[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

draft-ietf-radext-digest-auth, Securit Considerations section



Here's a proposal for the text regarding the encryption of RADIUS
which is required when accepting sips/https:

   HTTP-style clients can use TLS with server side certificates together
   with HTTP-Digest authentication.  Instead of TLS, IPSec can be used,
   too.  TLS or IPSec secure the connection while Digest Authentication
   authenticates the user.  The RADIUS connection can be regarded as one
   leg on the path between the HTTP-style client and the HTTP-style
   server.  To prevent the RADIUS link from being the weakest hop on the
   path, a RADIUS client receiving an HTTP-style request via TLS or
   IPSec MUST use an equally secure connection to the RADIUS server.
   There are two ways to achieve this:
   o  the RADIUS client rejects HTTP-style requests received over TLS or
      IPSec
   o  the operator of the RADIUS client takes actions to ensure that
      RADIUS traffic is exclusively sent and received using IPSec.
   When using IPSec, it MUST be set up as described [RFC3579] section
   4.2.


Wolfgang

--
T-Systems
Internet Platforms
+49 6151 937 2863
Am Kavalleriesand 3
64295 Darmstadt
Germany 

--
to unsubscribe send a message to radiusext-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://psg.com/lists/radiusext/>