Bernard:
 
There might be multiple uses cases for credential provisioning and
enrollment. One case is just like you mentioned to initial bootstrap the
device. Other case might be provisioning additional credentials used for
other applications once the device has been fully provisioned. Third
case will be provisioning something useful for fast reconnect for future
authentications. Only in the first case, there is the potential MITM
attack you mentioned. In some deployment cases, this could be offset by
certain measures, such as using a relative strong password inner
authentication method, pre-provisioned trust anchor, restricted
environment etc. or tradeoff by admin for ease of deployment.   
 
In any case, the section cited is only discussing the use case needed to
be supported. The actual requirement section doesn't actually list any
requirement for credential provisioning. Other than the tunnel method
MUST support extensive attributes and EAP method. This will allow
someone to develop credential provisioning scheme using the EAP method
or attributes. We certainly don't want to develop a new tunnel method
preventing this from happening. Of course, security considerations
especially for MITM attack needs to be added. Are you ok with this
approach?  



________________________________

        From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of Bernard Aboba
        Sent: Thursday, June 26, 2008 4:17 AM
        To: emu@ietf.org
        Subject: [Emu] A comment on credential provisioning
        
        
        Section 3.7 of the tunnel requirements document states the
following: 
        
        
        3.7.  Credential Provisioning and Enrollment
        
           When a peer has authenticated with EAP, this is a convenient
time to
           distribute credentials to that peer that may be used for
later
           authentication exchanges.  For example, the authentication
server can
           provide a private key or shared key to the peer that can be
used by
           the peer to perform rapid re-authentication or roaming.  In
addition
           there have been proposals to perform enrollment within EAP,
such as
           [I-D.mahy-eap-enrollment].
        
           The tunnel method SHOULD support carrying credential
distribution
           protocols.
        Given the extensive EMU WG discussion relating to ZKPP, and the
need to avoid MITM attacks, 
        it seems quite odd to me that the WG would so readily take on
the credential provisioning problem. 
        
        As we move increasingly towards a world in which network access
will be increasingly likely to 
        require authentication, mechanisms for credential provisioning
will become increasingly important. 
        For example, consider the situation where someone has obtained a
spanking new handset/PC/notebook
        and wishes to get connected in an environment where
authentication is required for all access 
        mechanisms:  VPN/WLAN/Ethernet/PPP, etc.  
        
        That said, moving from a state where no credentials, trust
anchors or policy is provisioned to
        one where everything is set up can be quite tricky:
        
        a. No trust anchor may be provisioned, which makes server
certificate authentication difficult. 
        Without server certificate authentication, we need to be very
careful about MITM attacks!
        
        b. If the server may be a rogue, then the dictionary attack
protection provided by the TLS
        tunnel is worth much.  This implies that the credential
provisioning mechanism itself
        needs to be immune to dictionary attack.  Merely binding the
inner authentication to 
        the outer tunnel only demonstrates that there is no MITM attack,
but it doesn't demonstrate
        that the server is authentic.  Unless the client is willing to
consider its password compromised
        if the cryptographic binding fails (a nasty situation) we're
back to the pure password
        discussion initiated by Glen and Dan, or a poor man's
substitute, such a progressive
        disclosure, which was used in the WFA WPS EAP method. 
        
        Given all of this, my advice would be to delete Section 3.7.
Leaving this in is likely to 
        lead to a lot of additional discussion which is largely
tangential to the core of what
        needs to be accomplished.  If and when the WG decides to add the
password-based
        method item to the Charter, we could bring this item back.  But
until then, it seems
        like it would be best ruled out of scope.
        
        

_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to