On Oct 16, 2024, at 1:13 AM, Yukiko MINAMIE <mina...@stellar.co.jp> wrote:
> FIDO2 servers are designed to generate their own FIDO2 challenges,
> which means that the current EAP-FIDO specification, using
> FIDO2 challenges derived from TLS keying material,
> does not allow for the use of existing FIDO2 servers.
> 
> Could you consider alternative methods to using FIDO2 challenges
> derived from the TLS keying material to bind the TLS handshake phase
> to the FIDO-exchange phase?

  Deriving the challenge from the TLS keying materials is because of 
cryptographic binding issues:

https://datatracker.ietf.org/doc/html/rfc5281#section-14.1.11

  Which refers to an out-dated link.  The updated one is 
https://asokan.org/asokan/research/tunnel_extab_final.pdf

  See section 3 of that document for details.

  The EAP-TTLS RFC discusses the issue that challenges generated by the client 
are an issue.    I'll have to dig in more detail, but perhaps there isn't an 
issue for server generated challenges?

  Perhaps one option would be to allow the challenge to be created by the FIDO2 
server, but add an exchange specific to the EAP-FIDO protocol, which would do 
the cryptographic binding.  That exchange could stay inside of EAP-FIDO, and 
wouldn't have to affect any FIDO exchanges.

  Alan DeKok.

_______________________________________________
Emu mailing list -- emu@ietf.org
To unsubscribe send an email to emu-le...@ietf.org

Reply via email to