On Jun 20, 2022, at 11:20 AM, Heikki Vatiainen <h...@radiatorsoftware.com> 
wrote:
> Please find below my comments. I think the draft can move forward. The 
> comments below are clarifications and minor fixes. The list is quite long but 
> I think there aren't any functional changes.

  That's fine.  Unless otherwise noted below, I've addressed all of your 
comments by making the requested changes.

> Naming things
> +++++++++++
> Should the EAP type names named consistently? For example, always use 
> EAP-FAST and EAP-TTLS because those are the IANA registered names. PEAP and 
> TEAP already use just one form.

  Yes.

> Using 'EAP peer', and when unambiguous, 'peer', as much as possible: now the 
> draft uses also 'client' and 'supplicant' sometimes. Client should remain 
> when the discussion is about general TLS client behaviour, though.
>
> Similarly 'EAP server' could be used sometimes to clarify which server is 
> discussed.

  It's probably  worth just using "EAP peer", and "EAP server" consistently.

> Paragraph 5: The second sentence in the draft is shwn below with my suggested 
> text following:
> 'When the supplicant attempts to use the ticket, the peer can simply request 
> a full reauthentication.'
> 'When the EAP peer attempts to use the ticket, the EAP server can simply 
> request a full authentication.'
> This clarifies naming, roles and simply says 'authentication' because it's 
> not going to be reauthentication any longer.

  I'll put this as:

When the EAP peer attempts to use the ticket, the EAP server can instead 
request a full authentication

> 2.5 PEAP
> +++++++
> Paragraphs 1 and 2 in the draft are shown below followed by suggested version:
> ...
> The idea is to clarify what 'here' refers to (PEAP-MPPE) and to use 
> 'derivation' instead of 'calculation' for matching terminology. My 
> understanding that 'different' means 'different than what is specified 
> section 2.1 in this draft', therefore it was switched to PEAP-specific to be 
> clear what it refers to. Attempt is also made to clarify that what remains 
> unchanged is 'PRF+' function. Term 'method' is used just once so that PRF 
> calculation method won't be confused by 'inner EAP method'.

  I agree.   I've made the change.

> 3 Application data
> ++++++++++++++
> The draft says:
> 
>    The NewSessionTicket message SHOULD also be sent along with other
>    application data, if possible.  Sending that message alone prolongs
>    the packet exchange to no benefit.
> 
> I fully agree with the above. Experimenting shows that, for example, 
> eapol_test from wpa_supplicant supports a lone NewSessionTicket message by 
> sending back an PEAP ack when it receives just the tickets instead of 
> EAP-Identity/Request+keys after TLS handshake completion. However, another 
> EAP peer implementation responds nothing and stops the authentication process 
> when it receives just a NewSessionTicket message without the expected 
> EAP-Identity/Request.

  I would add one EAP peer implementation also doesn't implement resumption for 
TTLS / PEAP.  That seems very, very, wrong to me.

> To summarise, in addition to prolonging the packet exchange, it can also lead 
> to non-interoperable implementations. Seems that the smallest number of 
> messages allowed by the TLS and EAP method specifications is the way to go. 
> Not just with PEAP but with other EAP methods too.

  I'll add the last bit as an additional explanation, with some rewording.

> 4. Resumption
> +++++++++++
> The paragraph in the draft could benefit from a small sentence reordering and 
> rewording. The original is followed by the suggested version:
...
>    Note that if resumption is performed, then the EAP server MUST send
>    the protected success result indicator (one octet of 0x00) inside the
>    TLS tunnel as per [RFC9190].  The EAP peer MUST in turn check for
>    the existence the protected success result indicator (one octet of
>    0x00), and cause authentication to fail if that octet is not
>    received.  If either peer or server instead
>    initiates an inner tunnel method, then that method MUST be followed,
>    and inner authentication MUST NOT be skipped.
> 
> The rewording changes 'resumption MUST NOT be used' to what's shown above. My 
> understanding is that if TLS resumption is done, then the choice is either to:
> - use protected success result indication 0x00; or
> - do full inner authentication; but not both

  That's good.

> 
> 6. Security Considerations
> ++++++++++++++++++++
> The last sentence of paragraph 3 is shown below with the suggested change 
> following:
> ...
> The changes use 'EAP peer' instead of 'clients' and add missing verb 'use'.

  Changed, thanks.

> 
> 6.1 Protected Success and Failure indicators
> ++++++++++++++++++++++++++++++++++
> Paragraph 5 says '... TTLS with inner PAP or CHAP.'. I'd change the inner 
> protocols to 'PAP, CHAP or MS-CHAP'.
> 
> Paragraph 7 says '... do not provided protected ...'. Change 'provided' to 
> 'provide'.
> 
> Paragraph 7 also suggests replacements for PAP and CHAP to ensure protected 
> indicators can be used. A replacement for MS-CHAP could be EAP-MSCHAP-V2 or 
> possibly EAP-MD5?

  A replacement for MS-CHAPv1 is MS-CHAPv2, or EAP-MSCHAPv2

> 
> 8. References
> +++++++++++
> [PEAP-MPPE], [PEAP-PRF] and [PEAP-TK] point to different parts of [MSPEAP]. 
> It might be useful to clarify that this is the case in order to minimise the 
> problem with broken links. 

  I'll add some clarifying text.

  Thanks for the comprehensive review.

  Alan DeKok.

_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to