Dan Harkins wrote:
> On Sun, August 16, 2009 9:43 am, Stephen Hanna wrote:
> > I do not agree that EAP channel bindings are about
> > authentication. They have two parts: checking whether
> > the NAS is advertising services that it's not
> > authorized to advertise and using information from
> > the NAS (like which SSID the peer is trying to
> > connect to) to supplement the AAA server's decision
> > about whether to grant the requested access.
> > Both of these are authorization decisions and they
> > are made not based on authenticating the NAS (which
> > we have had for many years in the form of the secret
> > shared between the NAS and the AAA server) but on
> > supplementary information about the SSIDs and other
> > things being advertised by the NAS and requested by
> > the EAP peer.
> 
>   The problem with your definition of channel bindings is that it
> completely ignores the lying NAS problem. An identity is not a service
> that a NAS can be authorized to provide that is checked after
> authentication has completed.

After carefully reviewing again the list of attributes
verified by draft-ietf-emu-chbind-03.txt, I would agree
that several of them are related to the NAS identity:
NAS-IP-Address, Called-Station-Id (the MAC part), and
NAS-Identifier. Some are related to the identity of
the network to which the NAS claims to provide access
or to the mobility domain of which it is a part:
Called-Station-Id (the SSID part) and Mobility-Domain-Id.
For those, I agree that we can call them authentication
since the main purpose of channel bindings is to verify
that the identity claimed by the NAS to the EAP peer is
acceptable (although SSID and Mobility-Domain-Id are
not really NAS identity but network identity).

If/when the AAA server uses the SSID to decide whether
a user is authorized to connect to that SSID, there's
definitely authorization taking place but one can argue
that the primary reason to convey this attribute in
channel bindings is to verify the network identity
claimed by the NAS to the EAP peer. So let's overlook
this authorization aspect.

However, I wonder if you really want to claim that
the Cost-Information AVP is part of the NAS identity.
That seems to be clearly not. Do you want to claim
that this is part of the network identity? That seems
to be a stretch. Really, I think that this is an
attribute of the network (or one could say an
advertisement) that is being verified.

> > I agree that NEA assessments are a different topic.
> > They're not the same as channel bindings. I'd say
> > that the data conveyed in EAP for channel bindings
> > and for NEA assessments are both authorization data
> > in that they are not authentication protocols but
> > supplementary data that the AAA server will use in
> > deciding whether access should be granted (and maybe
> > whether other action should be taken, like getting
> > the lying NAS repaired or sending remediation
> > instructions to an unhealthy endpoint).
> 
>   "Repair" the lying NAS after authentication? Whoa! If authentication
> does not fail because a lying NAS was detected then there is a huge
> security problem.

I agree that authentication should not succeed if a
lying NAS is detected. I didn't say otherwise. I said
that you might want to repair a lying NAS. Of course,
"repair" would mainly apply if it's your equipment.
If it's a rogue NAS, you might want to find it and
smash it with a sledgehammer. ;-)

> You seem to be conflating authentication and authorization
> because a "AAA server" might use information from both steps
> in deciding whether access is granted or not. An EAP server
> asks "who are you?" and then proceeds to prove the identity
> it is told using a method of its choice. If the EAP method
> derives keys the keys have to be bound to a consistent
> view of the identities involved in the communication 
> (including the NAS identity). If the EAP server is successful
> in proving that the peer really is the identity it claimed
> (and the key is successfully bound to a consistent view of
> all identities) there can still be other, supplementary,
> things to consider before deciding to grant access or not-- 
> time-of-day, location, up-to-date anti-virus software, etc.
> But those other, supplementary, things are not EAP, which
> is why you're mentioning a "AAA server" and not an "EAP server".
> 
> We might want to make them part of EAP since EAP is the only
> protocol allowed prior to the access decision being made and
> it's attractive to pass arbitrary data encapsulated in EAP.
> But I think it's wrong to say that NEA assessments can piggy
> back in because the door is being held open for channel bindings.

I am not trying to conflate authentication and authorization.
I recognize that these are two different things and I think
that it will help us to have a clear definition of each.
That should help us decide whether we want to allow some
authorization data to travel over EAP. You wrote:

> Authentication has to do with proving an identity. Authorization
> has to do with determining whether that proven identity is
> "good" or "bad".

I agree with the gist of your definition of authentication.
We might more precisely define authentication as:

  the process of verifying a claim that an entity has a certain
  identity

However, I think that your definition of authorization is a bit
too loose. A perfectly good person should not be authorized to
access someone else's records. I suggest that we use this
definition of authorization from RFC 4949:

      1b. (I) A process for granting approval to a system entity to
      access a system resource.

I agree that EAP was originally defined solely for the purpose
of authentication. I agree that it is wise for us to consider
carefully whether we want to also allow it to be used to carry
information that is useful in authorization. While I believe that
this is a good idea, I think that we'll want to continue to place
constraints on the amount and kind of data that should be
conveyed over EAP. EAP is not a bulk data transfer protocol
and it should not be used as one. That will only result in
heartache for all involved (due to the limit of one packet
in flight at any time, the frequently long round trip times
when RADIUS proxies are used, and the short timeouts given
by many NASs, among other issues).

Thanks,

Steve
_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to