Hi,

I have reviewed draft-ietf-emu-tls-eap-types-01. Looks good. Two crypto related 
comments below:


- "MAC is the MAC function negotiated in TLS 1.3."

There is no MAC function negotiated in TLS 1.3. Also, a modern TLS 
implementation would not negotiate any MAC funtion in TLS 1.2 as they would use 
an AEAD. There is however a cipher suite hash algorithms that is used in HMAC 
mode. Maybe something like

   "Compound-MAC = HMAC( CMK, BUFFER )

   Where HMAC uses the Hash algorithm for the handshake."
   
   or

   "Compound-MAC = HMAC( CMK, BUFFER )

   Where the Hash function used by HKDF is the cipher suite hash algorithm"

This raises the question what TEAP TLS 1.2 implementations do today? Are they 
only using outdated and non-secure cipher suites or are they doing something 
unspecified to derive Compound-MAC with an AEAD cipher suite?

Anyway, how to calculate Compound-MAC with an AEAD algorithm needs to be 
specified for TLS 1.2 as well. I think the scope of the document need to be 
expanded slightly.


- "For PEAP, some derivation use HMAC-SHA1 [PEAP-MPPE].  There are no
   known security issues with HMAC-SHA1.  In the interests of
   interoperability and minimal changes, we do not change that
   definition here."

While it is true that there are no known practical attacks against HMAC-SHA1, 
most modern protocols like TLS 1.3 forbid all uses of SHA-1, governments are 
recommending phasing out use of HMAC-SHA1 in e.g. IKEv2, and many buyers of 
security equipment thinks that everything with SHA-1 is very weak. To me it 
feels strange to force future implementations to continue support of SHA-1 when 
it is completely removed from TLS 1.3. Enforcing SHA-256 when TLS 1.3 is used 
seems like the easy way forward. It is probably much harder to do at a later 
stage. 

Editorials:

- "in Section Those"
- formatting of the list in section 5

Cheers,
John

-----Original Message-----
From: Emu <emu-boun...@ietf.org> on behalf of "internet-dra...@ietf.org" 
<internet-dra...@ietf.org>
Reply to: "emu@ietf.org" <emu@ietf.org>
Date: Wednesday, 29 July 2020 at 23:04
To: "i-d-annou...@ietf.org" <i-d-annou...@ietf.org>
Cc: "emu@ietf.org" <emu@ietf.org>
Subject: [Emu] I-D Action: draft-ietf-emu-tls-eap-types-01.txt


    A New Internet-Draft is available from the on-line Internet-Drafts 
directories.
    This draft is a work item of the EAP Method Update WG of the IETF.

            Title           : TLS-based EAP types and TLS 1.3
            Author          : Alan DeKok
        Filename        : draft-ietf-emu-tls-eap-types-01.txt
        Pages           : 12
        Date            : 2020-07-29

    Abstract:
       EAP-TLS [RFC5216] is being updated for TLS 1.3 in [EAPTLS].  Many
       other EAP [RFC3748] and [RFC5247] types also depend on TLS, such as
       FAST [RFC4851], TTLS [RFC5281], TEAP [RFC7170], and possibly many
       vendor specific EAP methods.  This document updates those methods in
       order to use the new key derivation methods available in TLS 1.3.
       Additional changes necessitated by TLS 1.3 are also discussed.


    The IETF datatracker status page for this draft is:
    https://datatracker.ietf.org/doc/draft-ietf-emu-tls-eap-types/

    There are also htmlized versions available at:
    https://tools.ietf.org/html/draft-ietf-emu-tls-eap-types-01
    https://datatracker.ietf.org/doc/html/draft-ietf-emu-tls-eap-types-01

    A diff from the previous version is available at:
    https://www.ietf.org/rfcdiff?url2=draft-ietf-emu-tls-eap-types-01


    Please note that it may take a couple of minutes from the time of submission
    until the htmlized version and diff are available at tools.ietf.org.

    Internet-Drafts are also available by anonymous FTP at:
    ftp://ftp.ietf.org/internet-drafts/


    _______________________________________________
    Emu mailing list
    Emu@ietf.org
    https://www.ietf.org/mailman/listinfo/emu

_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to