> -----Original Message-----
> From: Katrin Höper [mailto:[EMAIL PROTECTED] 
> Sent: Monday, November 03, 2008 8:05 AM
> To: Joseph Salowey (jsalowey)
> Cc: emu@ietf.org
> Subject: Re: [Emu] Review of Requirements for a Tunnel Based 
> EAP Method
> 
> On Sun, Nov 2, 2008 at 11:00 PM, Joseph Salowey (jsalowey) 
> <[EMAIL PROTECTED]> wrote:
> 
> 
> 
>       > -----Original Message-----
>       > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
>       > Behalf Of Katrin Höper
>       > Sent: Friday, October 31, 2008 8:22 AM
>       > To: emu@ietf.org
>       > Subject: [Emu] Review of Requirements for a Tunnel 
> Based EAP Method
>       >
>       > Hi,
>       >
>       > I have problems with some of the cryptographic binding claims
>       > in the curent document (draft-ietf-emu-eaptunnel-req-00.txt)
>       > and would like to discuss them on the list.
>       > Basically it is about claiming cryptographic bindings for
>       > MitM protection even if the inner method(s) does not 
> derive keys.
>       >
>       > Section 3.1 Password Authentication
>       > "The tunnel method MUST meet this use case. However, it MUST
>       > NOT expose the username and password to untrusted parties and
>       > it MUST provide protection against man-in-the-middle and
>       > dictionary attacks."
>       >
>       > KH: How is the last MUST possible? The considered password
>       > authentication methods typically do not derive keying
>       > material. As result, the cryptographic binding key has only
>       > the tunnel key as input, i.e. no actual binding is provided.
>       > Consequently, MitM attacks are still feasible.
>       > The only way to ensure that MitM attacks are prevented for
>       > inner method that do NOT derive keys is to enforce a policy
>       > that does not allow those EAP methods to be executed outside
>       > a tunnel. However, this is a policy and cannot be ensured by
>       > a tunnel-based EAP method itself.
>       >
>       
>       [Joe] What we want to say is that the tunnel itself 
> MUST provide MitM protection and MUST not weaken any MitM 
> protection provided by an inner method.
>       
> 
>  
> [Katrin]: How can a tunnel in which only the authentication 
> server is authenticated provide MitM protection? 
> 
[Joe] If the client authenticates the server then it has protection from MitM.  
If there is no client authentication then the server does not know if there is 
a MitM. 

  

>       
>       
>       > Section 3.2 Protect Weak EAP Methods
>       > "The tunnel method MUST support protection of weak inner
>       > methods and protect against man-in-the-middle attacks
>       > associated with tunneled authentication."
>       >
>       > KH:Same comment as above. If the EAP methods does not derive
>       > a key -> no binding takes place. If the key exchange is weak
>       > and can be broken by an MitM during the protocol execution,
>       > the attack still succeeds.
>       > Again only enforcing  a security policy can prevent 
> these attacks.
>       >
>       
>       [Joe] Same text as above.  Protection from MitM offered 
> by the tunnel method combined with an inner method MUST NOT 
> be worse than the inner method run outside the tunnel.
>       
> 
>       > I don't know how to address this problem since a candidate
>       > tunnel method cannot enforce policies.
>       > However, the MUST statements cannot be met as stated in the
>       > current draft.
>       >
>       > Any thoughts???
>       >
>       > Regards,
>       > Katrin
>       
>       > _______________________________________________
>       > Emu mailing list
>       > Emu@ietf.org
>       > https://www.ietf.org/mailman/listinfo/emu
>       >
>       
> 
> 
> 
_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to