English 中文(简体)
Does RADIUS’s use of the MD5 algorithm make it not FIPS validated for an application that allows RADIUS authentication?
原标题:

The issue is if you enforce FIPS validated cryptography in the Windows security policy settings, an exception will be thrown because RADIUS protocol uses the MD5 algorithm to hash the request authenticator. There is not an alternative MD5 algorithm that is FIPS validated so it does not appear any code implementation of RADIUS would be possible on a machine providing FIPS validated cryptography.

Does this mean RADIUS is mutually exclusive with FIPS validation?

The code implements the RADIUS protocol as specified by the official RFC (https://www.rfc-editor.org/rfc/rfc2865).

问题回答

When you enable FIPS validated cryptography in Windows, you re asserting that you are now going to use only the FIPS-validated encryption and hash algorithms. More specifically, it s the cryptographic module in Windows that has been validated only to allow users to use approved FIPS algorithms. The list of acceptable algorithms is defined in Annex A: Approved Security Functions for FIPS PUB 140-2, Security Requirements for Cryptographic Modules.

MD5 is not an approved hash algorithm, so no, applications cannot use it. For hashing, you re limited to the SHA family of algorithms. So MD5-based Radius is out because it cannot use MD5 from a FIPS-validated security module.

If you peruse the FIPS-validated modules, you may notice that some declare MD5 as a non-approved algorithm. What this means is that the certified module internally uses MD5, but does not expose the functionality to applications, or use it for communication. For example, a hardware encryption module running embedded linux may use MD5 to hash passwords in /etc/passwd. That s OK because users of the module cannot use MD5.





相关问题
Can two different strings generate the same MD5 hash code?

For each of our binary assets we generate a MD5 hash. This is used to check whether a certain binary asset is already in our application. But is it possible that two different binary assets generate ...

What is hash exactly?

I am learning MD5. I found a term hash in most description of MD5. I googled hash , but I could not find exact term of hash in computer programming. Why are we using hash in computer ...

Help with DOS script (grab specific data from a file)

I need to grab just the md5 value from a file and make it a variable which I can use to compare to another md5 value. The problem is this file looks like this: a7393f772e34ca16a5854e80d9ec6704 md5 ...

Make md5 strong

Im making a website that will intergrate with game that only support md5 hashing metod (atm). Which ofc is not especially safe anymore. But how could i make it stronger? Should I just generate long ...

question on MD5 state variables

I am studying MD5 algorithm. I found out that there are four state variables (I am not sure what that means). Those variables are 0x67452301 , 0xEFCDAB89, 0x98BADCFE, and 0x10325476. I converted ...

Is there a way to test if a string is an MD5 hash?

I am trying to input a text file that contains MD5 hashes and keywords (one per line) into a C# app. Is there a way to check if a string is an MD5 hash? I looked on MSDN and couldn t find anything ...

热门标签