On Jan 7, 2020, at 12:33 PM, Ryan Sleevi <ryan-i...@sleevi.com> wrote:
> > At the high-level, I will say that using TLS (id-kp-serverAuth) 
> > certificates, from the intersection of CAs that are commonly trusted by 
> > operating systems and browsers, is bad. It will create security issues, 
> > will create interoperability issues, and will not help users.
> 
>   It's been accepted practice in all EAP implementations for ~15 years.  Are 
> there practical issues you're aware of?  Because I can't recall seeing any.
> 
> I'm sure "practical" will be seen as subjective, but here's some examples:
> 
> Operational:
> - Customers of CAs having trouble when their CA has to perform timely 
> revocation of their certificates
> - Migration off SHA-1
> - Migration off 1024-bit RSA
> - CAs being shut down or exiting the business due to non-compliance with 
> browser requirements

  How is that specific to the use of TLS (id-kp-serverAuth) certificates?  Any 
use of TLS certificates by EAP would be subject to the same issues.

> Security:
> - Cross-protocol considerations due to key reuse seems like a meaningful 
> security issue that's being dismissed.

  Who is dismissing it?

>   Any security issues are limited.  If a site administrator has access to the 
> public / private keys for a web server, it's possible to re-use those certs 
> for EAP.  This re-use cannot be prevented.
> 
> No. But it results in prompt revocation of that certificate if anyone 
> demonstrates it being used like that

  No, it doesn't.

  *Everyone* has been doing this with EAP for a very long time.  i.e. getting a 
certificate using id-kp-serverAuth from a root CA, and then using that 
certificate for EAP.  I have never heard of such a certificate being revoked.

> There's no short-term or medium-term solution that can rely on 'accepting' or 
> 'specifying' the use of id-kp-serverAuth, which was the original proposal as 
> a "recommend". Any of those uses are inherently broken and unsafe and just 
> time bombs waiting to go off.

  It's been 15+ years.  There has been no such issue.

  I think it's acceptable to recommend people continue existing practice, where 
such practice has been shown to be (a) workable, and (b) has no known issues.

>   Everyone knows that it's wrong to use id-kp-serverAuth for EAP.   The way 
> forward is to figure out how to fix it.
> 
> Update software?

  To do *what*?  A concrete proposal would help here.

> I'm glad there's agreement it's bad/wrong to use, but it seems the only path 
> forward is going to be to breaking, not recommending for using public (TLS) 
> CAs with id-kp-serverAuth.

  Please call Microsoft and Apple, and tell them you're going to forbid their 
15 year workflow for EAP.  Then, tell them that you *want* their systems to 
break, and that it's for security reasons.

  I suspect that request won't go over well.

  We just cannot break existing systems without a clear and present security 
problem.  And none has been demonstrated here.

> Attempting to specify some interoperable behaviour in the interim, before 
> things are broken, for how folks can keep using id-kp-serverAuth, seems to be 
> the problem. Just accepting that things need to be broken seems like it 
> easily allows moving into the discussion about NAIRealm and manual 
> configuration.

  I think it's OK to *document* existing behaviour.  Behaviour that has been 
demonstrated in to be interoperable with billions of devices.

> I know that's easy to say when it's individual vendors who have to deal with 
> the fallout and that's why I suggested there's a spectrum of responses for 
> how that's phased out. But explicitly moving towards that goal, and not 
> trying to live in the interim with id-kp-serverAuth, seems the best path 
> forward.

  I welcome concrete proposals to move forward.  The discussion here seems to 
recommend against using id-kp-eapOverLAN and NAIRealm.  Which means we *don't* 
have a way forward.

  In the absence of a solution, it's best to document existing practice.

  Alan DeKok.

_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to