Stefan,

Thanks for the input.

For the authors,

Does this need to be documented as a mode of operation for TEAP or are we
going to say that this is not a supported mode?

Jim


> -----Original Message-----
> From: emu-boun...@ietf.org [mailto:emu-boun...@ietf.org] On Behalf Of
> Stefan Winter
> Sent: Wednesday, October 03, 2012 11:10 PM
> To: emu@ietf.org
> Subject: Re: [Emu] Client Auth with TLS
> 
> Hi,
> 
> > 3.  The client provides the certificate in a protected manner - I had
> > a problem at this point because I don't know enough TLS to properly go
> > through this scenario, and I could not really read documents while
> > driving.  If the encrypted certificate extension was used, then there
> > is no issue as the protected certificate would be passed in the
> > initial handshake.  However if the client starts the negotiation and
> > then restarts it after it is encrypted, I don't know if this occurs
before or
> after the finish message.
> > If it starts after the finish method then there is an issue with
> > having the server close an anonymous session if the client is then
> > going to provide the certificate encrypted.  Help on how this works
would
> be appreciated.
> 
> FWIW, RFC5216 (EAP-TLS) already has provisions for a protected client
> credential exchange (for client privacy protection reasons). I didn't ever
see it
> used (anyone?), but it's clearly a foreseen mode of operation. The text
> describing this is in section 2.1.4:
> 
> "...    In order to avoid disclosing the peer username, an EAP-TLS peer
>    configured for privacy MUST negotiate a TLS ciphersuite supporting
>    confidentiality and MUST provide a client certificate list containing
>    no entries in response to the initial certificate_request from the
>    EAP-TLS server.
> 
>    An EAP-TLS server supporting privacy MUST NOT treat a certificate
>    list containing no entries as a terminal condition; instead, it MUST
>    bring up the TLS session and then send a hello_request.  The
>    handshake then proceeds normally; the peer sends a client_hello and
>    the server replies with a server_hello, certificate,
>    server_key_exchange, certificate_request, server_hello_done, etc.
> 
>    For the calculation of exported keying material (see Section 2.3),
>    the master_secret derived within the second handshake is used.
> 
>    An EAP-TLS peer supporting privacy MUST provide a certificate list
>    containing at least one entry in response to the subsequent
>    certificate_request sent by the server.  If the EAP-TLS server
>    supporting privacy does not receive a client certificate in response
>    to the subsequent certificate_request, then it MUST abort the
>    session.
> "
> 
> There is a sequence diagram shortly afterwards which shows clearly that
the
> "first" negotiation ends with a 'finished' and then immediately a new
> 'hello_request' - all in one EAP message.
> 
> Greetings,
> 
> Stefan
> 
> >
> > Jim
> >
> >
> > _______________________________________________
> > Emu mailing list
> > Emu@ietf.org
> > https://www.ietf.org/mailman/listinfo/emu
> >
> 
> 
> --
> Stefan WINTER
> Ingenieur de Recherche
> Fondation RESTENA - Réseau Téléinformatique de l'Education Nationale et de
> la Recherche 6, rue Richard Coudenhove-Kalergi
> L-1359 Luxembourg
> 
> Tel: +352 424409 1
> Fax: +352 422473


_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to