Hi Alan,

Thanks for you many good suggestions. I tried to address all your comments and 
include all your suggestions in a recent commit to github.

- I did not include an identity section as I did not see how it would fit with 
the structure of RFC 5216 that the draft reuses. Instead I expanded the 
identity sections in the resumption and privacy sections and added a new 
paragraph on identity in Section 2.1. This aligns well with RFC 5216.
- The text on encrypted usernames (like 3GPP SUCI) where updated to illustrate 
that they are intended to be NAIs, not opaque blobs.
- I added an explanation on how to derive a anonymous NAI from a NAI in the 
certificate subject name. I did not want to talk about common name as the 
certificate may contain a subjectAltName which is not common name (I think).

The new suggested paragraphs on identities are shown below. The resumption and 
privacy section only talks about details specific for resumption and privacy.

Cheers,
John

----------------------------------

2.1.  Overview of the EAP-TLS Conversation

   ...

   It is RECOMMENDED to use a NAIs in the Identity Response [RFC7542] as
   such identities are routable.  While opaque blobs are allowed by
   [RFC3748] such identities are NOT RECOMMENDED as they are not
   routable and should only be considered in local deployments where the
   EAP Peer, EAP authenticator, and EAP Server all belong to the same
   network.  An anonymous NAIs MAY be derived from the subject name in
   the TLS client certificate by removing the username from a NAI.  The
   subject name in client certificates typically contains an identity
   with a routable domain such as an email address.

2.1.6.  Resumption

   ...

   It is RECOMMENDED to use a NAIs with the same realm in the resumption
   and the original full authentication.  This requirement allows EAP
   packets to be routable to the same destination as the original full
   authentication.  The TLS PSK identity is typically derived be the TLS
   implementation and may be an opaque blob without a routable realm.
   The TLS PSK identity is therefore in general unsuitable for deriving
   a NAI to use in the Identity Response.

2.1.7.  Privacy

   ...

   EAP-TLS peer and server implementations supporting TLS 1.3 or higher
   MUST support anonymous NAIs (Network Access Identifiers) (Section 2.4
   in [RFC7542]) and a client supporting TLS 1.3 MUST NOT send its
   username in cleartext in the Identity Response.  Following [RFC7542],
   it is RECOMMENDED to omit the username (i.e. the NAI is @realm), but
   other constructions such as a fixed username (e.g. anonymous@realm)
   or an encrypted username (e.g.  YmVuZGVy@realm) are allowed.  Note
   that the NAI MUST be a UTF-8 string as defined by the grammar in
   Section 2.2 of [RFC7542].

----------------------------------
 

_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to