I would be very hesitant to mandate RFC 7924. Most EAP-TLS implementations use existing TLS libraries rather than implementing their own TLS stack. And many popular TLS libraries don't provide support for RFC 7924. Please look at : https://github.com/openssl/openssl/issues/5040 for example.
Using RFC 7924 even for dropped handshakes requires wider community review and should stay in draft-ms-emu-eaptlscert. We should try to keep the two drafts in sync but independent. For me, shipping draft-ietf-emu-eap-tls13 within a reasonable time (say within 6 months) is more critical. +1 on making OCSP stapling mandatory. --Mohit On 11/14/18 4:04 PM, John Mattsson wrote: > Hi all, > > I think the draft is now in quite good shape. It would be good to get some > reviews. One thing that I would like to discuss is what the draft should say > about various extensions and mechanisms. In particular: > > > - Revocation > ------------------------------------------------------ > > RFC 5216 says: > > "EAP-TLS peer and server implementations MUST support the use of Certificate > Revocation Lists (CRLs)" > "EAP-TLS peer and server implementations SHOULD also support the Online > Certificate Status Protocol (OCSP)" > "EAP-TLS peers and servers SHOULD implement Certificate Status Request > messages" > > draft-ietf-emu-eap-tls13-03 adds: > > "The use of Certificate Status Requests to determine the current status of > the EAP server's certificate is RECOMMENDED." > > For EAP-TLS where the peer often does not have internet connection OCSP > stapling is often by far the most appropriate mechanism. Is it time to make > Certificate Status Requests (OCSP stapling) mandatory to implement for > EAP-TLS with TLS 1.3? > > My view would be yes, OSCP stapling is solving a lot of issues with > revocation, especially for EAP-TLS. I think OCSP stapling should be mandatory > to support and maybe also mandatory to use... > > What is the working group's opinion about revocation mechanisms? > > > > - Fragmentation due to large certificates > ------------------------------------------------------ > > draft-ietf-emu-eap-tls13-03 says: > > "EAP-TLS peers and servers SHOULD support and use the Cached Information > Extension as specified in [RFC7924]." > > draft-ms-emu-eaptlscert-01 says: > > "The extension however necessitates a successful full handshake before any > caching. This extension can be useful when, for example, when a successful > authentication between an EAP peer and EAP server has occurred in the home > network." > > As fragmentation of large certificates is a large problem in EAP-TLS > deployments, would it make sense to mandate support and or use of RFC 7924 > when TLS 1.3 is used? > > Also, in IETF 102 we discussed cached information and the possibility for the > client to cache the server's certificate from a dropped handshake. I though > more about this and I cannot see any cryptographic problems with the client > caching the server's certificate from a dropped handshake. The client can > verify the certificate anyway, but the server may not have time to prove > possession of the private key before the handshake is dropped. Getting > certificates out-of-band is common in many cases. The only problem I can see > is that an attacker could try to fill the peer's memory storage by sending > certificates to the client, but this does not give any amplification and > could easily be mitigated by the client only caching a single or very few > certificates. > > As fragmentation of large certificates is a large problem in EAP-TLS, my view > would be that we should specify that the peer can cache certificates from a > dropped handshake. With this change is it likely almost always possible to do > EAP-TLS even if the authenticator drops the connection after 40-50 packages. > If we decide to do this, we should tell the TLS working group that we are > planning this and ask for their view. > > (Note that the whole Fragmentation section in draft-ietf-emu-eap-tls13 should > be updated when draft-ms-emu-eaptlscert gets adopted by the WG). > > /John > > -----Original Message----- > From: John Mattsson <john.matts...@ericsson.com> > Date: Wednesday, 14 November 2018 at 13:50 > To: "emu@ietf.org" <emu@ietf.org> > Subject: FW: New Version Notification for draft-ietf-emu-eap-tls13-03.txt > > Hi, > > We have updated the draft according to the discussion and conclusions at IETF > 103. > > - New figure showing the message flow for EAP-TLS client rejection of > NewSessionTicket > > - The draft did not mention that TLS has both warning and fatal alerts. We > changed "TLS Alert Message" to " TLS Fatal Alert" and added a few sentences > that describe the difference. > > "Figures 4, 5, 6, and 7 illustrate message flows in several cases > where the EAP peer or EAP server sends a TLS fatal alert message. > TLS warning alerts generally mean that the connection can continue > normally and does not change the message flow. Note that the party > receiving a TLS warning alert may choose to terminate the connection > by sending a TLS fatal alert, which may add an extra round-trip, see > [RFC8446]." > > - Made it mandatory to always conceal the username in the Identity Response. > This led to smaller changes in several places. > -- Text were updated to reflect this is mandatory > -- Changed "Identity (MyID)" to "Identity (Anonymous NAI)" in all figures > -- Removed the "privacy" figure as that is no longer needed. Instead the > section refer to Figure 1. > > - Added "and all Post-Handshake messages have been sent" to page 3. The new > sentence reads: > "After the TLS handshake has completed and all Post-Handshake messages have > been sent, the EAP server sends EAP-Success." > > - Several editorials. > > Cheers, > John > > -----Original Message----- > From: "internet-dra...@ietf.org" <internet-dra...@ietf.org> > Date: Wednesday, 14 November 2018 at 13:20 > To: Mohit Sethi <mo...@piuha.net>, John Mattsson <john.matts...@ericsson.com> > Subject: New Version Notification for draft-ietf-emu-eap-tls13-03.txt > > > A new version of I-D, draft-ietf-emu-eap-tls13-03.txt > has been successfully submitted by John Mattsson and posted to the > IETF repository. > > Name: draft-ietf-emu-eap-tls13 > Revision: 03 > Title: Using EAP-TLS with TLS 1.3 > Document date: 2018-11-14 > Group: emu > Pages: 22 > URL: > https://www.ietf.org/internet-drafts/draft-ietf-emu-eap-tls13-03.txt > Status: https://datatracker.ietf.org/doc/draft-ietf-emu-eap-tls13/ > Htmlized: https://tools.ietf.org/html/draft-ietf-emu-eap-tls13-03 > Htmlized: https://datatracker.ietf.org/doc/html/draft-ietf-emu-eap-tls13 > Diff: https://www.ietf.org/rfcdiff?url2=draft-ietf-emu-eap-tls13-03 > > Abstract: > This document specifies the use of EAP-TLS with TLS 1.3 while > remaining backwards compatible with existing implementations of EAP- > TLS. TLS 1.3 provides significantly improved security, privacy, and > reduced latency when compared to earlier versions of TLS. EAP-TLS > with TLS 1.3 provides significantly improved protection against > pervasive monitoring by mandating use of privacy. This document > updates RFC 5216. > > > > > > Please note that it may take a couple of minutes from the time of submission > until the htmlized version and diff are available at tools.ietf.org. > > The IETF Secretariat > > > > _______________________________________________ > Emu mailing list > Emu@ietf.org > https://www.ietf.org/mailman/listinfo/emu _______________________________________________ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu