On Wed, 19 Jul 2023 at 11:45, Dan Garcia Carrillo <garcia...@uniovi.es>
wrote:

On 5/7/23 15:36, Alan DeKok wrote:
>


> >    Given that the EAP packets can be forced to be no more than 1024
> octets, the only difference between EAP methods is the number of packets
> exchanged, and the total amount of data exchanged.  Current EAP supplicants
> and authenticators limit the total number of exchanges to 50 or 100,
> depending on various factors.
> >
> >    Is there a similar limit for CoAP?  i.e. will CoAP go fail if there
> is 64K of data being exchanged in EAP?
>
>
> We tried not to go there in the document, just to acknowledge that CoAP
> fits the requirements for an EAP lower layer. In any case, EAP messages
> larger than 1024 could be sent using CoAP Block-wise transfer, that will
> seamlessly take care of sending payloads larger than CoAP Minimum MTU.
>

A couple of additional notes about EAP authentication exchange and its data
use.

First, if look at EAP-TTLS and PEAP but not EAP-TLS, it may seem that the
authentication exchange is very asymmetric in how it uses data. The EAP
server sends a long certificate chain and the client sends very little with
many of client responses being just simple ACKs that tell the server to
continue.

EAP-TLS, especially with TLSv1.2 and earlier, uses plenty of data for both
directions. EAP servers know how to fragment the data but clients sometimes
may attempt to send messages that get fragmented by the lower layer and may
get lost in transit (firewalls etc. being a problem). The problem with
clients is typically that there may not be a setting or a method that tells
the client to use a certain EAP message size. In other words, EAP-TLS, for
example, supports fragmentation, but the clients especially may now know
how small the fragment needs to be when they send out their client
certificate and its associated CA certificate chain.

Some EAP methods, such as PEAP and EAP-TTLS allow running EAP-TLS as the
inner authentication method, which means you have TLS within TLS and client
fragmentation becomes even more complex. Servers typically know how to
handle this too. This is not the most common thing to do, but with TLSv1.2
is the method to hide client certificate information when using EAP-TLS.

To summarise: with EAP-TLS there is typically large amount of data
transferred in both directions.

With TLSv1.3 it's possible to omit the CA certificates:
https://datatracker.ietf.org/doc/html/rfc8446#section-4.4.2

    ... a certificate that specifies a trust anchor MAY be
   omitted from the chain ...

This can be a large size saver, but please see the whole paragraph too. The
CA certificates (trust anchors) would need to be know be the other TLS
endpoint if this is done. This is yet another good reason to use TLSv1.3
even though TLSv1.2 and earlier still remain in wide use with TLS based EAP
methods.

-- 
Heikki Vatiainen
h...@radiatorsoftware.com
_______________________________________________
Ace mailing list
Ace@ietf.org
https://www.ietf.org/mailman/listinfo/ace

Reply via email to