On Sun, Dec 15, 2019 at 4:01 PM Owen Friel (ofriel) <ofr...@cisco.com> wrote:
> Hi, > > > > At ACME meeting at IETF106, the last discussion of the week was around EMU > looking for recommendations for EAP client/peer/supplicant cert > verification logic when the client is verifying the cert that the EAP > server presents. Minutes here: > https://datatracker.ietf.org/doc/minutes-106-acme/ The recommendation > was to ask lamps. This was also discussed on EMU mailer recently. > > > > Quoting some additional background that Alan gave on EMU mailer: > > > > “Background: > > > > a) the current practice in TLS-based EAP methods is to use certificates > with "id-kp-serverAuth" OID set for Extended Key Usage. > > b) many supplicants check for this OID, and refuse to perform > authentication if it is missing > > c) supplicants do not check DNS names or any other field in the > certificates > > d) as a result of this lack of verification, supplicants ship with all > known CAs disabled for TLS-based EAP methods” > > > > The key consideration is that RFCs that recommend cert fields for EAP > servers that clients should check for are not currently issued by public > CAs, and in some instances (e.g. SSID) ownership can often not be proven by > CAs. > > > > For example: > > > > https://tools.ietf.org/html/rfc4334#section-2 id-kp-eapOverLAN EKU > > > > https://tools.ietf.org/html/rfc4334#section-3 id-pe-wlanSSID > > > > https://tools.ietf.org/html/rfc7585#section-2.2 NAIRealm > > > > If an EAP server operator wants to use a public CA identity cert on their > EAP server, what recommendations should we give to EAP clients so that the > supplicant code can handle public or private CA issued EAP server identity > in a secure a fashion as possible? > Define “public CA” first, and it’ll be clearer that the question is really supplicant-specific. That is, most definitions for “public CAs” come down to “I don’t want to think about / analyze the security or validation practices of the CA, I want my supplicant / software / hardware vendor to do it for me, against some criteria the vendor is responsible for, and hope it all works out”. To the extent TLS uses ‘public CAs’, it either boils down to the OS or browser vendors reaching rough (independent) consensus on who is worth trusting, or the vendor going along with everyone else’s decisions for cost (too expensive for the vendor to evaluate) or compatibility (everyone else trusts them and it’d break things if the vendor doesn’t) reasons. Is the supplicant market likely to reach that consensus? It seems unlikely, unless and until you define the “thing everyone can and wants and needs to validate”, and that thing is either globally unique (like DNS) or sufficiently domain specific (e.g. Passpoint) that vendors can agree. If at some point in the future, public CAs are willing to issue certs with > some or all of the above fields, then what is the migration plan, what do > we tell EAP clients to do now, and how to they migrate their verification > logic? > This statement similarly requires untangling. There are “public CAs” as “The set of keys/certificates used for authenticating particular services” and “public CAs” as the set of organizations that own/operate those keys. The case of the former is extremely unlikely, as the industry is actively moving away from that approach to PKI, by trying to ensure separate keys for separate use cases or authentication realms, of which EAP would surely be. The case of the latter is already available from said organizations as part of “managed CA” or “private CA” offerings, which are operated by that public CA organization, but that’s effectively greenfield because you aren’t having to interoperate with any extant keys or certificate profiles. The ideal experience would be along these lines for a client with real user > interactions: > > - client connects to an EAP server > > - client prompts user for userId + realm and password > > - client verifies server cert has id-kp-eapOverLAN set > What assurance is this to provide? - NAIRealm in cert matches user’s realm > This only works iff the NAIs are globally unique (e.g. map to DNS), which imposes requirements on NAIs that aren’t present in RFC 7542, and seemingly intentionally, compared to 4282. - verify the cert signing chain > > > > The reality today is that if the server cert is issued by a public CA, > then all that client can really check is: > > - id-kp-serverAuth is set > > - dNSName in cert matches user’s realm > > - verify the cert signing chain > > > > We would like to document some recommendations for EAP clients and EAP > operators so that public CAs could be used, and recommend checks for public > vs. private CA issued EAP server certs. > If you mean the same set of CAs and keys used for TLS by common operating systems and browsers, it bears highlighting again: industry is moving away from that. Which is to say that contracts and requirements for PKIs used “by default” by browsers and operating systems are being explicit about the need to segment purpose and use case and not use such certificates for such purposes. Already, TLS and e-mail, the two dominant uses of PKI in such systems, are required to be distinguished at their intermediate level. Browsers are looking to explicitly only trust the TLS-Web side of the PKI, and making sure that the TLS-Web PKI side is highly agile. Other cases, such as restricted use server to server PKI or industry bespoke cases (such as financial services or system networking) are being restricted to PKIs that aren’t federated-by-default. For example, X9 recently revived their PKI WG, to define PKI requirements appropriate for financial services customers (like ATM to bank), because financial services struggle to move at the same speed as modern software, for understandable reasons. The use of domain/purpose-specific PKIs is something we can and should be embracing more of. It seems like logic should be something like: > > > > - recommend EAP operators with private CA issued certs on their EAP > servers set id-kp-eapOverLAN and NAIRealm set > > - recommend EAP operators using public CAs get EAP server certs with > id-kp-serverAuth and dNSName set > - recommend clients enable trust in public CAs > This is why I started with trying to define what “public CAs” are. If you mean the extant CAs trusted by browsers and operating systems, both this recommendation and the one proceeding it may not be good recommendations or long-term viable practices. That’s not to say you couldn’t, but it means your EAP services and servers need to be prepared to be as agile as the Web ecosystem is and modern operating systems are converging on. The ability to support or be beholden to “legacy” - whether algorithms, profiles, or trust in particular organizations - is something that industry is recognizing does not align with user needs. This means adopting practices like automation, being able to quantify compatibility risks, and being able to move quickly as expectations change, in response to ecosystem challenges. Maybe that’s fine for EAP, but I’m willing to suspect that it because updates may involve physically replacing client hardware or physically installing firmware, you really don’t want EAP needing to be beholden to those agility needs of the Web and OSes. And, again, that’s perfectly OK, it just means defining a PKI and set of procedures that is appropriate for that use case, and convincing industry to adopt it as an “out of the box” configuration. Or, alternatively, embracing private PKI. - recommend clients implement different cert verification logic depending > on whether the EAP server cert is issued by a public CA or private CA > Why is this good? To the extent browsers or OSes make this distinction, it’s largely based on simply phasing rollouts of new requirements, with the goal to eventually require consistent and uniform treatment to ensure simpler code with consistent and uniform security properties. Having a long-term segmentation of requirements, or even encouraging them without a clear vision back to harmonization, is definitely an anti-pattern here. - for public CA certs, client checks that id-kp-serverAuth is set **and** > dNSName matches user realm. If either check fails, reject. > > - for private CA certs, client checks that id-kp-serverAuth or > id-kp-eapOverLAN is set **and** NAIRealm matches user realm.. If either > check fails, reject. > > > > - as a longer term goal see if public CAs will issue id-kp-eapOverLAN and > NAIRealm. Although of course if some were to start doing this, then there > is a migration challenge, and clients cannot make a hard check for these > values against all public CAs. This doesn’t really seem practical in the > near term at all. > The effect of the separate EKU, which is actually quite desirable, is that it functionally makes it difficult for CAs to issue these certificates from intermediated that lack this EKU or any EKU. Further, CAs subject to browser/OS vendor oversight are consistently required to segment out their EKUs at the intermediate level, and required to always specify EKUs. The end result is that, to achieve this long term goal, you’ve effectively required the establishment of a new PKI - just at the intermediate level rather than the root. And as many of the public CAs can tell you, having recently encountered challenges regarding non-TLS intermediates from roots that are subject to browser/OS oversight, it’s often easier to use separate roots as well. Again, I think that’s desirable, to define an entirely new PKI with zero overlap with the server auth/TLS PKI used by OSes/browsers, but that does change your recommendations and design a bit :) The short term recommendation becomes “don’t use public CAs”, and that seems easier to explain and easier to evolve the technical requirements, until the time that such a new, EAP-specific public PKI can be introduced. In my mind, this is no different from organizations that want TLS certificates for their servers named “webmail” (not globally unique) or “mail_01.company.example” (not preferred name form / LDH). The answer is “use private CAs, don’t use public CAs” > > Note that for an IoT device, there is some work to do to define how to > e.g. extend the RFC8366 so that it can specify the dNSName that devices > should check for when verifying EAP identity where they EAP server uses a > public CA. Some related options are outlined in > https://tools.ietf.org/html/draft-friel-anima-brski-cloud-01. > > > > Comments/thoughts? > > > > Regards, > > Owen > > > > > > > > > > > > > > > > > _______________________________________________ > Spasm mailing list > sp...@ietf.org > https://www.ietf.org/mailman/listinfo/spasm >
_______________________________________________ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu