[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [radext] #91: Citation for MD5 security Issues



#91: Citation for MD5 security Issues

Changes (by bernard_aboba@â):

  * status:  new => closed
  * resolution:  => fixed


Comment:

 Proposed resolution is to change Section 3 to the following:

 3.  The Current State of RADIUS Security

    RADIUS packets, as defined in [RFC2865], are protected by an MD5
    message integrity check (MIC), within the Authenticator field of
    RADIUS packets other than Access-Request [RFC2865] and Status-Server
    [RFC5997].  The Message-Authenticator Attribute utilizes HMAC-MD5 to
    authenticate and integrity protect RADIUS packets.

    While RADIUS does not support confidentiality of entire packets,
    various RADIUS attributes support encrypted (also known as "hidden")
    values, including: User-Password (defined in [RFC2865] Section 5.2),
    Tunnel-Password (defined in [RFC2868] Section 3.5), and various
    Vendor-Specific Attributes, such as the MS-MPPE-Send-Key and MS-MPPE-
    Recv-Key attributes (defined in [RFC2548] Section 2.4).  Generally
    speaking, the hiding mechanism uses a stream cipher based on a key
    stream from an MD5 digest.  Attacks against this mechanism are
    described in [RFC3579] Section 4.3.4.

    "Updated Security Considerations for the MD5 Message-Digest and the
    HMAC-MD5 Algorithms" [RFC6151] discusses security considerations for
    use of the MD5 and HMAC-MD5 algorithms.  While the advances in MD5
    collisions do not immediately compromise the use of MD5 or HMAC-MD5
    for the purposes used within RADIUS absent knowledge of the RADIUS
    shared secret, the progress toward compromise of MD5's basic
    cryptographic assumptions has resulted in the deprecation of MD5
    usage in a variety of applications.  As noted in [RFC6151] Section 2:

       MD5 is no longer acceptable where collision resistance is required
       such as digital signatures.  It is not urgent to stop using MD5 in
       other ways, such as HMAC-MD5; however, since MD5 must not be used
 for
       digital signatures, new protocol designs should not employ HMAC-MD5.

-- 
---------------------------------------+------------------------------------
 Reporter:  bernard_aboba@â            |        Owner:            
     Type:  defect                     |       Status:  closed    
 Priority:  major                      |    Milestone:  milestone1
Component:  Crypto-Agility             |      Version:  1.0       
 Severity:  Active WG Document         |   Resolution:  fixed     
 Keywords:                             |  
---------------------------------------+------------------------------------

Ticket URL: <http://trac.tools.ietf.org/wg/radext/trac/ticket/91#comment:1>
radext <http://tools.ietf.org/radext/>


--
to unsubscribe send a message to radiusext-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://psg.com/lists/radiusext/>