Here is the list of revisions planned for the next revision of the
tunnel method requirements document.

+ 4.5.1.2 authentication of server

Issue: I don't think it is as important to protect the username as the
password.
Resolution: Update 4.5.1.2 as
"The EAP server MUST be authenticated before the peer can send the clear
text password to the server.


+ Peer Identity Privacy

Issue: Just username is too limited, all credentials need to be
protected, and arguably all attributes of a user.

Suggested Resolution: In section 4.2.1.4, clarify that the information
goes beyond user name to all other attributes as well.  

" A tunnel protocol MUST support peer privacy.  This requires that the
   username and other attributes associated with the peer are not 
   transmitted in the clear and, if applicable, the peer certificate 
   is sent confidentially (i.e. encrypted)." 

+ 4.4 EAP Channel Binding Requirements

Issue:  (multiple issues) This section incompletely or incorrectly
describes Channel Binding 

Suggested resolution:  have this section reference the channel binding
work so we don't have to do things twice. Replace section 4.4 with:

"The tunnel method MUST be capable of meeting EAP channel binding
requirements described in [I-D.clancy-emu-chbind]."

+ Requirements Associated with Carrying Username and Passwords

Issue: OTP is not a password database.  Other places where password
verifier should be included as well.  

Suggested Resolution:  Modify 4.5 to read:

"  This section describes the requirements associated with tunneled
   password authentication.  The password authentication mentioned here
   refers to user or machine authentication using a legacy password
   database and verifiers, such as LDAP, OTP, etc.  These 
   typically require the password in its original text form in order to
   authenticate the peer, hence they require the peer to send the clear
   text user name and password to the EAP server."

Modify other sections similarly (1, 4.5.1, 4.5.4) 

+ EAP Header Protection

Issue: Mostly EAP header protection is not really necessary.  The
requirement should focus on what is necessary to protect.

Suggested Resolution: Revise 4.2.3 to read:

"4.2.3. Protection of Data External to Tunnel


   A tunnel method MUST provide protection of any data external to
   the TLS tunnel that can cause a problem if it is modified by an
   attacker.  This may include data such as type codes and version
   numbers."
   
Revise section 6.3 to:

"6.3. Data External to Tunnel


  The tunnel method will use data that is outside the TLS tunnel 
  such as the EAP type code or version numbers.  If an attacker 
  can compromise the protocol by modifying these values the tunnel
  method MUST protect this data. "

+ Other types of authentication mechanisms

Issue: This wording excludes means of authentication that are neither
based on passwords nor EAP
Suggested resolution: Discuss, while it is true we can carry anything in
the tunnel I think we want to limit the scope of what we initially try
to accomplish. 

+ 3.4 Id Protection
Issue: The intent of this section is unclear to me.
Suggested Resolution: Remove sentence "If an inner method also provides
identity protection, this protection
   MUST extend all the way to the server that terminates that inner
   method."

+ 3.1. Password Authentication

Issue: Outer method should not be concerned about password management.
Suggested Resolution: Change second paragraph to read:
   
"Since EAP authentication occurs before network access is granted the
   tunnel method SHOULD enable and inner exchange to provide support 
   for minimal password management
   tasks including password change, "new PIN mode", and "next token
   mode" required by some systems." 

+ 6.1. Cipher suite Selection

Issue: section does not tie into the document
Suggested resolution:  Add sentence to last paragraph that says:

"This document requires server authentication to mitigate the risks
associated with anonymous cipher suites." 

+ 3.7. Credential Provisioning and Enrollment

Issue: this should be more of a use case to drive extensibility
requirement
Suggested Resolution: Move text in 3.7 into section 3.10:

"3.10. Extensibility


   The tunnel method MUST provide extensibility so that additional types
   of data can be carried inside the tunnel in the future.  This removes
   the need to develop new tunneling methods for specific purposes.

   One example of a application for extensibility is credential
provisioning
   When a peer has authenticated with EAP, this is a convenient time to
   distribute credentials to that peer that may be used for later
   authentication exchanges.  For example, the authentication server can
   provide a private key or shared key to the peer that can be used by
   the peer to perform rapid re-authentication or roaming.  In addition
   there have been proposals to perform enrollment within EAP, such as
   [I-D.mahy-eap-enrollment]."

+ 4.1.1 4962 and channel bindings

Issue: 4962 does not necessarily require channel bindings
Suggested resolution: Remove last sentence in section

+ Add requirement to carry inner EAP method without modification

Issue: in the past some tunnel methods have modified the inner method
Suggested Resolution: add text to section 4.6

"The tunnel method MUST be able to carry inner EAP methods without
modifying them." 

+ Additional Editorial Changes

> -----Original Message-----
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On 
> Behalf Of Alan DeKok
> Sent: Sunday, October 19, 2008 11:52 AM
> To: emu@ietf.org
> Subject: Re: [Emu] Tunnel Method (Current WG Work item status)
> 
>   IETF 73 is approaching soon, and we need to ensure that 
> make progress on the current WG activities.  To that end, I 
> am repeating previous posts about WG status items.
> 
>   The document has been accepted as a WG item:
> 
> http://www.ietf.org/internet-drafts/draft-ietf-emu-eaptunnel-r
> eq-00.txt
> 
>  and reviewed:
> 
> http://www.ietf.org/mail-archive/web/emu/current/msg00860.html
> 
> http://www.ietf.org/mail-archive/web/emu/current/msg00911.html
> 
>   I encourage WG members to review the document prior to the 
> next meeting.  We need to ensure that the document is ready 
> for last call, prior to moving ahead with other WG activies.
> 
> Alan DeKok wrote:
> >   While the charter updates are being formally approved, we 
> can start 
> > discussions about the new work items.  Please respond with 
> comments, 
> > queries, or feedback on the items listed below.
> > 
> > Work item:
> > 
> > - A mechanism to support extensible communication within a TLS 
> > protected tunnel. This mechanism must support channel bindings in 
> > order to meet RFC 4962 requirements. This mechanism will support 
> > meeting the requirements of an enhanced TLS mechanism, a password 
> > based authentication mechanism, and additional inner authentication 
> > mechanisms.
> > 
> > Status:
> > 
> >   A tunnel method draft has been submitted:
> > 
> > http://tools.ietf.org/id/draft-salowey-emu-eaptunnel-req-01.txt
> > 
> >   A separate call for consensus will be issued for this document.
> > _______________________________________________
> > Emu mailing list
> > Emu@ietf.org
> > https://www.ietf.org/mailman/listinfo/emu
> > 
> > 
> 
> _______________________________________________
> Emu mailing list
> Emu@ietf.org
> https://www.ietf.org/mailman/listinfo/emu
> 
_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to