On Mar 9, 2019, at 6:50 PM, Michael Richardson <mcr+i...@sandelman.ca> wrote:
> I have been following along the discussion, and I think that I missed the use 
> case.
> Why are we having this discussion?

  It's good to understand the edge conditions of the protocol.  Otherwise, it 
might have designed-in flaws.  Or, implementations might be vulnerable to 
attacks which aren't discussed in the specification.

> alan> i.e. a user starts with EAP-TLS, and then tries to "resume" his
> alan> session, but this time uses TTLS.  It's not clear that anything in the
> alan> spec forbids or prevents this.
> 
> What's in it for the user?

  s/user/attacker/

  Answer: lots.

  Systems may have different policies for different EAP types.  Being able to 
undetectably change EAP types seems bad.

  The issue is larger than just resumption with different EAP types.  It's the 
whole set of information around the authentication.  All of that data is 
unsecured, and can be forged.

> Is this an attack?

  Yes.

  If the user changes the unauthenticated data associated with the EAP session 
(MAC address, switch port, etc), it may be possible to bypass poorly designed 
policies.

  e.g. changing the EAP-Request / Identity field.

> Does it avoid an interaction with a human?
> Does it enable mobility between different networks?
> Does this avoid some interaction with a two-factor authenticator?

  It bypasses security policies.  That seems bad.

  The other huge issue is how do we enforce policies with TLS resumption?  The 
EAP-Request / Identity is insecure and can be forged.  So that can't be relied 
on.

  Maybe the EAP server doesn't associate *any* policy data or authentication 
credentials with that TLS session.  In that case, you can "resume", but we have 
no idea *who* is being "resumed", or what policies should be applied to that 
user.  That seems like a rather enormous security issue.

  Since nothing in the protocol prevents people from playing games with it, 
attackers *will* play games, with unknown consequences.  It therefore seems 
prudent to discuss these issues.  Also to give guidance on the possible 
attacks.  And, to give guidance on good practices.

  I think the issue of "resumption across EAP methods" is a minor one, but it 
has opened up a series of additional issues which need addressing.

  The previous EAP-TLS spec was written largely to describe EAP-TLS and nothing 
more.  Realistically, EAP-TLS is almost always used inside of a larger 
ecosystem.  It is therefore also prudent to discuss how these systems can 
interact, and what security issues may arise from this interactions.

  Alan DeKok.

_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to