Hi Michael,

"/1) .../"

For onboarding a new device, where there is no connectivity after authentication, you propose to use 802.1X, which is an EAP lower layer. EAP over CoAP is in fact a proposal for a application level EAP lower layer that overcomes the limitation that 802.1X works on an inferior layer, hence, giving the possibility to perform the network authentication through nodes.

This idea is not new, in fact, you have PANA, another EAP lower layer that works on top of UDP.

As you comment , draft-ietf-6tisch-minimal-security - offers minimal security and has several deficiencies that can be solved by using EAP and AAA infrastructures.

Regarding your second point

"/2) If it for application authentication, then you need to use EAP to setup MSK for later use by a context. We do this in IKEv2, (D)TLS already./"

Our proposal is to define an EAP lower layer that is specifically designed for constrained devices and networks. The setup of the MSK for later use, is what the EAP KMF does, and  this key material is used to run a security association protocol, that could be DTLS or OSCORE.  That is why it is not an afterthought as you say. I wrote could, because is one of the possibilities. That is another benefit of using EAP.

With respect to do this with IKEv2, EAP already has an EAP method for IKE. Why limit the options when EAP gives you more. What will you do if the specific network does not support running IKEv2 due to severe constrains in the network or any other reason?

That is why I believe the flexibility EAP gives you is worth considering.

Best Regards,
Dan.



On 9/12/20 19:55, Michael Richardson wrote:
Dan Garcia <dan.gar...@um.es> wrote:
     > EAP can be used in the context of IoT for authentication.

But, to what end?

1) If it is onboarding a new device, then there is no connectivity until after 
authentication.
    so you can't use CoAP, you have to use 802.1x, or some equivalent, or
    create a system such as draft-ietf-6tisch-minimal-security.
    Which does use CoAP and OSCORE already.

2) If it for application authentication, then you need to use EAP to setup
    MSK for later use by a context.
    We do this in IKEv2, (D)TLS already.

So the only left would be OSCORE, yet you write "could", as if it was an 
afterthought.

Tell me what is your application?  What will be impossible if we don't do
this work?

--
Michael Richardson <mcr+i...@sandelman.ca>   . o O ( IPv6 IøT consulting )
            Sandelman Software Works Inc, Ottawa and Worldwide




_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to