Abstract
------------

"The tunnel will provide support for password authentication, EAP authentication and the transport of additional data for other purposes." This wording excludes means of authentication that are neither based on passwords nor EAP (while it should be invariant to the tunnel what's transported inside). Suggest to re-word to ... provide support for authentication (both EAP and non-EAP) and the transport of additional data for other purposes.

1. Introduction
----------------

The second sentence misses a reference behind PEAP.

2. Conventions
---------------------

Looking at RFC2119, it seems that that RFC is well applicable also to non-standards-track RFCs. ("Key words for use in RFCs to Indicate Requirement Levels", "This document defines these words as they should be interpreted in IETF documents.") Is it really necessary to create an own wording definition here?

3.1 Password Auth
--------------------------

"support for minimal management tasks including password change". I fail to see why a management mechanism to *change* the password is needed *during* the authentication... ?

3.4 Id Protection
----------------------

The intent of this section is unclear to me.

"... If an inner method also provides identity protection, this protection
  MUST extend all the way to the server that terminates that inner
  method. "

... "this" refers to which method, the inner or the outer? If

outer) it appears impossible to me that the outer tunnel can possibly ensure 
that the id protection extends beyond its termination point, up to the endpoint 
of the inner
inner) this would put a requirement on the inner method, which appears odd in 
document that should describe requirements for the outer method.

3.8 Resource constrained Environments
-------------------------------------

The document has the implicit requirement to use TLS for the tunnel method, which is computationally 
intensive in itself. A device which is able to establish a TLS tunnel apparently has a decent amount of 
computational resources. Plus, the definition of resource contrained device is quite fuzzy: 
"little" processing power, "small" memory, "small" amount of storage. This 
section doesn't add a lot of value to the document IMHO. I suggest to delete it altogether.


4.1.1 RFC compliance
-------------------------------

This section can be largely condensed. It references RFC4017 as a mandatory reference and requires unconditional compliance to that RFC, but repeats parts of the content of that RFC in a different wording, which appears redundant. [SW] annotated full text of section below:

The tunnel method MUST include a Security Claims section with all
  security claims specified in Section 7.2 in RFC 3748 [RFC3748].  In
  addition, it MUST meet the requirement in Sections 2.1 and 7.4 of RFC
  3748 that tunnel methods MUST support protection against man-in-the-
  middle attacks.  Furthermore, all tunnel methods MUST support
  identity protection as specified in Section 7.3 in RFC 3748.

[SW] Sentence 2 (MITM protection) is already contained in item [6] in RFC4017. 
Suggest to to delete sentence.
[SW] Sentence 3 (id prot) is already contained in item [9] in RFC4017. Suggest 
to to delete sentence.


  The tunnel method MUST be unconditionally compliant with RFC 4017
  [RFC4017] (using the definition of "unconditionally compliant"
  contained in section 1.1 of RFC 4017).  This means that the method
  MUST satisfy all the MUST, MUST NOT, SHOULD, and SHOULD NOT
  requirements in RFC 4017.

  The tunnel method MUST meet all the EAP method requirements contained
  in the EAP Key Management Framework draft [I-D.ietf-eap-keying] or
  its successor.  The tunnel method MUST include MSK and EMSK
  generation.  This will enable the tunnel method to properly fit into
  the EAP key management framework, maintaining all of the security
  properties and guarantees of that framework.

[SW] MSK and EMSK generation are already contained in item [2] in RFC4017. 
Suggest to delete the last two sentences.

  The tunnel method MUST NOT be tied to any single cryptographic
  algorithm.  Instead, it MUST support run-time negotiation to select
  among an extensible set of cryptographic algorithms.  This
  "cryptographic algorithm agility" provides several advantages.  Most
  important, when a weakness in an algorithm is discovered or increased
  processing power overtakes an algorithm, users can easily transition
  to a new algorithm.  Also, users can choose the algorithm that best
  meets their needs.

[SW] Algorithm independence is already contained in item [7] of RFC4017. The 
wording isn't so clear to me, but at least the Security Considerations section 
in RFC4017 claims that it is the case. Suggest to delete the para.

  The tunnel method MUST meet requirements pertinent to EAP method
  contained in Section 3 of RFC 4962 [RFC4962].  This includes:
  cryptographic algorithm independence; strong, fresh session keys;
  replay detection; keying material confidentiality and integrity;
  confirm cipher suite selection; and uniquely named keys.  In
  addition, the tunnel method MUST support EAP channel bindings to
  enable a system based on EAP to meet the additional requirements in
  Section 3 of RFC 4962.

[SW] The reference to 4962 seems strange: that RFC does not specify requirements on EAP 
types, but on AAA Key Management Protocols. There is only few mentioning of EAP types in 
the documents. All the requirements listed in this para are mentioned in RFC4962 as 
desired properties of /AAA Key Management Protocols/. Worse, RFC4962 states 
"However, an EAP method MAY depend on a specific cryptographic algorithm.", 
which is confusing to the requirements in this draft which state otherwise. Suggest to 
delete para.


4.2.1.4 Peer Id Privacy
--------------------------------

This is already a MUST support due to the requirement of unconditional compliance with RFC4017. So I wonder if this needs to be re-iterated here.

4.2.1.5 Session Resumption
---------------------------------------

Session Resumption is a "MUST support". It is certainly a desirable property to lower needed re-auth round-trips, but I don't see why it is crucial. I wonder if a SHOULD would do.

Greetings,

Stefan Winter

--
Stefan WINTER
Ingenieur de Recherche
Fondation RESTENA - Réseau Téléinformatique de l'Education Nationale et de la 
Recherche
6, rue Richard Coudenhove-Kalergi
L-1359 Luxembourg

Tel: +352 424409 1
Fax: +352 422473

_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to