> -----Original Message-----
> From: Bernard Aboba [mailto:[EMAIL PROTECTED] 
> Sent: Monday, September 17, 2007 10:20 AM
> To: Joseph Salowey (jsalowey); emu@ietf.org
> Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED]
> Subject: RE: Draft liaison response for IEEE 802.11u EAP 
> method for emergency calls
> 
> It is not clear to me whether the requirements do in fact 
> prohibit server-side authentication.  As you note, without 
> server-side authentication man-in-the-middle attacks are 
> possible;  however, even with server-side authentication, 
> additional requirements may need to be imposed in order to 
> provide the desired level of security.
> 
> Requirement #1 is "No Pre-configured trust relationship".  
> This could refer to pre-configuration of the server with 
> respect to the expected client credential (PSK or 
> certificate), or it could refer to pre-configuration of the 
> client with respect to the server, (such trust anchors).  The 
> text seems focused on the former more than the latter.  
> Assuming that clients can be pre-configured with trust 
> anchors, then TLS-based EAP methods could meet the requirement.

[Joe] I agree, that if "No pre-configured trust relationship" refers to
configuration of client on the server then we are in a better position.
However it seems that in you discussion below that the peer does not
typically have enough information to validate the server. 
> 
> Requirement #2 is "Small" number of messages.  While this 
> requirement clearly excludes long exchanges, it is not clear 
> to me that TLS-based methods are excluded, particularly if 
> the method is to be implemented on the AP itself, which 
> potentially would result in lower round-trip times and 
> eliminate the possibility of AAA-based frame loss.
> 
[Joe] the requirement is a bit unclear, however I agree that it is worth
including text about this. 

> It may be possible that requirements #1 and #2 are compatible 
> with proposals involving unauthenticated client access 
> combined with server authentication. 
>    However, due to lack of a pre-configured network access 
> profile, this scenario presents additional threats that are 
> worthy of further discussion.
> 
> The presentation refers to the desire to for confidentiality 
> (presumably at L2, rather than using SRTP).  Where 
> confidentiality is desirable, it will also presumably be 
> important for the client to determine that it has connected 
> to a legitimate network.
> 
> Where a pre-configured network access profile exists, the 
> binding between a validated server certificate and an 
> advertised SSID is pre-configured.  
> However, where there is no pre-configured network access 
> profile, the binding may be difficult to establish without 
> imposition of additional requirements.
> 
> For example, the server certificate/SSID binding cannot be 
> determined solely via verification of the server certificate. 
>  An attacker could obtain a valid server certificate for 
> "example.com"; does this entitle them to advertise an SSID of 
> "Emergency Network" or even "Example"?  Since SSIDs are not 
> globally unique, there is no verifiable mapping between a 
> Server-Id and an allowed set of SSIDs. In general, a CA has 
> no way of determining whether a server has the rights to a 
> particular SSID or not, so that a CA cannot in practice vouch 
> for an RFC 4334 SSID extension within a server certificate.
> 
[Joe] If this is the case then I don't think there is a valid trust
relationship for the peer to validate the server. 


> Therefore verification of a binding between the server 
> identity and the advertised network would only seem to be 
> possible by requiring the advertised network name to match 
> the Server-Id advertised in the server certificate.  This in 
> turn would require restricting the allowable SSIDs, or adding 
> another field to the IEEE 802.11 Beacon/Probe Response.
> 
[Joe] It seems like there are at least two possibilities here:

1. Have a CA that only issues emergency services certificates and an
indication in the beacon/probe of which SSIDs are emergency services.

2. Have a CA that issues different types of certificates and have
specific SSIDs and names in the certificates to create the authorization
linkage.  

> 
> 
> 
> 
> 
> 
> >From: "Joseph Salowey (jsalowey)" <[EMAIL PROTECTED]>
> >To: <emu@ietf.org>
> >CC: <[EMAIL PROTECTED]>, "Bernard Aboba" 
> ><[EMAIL PROTECTED]>
> >Subject: Draft liaison response for IEEE 802.11u EAP method for 
> >emergency calls
> >Date: Sun, 16 Sep 2007 22:26:36 -0700
> >
> >The EMU working group has a liaison request from IEEE 802.11u on EAP 
> >methods for emergency calls.  The liaison request can be 
> found on the 
> >liaison statement page, https://datatracker.ietf.org/liaison/ (May 
> >2007).  We had a presentations and discussion of this topic at the 
> >Chicago EMU meeting.  Below is a draft response based on the 
> discussion 
> >in the meeting.  It would be good to have comments on or approval of 
> >the text by Monday, October 1, so a revised response can be 
> created to 
> >be sent as a response to the IEEE.
> >
> >==============================================================
> >
> >802.11u Liaison response for EAP Methods for Emergency Communications
> >
> >We have had discussion of EAP method for Emergency services 
> at the last 
> >IETF meeting in Chicago.  The following is a summary of 
> working group 
> >discussion on this topic.
> >
> >Currently there are no standards track EAP methods that meet the 
> >requirements as understood by the EMU working group.  There 
> are several 
> >possible candidates of existing EAP methods that may meet or be 
> >slightly modified to meet some of the 802.11u requirements for 
> >emergency services, especially if minimal latency is not the 
> strongest 
> >requirement.  TTLS (draft-funk-eap-ttls-v0-01.txt) and EAP-FAST
> >(RFC4851) are TLS based methods that can support server only 
> >authentication.  It was also pointed out that EAP-TLS
> >(draft-simon-emu-rfc2716bis-11.txt) could be modified to 
> create a new 
> >EAP method that only requires server side authentication.  
> In order to 
> >truly support emergency services these methods would need to forego 
> >server certificate validation which negates much of the security they
> >provide by allowing man-in-the-middle attacks.   These TLS 
> based methods
> >also require a significant number of round trips that may not be 
> >acceptable for emergency communication.
> >
> >There were also several questions raised in the working group during 
> >the discussion that might help in further determining the 
> best approach.
> >These are summarized below:
> >
> >1) It is not clear how to make the tradeoff between security and 
> >low-latency.  If there is not existing trust relationship there are 
> >limits as to what security properties can be provided.  What 
> security 
> >properties are desirable and what is the tolerance for extra-round 
> >trips for the communication?
> >
> >2) PSK was described as having worse DOS resistance 
> properties that EAP.
> >It seems that in many cases EAP would have worse DOS resistance that 
> >PSK, which cases is EAP better?
> >
> >3) It seems that most public access networks already provide an open 
> >access network, why couldn't this network be used for emergency 
> >communication?
> >
> >4) What regulatory requirements are driving the need for encryption?
> >This creates some conflicts because encryption without 
> authentication 
> >does not satisfy most useful security requirements.
> >
> >As the 802.11u group is certainly aware, there are other 
> groups within 
> >the IETF that are looking at unauthenticated emergency services.  In 
> >particular, the ECRIT group within the IETF has ongoing work in this
> >area:
> >
> >http://tools.ietf.org/html/draft-schulzrinne-ecrit-unauthenti
> cated-acce
> >s
> >s-00
> >
> >We encourage IEEE working group members to continue the 
> discussion with 
> >the IETF in the EMU and the ECRIT working groups.
> 


_______________________________________________
Emu mailing list
Emu@ietf.org
https://www1.ietf.org/mailman/listinfo/emu

Reply via email to