Hi Alan, On 2/5/19 5:48 PM, Alan DeKok wrote: > On Feb 5, 2019, at 10:18 AM, Mohit Sethi M <mohit.m.se...@ericsson.com> wrote: >> But session resumption is not simply about changing one byte in the EAP >> conversation. If you look at Figure 2 of draft-ietf-emu-eap-tls13-03 >> (https://tools.ietf.org/html/draft-ietf-emu-eap-tls13-03), a server is >> issuing a NewSessionTicket only after receiving the TLS Finished from >> the client, at which point it has authenticated the client identity. > Yes... > >> What you are suggesting is that the server should issue a >> NewSessionTicket even before the client has been authenticated (which is >> the case for other TLS based EAP methods) and then only use that for >> resumption. This is significant difference. > No, that's not what I'm saying. I'm not sure why there's confusion. > > I'm saying this: > > 1) user is authenticated via EAP-TLS as normal > > 2) user gets a session ticket for fast session resumption > > 3) user tries to resume the session using the session ticket. > > My questions here are about (3). > > a) Can the user resume via EAP-TLS? Clearly, yes. > > b) Can the user resume via TTLS? In practice, very likely, yes > > OK... so should we disallow (b)? If so, why? If not, why not? > >> Also, client authentication with an easy-to-guess password inside a TLS >> tunnel is different than client authentication with a certificate. Which >> is why I stated the difference in security properties and proofs. > That's true, but is only one part of the situation. > > What about doing an EAP-TLS session, and then resuming via TTLS? That is > a strong authentication with a certificate. How is that resumption > *quantitatively different* from resuming via EAP-TLS? Peer/Client authentication in stage 1 of EAP-TTLS is optional. So there is probably no difference if you do EAP-TLS first and then possibly use EAP-TTLS resumption. But the other way, EAP-TTLS/EAP-PEAP first and then EAP-TLS resumption is not the okay. That is because you can't know how and when the client was authenticated with EAP-TTLS/EAP-PEAP. > > In that situation, the difference *is* exactly octet 5 of the EAP packet. > So again, what *other* difference would forbid that kind of session > resumption? > > We also PEAP with inner MS-CHAP, versus TTLS with inner MS-CHAP. In that > case, both methods have similar data for inner authentication. So why forbid > cross-method session resumption? > > Or authenticating via TTLS with client certs, and resuming via EAP-TLS. > For that situation, they have similar security properties. > > In the end, if a site administrator says "I allow passwords and session > resumption", that should work. I still don't see any quantitative difference > when session resumption is done while changing octet 5 of the EAP packet. > Saying "security properties" when only octet 5 has changed isn't a convincing > argument. > > Maybe the answer here is "we have no idea what cross-method session > resumption means, and therefore we forbid it". > > That's a good answer. But if there are reasons for doing so, I wish to > understand those reasons. I think we are in agreement that there is not good reason to allow such cross method resumption and that this should be forbidden as such.
--Mohit > > Alan DeKok. > > _______________________________________________ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu