Some late last call comments:

1. For PEAP and TTLS, it is no longer possible to use client certificates without phase 2 authentication. Does the same restriction apply to TEAP. I think it would make sense to add an explanation on why this was done? How about using server certificate in phase 1 and client certificate in phase 2 (with no further inner methods)? TEAP supports such behavior for TLS 1.2 to hide client identity? Would it not be better to simply mandate at least one NewSessionTicket message? I can think of a TTLS deployment where some peers only authenticate with client certificates while other peers authenticate with client certificates and one-time passwords in phases 2. Depending on the type of authentication, peers are put in different VLANs.

2. I don't think this makes sense:

Implementations SHOULD NOT use inner identities which contain an NAI
    realm.

  if the inner identity does contain an NAI realm, the inner
    realm SHOULD be either an exact copy of the outer realm, or be a
    subdomain of the outer realm.

Eliot would agree that there are all kinds of IoT uses cases where the outer NAI has a realm of the device manufacturer while the inner NAI has a realm of the enterprise where the device is installed (or vice-versa).

I also don't understand why this is bad:

For example, if a user
    has an inner identity of"u...@example.com", then it generally makes
    no sense to have an outer identity of "@example.org".
Most university guidelines for eduroam recommend exactly what you are trying to prevent. For example: https://www.aalto.fi/en/services/installation-instructions-for-eduroam says:

*Review your settings in the Wi-Fi Settings *window:
Wireless security: WPA & WPA2 Enterprise
Authentication: Protected EAP (PEAP)
Anonymous identity: anonym...@aalto.fi
CA certificate: ca-certificates.crt
PEAP version: Automatic
Inner authentication: MSCHAPv2
Username: firstname.lastn...@aalto.fi
Password: <your Aalto password>

@Joe: I am not confident that this section has had sufficient review. I am generally not comfortable with the text. This draft was anyways about TLS 1.3 for TEAP/PEAP/TTLS etc. I think this is going way beyond what the draft originally was trying to solve.

3. Section 2.4 says:

  the response from the EAP peer MUST be either
    EAP-Success or EAP-Failure.
I though the Success and Failure messages are sent by the EAP server?

4. Section 4 says:

If either peer or server instead
    initiates an inner tunnel method
I thought you have mandated the use of an inner tunnel method? So why the 'if'?

--Mohit

On 6/8/22 19:16, Joseph Salowey wrote:
This is the working group last call for draft-ietf-emu-tls-eap-types.  You can find the document here:

https://datatracker.ietf.org/doc/html/draft-ietf-emu-tls-eap-types <https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Fdraft-ietf-emu-tls-eap-types&data=05%7C01%7Csethim1%40aaltofi.mail.onmicrosoft.com%7C983f8dc1a09344ffefba08da496a4b67%7Cae1a772440414462a6dc538cb199707e%7C1%7C0%7C637903018430350080%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000%7C%7C%7C&sdata=VzzXUxFfIQiLJ4JwBcBBDcWaK4jh0HrVZLSsLlrbNjA%3D&reserved=0>

Please respond to the list with comments by June 24, 2022.  Responses that indicate that you have read the draft and think it is ready to move forward are also useful.

Thanks,

Joe & Mohit



_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu
_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to