On Jan 9, 2018, at 8:46 AM, John Mattsson <john.matts...@ericsson.com> wrote:
> 
> We have submitted an updated version of draft-mattsson-eap-tls13. The new 
> version is a significant update based on the feedback and comments on the EAP 
> and EMU mailing lists. The new version also fills in all the sections that 
> was TDB in the -00 version.

  That looks a lot cleaner, thanks.

> - The draft now updates version updates RFC5216 (instead of obsoleting) and 
> all text have been updated to make sure that the update stays compatible with 
> all existing implementations of EAP-TLS


> - Added more text on what TLS 1.3 changes and why an update to RFC5216 is 
> needed.

  Nit:

   This means that significant parts of
   the normative text in the previous EAP-TLS specification [RFC5216] no
   longer apply, and aspects such as privacy handling, resumption, and
   key derivation need to be handled differently.

  Instead of "no longer apply", I would say "are not applicable to EAP-TLS 
using TLS 1.3".  A simple "no longer applies" text could be interpreted as 
meaning it no longer applies to *any* variant of EAP-TLS.


> - As this is now an update, all duplicated text is removed, and the draft 
> only describe the changes to message flow, messages, key derivation, privacy, 
> etc. when TLS 1.3 is used. The new draft follows the structure of RFC5216 and 
> lists updates (if any) to each section.

  Nit:

   The EAP server MUST authenticate with a certificate and SHOULD
   require the EAP peer to authenticate with a certificate.

  If the client certificate isn't provided, how is the client to be 
authenticated?  It may be better to say that the peer MUST authenticate itself 
initially with a certificate, and then MUST use a provisioned PSK for session 
resumption.  Only those two authentication methods are allowed.

> - Clearly stated that PSK authentication SHALL not be used (except for 
> resumption).

  Why would PSK be forbidden?

  The TLS 1.3 spec clearly allows PSKs to be established out of band:

https://tlswg.github.io/tls13-spec/draft-ietf-tls-tls13.html#rfc.section.2.2

  While RFC 5216 doesn't explicitly allow PSKs to be used, it doesn't forbid 
them or define how they're used.  The only other reference to EAP-TLS with PSK 
seems to be draft-otto-emu-eap-tls-psk-02.txt, from 2007.

  I guess my question here is how to allow PSK for session resumption, while 
forbidding the use of static keys everywhere else.

  Nit:

   ... If the client has received a NewSessionTicket
   message from the server, the client can use the PSK identity   

  "can" use the PSK identity?  What if it chooses to not use the PSK identity?

  I suspect it would be better to say that the EAP server MUST provide an 
identity and PSK for session resumption.  When doing session resumption, the 
EAP peer MUST use that identity and PSK.

  There's no benefit to the peer using a *different* identity.  The current 
phrasing "can use..." sounds philosophical instead of prescriptive.  It would 
be better to mandate the correct behaviour.

  Nit:

   A subsequent authentication using resumption, where both sides
   authenticate successfully is shown in Figure 3.

  It would be good to show a subsequent authentication using session 
resumption, where the server rejects the resumption, and requests that the EAP 
peer re-authenticate from scratch.

  It would also be good to note that if the session resumption is rejected, the 
EAP peer MUST discard the ticket, along with any associated identity and PSK. 

> - Due to the encrypted handshake in TLS 1.3 there is no longer any need for 
> the EAP client to send and empty certificate list. A privacy section has been 
> added that explains this.
> 
> - A key hierarchy section has been added specifying that when TLS 1.3 is used 
> then Key_Material, IV, and Session-Id SHALL be derived from the 
> exporter_master_secret using the TLS exporter interface.

  That's good.

  Alan DeKok.

_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to