Glen Zorn wrote: I would suggest that the authors submit an updated version of the document, addressing Glen's concerns. Most seem to be straightforward to resolve.
> Section 3.1, first paragraph, last two sentences say: > > The tunnel method MUST support this use case. > However, it MUST NOT expose the username and password to untrusted > parties and it MUST provide protection against man-in-the-middle and > dictionary attacks. The combination of the tunnel authentication and > password authentication MUST enable mutual authentication. > > By whom (or what) are the "untrusted patties" referred to not trusted? For > example, the AAA proxies in a visited network are certainly trusted _by that > network_ (and by inference, the home network) but they may not be trusted > (at least as much) as similar entities in the home network _by the user_. > Some clarification of the trust model seems to be necessary here, especially > given the specification of absolute requirements in the text. I would say entities trusted to know the username and password can have access to them. This is normally the end user, the server validating the username/password, and no one else. > This might also be a good place to mention that certain data related to > authorization may need to be communicated to the peer; it is forbidden to do > this in an EAP Success message, but there is no such constraint (yet) upon > the TLS tunnel. It may be useful to do this in a TLS tunnel. I would suggest that doing this is permissible, and not forbidden. > Section 3.8, first sentence of first paragraph says: > > The tunnel method MUST provide extensibility so that additional types > of data can be carried inside the tunnel in the future. > > This statement seems awfully broad to me. Do we really mean _any_ > "additional types of data" or is it "additional types of security-related > data" or maybe "additional types of data related to network access"? I would suggest authentication and authorization data can be carried in the tunnel. Other types of data SHOULD NOT be carried in the tunnel. > While it is undoubtedly tempting to simply require compliance with RFC 5247, > given the rather incredible amount of drivel and nonsense present in that > RFC, it might be a better idea to be specific about precisely what > requirements need to be satisfied. This seems slightly more contentious to me. If the authors can submit a document *without* addressing this issue, we can focus discussion to obtain WG consensus on how best to resolve this issue. I would prefer not to re-visit RFC 5247. If there are things which are *wrong* in that document, we could update the tunnel requirements document to say "no need to follow section X.Y of 5247". Otherwise, the presumption should be that 5247 applies. > Same section, last paragraph: same comment as the last, but in spades. Just > one example that leaps out: Section 4.1.1, 4th paragraph of the draft in > question says "The tunnel method MUST NOT be tied to any single > cryptographic algorithm." and the last paragraph says "The tunnel method > MUST meet requirements pertinent to EAP method contained in Section 3 of RFC > 4962 [RFC4962]. This includes: cryptographic algorithm independence..." but > the subsection on algorithm independence in Section 3 of RFC 4962 says > "...an EAP method MAY depend on a specific cryptographic algorithm." While > this specific contradiction might be addressed by adding a sentence stating > that conflicts are resolved in favor of this draft other, more subtle > problems might not. This issue requires more WG discussion. I think that clarification is necessary. Given current state of affairs, having a tunneled method that is not tied to a specific cryptographic algorithm seems beneficial to me. The concern with this is that cryptographic negotiation is hard. Alan DeKok. _______________________________________________ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu