Hi Alan and Terry,

Thank you again for the feedback. I have updated the text in github:
https://emu-wg.github.io/draft-ietf-emu-eap-tls13/draft-ietf-emu-eap-tls13.html#rfc.section.5.7

Here is the diff for your convenience:
https://tools.ietf.org/rfcdiff?url1=https://tools.ietf.org/id/draft-ietf-emu-eap-tls13.txt&url2=https://emu-wg.github.io/draft-ietf-emu-eap-tls13/draft-ietf-emu-eap-tls13.txt

We'll submit the new version once we have sufficient implementation 
experience with the use of the close_notify alert.

--Mohit

On 8/11/20 5:57 PM, Alan DeKok wrote:
> On Aug 11, 2020, at 8:40 AM, Terry Burton <terry.bur...@gmail.com> wrote:
>> On Tue, 11 Aug 2020 at 09:11, Mohit Sethi M <mohit.m.se...@ericsson.com> 
>> wrote:
>>> Section 5.7  "Resumption" says:
>>>
>>>> When resumption occurs, it is based on cached information at the TLS
>>>>    layer.  To perform resumption in a secure way, the EAP-TLS peer and
>>>>    EAP-TLS server need to be able to securely retrieve authorization
>>>>    information such as certificate chains from the initial full
>>>>    handshake.
>    Is there more information which needs to be cached?  If so, are there 
> examples?
>
>>> In the second mechanism, the server can avoid storing information. It
>>> instead puts that information in the PSK or the session ticket and sends
>>> it to the client. However, the client still needs to store information
>>> from the original handshake. This is why there is the sentence "Note
>>> that the client still needs to cache the information locally.". The
>>> client can't obviously read the contents of the ticket or the PSK.
>> I agree with the sentiment, but the current text seems a bit
>> "Sherlock": Once you've eliminated all other possibilities whatever
>> remains must be the case. I think it should directly state that the
>> client uses the opaque ticket or PSK as a key to identify the cached
>> information corresponding to the original session. Whereas the server
>> may use the decoded content of the ticket or PSK to achieve the goal
>> of remaining stateless.
>    I agree.  It's a minor point, but clarifying it is helpful.
>
>> Aside: The latter part might be obvious since shifting the burden of
>> storing the server-side state from the server to the client is the
>> whole point of ticket/PSK schemes. However it's not obvious to me that
>> the additional goal introduced by this RFC of performing a deep
>> revalidation of the authorisation data (resume-time certificate
>> checks, etc.) is shared with the RFC5077 or RFC8446 whose concern
>> appears to be with lightweight bootstrapping of the connection using
>> the original parameters. (Maybe I have missed something?) If that's
>> true then as Alan mentions, perhaps it is worth enumerating the types
>> of information that should be stored in the ticket to facilitate the
>> resume-time authorisation check rather than merely to reestablish the
>> crypto parameters required to perform an abbreviated handshake?
>     Just re-checking 5.7, it should also have a discussion on expiring the 
> cached data.  How long should it be cached for on each side?  I'd like to see 
> some discussion.
>
>    My $0.02 is that the cached data MUST expire no later than the expiry time 
> of any certificate involved.  i.e. client, server, or any cert in the CA 
> chain.
>
>    Perhaps it would also be good to suggest that expiry times SHOULD be no 
> longer than 48h?
>
>    I also note:
>
>     The above requirements also apply if the EAP server expects some
>     system to perform accounting for the session.  Since accounting must
>     be tied to an authenticated identity, and resumption does not supply
>     such an identity, accounting is impossible without access to cached
>     data.
>
>    It would be good to add a sentence such as:
>
>       Therefore systems which expect to perform accounting for the session 
> SHOULD cache an identifier which can be used in subsequent accounting.
>
>    In RADIUS, this would involve sending back User-Name or CUI in the 
> Access-Accept.
>
>    Alan DeKok.
>
> _______________________________________________
> Emu mailing list
> Emu@ietf.org
> https://www.ietf.org/mailman/listinfo/emu
_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to