque data that RADIUS is 
 simply transporting on the behalf of the other protocol. 
 
Alan DeKok. 

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: AD review of draft-zorn-radius-pkmv1-04.txt

2009-08-13 Thread Glen Zorn
Sorry for the late response -- my laptop was stolen in Stockholm  I'm just
getting back to normal :-(

 If we are to dismiss the Design Guidelines as a personal preference how
are they to be taken seriously?

They shouldn't be taken _too_ seriously.  

 I understand that following someone else's design 
 guidance is not always popular with developers, but following regular
design patterns is a well recognized practice
 in software engineering, that is 
 generally attributed with increasing product quality and maintainability.B
I think we simply need to get with the 
 program here. 

I really think that the IETF has enough trouble with protocol engineering
w/o setting itself up as a software engineering standards body; indeed, the
waterfall design process followed (by  large) in the IETF was discredited
years ago...


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: AD review of draft-zorn-radius-pkmv1-04.txt

2009-07-27 Thread Michael Richardson
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


 Alan == Alan DeKok al...@deployingradius.com writes:
Alan   Both the PKM-SS-Cert and PKM-CA-Cert attributes provide
Alan 'ad-hoc' extension of the RADIUS attribute size, much like the
Alan EAP-Message attribute.  It would have been preferable to

  Back in the time of EAP-SIM, I complained about the rather
inconsistent attribute encoding in it, and why didn't they use the
radius encoding, or at least some consistent mechanism.
  (Sizes are both in words and bytes in EAP-SIM)

  While doing interop, I found at least two implementations that got
things wrong (and therefore their corresponding clients must not checked
at all!) and would have resulted in buffer overflows, and possible
exploits. 

  I want to emphasis what Alan says in the next message:

Alan  What value, then, is in the design guidelines, WG consensus,
Alan  or IETF  review?  Can we just over-ride them willy-nilly
Alan  because a vendor has an implementation of a spec?

- -- 
] Y'avait une poule de jammé dans l'muffler!|  firewalls  [
]   Michael Richardson, Sandelman Software Works, Ottawa, ON|net architect[
] m...@sandelman.ottawa.on.ca http://www.sandelman.ottawa.on.ca/ |device driver[
]h(Just another Debian GNU/Linux using, kernel hacking,ruby  guy);  [
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Finger me for keys

iQEVAwUBSmi1kICLcPvd0N1lAQIHhwf+Pgz79pEFujsgWY7dHFxAEezUiMb6QgPQ
8NQqQCzxquI+aikmzxsqrmNdSEXLEIMEVCyzyYLLb+W0dCNpWD7HUJ0Ktz4NsOK6
zI+t7Cbx0KMXHmydpUJNqg3ucxf5cpt46hY2eug2p2F0UNLTuCYIne+2HzhSMOKa
95PeRlYvkGIW8PKxspdYlIxa9GnASjCY4lh1IRQv3tRNZ3kPSPsRqfSZhyzNB8Hy
SFnEIiBL3FvbvDzOqlk2TA6GYE+Q86v21tSlaGP61/UqbuRrl51Bo8QviORFiWy8
zdiOq0oTAhjT59pspiq518UgrP/ndsjB1op8xCi5JBEnRMDFDuyU1g==
=Vzu1
-END PGP SIGNATURE-
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: AD review of draft-zorn-radius-pkmv1-04.txt

2009-07-27 Thread Alan DeKok
d.b.nel...@comcast.net wrote:
 Yeah.  I've always been a bit uncomfortable with the security
 functionality escape clause in the RADIUS Design Guidelines draft. 
 Lots of things can reasonably be claimed to be security related.  I
 would have preferred the exception to be crafted a bit narrower, just
 for this reason.  But, unless wording of Design Guidelines is changed,
 you have a legitimate argument.

  I believe the intent was related to RADIUS security.  The guidelines
document could be updated to address this.

  RADIUS could transport parameters for *another* protocol.  Those
attributes are not security related.  They either follow the RADIUS data
model (int, IP address, etc.), or they are opaque data that RADIUS is
simply transporting on the behalf of the other protocol.

  Alan DeKok.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: AD review of draft-zorn-radius-pkmv1-04.txt

2009-07-23 Thread Glen Zorn
Alan DeKok [mailto:al...@deployingradius.com] writes:

 Romascanu, Dan (Dan) wrote:
  I have reviewed as shepherding AD draft-zorn-radius-pkmv1-04.txt
 
   Following on Dan's review, I've reviewed the document for agreement
 with the RADIUS design guidelines document [1]
 
 
   Both the PKM-SS-Cert and PKM-CA-Cert attributes provide 'ad-hoc'
 extension of the RADIUS attribute size, much like the EAP-Message
 attribute.  It would have been preferable to follow the extended
 attribute format [2].  This provides a standardized way of carrying
 data
 larger than a 253 bytes.
 
   However, that document has not yet been published.  My question is
 that if there are no current implementations of the PKM specification,
 it may be preferable to wait until the extended attributes document is
 finished, and then to use that format.

No.  There _are_ implementations as I rather clearly stated at the meeting
in SF, using the Experimental attribute space.

 
   Section 3.3 defines the PKM-Config-Settings.  This is a complex
 attribute within the meaning of Section 2.1.3 of the design guidelines
 document, which states:
 
As a
result, the introduction of new complex data types within RADIUS
attribute specifications SHOULD be avoided, except in the case of
complex attributes involving authentication or security
functionality.

All of the attributes are security related.

 
   I do not see any pressing need to make this attribute carry seven
 independent fields.  The RADIUS attribute space has sufficient room to
 allocate 7 attributes.  If the extended attribute format is used, then
 nearly all space limitations are removed.  I would recommend that these
 independent values be split up into independent attributes that follow
 the RADIUS data model.

Given that there are already multiple interoperable implementations and all
of the attributes are security related, I see no pressing need to make
people change running code to satisfy your personal preferences.  Sorry if
these attributes were designed to be easy to implement for people writing
PKM code, rather than RADIUS code.
 
 
   In Section 3.4.  PKM-Cryptosuite-List, can the attribute be longer
 than 253 bytes?

No.  There are exactly 

...

 
   Section 3.5.  PKM-SAID, defines an attribute containing 2 octets of
 data.  It would be preferable to use a 4-octet type, and to specify
 that
 the upper 2 octets are zero.  This would allow the attribute to fit
 within the existing RADIUS data model, as discussed in Section 2.1.1 of
 the design guidelines document:
 
It is worth noting that since RADIUS only supports unsigned integers
of 32 or 64 bits, attributes using signed integer data types or
unsigned integer types of other sizes will require code changes, and
SHOULD be avoided.

This would allow a lot more code to be written, too.

 
   Section 3.6.  PKM-SA-Descriptor defines another complex attribute as
 discussed above.  It would be good to define this as a 64-bit integer,
 which would fit within the RADIUS data model.

You're absolutely right: why make it easy on engineers when there's the
RADIUS data model to defend?

 
   Section 3.7.  PKM-AUTH-Key defines a complex attribute for
 authentication or security, which fits within the design guidelines.

All of these attributes are related to security.

 However, the encryption of the attribute is specified by reference to
 [IEEE.802.16-2004].  This encryption is unlike anything previously used
 in RADIUS, but it appears to be mandated by the IEEE specification.

Yes, in an obvious error, the IEEE seems to have completely ignored the
RADIUS data model.  Silly them!

...

   I also have some comments on the Security Considerations section:
 
If the Access-Accept message is not subject to strong integrity
protection, an attacker may be able to modify the contents of the
PKM-Auth-Key Attribute.  For example, the Key field could be
 replaced
with a key known to the attacker.
 
   Would it be sufficient to require that the Access-Accept contains a
 Message-Authenticator for integrity protection?

If you consider MD5 to be strong integrity protection.

 
 
Although it is necessary for a plaintext copy of the Key field in
 the
PKM-AUTH-Key Attribute to be transmitted in the Access-Accept
message, this document does not define a method for doing so
securely.
 
   How is inter-operability to be achieved if there is no specification
 for how to carry a necessary field?
 
   I suggest changing the suggestion to use MS-MPPE-Send-Key into a
 mandatory requirement, and making it part of the specification.

MPPE-Send-Key is broken; I don't see the value in requiring the use of
broken technology.  There are much better ways to encrypt attributes for
transmission, in which (once again) the radext WG has shown near zero
interest.  Maybe it should be a cisco VSA?

...

___
Ietf mailing list
Ietf@ietf.org

Re: AD review of draft-zorn-radius-pkmv1-04.txt

2009-07-23 Thread Alan DeKok
Glen Zorn wrote:
 No.  There _are_ implementations as I rather clearly stated at the meeting
 in SF, using the Experimental attribute space.

  So the implementations have to be updated to use the IANA code points,
independent of them possibly using the extended attributes format.

 Given that there are already multiple interoperable implementations and all
 of the attributes are security related, I see no pressing need to make
 people change running code to satisfy your personal preferences.

 The contents of the design guidelines document reflect the WG consensus
after years of effort and review.  It by *no* means reflects solely my
personal preference, as seems to be implied here.

  Sorry if
 these attributes were designed to be easy to implement for people writing
 PKM code, rather than RADIUS code.

  There's no need to follow the RADIUS design guidelines, because the
attributes refer to data that interacts with non-RADIUS systems...

  What value, then, is in the design guidelines, WG consensus, or IETF
review?  Can we just over-ride them willy-nilly because a vendor has an
implementation of a spec?

   In Section 3.4.  PKM-Cryptosuite-List, can the attribute be longer
 than 253 bytes?
 
 No.  There are exactly 

  This response seems to have been cut off.

   Would it be sufficient to require that the Access-Accept contains a
 Message-Authenticator for integrity protection?
 
 If you consider MD5 to be strong integrity protection.

  It appears to be good enough for the rest of RADIUS, at least until
the TLS-based methods are standardized.

 MPPE-Send-Key is broken; I don't see the value in requiring the use of
 broken technology.  There are much better ways to encrypt attributes for
 transmission, in which (once again) the radext WG has shown near zero
 interest.  Maybe it should be a cisco VSA?

  If it's documented, sure.

  Alan DeKok.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: AD review of draft-zorn-radius-pkmv1-04.txt

2009-07-23 Thread d . b . nelson


Glen Zorn writes... 


  As a  result, the introduction of new complex data types within 

  RADIUS attribute specifications SHOULD be avoided, except 

  in the case of complex attributes involving authentication or 

  security functionality. 
 
 All of the attributes are security related. 



Yeah.  I've always been a bit uncomfortable with the security functionality 
escape clause in the RADIUS Design Guidelines draft.  Lots of things can 
reasonably be claimed to be security related.  I would have preferred the 
exception to be crafted a bit narrower, just for this reason.  But, unless 
wording of Design Guidelines is changed, you have a legitimate argument. 


    I do not see any pressing need to make this attribute carry seven 
  independent fields.  The RADIUS attribute space has sufficient room to 
  allocate 7 attributes.  If the extended attribute format is used, then 
  nearly all space limitations are removed.  I would recommend that these 
  independent values be split up into independent attributes that follow 
  the RADIUS data model. 
 
 Given that there are already multiple interoperable implementations and all 
 of the attributes are security related, I see no pressing need to make 
 people change running code to satisfy your personal preferences.  Sorry if 
 these attributes were designed to be easy to implement for people writing 
 PKM code, rather than RADIUS code. 



No one has ever claimed that following the RADIUS Design Guidelines is the only 
way to interoperable implementations.  Lots of designs, good, bad and 
indifferent, can be made to interoperate . 



If we are to dismiss the Design Guidelines as a personal preference how 
are they to be taken seriously?  I understand that following someone else's 
design guidance is not always popular with developers, but following regular 
design patterns is a well recognized practice in software engineering, that is 
generally attributed with increasing product quality and maintainability.  I 
think we simply need to get with the program here. 

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf