Hi:
On 7/4/22 22:28, Alan DeKok wrote:
On Jul 4, 2022, at 2:56 PM, Mohit Sethi <mo...@iki.fi> wrote:
Some late last call comments:
1. For PEAP and TTLS, it is no longer possible to use client certificates
without phase 2 authentication. Does the same restriction apply to TEAP. I
think it would make sense to add an explanation on why this was done?
I think it should be done for TEAP, too. The text could mirror TEAP:
The practice of using client certificates with no "inner tunnel" method is
forbidden when TEAP
is used with TLS 1.3. If there is a requirement to use client
certificates with no inner tunnel methods, then EAP-TLS should be used
instead of TEAP.
How about using server certificate in phase 1 and client certificate in phase 2
(with no further inner methods)? TEAP supports such behavior for TLS 1.2 to
hide client identity?
My inclination is to forbid that for TLS 1.3. However, TEAP can do multiple inner
method authentication (host + user), unlike TTLS and PEAP. Which means that it is
possible to do TEAP with inner EAP-TLS, and then also inner "other method".
Perhaps the document could just say it's NOT RECOMMENDED to do TEAP with
only inner EAP-TLS.
Would it not be better to simply mandate at least one NewSessionTicket message?
I can see situations where resumption isn't used.
You don't have to use resumption. You just need to send NewSessionTicket
as a protected success indication. I thought the reason for for
forbidding use of client certificates without phase 2 authentication was
lack of protected success indication. Perhaps there is some other
reason? This is why I wrote in my original comment: "I think it would
make sense to add an explanation on why this was done? ".
I can think of a TTLS deployment where some peers only authenticate with client
certificates while other peers authenticate with client certificates and
one-time passwords in phases 2. Depending on the type of authentication, peers
are put in different VLANs.
I'm not sure how that affects NewSessionTicket?
One-time passwords in phase 2 are a significant issue with EAP methods.
Where people have tried to deploy them, there are many issues. They just don't
work in practice for a host of reasons.
One-time password was only an example. Perhaps a wrong one. I just
wanted to highlight that we were forbidding TTLS/PEAP and now TEAP
deployments from using client certificates without phase 2
authentication. But there can be deployments where some peers use client
certificates without phase 2 authentication while other peers use client
certificates with additional phase 2 authentication (password, etc.).
The simplest one is that the supplicant caches the inner identity, and
re-uses it when the WiFi signal is lost / re-gained. While a NewSessionTicket
will help here, it won't always help. There are situations where the end user
will be prompted again (sometimes repeatedly!) in a short period of time.
I would suggest that one-time passwords in phase 2 are NOT RECOMMENDED,
unless the passwords can be automatically entered without human intervention.
2. I don't think this makes sense:
Implementations SHOULD NOT use inner identities which contain an NAI
realm.
if the inner identity does contain an NAI realm, the inner
realm SHOULD be either an exact copy of the outer realm, or be a
subdomain of the outer realm.
Eliot would agree that there are all kinds of IoT uses cases where the outer
NAI has a realm of the device manufacturer while the inner NAI has a realm of
the enterprise where the device is installed (or vice-versa).
I think that's best described as "surprising" from an EAP standpoint. The
outer NAI is overwhelmingly used to determine routing, as with Eduroam. Having different
outer / inner NAIs means that the routing is broken:
* packets get sent to "example.com"
* the example.com server sees authentication requests for "example.net", and says
"that's not me, why did you send these packets to me?"
For the IoT case, we would never route the authentication packets to the
device manufacturer. So it's not clear to me why the outer NAI has to contain
that value.
If this is a necessary use-case, I would suggest requiring that these
authentications MUST be handled locally, with no routing.
This issue is why I was proposing to define the outer NAI realm of "@eap.arpa". Those
packets are clearly labelled as "site local", and are not forwarded.
I also don't understand why this is bad:
For example, if a user
has an inner identity of
"u...@example.com"
, then it generally makes
no sense to have an outer identity of "@example.org".
Most university guidelines for eduroam recommend exactly what you are trying to
prevent. For example:
https://www.aalto.fi/en/services/installation-instructions-for-eduroam says:
I haven't seen this recommendation in most universities. My discussions
with the eduroam people make me believe that such configurations are in fact
discouraged by the wider Eduroam recommendations.
Review your settings in the Wi-Fi Settings window:
Wireless security: WPA & WPA2 Enterprise
Authentication: Protected EAP (PEAP)
Anonymous identity: anonym...@aalto.fi
CA certificate: ca-certificates.crt
PEAP version: Automatic
Inner authentication: MSCHAPv2
Username: firstname.lastn...@aalto.fi
Password: <your Aalto password>
Which is using the same realm for both outer / inner identities. So I don't
understand why there's an issue.
The draft currently says that inner identity should not have a realm.
However, the example above, and many other guidance documents I have
seen do use a realm in the inner identity.
--Mohit
Incidentally the recommendation violates the RFCV 7542 recommendation to
just use @aalto.fi as the outer NAI. i.e. an outer *user* portion of the NAI
is not needed. But both *realms* are identical for inner and outer NAIs.
@Joe: I am not confident that this section has had sufficient review. I am
generally not comfortable with the text. This draft was anyways about TLS 1.3
for TEAP/PEAP/TTLS etc. I think this is going way beyond what the draft
originally was trying to solve.
This section describes wide-spread practice in the community for about a
decade.
While the updated text is not specific to TLS 1.3 and TTLS / PEAP / FAST /
TEAP, it does give guidelines to users of TTLS / etc. for TLS 1.3. WhichI
think is critical for success in real-world use-cases.
3. Section 2.4 says:
the response from the EAP peer MUST be either
EAP-Success or EAP-Failure.
I though the Success and Failure messages are sent by the EAP server?
That was a typo, already addressed in a previous comment.
4. Section 4 says:
If either peer or server instead
initiates an inner tunnel method
I thought you have mandated the use of an inner tunnel method? So why the 'if'?
Resumption doesn't use an inner tunnel method. So the "if" is necessary.
Alan DeKok.
_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu