We are talking about the case of separation of outer EAP method and inner method (intermediate AAA terminates the EAP tunnel and have a separate AAA server for the inner method). Since EMSK from the inner method never leaves the AAA server where it is generated, (nor it is designed to be transported or a protocol exists to transport the EMSK or key derived from it between AAA servers), EMSK based crypto-binding will potentially break this use case.
From: "zhou.suj...@zte.com.cn<mailto:zhou.suj...@zte.com.cn>" <zhou.suj...@zte.com.cn<mailto:zhou.suj...@zte.com.cn>> Date: Tuesday, July 3, 2012 12:04 AM To: "Zhangdacheng (Dacheng)" <zhangdach...@huawei.com<mailto:zhangdach...@huawei.com>> Cc: "emu@ietf.org<mailto:emu@ietf.org>" <emu@ietf.org<mailto:emu@ietf.org>>, "emu-boun...@ietf.org<mailto:emu-boun...@ietf.org>" <emu-boun...@ietf.org<mailto:emu-boun...@ietf.org>>, Sam Hartman <hartmans-i...@mit.edu<mailto:hartmans-i...@mit.edu>>, Cisco Employee <hz...@cisco.com<mailto:hz...@cisco.com>> Subject: 答复: RE: Re: [Emu] New draft on mutual crypto binding problem Regards~~~ -Sujing Zhou "Zhangdacheng (Dacheng)" <zhangdach...@huawei.com<mailto:zhangdach...@huawei.com>> 写于 2012-07-03 11:41:49: > I think you try to ask why ESMK can be used to detect the attackers > who try to impersonate other honest servers. > > Unlike MSK, EMSK will never be transported over the network and then > cannot be accessed by attackers. Therefore, it is possible for a > peer to use EMSK to detect an attacker who tries to perform the > attacks illustrated in the draft. That is what I understand, but EMSK-based crypto binding can still be transported through intermediate AAA servers between home AAA server and peer, right? Idon't understand Hao Zhou's concern here. > > From: zhou.suj...@zte.com.cn<mailto:zhou.suj...@zte.com.cn> > [mailto:zhou.suj...@zte.com.cn] > Sent: Tuesday, July 03, 2012 11:27 AM > To: Sam Hartman > Cc: > draft-hartman-emu-mutual-crypto-b...@tools.ietf.org<mailto:draft-hartman-emu-mutual-crypto-b...@tools.ietf.org>; > emu@ietf. > org; emu-boun...@ietf.org<mailto:emu-boun...@ietf.org>; Sam Hartman; Hao Zhou > Subject: 答复: Re: [Emu] New draft on mutual crypto binding problem > > > How does EMSK break intermediate AAA servers? > > Regards~~~ > > -Sujing Zhou > > emu-boun...@ietf.org<mailto:emu-boun...@ietf.org> 写于 2012-06-29 02:25:44: > > > >>>>> "Hao" == Hao Zhou <hz...@cisco.com<mailto:hz...@cisco.com>> writes: > > > > Hao> Sam: > > Hao> This is a well thought and well written draft, it covers a > > lot of background > > Hao> and aspect of the attacks and mitigations. However, I have > > few comments: > > Thanks! > > > > You listed a set of drawbacks to EMSK-based crypto binding. > > > > Hao> A. Mutual crypto-binding required the use of EMSK, not all > > existing EAP > > Hao> method generate and export EMSK. It will also break > intermediate AAA > > Hao> servers. More importantly, it would only work for an EAP > method that > > Hao> generates keys. Part of the goal of Tunnel Method is to > protect weak > > Hao> authentication or EAP method, this would not benefits them. > > > > These drawbacks to EMSK-based cryptographic binding are documented; > > thanks. > > > > Hao> D. Enforcing server policy would be another good way to go, > > if server can > > Hao> demand tunnel method only, eliminate the chance of inner > > method MSK being > > Hao> sent to the attacker. > > > > As discussed in the draft, you actually need a number of conditions > > beyond just that. > > However I agree server policy is another important mitigation, which is > > why the draft recommends it. > > > > Hao> 2. I am not sure "Mutual Crypto-binding" is a good term, as > > the existing > > Hao> crypto-binding is already mutually authenticating the peer > > and the server. > > Hao> Maybe more accurate to be called "Crypto-binding based on > > EMSK" or "Extended > > Hao> Crypto-binding" etc. > > > > I think of mutual cryptographic binding as crypto binding that provides > > defense against these sort of attacks (and personally don't consider > > existing cryptographic binding to really qualify as "mutual".) > > I think though that describing this new mechanism as EMSK-based > > cryptographic binding is good. We may have other mechanisms that meet > > the security goals of mutual cryptographic binding and it is always > > desirable to separate mechanism from abstraction. > > I've tried to start that transition in the next version of the > > draft. Thanks very much for pointing this out. > > Doubtless we'll have another round of improving terminology. > > > > Again, thanks so much for your comments. > > _______________________________________________ > > Emu mailing list > > Emu@ietf.org<mailto:Emu@ietf.org> > > https://www.ietf.org/mailman/listinfo/emu > >
_______________________________________________ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu