Dan Harkins said:

"When there are 3 parties involved in this 2 party protocol it is
justified by saying that the EAP server trusts the NAS so there is no
security issue when MSK is disclosed to it. But what NAS identity does
the EAP server trust? The peer and EAP server derive a shared key and
for the key to be disclosed to another entity the peer and EAP server
must have a consistent view of the identity of that entity. If they cannot
arrive at a consistent view of all identities then the protocol deriving
the key fails. That is not an authorization issue, it's an authentication
issue."

RFC 5247 Section 5.3.2 describes problems that can result from a NAS 
impersonating another NAS.   Section 5.3.3 describes the Channel
Binding problem, which is logically distinct. 

As noted in Section 5.3.2, it is not possible for a AAA server more
than one hop from the NAS to verify the NAS Identity.  This verification
must be handled at the first hop proxy. 

Given this, it will typically be outside the scope of a Channel Binding
Implementation to address the impersonation issue.  

_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to