On Jan 11, 2019, at 8:13 AM, John Mattsson <john.matts...@ericsson.com> wrote:
> 
> The working group did never really discuss the context_value parameter. So 
> just to bring up the question: Is there any information from the EAP-Requests 
> and EAP-Responses that should (and could) be included in the context_value to 
> ensure that the EAP Peer and EAP Sever agree that they have gotten the same 
> information.

 I'll note that the TLS-Exporter function is used after authentication 
succeeds, which makes a difference to what information can be used.  If we use 
a context_value, we should choose one that has the most information, and 
therefore the most utility.

> E.g. from these messages:
> 
>    EAP Peer                                              EAP Server
> 
>                                                         EAP-Request/
>                               <--------                    Identity
>    EAP-Response/
>    Identity (Anonymous NAI)   -------->
>                                                         EAP-Request/
>                                                    EAP-Type=EAP-TLS
>                               <--------                  (TLS Start)

  I would think that all of the public information (such as the data here) 
isn't suitable for use in the context_value.

  Even if it was suitable, what data would we use?  If we use certificate 
privacy and exchange the client cert only in the inner tunnel (i.e. EAP-TLS 
inside of EAP-TLS).  There is minimal data in the outer session that both peer 
and server can agree on.  Well, there's an anonymous NAI, but that isn't good 
for much.

> RFC 5216 does not include any such information in the key derivation, but as 
> the group has agreed to modify the key derivation mechanism for EAP-TLS 1.3, 
> it would be relatively easy to add context information is that is believed to 
> increase current or future security.

  If we believe the argument above, the only data suitable for use in 
context_value is data *both* parties know from the inner tunnel exchange.  That 
generally means information related to client / server certificates.

  And I'm not sure what information from the certs would be used.  We presume 
that the certs are already correct and validated.  TLS ensures that the 
TLS-Exporter function depends on the TLS exchange, which depends on the certs.  
 So using information from the certs seems pointless.

  And what additional information should be added to TLS-Exporter that would 
make it *better*?  EAP-TLS doesn't provide for a way to peer and server to send 
additional data, unlike EAP-TTLS, so there isn't much that can be done here

   In the end, I think any information we could use is already being used to 
derive TLS-Exporter, and there's no real way to get additional information.  
And even if there was, it's not clear what information would make the 
TLS-Exporter "better". Or even what "better" means in this context.

  Alan DeKok.

_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to