Hi Steve,

On Sun, August 16, 2009 9:43 am, Stephen Hanna wrote:
> I do not agree that EAP channel bindings are about
> authentication. They have two parts: checking whether
> the NAS is advertising services that it's not
> authorized to advertise and using information from
> the NAS (like which SSID the peer is trying to
> connect to) to supplement the AAA server's decision
> about whether to grant the requested access.
> Both of these are authorization decisions and they
> are made not based on authenticating the NAS (which
> we have had for many years in the form of the secret
> shared between the NAS and the AAA server) but on
> supplementary information about the SSIDs and other
> things being advertised by the NAS and requested by
> the EAP peer.

  The problem with your definition of channel bindings is that it
completely ignores the lying NAS problem. An identity is not a service
that a NAS can be authorized to provide that is checked after
authentication has completed.

  When there are 3 parties involved in this 2 party protocol it is
justified by saying that the EAP server trusts the NAS so there is no
security issue when MSK is disclosed to it. But what NAS identity does
the EAP server trust? The peer and EAP server derive a shared key and
for the key to be disclosed to another entity the peer and EAP server
must have a consistent view of the identity of that entity. If they cannot
arrive at a consistent view of all identities then the protocol deriving
the key fails. That is not an authorization issue, it's an authentication
issue.

> I agree that NEA assessments are a different topic.
> They're not the same as channel bindings. I'd say
> that the data conveyed in EAP for channel bindings
> and for NEA assessments are both authorization data
> in that they are not authentication protocols but
> supplementary data that the AAA server will use in
> deciding whether access should be granted (and maybe
> whether other action should be taken, like getting
> the lying NAS repaired or sending remediation
> instructions to an unhealthy endpoint).

  "Repair" the lying NAS after authentication? Whoa! If authentication
does not fail because a lying NAS was detected then there is a huge
security problem.

  You seem to be conflating authentication and authorization because
a "AAA server" might use information from both steps in deciding whether
access is granted or not. An EAP server asks "who are you?" and then
proceeds to prove the identity it is told using a method of its choice.
If the EAP method derives keys the keys have to be bound to a consistent
view of the identities involved in the communication (including the NAS
identity). If the EAP server is successful in proving that the peer really
is the identity it claimed (and the key is successfully bound to a
consistent view of all identities) there can still be other, supplementary,
things to consider before deciding to grant access or not-- time-of-day,
location, up-to-date anti-virus software, etc. But those other,
supplementary, things are not EAP, which is why you're mentioning a "AAA
server" and not an "EAP server".

  We might want to make them part of EAP since EAP is the only protocol
allowed prior to the access decision being made and it's attractive to
pass arbitrary data encapsulated in EAP. But I think it's wrong to say
that NEA assessments can piggy back in because the door is being held
open for channel bindings.

  Dan.


_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to