On Tue, 10 Jan 2023 at 19:26, Alan DeKok <al...@deployingradius.com> wrote:

> On Jan 9, 2023, at 5:17 PM, Heikki Vatiainen <h...@radiatorsoftware.com>
> wrote:


> Is it known how widely Unauthenticated mode is used? Can this be left as
> it is for this round of TEAP update?
>

>   Implementors please speak up.  :)
>
>   I think it can be left as-is for this round of TEAP updates.
> Realistically speaking, if the client verifies the server identity, then
> the connection is secure.  And any security issues with MS-CHAP become less
> relevant.
>
>   i.e. MS-CHAP is insecure against offline dictionary attacks, for
> attackers who can view the MS-CHAP exchange.
>

With *Server Un*authenticated mode a passive attacker can't view the
exchange, but MITM is possible. EAP-FAST allowed EAP-FAST-MSCHAPv2 with
this mode but since then requirements seem to have become stricter.


>   If we're running MS-CHAP inside of TLS, then only the client and server
> can observe the MS-CHAP exchange.
>
>   If the client verifies the server identity (certificate. etc), then this
> prevents MITM attacks.
>

With Server Unauthenticated Provisioning Mode client does not verify a
certificate and MITM is possible. With an anonymous ciphersuite a
certificate is not required in a Server Hello message. Here's an EAP-FAST
example where the client ( eapol_test from hostapd) has no PAC and it's
configured with anonymous provisioning allowed. Client Hello is not shown,
but it only contains two ciphersuites: TLS_DH_anon_WITH_AES_128_CBC_SHA and
0x00ff (RFC 5746 TLS Renegotiation Extension). EAP-FAST server then sends
this as response to finish its part of TLS handshake.  No certificate is
present in Server Hello.

Transport Layer Security
    TLSv1.2 Record Layer: Handshake Protocol: Server Hello
        Content Type: Handshake (22)
        Version: TLS 1.2 (0x0303)
        Length: 89
        Handshake Protocol: Server Hello
            Handshake Type: Server Hello (2)
            Length: 85
            Version: TLS 1.2 (0x0303)
            Random:
04e834170801843585c851e4fc9a385b9e685e15117e5559820535d1ce9ab0c1
            Session ID Length: 32
            Session ID:
04e71ab3f6a879a94c0506158fa45b34f2d91b0fa14a79b59a8c074be8d94f89
            Cipher Suite: TLS_DH_anon_WITH_AES_128_CBC_SHA (0x0034)
            Compression Method: null (0)
            Extensions Length: 13
            Extension: renegotiation_info (len=1)
            Extension: encrypt_then_mac (len=0)
            Extension: extended_master_secret (len=0)
            [JA3S Fullstring: 771,52,65281-22-23]
            [JA3S: ecbb9d4a0a2c120e04934d821ba6cb58]
    TLSv1.2 Record Layer: Handshake Protocol: Server Key Exchange
        Content Type: Handshake (22)
        Version: TLS 1.2 (0x0303)
        Length: 523
        Handshake Protocol: Server Key Exchange
            Handshake Type: Server Key Exchange (12)
            Length: 519
            Diffie-Hellman Server Params
    TLSv1.2 Record Layer: Handshake Protocol: Server Hello Done
        Content Type: Handshake (22)
        Version: TLS 1.2 (0x0303)
        Length: 4
        Handshake Protocol: Server Hello Done
            Handshake Type: Server Hello Done (14)
            Length: 0

EAP-FAST dynamic provisioning RFC discusses Server-Unauthenticated
Provisioning Mode in detail:
https://datatracker.ietf.org/doc/html/rfc5422#section-6.1.2

TEAP RFC has much less text about Server Unauthenticated mode. I'd say this
gives even more reason to be clear about why EAP-FAST-MSCHAPv2 is no longer
allowed by TEAP with this mode.

  The server presumably already knows the password, so it gains no
> information by observing the MS-CHAP exchange.
>
>   Any client which knows the password gains no information by observing
> the MS-CHAP exchange.
>
>   Attackers can only try MS-CHAP with random guess, and get rejected.
> They can't do anything other than online guesses.
>
>   Does that sound correct?
>

For server authenticated operation yes, but with sessions that use
anonymous ciphersuite there's the MITM problem.

-- 
Heikki Vatiainen
h...@radiatorsoftware.com
_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to