Thank you, Alan. Both solutions make sense to me. We just need to
ensure that they are explained to the protocol implementers.
On Mon, Dec 30, 2024 at 11:44 PM Alan DeKok <al...@deployingradius.com> wrote:
>
> On Dec 30, 2024, at 12:44 PM, Oleg Pekar <oleg.pekar.2...@gmail.com> wrote:
> > "The second use-case for EAP-TLS in Phase 2 is where both the user and
> > machine use client certificates for authentication. Since TLS permits
> > only one client certificate to be presented, only one certificate can
> > be used in Phase 1."
> >
> > How are we going to figure out whether this certificate in Phase 1
> > belongs to the user or to the machine? Since we can't send
> > Identity-Type TLV during TEAP tunnel establishment.
>
>   Why not?  Identity-Type can be used as an Outer TLV, and Section 2.3 
> defines Outer TLVs as:
>
> ...
> This term is used to refer to optional TLVs outside the TLS tunnel, which are 
> only allowed in the first two messages in the TEAP protocol. That is the 
> first EAP-server-to-peer message and first peer-to-EAP-server message
> ...
>
>   Which leads me to conclude that it should be possible.  The peer sends EAP 
> Request / Identity.  The server replies with TEAP and Outer TLVs.  The peer 
> replies with TEAP and Outer TLVs, including Identity-Type.
>
>   And double-checking the document, it looks there is no example of sending 
> Identity-Type as an outer TLV.
>
>   Checking some client implementations, it looks like they don't send Outer 
> TLVs.  But they do process the Outer TLVs sent by the server in the first 
> TEAP message from server to peer.
>
> >> Change 2
> >> Clarify "Limitations on inner methods" section.  This change has no impact 
> >> on the protocol or implementations, and is editorial.
> > "Implementations SHOULD limit the permitted inner EAP methods to a
> > small set such as EAP-TLS and the EAP-FAST-MSCHAPv2 variant of
> > EAP-MSCHAPv2."
> >
> > There is a benefit in positioning TEAP as a framework for other EAP
> > methods to be used inside the tunnel. Since TEAP RFC defines exactly
> > the integration of any inner method it looks sure enough to allow any
> > inner method to run inside. I understand the motivation to suggest
> > only methods that were thoroughly tested by the community and most of
> > them support keys generation. However such a sentence could be
> > off-putting implementers.
>
>   I'll clarify.  Jouni also pointed out that because EAP-TLS works, it is 
> highly likely that other EAP types work so long as they derive MSK and EMSK.
>
>   Alan DeKok.
>

_______________________________________________
Emu mailing list -- emu@ietf.org
To unsubscribe send an email to emu-le...@ietf.org

Reply via email to