This message had my response in the wrong place. I was responding to Tim's comments and not to Alan's comments. I completely agree with Alan that this information needs to be fed back to the NAS and not rely on what the client starts out saying.
> -----Original Message----- > From: Emu <emu-boun...@ietf.org> On Behalf Of Jim Schaad > Sent: Wednesday, November 14, 2018 10:35 AM > To: 'Cappalli, Tim (Aruba Security)' <t...@hpe.com>; 'Alan DeKok' > <al...@deployingradius.com> > Cc: emu@ietf.org; 'John Mattsson' <john.matts...@ericsson.com> > Subject: Re: [Emu] FW: New Version Notification for draft-ietf-emu-eap- > tls13-03.txt > > > > > -----Original Message----- > > From: Emu <emu-boun...@ietf.org> On Behalf Of Cappalli, Tim (Aruba > > Security) > > Sent: Wednesday, November 14, 2018 6:49 AM > > To: Alan DeKok <al...@deployingradius.com> > > Cc: emu@ietf.org; John Mattsson <john.matts...@ericsson.com> > > Subject: Re: [Emu] FW: New Version Notification for > > draft-ietf-emu-eap- tls13-03.txt > > > > The question was asked about making it anonymous NAI mandatory in the > > Identity Response. That is what my comments were targeted to. > > > > In terms of infrastructure, logging into a wireless controller, switch > > or NMS and seeing hundreds of "anonym...@enterprise.co" makes an > > administrator's life miserable. Most folks in a large enterprise > > responsible for troubleshooting end user access do not have access to the > EAP server. > > > > The only way to provide the real identity back to the NAS would be > > sending it back as the IETF User-Name in the Access-Accept with the > > assumption that the NAS would honor it. > > My first response to this would be - what happens as an attacker I supply one > name in the outer and validate using a different (and correct) inner name. > This is going to make the administrator's life miserable since they are going > to be looking at the wrong name and not have any ability to recognize that > that is the problem. > > Jim > > > > > tim > > > > On 11/14/18, 8:38 AM, "Alan DeKok" <al...@deployingradius.com> > wrote: > > > > > > > > On Nov 14, 2018, at 8:16 AM, Cappalli, Tim (Aruba Security) > > <t...@hpe.com> wrote: > > > > > > > > > > Making it mandatory to use an anonymous NAI will be a huge issue > > in enterprise where the infrastructure, device and enterprise identity > > is owned by the enterprise. There is no proxy or third party provider. > > > > > > > > I don't see that in Section 2.1.4. It says: > > > > > > > > ... a client supporting TLS 1.3 MUST NOT send its > > > > username in cleartext in the Identity Response. It is > > RECOMMENDED to > > > > use anonymous NAIs, but other solutions where the username is > > > > encrypted MAY be used. > > > > > > > > So username *hiding* his mandatory. But the method is left to > > the implementation. > > > > > > > > > Seeing "anonym...@enterprise.com" across all network > > infrastructure is not going to be acceptable. > > > > > > > > In what context will you "see" that across all network infrastructure? > > > > > > > > Since this is the enterprise, you control your own RADIUS > > server. You can associate the *inner* identity with the users > > session. There is no requirement that you only look at the outer > > identity for tracking user sessions. This tying of inner / outer > > identities is common in ISP and enterprise environments. > > > > > > > > In the absence of specific reasons behind this statement, I just > > don't see how anonymous identities are a problem for anyone, anywhere. > > > > > > > > If I had to guess, I'd say that the problem comes from *other* > > devices on the network. Devices that snoop EAP, but aren't involved > > in the actual authentication. The solution there would be to have the > > local RADIUS server talk to the local snooping device. Or, the local > > snooping device looks at MAC addresses instead of EAP identities. And > > then uses the RADIUS DB to correlate MAC address to EAP inner identity. > > > > > > > > > Why not provide a flag that can be passed in the EAP exchange > > from the supplicant that enables this behavior so users with full > > control of their device can use this while enterprise or other use > > cases that require real identity can configure the supplicant to provide a > different flag? > > > > > > > > Given the horrific nature of implementations and > > inter-operability, I would oppose yet another point of negotiation. > > It does not add anything IMHO. And, it makes implementations and inter- > operability more complex. > > > > > > > > Alan DeKok. > > > > > > > > > > > _______________________________________________ > Emu mailing list > Emu@ietf.org > https://www.ietf.org/mailman/listinfo/emu _______________________________________________ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu