With implementations shipping on virtually every major platform (e.g. Android, iOS, Mac OS X, Windows, Linux ,etc.) EAP-TLS (RFC 5216) is now supported on 2+ billion devices worldwide. This includes numerous open source implementations for both the EAP client and server.
In particular, EAP-TLS, due to its focus on certificate-authentication, has been deployed widely in environments requiring the highest levels of security, such as critical infrastructure, and military/national security installations. In these environments, EAP-TLS's provable security properties are considered critical, as is backward compatibility with the hardware ecosystem that has grown up around EAP-TLS, providing addons such as employee smartcard badges, or hardware-based certificate storage. Given the enormous number of deployed devices, the widespread implementation in open source, and the potential impact on national security and critical infrastructure, it is very important that updates to EAP-TLS consider backwards compatibility, retain the provable security, and avoid introduction of royalty-bearing IPR and the introduction of security vulnerabilities. To provide backwards as well as forwards compatibility, EAP-TLS was designed to to support new versions of TLS, including versions introducing new ciphersuites. So while RFC 5216 mandates support for TLS 1.0 to preserve backwards compatibility, it does not mandate the use of TLS 1.0 or any other version in a given installation. This allows organizations to manage their deployments (and required ciphersuites) as they see fit. For example, an organization wiling to take on the costs of migrating all of their devices and servers to TLS 1.3 and requiring the use of TLS 1.3 mandated ciphersuites is fully able to do so within the framework laid out by RFC 5216. However, what RFC 5216 does NOT attempt to do is to mandate a world-wide non-backward compatible "forklift" upgrade for TLS versions of ciphersuites. Such a non-backward compatible "forklift" update would be extra-ordinarily costly, requiring the upgrading of every device implementing EAP-TLS, including devices that do not use the protocol regularly, if ever. Despite this lack of "central management" imposed by the IETF, the record of EAP-TLS forward compatibility appears to be pretty good. At this point support for TLS 1.1 and 1.2 in EAP-TLS has widely deployed and I am aware of several implementations of EAP-TLS now testing support for TLS 1.3, without any changes to the protocol. I was therefore surprised to come across draft-mattsson-eap-tls13 which: 1. Mandates support for TLS 1.3 in all implementations of EAP-TLS. As noted earlier, organizations requiring support for TLS 1.3 can easily impose such a requirement on their EAP-TLS devices, if the cost and security benefits justify it. However, since RFC 5216 is referenced in many RFPs, obsoleting it merely to impose a TLS 1.3 requirement without extraordinary justification (such as discovery of a critical security flaw that cannot be patched in previous versions) would impose enormous costs. 2. Invalidates the existing security proofs of EAP-TLS by introducing new authentication modes (such as EAP PSK) that were specifically rejected by the EMU WG so to ensure that high-security installations could ensure that certificate-based authentication, and only cert-based authentication was provided by their EAP-TLS implementations. This reversal of an EMU WG decision is very unwise since it has the potential to introduce new security vulnerabilities into the systems protecting some of the world's most sensitive data. 3. Removes much of the security guidance of RFC 5216 addressing known interoperability and security issues. 4. Does not discuss the potential IPR implications of introducing a TLS 1.3 requirement into a protocol that is widely implemented in open source. -------------------------------------- Although I see that the EMU WG concluded earlier this year, I’d like to ask those on this mail list to consider whether an update to RFC 5216 may be worth pursuing. Wireless LAN deployments commonly leverage the EAP-TLS standard. The IEEE took steps earlier this year to raise the bar for wireless security through publishing the new 802.11ac standard. RFC 5216 currently requires TLS 1.0, and the only mandatory cipher suite specified is TLS_RSA_WITH_3DES_EDE_CBC_SHA. I’d like to suggest updating the standard in a manner that also requires mandatory support for TLS 1.2 and ECDHE_ECDSA AEAD cipher suites. Best regards, Clint Clint McKay NSA Information Assurance
_______________________________________________ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu