Hi,

> I think it is worthwhile to support an mode of operation that supports peer 
> privacy.   I've seen this implemented in tunnel methods in two different 
> ways.  One with renegotiation as described below and the other as an inner 
> EAP-TLS exchange after an anonymous outer exchange.   I don't really have a 
> strong opinion as to which is better at this point.  It seems that using an 
> inner EAP-TLS may be more flexible and would offer the same security 
> properties and might be a simpler model.    
> 
> Any opinions on the list?  

We have a couple of EAP-TLS realms which are also interested in NEA. I
usually tell them that NEA data can't be put into the EAP channel with
EAP-TLS, and that that is bad luck for them :-)

If TEAP uses tunneled EAP-TLS as opposed to renegotiating, the inner EAP
would/might allow for carrying extra attributes besides the cert
exchange - thus enabling NEA-like exchanges.

If my thinking isn't borked, that would mean I'd rather support inner
EAP-TLS to enable these usages.

Greetings,

Stefan

> 
> 
> 
> On Oct 7, 2012, at 8:43 PM, Jim Schaad wrote:
> 
>> Stefan,
>>
>> Thanks for the input.
>>
>> For the authors,
>>
>> Does this need to be documented as a mode of operation for TEAP or are we
>> going to say that this is not a supported mode?
>>
>> Jim
>>
>>
>>> -----Original Message-----
>>> From: emu-boun...@ietf.org [mailto:emu-boun...@ietf.org] On Behalf Of
>>> Stefan Winter
>>> Sent: Wednesday, October 03, 2012 11:10 PM
>>> To: emu@ietf.org
>>> Subject: Re: [Emu] Client Auth with TLS
>>>
>>> Hi,
>>>
>>>> 3.  The client provides the certificate in a protected manner - I had
>>>> a problem at this point because I don't know enough TLS to properly go
>>>> through this scenario, and I could not really read documents while
>>>> driving.  If the encrypted certificate extension was used, then there
>>>> is no issue as the protected certificate would be passed in the
>>>> initial handshake.  However if the client starts the negotiation and
>>>> then restarts it after it is encrypted, I don't know if this occurs
>> before or
>>> after the finish message.
>>>> If it starts after the finish method then there is an issue with
>>>> having the server close an anonymous session if the client is then
>>>> going to provide the certificate encrypted.  Help on how this works
>> would
>>> be appreciated.
>>>
>>> FWIW, RFC5216 (EAP-TLS) already has provisions for a protected client
>>> credential exchange (for client privacy protection reasons). I didn't ever
>> see it
>>> used (anyone?), but it's clearly a foreseen mode of operation. The text
>>> describing this is in section 2.1.4:
>>>
>>> "...    In order to avoid disclosing the peer username, an EAP-TLS peer
>>>   configured for privacy MUST negotiate a TLS ciphersuite supporting
>>>   confidentiality and MUST provide a client certificate list containing
>>>   no entries in response to the initial certificate_request from the
>>>   EAP-TLS server.
>>>
>>>   An EAP-TLS server supporting privacy MUST NOT treat a certificate
>>>   list containing no entries as a terminal condition; instead, it MUST
>>>   bring up the TLS session and then send a hello_request.  The
>>>   handshake then proceeds normally; the peer sends a client_hello and
>>>   the server replies with a server_hello, certificate,
>>>   server_key_exchange, certificate_request, server_hello_done, etc.
>>>
>>>   For the calculation of exported keying material (see Section 2.3),
>>>   the master_secret derived within the second handshake is used.
>>>
>>>   An EAP-TLS peer supporting privacy MUST provide a certificate list
>>>   containing at least one entry in response to the subsequent
>>>   certificate_request sent by the server.  If the EAP-TLS server
>>>   supporting privacy does not receive a client certificate in response
>>>   to the subsequent certificate_request, then it MUST abort the
>>>   session.
>>> "
>>>
>>> There is a sequence diagram shortly afterwards which shows clearly that
>> the
>>> "first" negotiation ends with a 'finished' and then immediately a new
>>> 'hello_request' - all in one EAP message.
>>>
>>> Greetings,
>>>
>>> Stefan
>>>
>>>>
>>>> Jim
>>>>
>>>>
>>>> _______________________________________________
>>>> Emu mailing list
>>>> Emu@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/emu
>>>>
>>>
>>>
>>> --
>>> Stefan WINTER
>>> Ingenieur de Recherche
>>> Fondation RESTENA - Réseau Téléinformatique de l'Education Nationale et de
>>> la Recherche 6, rue Richard Coudenhove-Kalergi
>>> L-1359 Luxembourg
>>>
>>> Tel: +352 424409 1
>>> Fax: +352 422473
>>
>>
>> _______________________________________________
>> Emu mailing list
>> Emu@ietf.org
>> https://www.ietf.org/mailman/listinfo/emu
> 


-- 
Stefan WINTER
Ingenieur de Recherche
Fondation RESTENA - Réseau Téléinformatique de l'Education Nationale et
de la Recherche
6, rue Richard Coudenhove-Kalergi
L-1359 Luxembourg

Tel: +352 424409 1
Fax: +352 422473

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to