[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [radext] #41: A1.2



#41: A1.2
---------------------------------------+------------------------------------
 Reporter:  bernard_aboba@â            |       Owner:            
     Type:  defect                     |      Status:  new       
 Priority:  major                      |   Milestone:  milestone1
Component:  design                     |     Version:  1.0       
 Severity:  Submitted WG Document      |    Keywords:            
---------------------------------------+------------------------------------
Description changed by bernard_aboba@â:

Old description:

> Does the data provide authentication and/or security capabilities for
>    the RADIUS protocol, as outlined below?  If so, it SHOULD be
>    allocated from the standard space via "IETF consensus", and SHOULD
>    NOT be allocated from the vendor space.
>
> [BA] A BCP should not be setting IANA allocation policy.  Recommended
> change:
>
>    Does the data provide authentication and/or security capabilities for
>    the RADIUS protocol, as outlined below?  If so, it SHOULD be
>    allocated from the standard space.

New description:

 A.1.2. Transport of Authentication and Security Data

    Does the data provide authentication and/or security capabilities for
    the RADIUS protocol, as outlined below?  If so, it SHOULD be
    allocated from the standard space via "IETF consensus", and SHOULD
    NOT be allocated from the vendor space.

       * Complex data types that carry authentication methods which
         RADIUS servers are expected to parse and verify as part of
         an authentication process.

       * Complex data types that carry security information intended
         to increase the security of the RADIUS protocol itself.

    Any data type carrying authentication and/or security data that is
    not meant to be parsed by a RADIUS server is an "opaque data type",
    as defined below.

 [BA] This section appears disjointed, as though it was missing some text.
 Recommended change:

 A.1.2. Transport of Authentication and Security Data

    Does the data provide authentication and/or security capabilities for
    the RADIUS protocol, as outlined below?  If so, use of a complex data
 type is acceptable, under the following circumstances:

       * Complex data types that carry authentication methods which
         RADIUS servers are expected to parse and verify as part of
         an authentication process.

       * Complex data types that carry security information intended
         to increase the security of the RADIUS protocol itself.

    Any data type carrying authentication and/or security data that is
    not meant to be parsed by a RADIUS server is an "opaque data type",
    as defined below.

--

-- 
Ticket URL: <http://trac.tools.ietf.org/wg/radext/trac/ticket/41#comment:1>
radext <http://tools.ietf.org/radext/>


--
to unsubscribe send a message to radiusext-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://psg.com/lists/radiusext/>