On Oct 6, 2024, at 11:25 AM, Heikki Vatiainen <h...@radiatorsoftware.com> wrote:
> I'm thinking of this from the implementation guidance point of view. When 
> this document is implemented it's likely added to existing clients and 
> servers. When the client or server knows that provisioning does not work at 
> the moment, a fallback and negotiation to a non-provisioned full 
> authentication, if available, must not happen.
  I would say that the current authentication fails, and the peer may try to 
use any existing credentials.

  TBH, this discussion really requires a new section on renewing credentials.

> This fallback is what I wrote about the client or server being helpful. 
> Whoever adds support for this document, must be careful to follow what the 
> document says. Here's an example from draft-ietf-emu-eap-arpa-02 section 3.4.2
> 
>    For example, an NAI of "@tls.eap.arpa" MUST NOT be used for any EAP method 
> other than EAP-TLS.
> 
> However,  the use described in section 3 is about provisioning. There's 
> nothing about allowing EAP method negotiation to non-provisioned full 
> authentication. To remind implementers, I'd say it's enough to remind them 
> that there must be no EAP method negotiation or selection with a provisioning 
> NAI. The negotiation includes both trying to switch to a EAP method for 
> provisioning or full authentication in case provisioning is deemed as 
> non-operation at the moment.

  I could see an EAP server having multiple provisioning methods, e.g. 
f...@tls.eap.arp and b...@teap.eap.arpa.

  If the client sends a request for th...@ttls.eap.arpa, do we want to allow 
the server to reply with a NAK, suggesting TLS or TEAP?

  I can see that being useful, but also dangerous.  If we forbid it, then we 
have to require that all EAP NAKs for provisioning NAIs contain type zero (0) 
only.

>   If the server can't authenticate, it just sends EAP Failure.
> 
>  In case or provisioning NAI, I agree.
> 
> To summarise: what I'm attempting is to think about what's useful to consider 
> when adding support for this document into existing client and server 
> implementations.

  My biggest priority is not breaking existing implementations which are in the 
field.  Any provisioning methods sent to a system which doesn't support them 
MUST be safe.

  The second priority is to ensure that the provisioning workflows will always 
work, and do something useful.

  Alan DeKok.

_______________________________________________
Emu mailing list -- emu@ietf.org
To unsubscribe send an email to emu-le...@ietf.org

Reply via email to