Hi Alan, My heartburn over the "MUST tranport the username and password" text is that it seems to be mandating some particular deployment and not mandating functionality. The introductory text talks about cases where the authentication server does not have cleartext access to, or a consistent transform of, the password. If the authentication server doesn't have cleartext access or a consistent transform of the password then what does requiring that the tunnel method transport the username and password to it solve? This requirement just seems to say that the tunnel method must be implemented in a way that it can separate the tunnel establishment stuff from the password authentication stuff and that is not a functional requirement.
If the requirement is that the tunnel method MUST support username and password authentication where the authentication server doesn't have cleartext access to, or a consistent transform of, the password then why not just say it directly? You have added a "That is," as an introduction to my suggested text which implies that it's just a restatement of the previous text; it isn't. The existing text says the tunnel method "MUST NOT expose the username and password to parties in the communication path between the peer and the EAP server...." As I said, exposing password-derived data is a way to comply with this requirement but it is flawed and insecure. That text also doesn't state anything about protecting the username and password when it's transporting it to the authentication server (which come to think of it is quite odd). My text does. I think it is better to just state what property we want in a tunnel method without ambiguity. I think my suggested replacement text is better than your compromise. Dan. On Wed, December 2, 2009 2:48 am, Alan DeKok wrote: > Dan Harkins wrote: >> Yes, I can propose a specific modification. In fact, I did already. > > It wasn't clear that the text was the suggested replacement. > >> It just got truncated from the thread. What I suggest is that in >> section 3.1, in the middle of the first paragraph (the text that Joe >> was quoting originally), remove this: >> >> "The tunnel method MUST support transporting the username >> and password to the authentication server. However, it >> MUST NOT expose the username and password to parties in the >> communication path between the peer and the EAP server and >> it MUST provide protection against man-in-the-middle and >> dictionary attacks." >> >> and put this in its stead: >> >> "The advantage any attacker gains against the tunneled method >> when employing a username and password for authentication MUST >> be through interaction and not computation". >> >> I believe that captures the property we want the tunnel method to >> have and is not so vague. > > Except it *removes* the requirement that the tunneled method transport > the username and password. Given the capabilities of widely deployed > systems, I think that this requirement should be kept. > >> It applies to active attacks against the >> authenticator, active attacks against the client, passive attacks >> between them and between the authenticator and any authentication >> server that may exist, and all forms of man-in-the-middle and >> dictionary attack that could be launched against the legitimate >> participants in this tunnel method. > > How about simply adding your text?: > > "The tunnel method MUST support transporting the username > and password to the authentication server. However, it > MUST NOT expose the username and password to parties in the > communication path between the peer and the EAP server and > it MUST provide protection against man-in-the-middle and > dictionary attacks. That is, the advantage any attacker gains > against the tunneled method when employing a username and password > for authentication MUST be through interaction and not > computation". > > I think this addresses your concerns, while simultaneously stating > clearly the specific requirements. > > Alan DeKok. > _______________________________________________ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu