On Oct 9, 2012, at 9:35 AM, Jim Schaad wrote: > > >> -----Original Message----- >> From: Joseph Salowey (jsalowey) [mailto:jsalo...@cisco.com] >> Sent: Monday, October 08, 2012 9:23 PM >> To: Jim Schaad >> Cc: Stefan Winter; <emu@ietf.org> >> Subject: Re: [Emu] Client Auth with TLS >> >> I think it is worthwhile to support an mode of operation that supports > peer >> privacy. I've seen this implemented in tunnel methods in two different >> ways. One with renegotiation as described below and the other as an inner >> EAP-TLS exchange after an anonymous outer exchange. I don't really have > a >> strong opinion as to which is better at this point. It seems that using > an inner >> EAP-TLS may be more flexible and would offer the same security properties >> and might be a simpler model. >> >> Any opinions on the list? > > Are you suggesting an inner EAP-TLS or an inner TEAP? >
[Joe] EAP-TLS as an inner method. > Jim > >> >> >> >> On Oct 7, 2012, at 8:43 PM, Jim Schaad wrote: >> >>> Stefan, >>> >>> Thanks for the input. >>> >>> For the authors, >>> >>> Does this need to be documented as a mode of operation for TEAP or are >>> we going to say that this is not a supported mode? >>> >>> Jim >>> >>> >>>> -----Original Message----- >>>> From: emu-boun...@ietf.org [mailto:emu-boun...@ietf.org] On Behalf >> Of >>>> Stefan Winter >>>> Sent: Wednesday, October 03, 2012 11:10 PM >>>> To: emu@ietf.org >>>> Subject: Re: [Emu] Client Auth with TLS >>>> >>>> Hi, >>>> >>>>> 3. The client provides the certificate in a protected manner - I >>>>> had a problem at this point because I don't know enough TLS to >>>>> properly go through this scenario, and I could not really read >>>>> documents while driving. If the encrypted certificate extension was >>>>> used, then there is no issue as the protected certificate would be >>>>> passed in the initial handshake. However if the client starts the >>>>> negotiation and then restarts it after it is encrypted, I don't know >>>>> if this occurs >>> before or >>>> after the finish message. >>>>> If it starts after the finish method then there is an issue with >>>>> having the server close an anonymous session if the client is then >>>>> going to provide the certificate encrypted. Help on how this works >>> would >>>> be appreciated. >>>> >>>> FWIW, RFC5216 (EAP-TLS) already has provisions for a protected client >>>> credential exchange (for client privacy protection reasons). I didn't >>>> ever >>> see it >>>> used (anyone?), but it's clearly a foreseen mode of operation. The >>>> text describing this is in section 2.1.4: >>>> >>>> "... In order to avoid disclosing the peer username, an EAP-TLS peer >>>> configured for privacy MUST negotiate a TLS ciphersuite supporting >>>> confidentiality and MUST provide a client certificate list containing >>>> no entries in response to the initial certificate_request from the >>>> EAP-TLS server. >>>> >>>> An EAP-TLS server supporting privacy MUST NOT treat a certificate >>>> list containing no entries as a terminal condition; instead, it MUST >>>> bring up the TLS session and then send a hello_request. The >>>> handshake then proceeds normally; the peer sends a client_hello and >>>> the server replies with a server_hello, certificate, >>>> server_key_exchange, certificate_request, server_hello_done, etc. >>>> >>>> For the calculation of exported keying material (see Section 2.3), >>>> the master_secret derived within the second handshake is used. >>>> >>>> An EAP-TLS peer supporting privacy MUST provide a certificate list >>>> containing at least one entry in response to the subsequent >>>> certificate_request sent by the server. If the EAP-TLS server >>>> supporting privacy does not receive a client certificate in response >>>> to the subsequent certificate_request, then it MUST abort the >>>> session. >>>> " >>>> >>>> There is a sequence diagram shortly afterwards which shows clearly >>>> that >>> the >>>> "first" negotiation ends with a 'finished' and then immediately a new >>>> 'hello_request' - all in one EAP message. >>>> >>>> Greetings, >>>> >>>> Stefan >>>> >>>>> >>>>> Jim >>>>> >>>>> >>>>> _______________________________________________ >>>>> Emu mailing list >>>>> Emu@ietf.org >>>>> https://www.ietf.org/mailman/listinfo/emu >>>>> >>>> >>>> >>>> -- >>>> Stefan WINTER >>>> Ingenieur de Recherche >>>> Fondation RESTENA - Réseau Téléinformatique de l'Education Nationale >>>> et de la Recherche 6, rue Richard Coudenhove-Kalergi >>>> L-1359 Luxembourg >>>> >>>> Tel: +352 424409 1 >>>> Fax: +352 422473 >>> >>> >>> _______________________________________________ >>> Emu mailing list >>> Emu@ietf.org >>> https://www.ietf.org/mailman/listinfo/emu > _______________________________________________ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu