Hi!

I performed an AD review of draft-ietf-emu-eap-tls13-09.  Thanks for the work 
on modernizing existing guidance to cover TLS 1.3.

Two high level things caught my attention:

** The abstract, introduction and title suggested to me that this document is 
only about TLS 1.3+EAP.  If I wasn't using TLS 1.3, then there is nothing here 
of interest.  However, there appears to be text here that updates non-TLS 1.3 
guidance.  I recommend being clear about that up front (in the abstract and 
introduction).

** Section 2.1 explicitly says that "[t]his document only lists additional and 
different requirements, restrictions, and processing compared to [RFC8446] and 
[RFC5216]."  The text tries to match section headers names with [RFC5216] 
(which is helpful).  However, I didn't always follow the "updates" without some 
searching.  Editorially, given a particular description of behavior, I 
recommend being clearer by consistently making explicit reference to a 
particular section in RFC5216 that is being updated. 

More details on the above observations and others below:

(1) Can you please check the boiler plate language, idnits is complaining is as 
follows:
  == The document seems to lack the recommended RFC 2119 boilerplate, even if
     it appears to use RFC 2119 keywords -- however, there's a paragraph with
     a matching beginning. Boilerplate error?

     (The document does seem to have the reference to RFC 2119 which the
     ID-Checklist requires).
     (Using the creation date from RFC5216, updated by this document, for
     RFC5378 checks: 2007-07-01)

  -- The document seems to lack a disclaimer for pre-RFC5378 work, but may
     have content which was first submitted before 10 November 2008.  If you
     have contacted all the original authors and they are all willing to grant
     the BCP78 rights to the IETF Trust, then this is fine, and you can ignore
     this comment.  If not, you may need to add the pre-RFC5378 disclaimer. 
     (See the Legal Provisions document at
     https://trustee.ietf.org/license-info for more information.)

(2) Section 1.  Editorial.  Instead of something working "perfectly", maybe 
just "supports"
OLD
   EAP-TLS [RFC5216] references TLS 1.0 [RFC2246] and TLS 1.1 [RFC4346],
   but works perfectly also with TLS 1.2 [RFC5246].   

NEW
EAP-TLS [RFC5216] explicitly references TLS 1.0 [RFC2246] and TLS 1.1 
[RFC4346], but it also supports TLS 1.2 [RFC5246].   

(3) Section 1.  Editorial.  "Easy" might be relative.

OLD
   Privacy is mandatory and achieved without any additional round-trips,
   revocation checking is mandatory and easy with OCSP stapling,

NEW
Privacy is mandatory and achieved without any additional round-trips,   
revocation checking is mandatory and simplified with OCSP stapling,

(3) Section 2.1.1.  What is the relationship between this section and NAI 
guidance in RFC5216 Section 2.1.4?  Is it that anonymous NAIs are RECOMMENDED 
for TLS 1.3, but stay a MAY in old EAP-TLS?

(4) Section 2.1.3.  Editorial.  To prevent the reader from having to line up 
which paragraphs are being replaced in Section 2.1.3 of [RFC5216], I would 
recommend citing the old text and showing how this text replaces it.  
Additionally, since RFC5216 lists the peer guidance before the server, I'd 
recommend reversing the order.  For example:

Original TLS guidance from RFC5216:
If the peer authenticates successfully, the EAP server MUST respond
   with an EAP-Request packet with EAP-Type=EAP-TLS, which includes, in
   the case of a new TLS session, one or more TLS records containing TLS
   change_cipher_spec and finished handshake messages.  The latter
   contains the EAP server's authentication response to the peer.  The
   peer will then verify the finished message in order to authenticate
   the EAP server.
....
   If the EAP server authenticates successfully, the peer MUST send an
   EAP-Response packet of EAP-Type=EAP-TLS, and no data.  The EAP Server
   then MUST respond with an EAP-Success message.

TLS 1.3 guidance:
[insert new language in the draft now]

(5) Section 2.1.5.  Is Figure 6 supposed to be read as being inclusive of all 
TLS messages?  The figure doesn't contain TLS CertificateRequest, TLS 
Certificate, or TLS CertificateVerify.  It wouldn't be germane to what the 
figure is trying to demonstrate but the examples in prior sections are 
"complete".

(6) Section 2.1.6.  The text here seems right to describe TLS 1.3 behavior.  
Recommend being clearer on which behavior this is replacing in TLS-EAP (i.e., 
explicitly citing a given section in RFC5216; is it Section 2.1.2?)

(7) Section 2.1.7.  The text here seems right to describe TLS 1.3 behavior.  
Recommend being clearer on which behavior this is replacing in TLS EAP (i.e., 
explicitly citing a given section in RFC5216)

(8) Section 2.1.7.  Per "When NAI reuse can be done without privacy 
implications", is there any guidance that can be provided on where there would 
be a privacy issue?

(9) Section 2.1.9.  The text here seems right to describe TLS 1.3 behavior.  
Recommend being clearer on which behavior this is replacing in TLS EAP (i.e., 
explicitly citing a given section in RFC5216, is it Section 2.1.5?)

(10) Section 5.1. Editorial.  Wrong section reference. s/Section 4.1. of 
[RFC5216]/Section 5.1 of [RFC5216]/

(11) Section 5.1.  Per "better confidentiality" in [2], this seems imprecise

(12) Section 5.4.  Per "While certificates often have a long validity period 
spanning several years, there are ...", as this is changing perhaps just say 
"While certificates may have long validity periods, there are ..."

(13) Section 5.5.  Recommend that this section read "No updates to Section 5.5 
of [RFC5216]"

(14) Section 5.6.  The guidance in this section does appear to be TLS 1.3 
specific.  If it isn't, it should be noted as such.

(15) Section 5.7.  Per "Since accounting must be tied to an authenticated 
identity ...", is there is a reason not to use a normative MUST here?  
Especially since later a normative RECOMMENDED is used for "It is RECOMMENDED 
that authorization, accounting and policy decisions are reevaluated based on 
information given in resumptions".

(16) Section 5.8.  Editorial. Per "[RFC6973] suggests that the privacy 
considerations of IETF protocols be documented", it isn't clear to me what this 
sentence is adding.

(17) Section 5.8.  Editorial.  s/TLS 1.3 offers much better privacy than 
.../TLS 1.3 offers better privacy properties than .../

(18) Section 5.8.  Editorial. Per "If privacy-friendly identifiers with 
encrypted usernames need to be generated with care", as written, this is a only 
sentence fragment.

(19) Section 5.8.  Per "An EAP peer with a policy allowing communication with 
EAP servers supporting only TLS 1.2 without privacy  and with a static RSA key 
exchange is vulnerable to disclosure of the peer username", the "without 
privacy" would benefit from being more precisely stated.

(20) Section 5.9.  Editorial. Per "As required by [RFC7258] ...", I'm not sure 
what this sentence adds.

(21) Section 5.9.  Could you contextualize this "widespread surveillance of 
users " more specifically within the EAP context.

Regards,
Roman


_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to