Bernard: Section 4.4 lists the requirement for channel binding as "The tunnel method MUST be capable of supporting EAP channel bindings described above.". I think this is the intent of the requirement. Section 4.1.1 language of "MUST support" might be too strong. Are you ok with changing Section 4.1.1 to be consistent with Section 4.4? I think this will allow WG to work on channel binding separately and if deemed important, not requiring us to modify the tunnel method.
________________________________ From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Bernard Aboba Sent: Thursday, June 26, 2008 3:50 AM To: emu@ietf.org Subject: [Emu] Requirements for Channel Binding in the Tunnel Method Requirements document Section 4.1.1 of the Tunnel Method Requirements document includes the following statement: In addition, the tunnel method MUST support EAP channel bindings to enable a system based on EAP to meet the additional requirements in Section 3 of RFC 4962. While I have no problem with including support for channel bindings within the EMU tunnel method, I do not believe that any requirement for EAP Channel Bindings can be inferred from Section 3 of RFC 4962. Here is what Section 3 says: The context will include the peer and NAS identities in more than one form. One (or more) name form is needed to identify these parties in the authentication exchange and the AAA protocol. Another name form may be needed to identify these parties within the lower layer that will employ the session key. Notice that neither this paragraph nor the ones surrounding it mention exported EAP keying material specifically. This omission was intentional -- the intent was to enable the requirement to be met by subsequent cryptographic binding operations operating within lower layers. As an example, IEEE 802.11r's PMK-R0 and PMK-R1 cryptographically bind the PMK/MSK to channel properties, satisfying this requirement. Part of the reason that EAP channel bindings were not mandatory to implement is that they were (and remain) undeployed, so that their practicality remains unproven. For this reason, despite considerable IESG pressure, RFC 4017 included EAP channel bindings only as an optional feature within Section 2.4, rather than promoting it to required or even recommended to implement. Between the publication of RFC 4017 and 4962, many aspects of EAP, including new methods, RFC 3748 implementations, etc. moved ahead, but progress in the channel binding area remained slow, so that the case for requiring EAP channel binding did not grow stronger. As proof that EAP channel binding is NOT required by RFC 4962 Section 3, RFC 5247 which was chartered to demonstrate how RFC 4962 requirements can met by EAP/Secure Association/AAA systems does not mention EAP channel bindings at all in Section 5.4, which discussed how the RFC 4962 key binding requirements from Section 3 can be met. Rather, RFC 5247 Section 2.3 which discussed authenticator identification, mentions both EAP channel binding and lower layer bindings in points (f) through (k), albeit without normative language. Given the extensive discussion of RFC 4017 and 4962 on the IETF mailing list and various other mailing lists, including the EAP WG list, it is therefore somewhat disappointing to see something which could only garner IETF consensus as an optional capability promoted to mandatory, purely due to IESG re-interpretation of a BCP after publication. Given that the EMU WG has as a work item for development of an Internet Draft on EAP channel binding, my advice is for the WG, through its analysis of the problem and the potential solutions, to develop its own consensus as to the value and practicality of channel bindings, rather than allowing an opinion to be imposed upon it from the IESG. As a first step toward that, a concise statement of the problem is very important. Section 4.4 of the Tunnel Method Requirements document includes the following statement of the Channel Binding problem: The so-called "lying NAS" problem is a well-documented problem with the current Extensible Authentication Protocol (EAP) architecture [RFC3748] when used with pass-through authenticators. Here, a Network Access Server (NAS), or pass-through authenticator, may authenticate to the backend AAA infrastructure using one set of credentials, while representing contrary information to EAP peers. The issue is not just whether the information presented to the peer and server are contradictory, but also whether the information is correct. To make this clear, RFC 5247 Section 5.3.3 included additional text beyond what was present in RFC 3748 Section 7.15: While the verification [of channel bindings] can be done either by the peer or the server, typically only the server has the knowledge to determine the correctness of the values, as opposed to merely verifying their equality. The use of the term "credentials" in the short problem description is somewhat odd, since in AAA protocols, the credentials used for mutual authentication between the AAA client and server do not relate to channel binding parameters such as the NAS-Identifier. For example, a AAA client can use a certificate containing a subjectAltName field of "aaaclient.example.com" to authenticate to the AAA server, whereas the enclosed NAS-Identifier attribute could contain a the R0KH-ID from IEEE 802.11r. Such an Access-Request would be completely valid, and RFC 5247 Section 2.5 notes some of the issues that can arise: It is possible for problems to arise in situations where the EAP server identifies itself differently to the EAP peer and authenticator. For example, it is possible that the Server-Id exported by EAP methods will not be identical to the Fully Qualified Domain Name (FQDN) of the backend authentication server. Where certificate-based authentication is used within RADIUS or Diameter, it is possible that the subjectAltName used in the backend authentication server certificate will not be identical to the Server-Id or backend authentication server FQDN. This is not normally an issue in EAP, as the authenticator will be unaware of the identities used between the EAP peer and server. However, this can be an issue for key caching, if the authenticator is expected to locate a backend authentication server corresponding to a Server-Id provided by an EAP peer. Where the backend authentication server FQDN differs from the subjectAltName in the backend authentication server certificate, it is possible that the AAA client will not be able to determine whether it is talking to the correct backend authentication server. Where the Server-Id and backend server FQDN differ, it is possible that the combination of the key scope (Peer-Id(s), Server- Id(s)) and EAP conversation identifier (Session-Id) will not be sufficient to determine where the key resides. For example, the authenticator can identify backend servers by their IP address (as occurs in RADIUS), or using a Fully Qualified Domain Name (as in Diameter). If the Server-Id does not correspond to the IP address or FQDN of a known backend authentication server, then it may not be possible to locate which backend authentication server possesses the key.
_______________________________________________ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu