I think mandatory support and use of stapling is a great idea. There have been 
so many changes across platforms the past few years w.r.t. status checks during 
an EAP exchange which has caused significant admin and end user headache. This 
solves that by making it consistent while adding the security value of 
revocation checks for the server identity.

Mandating support for the Cached Information Extension also seems like a good 
idea given the uptick of EAP-TLS usage and larger chains. I'd definitely be 
interested in hearing the TLS WGs opinion on this before being comfortable with 
mandating use.

tim


On 11/14/18, 9:04 AM, "Emu on behalf of John Mattsson" <emu-boun...@ietf.org 
on behalf of john.matts...@ericsson.com> wrote:

    Hi all,
    
    I think the draft is now in quite good shape. It would be good to get some 
reviews. One thing that I would like to discuss is what the draft should say 
about various extensions and mechanisms. In particular:
    
    
    - Revocation
    ------------------------------------------------------
    
    RFC 5216 says:
    
    "EAP-TLS peer and server implementations MUST support the use of 
Certificate Revocation Lists (CRLs)"
    "EAP-TLS peer and server implementations SHOULD also support the Online 
Certificate Status Protocol (OCSP)"
    "EAP-TLS peers and servers SHOULD implement Certificate Status Request 
messages"
    
    draft-ietf-emu-eap-tls13-03 adds:
    
    "The use of Certificate Status Requests to determine the current status of 
the EAP server's certificate is RECOMMENDED."
    
    For EAP-TLS where the peer often does not have internet connection OCSP 
stapling is often by far the most appropriate mechanism. Is it time to make 
Certificate Status Requests (OCSP stapling) mandatory to implement for EAP-TLS 
with TLS 1.3? 
    
    My view would be yes, OSCP stapling is solving a lot of issues with 
revocation, especially for EAP-TLS. I think OCSP stapling should be mandatory 
to support and maybe also mandatory to use...
    
    What is the working group's opinion about revocation mechanisms?
    
    
    
    - Fragmentation due to large certificates
    ------------------------------------------------------
    
    draft-ietf-emu-eap-tls13-03 says:
    
    "EAP-TLS peers and servers SHOULD support and use the Cached Information 
Extension as specified in [RFC7924]."
    
    draft-ms-emu-eaptlscert-01 says:
    
    "The extension however necessitates a successful full handshake before any 
caching.  This extension can be useful when, for example, when a successful 
authentication between an EAP peer and EAP server has occurred in the home 
network."
    
    As fragmentation of large certificates is a large problem in EAP-TLS 
deployments, would it make sense to mandate support and or use of RFC 7924 when 
TLS 1.3 is used?
    
    Also, in IETF 102 we discussed cached information and the possibility for 
the client to cache the server's certificate from a dropped handshake. I though 
more about this and I cannot see any cryptographic problems with the client 
caching the server's certificate from a dropped handshake. The client can 
verify the certificate anyway, but the server may not have time to prove 
possession of the private key before the handshake is dropped. Getting 
certificates out-of-band is common in many cases. The only problem I can see is 
that an attacker could try to fill the peer's memory storage by sending 
certificates to the client, but this does not give any amplification and could 
easily be mitigated by the client only caching a single or very few 
certificates.
    
    As fragmentation of large certificates is a large problem in EAP-TLS, my 
view would be that we should specify that the peer can cache certificates from 
a dropped handshake. With this change is it likely almost always possible to do 
EAP-TLS even if the authenticator drops the connection after 40-50 packages. If 
we decide to do this, we should tell the TLS working group that we are planning 
this and ask for their view.
    
    (Note that the whole Fragmentation section in draft-ietf-emu-eap-tls13 
should be updated when draft-ms-emu-eaptlscert gets adopted by the WG).
    
    /John
    
    -----Original Message-----
    From: John Mattsson <john.matts...@ericsson.com>
    Date: Wednesday, 14 November 2018 at 13:50
    To: "emu@ietf.org" <emu@ietf.org>
    Subject: FW: New Version Notification for draft-ietf-emu-eap-tls13-03.txt
    
    Hi,
    
    We have updated the draft according to the discussion and conclusions at 
IETF 103. 
    
    - New figure showing the message flow for EAP-TLS client rejection of 
NewSessionTicket      
    
    - The draft did not mention that TLS has both warning and fatal alerts. We 
changed "TLS Alert Message" to " TLS Fatal Alert" and added a few sentences 
that describe the difference.
    
      "Figures 4, 5, 6, and 7 illustrate message flows in several cases 
       where the EAP peer or EAP server sends a TLS fatal alert message.        
       TLS warning alerts generally mean that the connection can continue       
       normally and does not change the message flow.  Note that the party      
       receiving a TLS warning alert may choose to terminate the connection     
       by sending a TLS fatal alert, which may add an extra round-trip, see     
       [RFC8446]."
    
    - Made it mandatory to always conceal the username in the Identity 
Response. This led to smaller changes in several places.
       -- Text were updated to reflect this is mandatory 
       -- Changed "Identity (MyID)" to "Identity (Anonymous NAI)" in all figures
       -- Removed the "privacy" figure as that is no longer needed. Instead the 
section refer to Figure 1.
    
    - Added "and all Post-Handshake messages have been sent" to page 3. The new 
sentence reads:
     "After the TLS handshake has completed and all Post-Handshake messages 
have been sent, the EAP server sends EAP-Success."  
    
    - Several editorials.
    
    Cheers,
    John
    
    -----Original Message-----
    From: "internet-dra...@ietf.org" <internet-dra...@ietf.org>
    Date: Wednesday, 14 November 2018 at 13:20
    To: Mohit Sethi <mo...@piuha.net>, John Mattsson 
<john.matts...@ericsson.com>
    Subject: New Version Notification for draft-ietf-emu-eap-tls13-03.txt
    
    
    A new version of I-D, draft-ietf-emu-eap-tls13-03.txt
    has been successfully submitted by John Mattsson and posted to the
    IETF repository.
    
    Name:               draft-ietf-emu-eap-tls13
    Revision:   03
    Title:              Using EAP-TLS with TLS 1.3
    Document date:      2018-11-14
    Group:              emu
    Pages:              22
    URL:            
https://www.ietf.org/internet-drafts/draft-ietf-emu-eap-tls13-03.txt
    Status:         https://datatracker.ietf.org/doc/draft-ietf-emu-eap-tls13/
    Htmlized:       https://tools.ietf.org/html/draft-ietf-emu-eap-tls13-03
    Htmlized:       
https://datatracker.ietf.org/doc/html/draft-ietf-emu-eap-tls13
    Diff:           
https://www.ietf.org/rfcdiff?url2=draft-ietf-emu-eap-tls13-03
    
    Abstract:
       This document specifies the use of EAP-TLS with TLS 1.3 while
       remaining backwards compatible with existing implementations of EAP-
       TLS.  TLS 1.3 provides significantly improved security, privacy, and
       reduced latency when compared to earlier versions of TLS.  EAP-TLS
       with TLS 1.3 provides significantly improved protection against
       pervasive monitoring by mandating use of privacy.  This document
       updates RFC 5216.
    
                                                                                
      
    
    
    Please note that it may take a couple of minutes from the time of submission
    until the htmlized version and diff are available at tools.ietf.org.
    
    The IETF Secretariat
    
    
    
    _______________________________________________
    Emu mailing list
    Emu@ietf.org
    https://www.ietf.org/mailman/listinfo/emu
    

_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to