Hello,

On 10/5/24 10:21 AM, Owen Friel (ofriel) wrote:

*From:*Heikki Vatiainen <h...@radiatorsoftware.com>
*Sent:* Friday, September 27, 2024 10:33 PM
*To:* EMU WG <emu@ietf.org>
*Subject:* [Emu] draft-ietf-emu-bootstrapped-tls-06 notes

draft-ietf-emu-bootstrapped-tls-06 is clearly written. I've mainly worked on EAP server side implementations and I think the document describes the TLS-POK handshake, and how to prepare for it, clearly enough. A couple of notes follow:

TLS based EAP methods

+++++++++++++++++++

My understanding is that the document applies to any TLS based EAP method. Instead of using a method's usual TLS 1.3 handshake, the TLS-POK handshake is used. It's not explicitly said, but I presume all outer TLVs, etc. are unchanged.

TEAP seems to be the main target of the draft. Are there any TLS based EAP methods that shouldn't be used?

[ofriel] That is a good question. TEAP was the only method we had been thinking about. Dan – are there any EAP TLS methods we shouldn’t use or what explicit statements should we make here e.g. TLS1.3 EAP method and not say RFC5216 ?


  Well, this is for bootstrapping only. The implication is that there will be some provisioning step that will enable network connectivity being performed after
successful bootstrapping. TEAP can do a PKCS10/PKCS7 exchange to provision
a certificate on the device for subsequent connections and therefore it was the
only one considered.

  I'm not aware of other EAP methods that can provision network credentials on
a supplicant that would work with this method of bootstrapping.

Use with wireless networks

+++++++++++++++++++++

The document recommends using TLS-POK with wired networks. Could the document be clearer about potential problems if used with wireless networks? For example, security considerations describes an adversary scanning QR codes and forcing connections from clients.

Is this one of problems? For example, if the client would need to do round-robin, as described in the introduction, to find the provisioning network, it could be easy for an adversary to create such a WLAN. Should there be a clear upper case key word instead of lower case 'recommended'?

[ofriel] The document recommends DPP for wireless, but the same security consideration exists for wireless using DPP too. If an adversary scans the QR, then the adversary can get the client to onboard against and trust their rogue network. Dan – what text do you suggest here for potential problems if used with wireless? The obvious reason is already stated in section 1 i.e. the “document does not address the problem of Wi-Fi network discovery”.


  Discovery on wi-fi is not an issue, DPP has solved that with chirping. Regarding the security considerations, this is addressed in the Resurrecting Duckling paper which
we reference in the draft.

  regards,

  Dan.

Thinking from authentication server point of view; the auth server may not always be aware of client's connectivity (wireless vs wired). Therefore it seems the client must make the correct decision because it could be harder on the authentication server side.

Use of EAP Identity

+++++++++++++++

The document says "anonym...@tls-pok-dpp.eap.arpa" SHOULD be used. Based on draft-ietf-emu-eap-arpa-02, I'd expect something like "tls-pok-...@teap.eap.arpa" to match the example EAP exchange in section '4. Using TLS Bootstrapping in EAP'.

draft-ietf-emu-eap-arpa-02 recommends against username 'anonymous' and mandates that the realm part uses an IANA registered EAP type name. Is this a conflict between the drafts?

EAP method negotiation

++++++++++++++++++

Section '4. Using TLS Bootstrapping in EAP' says:

  This identifier MUST be included in the EAP Identity response in

  order to indicate to the Authenticator that an EAP method that

    supports TLS-POK SHOULD be started.

This doesn't give any hint which EAP method the client wants. Is EAP method negotiation with EAP NAK supported? For example, is there a possibility that the client supports multiple EAP methods and it wants to get provisioned with method specific credentials? One option is to provision once for all methods, which would solve this.

If the server supports multiple methods for EAP-POK, then it could choose a wrong one and the client would need a NAK to switch to its desired method.

If provisioning requires use of multiple EAP methods, "anonym...@tls-pok-dpp.eap.arpa" would require a NAK to walk through the different methods, whereas "tls-pok-...@teap.eap.arpa" and "tls-pok-...@ttls.eap.arpa" would allow the server to immediately select the client's desired EAP method.

[ofriel] Alan says he will have draft-ietf-emu-eap-arpa-03 out next week that will clarify the above. I will wait to review that and then update bootstrapped-tls accordingly.

--

Heikki Vatiainen
h...@radiatorsoftware.com


--
"The object of life is not to be on the side of the majority, but to
escape finding oneself in the ranks of the insane." -- Marcus Aurelius
_______________________________________________
Emu mailing list -- emu@ietf.org
To unsubscribe send an email to emu-le...@ietf.org

Reply via email to