> -----Original Message----- > From: Jim Schaad [mailto:jim...@augustcellars.com] > Sent: Wednesday, February 27, 2013 5:47 PM > To: 'draft-ietf-emu-crypto-b...@tools.ietf.org' > Cc: emu@ietf.org > Subject: Comments on draft-ietf-emu-crypto-bind-02 > > Sam et al, > > You said you thought you were ready for a WGLC so I did a much more > detailed review. Lots of little things but nothing that should stop a WGLC in > my opinion. > > > 1. Keywords text should be attached to the first section of the document > and not to the abstract. > > 2. In the abstract, please keep some type of name (such as EAP) with the > RFC reference. If this text was standalone the reference would not really > work and people would not really know what the RFC was about. > > 3. I-D.ietf-emu-eap-tunnel-req has been published as RFC 6678 and the > reference should be updated. > > 4. Section #1 paragraph #3 > OLD: > An > example of the attack can happen when a peer is willing to perform > authentication inside and outside a tunnel. > NEW: > An example of the attack can happen when a peer is willing to use the same > EAP method to perform authentication inside and outside of a tunnel. > > After all, the tunnel is a method of authentication. > > 5. On the ASCII art - I could clean this up between now and the next IETF if > neither of your co-authors are willing to do so. > > 6. Section #1 last paragraph. I am not sure that it is sufficient for the server > to have this policy by itself. It is necessary that both the server and the peer > have the common policy and enforce it. In this case the server may only be > offering the inner method inside of the tunnel but if the peer will allow it to > be run outside of the tunnel it does not matter. > > 7. Section #2 para #1 - Prior to channel bindings, peers could not > distinguish one Network Access Service (NAS) from another, so attacks > where one NAS impersonated another were out-of-scope. > > I suggest s/distinguish/reliably distinguish/ > > 8. In section #3 para #1 - This sentence exists In this attack, one party adds a > layer of tunneling such > that from the perspective of the EAP peer, there are more methods > than from the perspective of the EAP server. > > I don't understand the intent of the sentence. From the example above > there was no additional EAP methods being added that I could see. I can see > the addition of the tunneling, but it is not clear why there are more methods > > 9. In section 3.2.1 - Potental additional challenge to be added to para #2 > It is not always obvious that a provided certificate is intended for EAP tunnel > authentication rather than for some other purpose (such as doing HTTP over > TLS). > > 10. In section 3.2.1 - Counter argument on section #3 should be added: > > On the other hand, not using commercial CAs can be problematic for users > who are trying to use kiosk type access points. Users may be able to > remember a user name and a password but are probably not going to be able > to correctly provide the necessary validation information for a private CA. > The use of commercial CAs in this case is also problematic as the user will > probably not be able to provide the machine name of the tunnel provider > either. > > 11. Comment " Please view in a fixed-width font such as Courier." Should be > removed > > 12. Section 3.2.2 - I think that the conversion of EAP methods is sufficiently > significant that it merits it's own section in the text. Where it is does not > make it follow nicely. Not sure why it is under server policy rather than > standing on its own. > > 13. Section 3.2.3 - The last sentence should say "when the inner method is a > key deriving EAP method". > > 14. Section 3.2.4 - Current text is "insert intermediates between the peer > and the EAP server." As the NAS sits between the peer and the EAP server > this is not a reasonable statement. I might try "split the EAP server into the > tunnel EAP server and the inner EAP server(s)." > > 15. Section 3.2.4 - In point #3 - does it need to depend on the MSK and the > EMSK or only on the EMSK? TEAP will depend on only the EMSK and not the > MSK if one is available and usable. > > 16. Section 3.2.4 - Given the text "If EMSK-based cryptographic binding is an > optional facility, the > negotiation of whether to use it MUST be protected by the inner MSK > or EMSK." > a) I don't understand the requirement > b) Do you believe that TEAP meets this requirement? > If I understand the sentence correctly I believe that TEAP does not meet this > requirement as the negotiation would be fully available to anyone who could > get into the tunnel. However the negotiation is protected by the tunnel > itself. > > 17. Section 6 - I don't really care for the security considerations at present. > > It seem to be rather perfunctorily written. Minimum things that I think I > would include here > > Traditionally, the primary focus of EAP has been to authenticate a peer to a > server in order to allow access to a network. With the advent of other types > of NAS services, such as are provide by ABFAB, it becomes more important > that the EAP peer be able to get information from the EAP server about the > network and its environments. This imposes new security requirements on > the EAP protocol such as a need for mutual authentication and a stronger > need to prevent MITM attacks on the authentication. > > This memo presents some of the attacks that are possible and provides a > number of recommendations for operators and protocol developers to > follow in order to prevent the attacks presented. The most significant of > these are to use tunnel methods and to use appropriate channel binding > methods within the tunnel methods. > > 18. Section 7 - review for additional people you might want to acknowledge. > Also - capitalize Margaret. > > Jim
_______________________________________________ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu