Message-Authenticator depending of request/response code
Julien Rische
jrische at redhat.com
Tue Oct 1 17:10:25 UTC 2024
Hello everyone,
We are currently working on implementing RADIUS Message-Authenticator for MIT
krb5[1] according to RFC2865[2] and draft-ietf-radext-deprecating-radius-03[3].
We are not sure about what packet codes we should generate and expect
Message-Authenticator to verify for. In draft-ietf-radext-deprecating-radius-03
we can read:
Section 5.2.1:
"Clients MUST add Message-Authenticator to all Access-Request packets."
Section 5.2.4:
"Servers MUST add Message-Authenticator as the first attribute in all
responses to Access-Request packets. That is, all Access-Accept,
Access-Reject, Access-Challenge, and Protocol-Error packets."
However, I see that the FreeRADIUS server seems to be generating
Message-Authenticators for additional packet codes[4]. We would like to enforce
the use of Message-Authenticator as much as possible, but we are not sure if it
is relevant for all packet codes.
Could you explain why this specific code set triggers Message-Authenticator
generation in the FreeRADIUS server? And do you have any recommendations about
the cases where we should generate Message-Authenticators to ensure
compatibility with FreeRADIUS?
Thank you in advance,
Julien Rische
Red Hat, Inc.
[1] https://github.com/krb5/krb5/pull/1370
[2] https://datatracker.ietf.org/doc/html/rfc2869
[3] https://datatracker.ietf.org/doc/html/draft-ietf-radext-deprecating-radius-03
[4] https://github.com/FreeRADIUS/freeradius-server/blob/4312a2df8e0829c87811f42da7591a852350c068/src/protocols/radius/base.c#L367-L386
More information about the Freeradius-Devel
mailing list