|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: iSCSI: 7.2.1 CHAP Considerations (12-98)Julian, Better, but I would suggest: If an initiator or target generates or verifies a CHAP secret that has less than 96 random bits then IPsec encryption (according to the implementation requirements in Section 7.3.2 Confidentiality) MUST be used to protect the connection. Moreover, in this case IKE authentication with group pre-shared keys SHOULD NOT be used unless it is not essential to protect group members against off-line dictionary attacks by other members, and an implementation MUST NOT continue with the login unless it can verify that IPsec encryption is being used to protect the connection. I want to more strongly tie the last requirement to the initial condition. Further comments on this text: 1. I would suggest changing "96 random bits" to "96 bits". I don't think it is practical to verify the number of random bits in a single secret. 2. I would suggest changing the final "MUST NOT" to a "SHOULD NOT". As with IKE pre-shared keys, the need to protect against off-line dictionary attacks is ultimately a local deployment consideration. Regards, Steve Senum Julian Satran wrote: > > The text I would suggest in 7.2.1 is: > > If an initiator or target generates or verifies a CHAP secret that has less > than 96 random bits then IPsec encryption (according to the implementation > requirements in Section 7.3.2 Confidentiality) MUST be used to protect the > connection. Moreover, in this case IKE authenti-cation with group pre-shared > keys SHOULD NOT be used unless it is not essential to protect group members > against off-line dictionary attacks by other members. When CHAP is used with > secret shorter than 96 bits, a compliant implementation MUST NOT continue with > the login unless it can verify that IPsec encryption is being used to protect > the connection. > > Julo >
Home Last updated: Thu Jun 13 13:18:41 2002 10757 messages in chronological order |