Sounds fine to me.
> -----Original Message----- > From: Bernard Aboba [mailto:[EMAIL PROTECTED] > Sent: Wednesday, July 09, 2008 5:05 PM > To: Hao Zhou (hzhou); Joseph Salowey (jsalowey); emu@ietf.org > Subject: RE: [Emu] Review of Requirements for an Tunnel Based > EAP Method > > Given this, the requirement could be rephrased to highlight > the items that need to be protected (type code, version > numbers, etc.), while dropping the EAP Header protection > requirement. > > -----Original Message----- > From: Hao Zhou (hzhou) [mailto:[EMAIL PROTECTED] > Sent: Wednesday, July 09, 2008 7:24 AM > To: Joseph Salowey (jsalowey); Bernard Aboba; emu@ietf.org > Subject: RE: [Emu] Review of Requirements for an Tunnel Based > EAP Method > > The intent of this requirement is to protect any data sent > outside the TLS data. This would include the EAP header and > any method specific fields such as version number field. We > know we cannot protect these data before a TLS session is > established, most likely we are talking about validation afterwards. > > The EAP header protection, as discussed below, might not > bring much value. I am ok with removing it. > > Another related problem is protection or validation of > version negotiation, which is usually happened outside the > TLS protection. To prevent downgrade attack, we should add > some requirement to make sure there is some validation of the > advertised version number or any method specific data sent > outside TLS of both sides. > > > -----Original Message----- > > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On > Behalf Of > > Joseph Salowey (jsalowey) > > Sent: Monday, July 07, 2008 2:48 PM > > To: Bernard Aboba; emu@ietf.org > > Subject: Re: [Emu] Review of Requirements for an Tunnel Based EAP > > Method > > > > I think this issues has been raised in the past, does anyone on the > > list have any specific scenarios where EAP header protections are > > important? > > If not the requirement can be downgraded or removed entirely. > > > > With respect to making one method look like another, some > systems such > > as 802.1X-2004, do not make use of the MSK/EMSK. > > Does this introduce a problem? I can't really think an > exploitable > > attack outside of denial of service at this point. In > addition, more > > and more systems are moving towards some type of cryptographic > > verification in the lower layer so this might not being an ongoing > > problem. > > > > Joe > > > > > -----Original Message----- > > > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On > > Behalf Of > > > Bernard Aboba > > > Sent: Wednesday, June 25, 2008 11:47 PM > > > To: emu@ietf.org > > > Subject: [Emu] Review of Requirements for an Tunnel Based > EAP Method > > > > > > Overall, this document is in very good shape. Kudos to the > > authors. > > > > > > A comment on EAP header protection (Section 4.2.3) and Type code > > > modification (Section 6.3): > > > > > > 4.2.3. EAP Header Protection > > > > > > > > > A tunnel method SHOULD provide protection of the outer > EAP header > > > information when possible to make sure the outer EAP > > header is not > > > modified by the intermediaries. > > > > > > 6.3. Outer EAP Method Header > > > > > > There are several existing EAP methods which use a > similar packet > > > format to EAP-TLS. Often for the initial portions of > > the exchange > > > the execution of the method is identical except for the > > method ID. > > > Protection of the outer EAP header helps to avoid > vulnerabilities > > > that may arise when an attacker attempts to modify > > packets to make > > > one EAP message look like one from a different method. > > > > > > [BA] The EAP header defined in RFC 3748 looks like this: > > > > > > 0 1 2 3 > > > 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 > 7 8 9 0 1 > > > > +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ > > > | Code | Identifier | Length > | > > > > +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ > > > | Type ... > > > +-+-+-+-+ > > > > > > Section 6.3 refers to modification of the Type field which can > > > potentially enable an attacker to make one TLS-based EAP > > method look > > > like another one. It's worth noting that such an attack can be > > > addressed without necessarily requiring EAP header protection, as > > > described in Section 4.2.3. > > > > > > For example, a Type field modification attack will only > > enable an EAP > > > peer to subsequently connect to an authenticator if the peer and > > > server were able to derive the same MSK/EMSK. > > > > > > To prevent such an attack, it is highly desirable for > TLS-based EAP > > > methods to utilize key derivation formulas unique to the > > method. As > > > an example, EAP-TLS and EAP-TTLSv0 utilize different key > derivation > > > formulas: > > > > > > EAP-TLS: > > > Key_Material = TLS-PRF-128(master_secret, "client EAP > > encryption", > > > client.random || server.random) > > > EAP-TTLSv0: > > > Keying Material = TLS-PRF-128(master_secret, > > > "ttls keying material", client_random || > > > server_random) > > > > > > Assuming that this approach is taken, the Type > modification threat > > > described in Section 6.3 can be addressed without EAP header > > > protection. > > > > > > Given this, it seems to me that EAP header protection is > > really about > > > protection of the Code, Identifier > > > and Length fields of the EAP header. However, the behavior > > > of these fields is fairly rigidly specified in RFC 3748, > so that a > > > well written implementation should only be vulnerable to > > DoS attack, > > > which would be the case even if EAP header protection were > > > implemented. > > > > > > For example, an attacker modifying the Code field might > be able to > > > cause an EAP peer or server to drop the packet. > > > However, the same thing would happen if EAP header > protection were > > > implemented, and the packet failed the MIC check. > > > > > > > > > Via modification of the Identifier field, it might be possible to > > > cause the peer or server to abort the EAP session in progress. > > > However, in TLS-based methods, failure of TLS integrity check is > > > also a terminal error, so that I'm not sure if anything is gained > > > here either. > > > > > > > > > Modification of the Length field might have as its objective the > > > inducement of a buffer overflow on either the peer or the > server, so > > > it's aims are somewhat more nefarious than attacks on the Code or > > > Identifier fields. However, implementation of EAP header > protection > > > would not be likely to address such an implementation bug > since the > > > MIC could not be computed until the EAP packet was fully > received, > > > by which time the buffer overflow would have already occurred. > > > > > > > > > In summary, I am not clear that EAP header protection as > described > > > in Section 4.2.3 really brings much value beyond > addressing the EAP > > > Type Code attack described in Section 6.3. > > > I would therefore recommend that this section be deleted, or at > > > least justified in more depth. > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > _______________________________________________ > > Emu mailing list > > Emu@ietf.org > > https://www.ietf.org/mailman/listinfo/emu > > > > _______________________________________________ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu