> -----Original Message-----
> From: Joseph Salowey (jsalowey) [mailto:jsalo...@cisco.com]
> Sent: Monday, October 08, 2012 9:23 PM
> To: Jim Schaad
> Cc: Stefan Winter; <emu@ietf.org>
> Subject: Re: [Emu] Client Auth with TLS
> 
> I think it is worthwhile to support an mode of operation that supports
peer
> privacy.   I've seen this implemented in tunnel methods in two different
> ways.  One with renegotiation as described below and the other as an inner
> EAP-TLS exchange after an anonymous outer exchange.   I don't really have
a
> strong opinion as to which is better at this point.  It seems that using
an inner
> EAP-TLS may be more flexible and would offer the same security properties
> and might be a simpler model.
> 
> Any opinions on the list?

Are you suggesting an inner EAP-TLS or an inner TEAP?

Jim

> 
> 
> 
> On Oct 7, 2012, at 8:43 PM, Jim Schaad wrote:
> 
> > Stefan,
> >
> > Thanks for the input.
> >
> > For the authors,
> >
> > Does this need to be documented as a mode of operation for TEAP or are
> > we going to say that this is not a supported mode?
> >
> > Jim
> >
> >
> >> -----Original Message-----
> >> From: emu-boun...@ietf.org [mailto:emu-boun...@ietf.org] On Behalf
> Of
> >> Stefan Winter
> >> Sent: Wednesday, October 03, 2012 11:10 PM
> >> To: emu@ietf.org
> >> Subject: Re: [Emu] Client Auth with TLS
> >>
> >> Hi,
> >>
> >>> 3.  The client provides the certificate in a protected manner - I
> >>> had a problem at this point because I don't know enough TLS to
> >>> properly go through this scenario, and I could not really read
> >>> documents while driving.  If the encrypted certificate extension was
> >>> used, then there is no issue as the protected certificate would be
> >>> passed in the initial handshake.  However if the client starts the
> >>> negotiation and then restarts it after it is encrypted, I don't know
> >>> if this occurs
> > before or
> >> after the finish message.
> >>> If it starts after the finish method then there is an issue with
> >>> having the server close an anonymous session if the client is then
> >>> going to provide the certificate encrypted.  Help on how this works
> > would
> >> be appreciated.
> >>
> >> FWIW, RFC5216 (EAP-TLS) already has provisions for a protected client
> >> credential exchange (for client privacy protection reasons). I didn't
> >> ever
> > see it
> >> used (anyone?), but it's clearly a foreseen mode of operation. The
> >> text describing this is in section 2.1.4:
> >>
> >> "...    In order to avoid disclosing the peer username, an EAP-TLS peer
> >>   configured for privacy MUST negotiate a TLS ciphersuite supporting
> >>   confidentiality and MUST provide a client certificate list containing
> >>   no entries in response to the initial certificate_request from the
> >>   EAP-TLS server.
> >>
> >>   An EAP-TLS server supporting privacy MUST NOT treat a certificate
> >>   list containing no entries as a terminal condition; instead, it MUST
> >>   bring up the TLS session and then send a hello_request.  The
> >>   handshake then proceeds normally; the peer sends a client_hello and
> >>   the server replies with a server_hello, certificate,
> >>   server_key_exchange, certificate_request, server_hello_done, etc.
> >>
> >>   For the calculation of exported keying material (see Section 2.3),
> >>   the master_secret derived within the second handshake is used.
> >>
> >>   An EAP-TLS peer supporting privacy MUST provide a certificate list
> >>   containing at least one entry in response to the subsequent
> >>   certificate_request sent by the server.  If the EAP-TLS server
> >>   supporting privacy does not receive a client certificate in response
> >>   to the subsequent certificate_request, then it MUST abort the
> >>   session.
> >> "
> >>
> >> There is a sequence diagram shortly afterwards which shows clearly
> >> that
> > the
> >> "first" negotiation ends with a 'finished' and then immediately a new
> >> 'hello_request' - all in one EAP message.
> >>
> >> Greetings,
> >>
> >> Stefan
> >>
> >>>
> >>> Jim
> >>>
> >>>
> >>> _______________________________________________
> >>> Emu mailing list
> >>> Emu@ietf.org
> >>> https://www.ietf.org/mailman/listinfo/emu
> >>>
> >>
> >>
> >> --
> >> Stefan WINTER
> >> Ingenieur de Recherche
> >> Fondation RESTENA - Réseau Téléinformatique de l'Education Nationale
> >> et de la Recherche 6, rue Richard Coudenhove-Kalergi
> >> L-1359 Luxembourg
> >>
> >> Tel: +352 424409 1
> >> Fax: +352 422473
> >
> >
> > _______________________________________________
> > Emu mailing list
> > Emu@ietf.org
> > https://www.ietf.org/mailman/listinfo/emu

_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to