Alan DeKok wrote:
Dan Harkins wrote:
  Once this group gets around to selecting a protocol for advancement
is it your view that we just have a coronation followed immediately
by publication or do we actually get to update the selected protocol
to meet our needs?

  Portions of any protocol will likely need to be updated.  The tunnel
requirements draft lists a number of issues that have to be addressed in
any protocol before it is accepted as the agreed-upon method.

  Any *other* changes unrelated to security and/or the tunnel
requirements are out of scope.

Then I must ask a stupid question. Who is the group that decides what should and shouldn't be allowed? While I understand that the changes EAP-FAST makes to existing EAP methods are already published and have many implementations, it seems that allowing future EAP methods to make random changes is something that will ultimately lead to interoperability problems. It is just a bad precedent to allow to continue. I would be happy to raise this issue on a different list if there is one more appropriate. But where this is an EAP related issue this seemed to be the right list.

As for security, I think the majority of the Internet community expects all of the standards setting bodies to put good security high on their list of things to care about. While the comment that EAP-TTLS can be just as dangerous in letting credentials out, there is one major difference from my point of view. No where that I have seen in the EAP-TTLS specifications did I ever see any hint that the supplicant could (or should) operate in a mode where the certificate isn't verified. For EAP-FAST provisioning anonymous provisioning is clearly spelled out as a possible mode of operation. By allowing things to be published like that without anyone calling attention to the related security issues seems like a bad idea. Further it bothers me more when I see a NIST document that indicates that EAP-FAST is the best choice for a secure, but easy to deploy, EAP method.
  It is certainly my understanding that the WG would update the selected
protocol (please correct me if I'm wrong!). Therefore *discussing* the
architectural choices a protocol made is something we certainly should
not discourage as it will guide our choice and, possibly, prepare us for
work ahead.

  Some issues are less important.  e.g. The TLS PRF being dependent on
(client + server), or (server + client) random.  Unless there are
security issues related to a particular choice of order, the use of one
order or another shouldn't be factor in choosing a tunneled EAP method.

  Alan DeKok.

I agree. It was not my intention to claim that all issues were of equal importance. There are obviously cases where decisions were made and released to the wild. My goal by listing all of the issues I did was to attempt to start a conversation and allow the important issues to rise to the top. Ultimately I want to see the use of EAP continue to be successful, but also to be secure. I figured I either had to put the issues (as I see them) out there and try to be part of the solution, or ignore them and just hope it works out. I would prefer to be part of the solution where possible.

However, again, if I am trying to get this discussion going in the wrong forum, please point me to a better one.
_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to