On Nov 14, 2018, at 9:48 AM, Cappalli, Tim (Aruba Security) <t...@hpe.com> 
wrote:
> 
> The question was asked about making it anonymous NAI mandatory in the 
> Identity Response. That is what my comments were targeted to.

  OK.

  For me, I would be fine with making the anonymous NAI mandatory.  I just 
don't see any end-user benefit to exposing their identities.  And there are 
benefits to privacy.

> In terms of infrastructure, logging into a wireless controller, switch or NMS 
> and seeing hundreds of "anonym...@enterprise.co" makes an administrator's 
> life miserable. Most folks in a large enterprise responsible for 
> troubleshooting end user access do not have access to the EAP server.

  If I were hard-nosed, I would say that's an internal management issue, and 
not a standards issue.  But I get your point, and there are ways to address 
this (see below).

> The only way to provide the real identity back to the NAS would be sending it 
> back as the IETF User-Name in the Access-Accept with the assumption that the 
> NAS would honor it. 

  All NASes that I'm aware of support this.  i.e. where the User-Name in 
Access-Accept is *not* the same as the one in the Access-Request.

  This question came up recently on RADEXT.  The thread is here:

https://www.ietf.org/mail-archive/web/radext/current/msg10079.html

  In short, it is possible (and is widely used) to return the *inner* EAP-TLS 
identity in the *outer* RADIUS Access-Accept.  That breaks user anonymity, but 
it definitely works.

  My $0.02 is that we *should* mandate anonymous outer identities.  Enterprises 
which are OK with breaking user privacy can return a different User-Name in the 
Access-Accept.  Other systems can use another method to track user identities 
across a session.

  In a related note, RFC 4372 defines a "Chargable-User-Identity" which is 
intended to be used as an anonymized user identity in roaming situations.  In 
practice, it's only really supported in WiMAX and in some 3G situations.  Most 
enterprise equipment does not support it, which makes it inapplicable here.

  Never the less, something similar could be done with User-Name in the 
Access-Accept.  And, it should  be supported by all enterprise equipment.

  It may be useful to discuss these topics in a "best practices" document for 
EAP and user anonymity.  If the WG thinks it's useful, I could write it.

  Alan DeKok.

_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to