On Aug 14, 2013, at 10:58 AM, Stephen Farrell <stephen.farr...@cs.tcd.ie> wrote:
> Stephen Farrell has entered the following ballot position for > draft-ietf-emu-eap-tunnel-method-07: Discuss > > When responding, please keep the subject line intact and reply to all > email addresses included in the To and CC lines. (Feel free to cut this > introductory paragraph, however.) > > > Please refer to http://www.ietf.org/iesg/statement/discuss-criteria.html > for more information about IESG DISCUSS and COMMENT positions. > > > The document, along with other ballot positions, can be found here: > http://datatracker.ietf.org/doc/draft-ietf-emu-eap-tunnel-method/ > > > > ---------------------------------------------------------------------- > DISCUSS: > ---------------------------------------------------------------------- > > > These discuss points are more questions I'd really like > answered than blocking points (depending on the answers I > guess:-) but I expect should be easily resolved. > > (1) 3.4: when x.500 names or SubjectAltNames are > "exported" is it clear how those are formatted? Maybe a > pointer to where that's defined would be good in case > implementers get it wrong. You might also want to warn > here (or somewhere) about names that contain a null byte > in case that attack is used e.g. with a TLS server cert > subject name like "CN=www.paypal.com\0.badguy.com" Even > though that's really a PKI failure, not detecting it here > would be bad too. > [Joe] We could add a note about the null, is there some text in an existing document we could reuse? > (2) 5.2, at the end: this adds a dependency on the > TLS-PRF. I don't suppose TLS1.3 will be a big enough > change for that to be a problem, but what if it was? E.g. > if someone convinced the TLS WG to use IKE instead? Do > you really need the same PRF or could you pick one for > TEAP and remove the dependency? Same question for the MAC > in 5.3. > [Joe] We chose to have the dependence so we would rely on the same crypto-algorithms as TLS so our crypto agility would track with TLS. We figured TLS would track advances in cryptography better than EMU. > (3) 7.3: you have a MAY for this separation but also > define what would become a cleartext password set of TLVs > on the link between the two boxes here. Could you not at > least REQUIRE protection (e.g. using IPsec) of that link > if the basic password method will be used? > [Joe] Sam's comments pretty much reflect the working group consensus on this topic. > > ---------------------------------------------------------------------- > COMMENT: > ---------------------------------------------------------------------- > > > - 3.2: You're allowing TLS compression. Is there the > potential for something like a CRIME attack here? I guess > not, given that there's no way to programatically get a > peer or inner method server to send attacker-chosen data. > Is that correct? (Just checking.) > [Joe] In general no. The closest thing I can think of is NEA which can use a method such as TEAP for transport, but I don't think this would allow an attacker to launch a CRIME attack. > - 3.2.2: Since a PAC-lifetime is a wall-clock time then > it would provide a way to correlate old and new sessions > (i.e. act as a fingerprint) if its ever carried in clear. > Can that happen? > [Joe] The PAC-lifetime is carried in the PAC-Info which is always send under the protection of the TLS tunnel. Only the PAC-Opaque is sent outside the tunnel. > - 3.3.3, 1st para: what does "clear text" mean here? Do > you mean within the TLS tunnel or not? I hope you do mean > within the TLS tunnel, but I think you need to be > clear(er) in any case. > [Joe] Clear text means outside the TLS tunnel. EAP state machine requires that the EAP-Success or EAP-Failure be sent independently of the method. This is why TEAP has its own protected result indication and why this section states that the Peer must not accept a cleartext success or failure before the protected results are received. > - 3.8: this says mutual auth "results" if the peer trusts > the server cert belongs to the server - that sounds > wrong, isn't it? > [Joe] I think this section is terminology challenged. It should basically replace mutual server authentication with just server authentication. "Several TEAP services including server unauthenticated provisioning, PAC provisioning, certificate provisioning and channel binding depend on the peer trusting the TEAP server. Peers MUST authenticate the server before these peer services are used. TEAP peers MUST track whether server authentication has taken place. Server authentication results if the peer trusts the provided server certificate. Typically this involves both validating the certificate to a trust anchor and confirming the entity named by the certificate is the intended server. Server authentication also results when the procedures of Section 3.3 are used to resume a session in which the the peer and server was previously mutually authenticated. Alternatively, if an inner EAP method providing mutual authentication and an Extended Master Session Key (EMSK) is executed and cryptographic binding with the EMSK compound MAC is present (Section 4.2.13), then the session is mutually authenticated and peer services can be used. TEAP implementations SHOULD NOT use peer services by default unless the session is server authenticated. TEAP peer implementations MUST have a configuration where authentication fails if server authentication cannot be achieved. An additional complication arises when a tunnel method authenticates multiple parties such as authenticating both the peer machine and the peer user to the EAP server. Depending on how authentication is achieved, only some of these parties may have confidence in it. For example if a strong shared secret is used to mutually authenticate the user and the EAP server, the machine may not have confidence that the EAP server is the authenticated party if the machine cannot trust the user not to disclose the shared secret to an attacker. In these cases, the parties who participate in the authentication need to be considered when evaluating whether to use peer services. " > - 3.8.1: I think you need an s/MAY/MUST/ here - you say > the request "MAY be issued only ..." but I think you mean > "MUST be issued only..." > [Joe] Yes. How about: "The peer MUST successfully authenticated the EAP server and validated the Crypto-Binding TLV as defined in Section 4.2.13 before issuing the request" > > - 3.8.2: Just checking, and I may be wrong here. Say if I > establish a TLS server-auth tunnel and then renegotiate > to get TLS client-auth (with id privacy) as well, and > then the Peer wants to get a new cert. This calls for > the tls-unique for the initial server-auth TLS session to > be used in the pkcs#10. Am I reading it right? Is that > ok? I think it is, but just want to check since its > pretty confusing;-) > [Joe] This is meant to use the same mechanism as EST. It is currently out of sync with the latest version. It should line up: In order to provide linking identity and proof-of-possession by including information specific to the current authenticated TLS session within the signed certification request, the peer generating the request SHOULD obtain the tls-unique value from the TLS subsystem as defined in Channel Bindings for TLS [RFC5929]. The TEAP peer operations between obtaining the tls_unique value through generation of the CSR that contains the current tls_unique value and the subsequent verification of this value by the TEAP server are the "phases of the application protocol during which application- layer authentication occurs" that are protected by the synchronization interoperability mechanism described in the Channel Bindings for TLS [RFC5929] section 3.1 interoperability notes. When performing renegotiation, TLS "secure_renegotiation" [RFC5746] MUST be used. The tls-unique value is base 64-encoded as specified in Section 4 of [RFC4648] and the resulting string is placed in the certification request challenge-password field ( [RFC2985], Section 5.4.1). The challenge-password field is limited to 255 bytes (section 7.4.9 of [RFC5246] indicates that no existing cipher suite would result in an issue with this limitation). If tls-unique information is not embedded within the certification request the challenge-password field MUST be empty to indicate that the peer did not include the optional channel-binding information (any value submitted is verified by the server as tls-unique information). The server SHOULD verify the tls-unique information. This ensures that the authenticated TEAP peer is in possession of the private key used to sign the certification request. > - The secdir review [1] raised a couple of questions that > I think would be good to answer. Did I miss that answer? > [Joe] No, I missed the review. Response in progress. > [1] http://www.ietf.org/mail-archive/web/secdir/current/msg04106.html > > > _______________________________________________ > Emu mailing list > Emu@ietf.org > https://www.ietf.org/mailman/listinfo/emu _______________________________________________ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu