Hi Dan,
On Fri, Feb 5, 2010 at 2:47 AM, Dan Harkins <dhark...@lounge.org> wrote: > > Hi Raj, > > RFC 3748 (the RFC defining EAP) says: > > The Identity Response may not be the appropriate > identity for the method; it may have been truncated or obfuscated > so as to provide privacy, or it may have been decorated for > routing purposes. > > In other words, the identity the IKEv2 gateway receives is worthless > for authentication purposes and authentication is what IKE does. That > identity is just to decide what EAP method to use with the peer. It is > not an "authenticated identity" as you suggest. RFC 3748 further > recommends: > > [F]or an EAP method to include an identity exchange that supports > per-packet authentication, integrity and replay protection, and > confidentiality. > That sounds quite reasonable and suggests each EAP method SHOULD have identity exchange for EAP authentication with IKEv2. Current draft doesn't say like that. That's my concern. > So the identity that is used for _authentication of the peer_ is something > that is just passed through the IKEv2 gateway and may even be encrypted by > a key that the IKEv2 gateway does not have access to. > > Imagine the next time some guard at a building or in an airport says, > "let me see your ID please" when you attempt to gain entry and you say, > "sorry you're not in a position to see that but our shared friend here > can vouch for me." How do you think that's gonna fly? Not too well, I'd > imagine. > > On a lighter note: It will be like flying without passport. :-) With Regards, Raj > regards, > > Dan. > > On Thu, February 4, 2010 8:56 am, Raj Singh wrote: > > Hi Yoav, > > > > According to RFC-3579 [Appendix-A] RADIUS (Remote Authentication Dial In > > User Service) Support For Extensible Authentication Protocol (EAP) shows > > that NAS (IKEv2 Gateway) sends an EAP-Request/Identity as the initial > > packet > > to IKEv2 initiator. Here IKEv2 will come to know EAP identity and apply > > policy based on authenticated identity. > > > > We can add text at end of section 2.16 that if authenticated identity is > > not > > sent by AAA server to IKEv2 responder, the IKEv2 responder can begin EAP > > authentication by sending EAP-Request/Identity as the initial packet to > > IKEv2 initiator. > > > > Regards, > > Raj > > > > 2010/2/4 Yoav Nir <y...@checkpoint.com> > > > >> The IKEv2 responder enforces policy, so it has to know the identity, > >> both > >> for enforcement and auditing. Suppose y...@checkpoint.com is allowed to > >> access server X, while alper.ye...@yegin.org is not, then the IKEv2 > >> responder needs to both block your attempts to access server X (perhaps > >> by > >> failing the CREATE_CHILD_SA exchange), and to log that you tried this. > >> > >> If auditing is not required, it's possible to work with some kind of > >> pseudo-identity, but in that case, for the IKEv2 responder, this is the > >> authenticated identity. > >> > >> Unless there is a single policy for all authenticated users, you do need > >> the user identity. > >> > >> -----Original Message----- > >> From: Alper Yegin [mailto:alper.ye...@yegin.org] > >> Sent: Thursday, February 04, 2010 3:40 PM > >> To: Yoav Nir; 'Raj Singh'; Yaron Sheffer > >> Cc: 'ipsec' > >> Subject: RE: [IPsec] Fwd: Issue : Regarding EAP identity > >> > >> Hello, > >> > >> Why would the IKEv2 responder need to know the real identity? > >> There can be privacy reasons for hiding it from any entity other than > >> the > >> AAA/authentication server. > >> > >> I'm thinking that mandating AAA server to reveal that value is not > >> necessary > >> and also problematic. > >> > >> Alper > >> > >> > >> > >> > >> > -----Original Message----- > >> > From: ipsec-boun...@ietf.org [mailto:ipsec-boun...@ietf.org] On > Behalf > >> > Of Yoav Nir > >> > Sent: Wednesday, February 03, 2010 10:43 AM > >> > To: 'Raj Singh'; Yaron Sheffer > >> > Cc: ipsec > >> > Subject: Re: [IPsec] Fwd: Issue : Regarding EAP identity > >> > > >> > Hi Raj > >> > > >> > I don’t think we can specify MUST requirements for the AAA servers, > >> > because we’re not specifying RADIUS or DIAMETER here. > >> > > >> > For example in RADIUS, the VPN gateway sends an Access-Request to the > >> > server, which contains the user-name, presumably the same user-name > >> > from the IDi payload. > >> > > >> > If the server authenticates the user successfully, and has not sent an > >> > user-name attribute, then I guess we can assume that it has > >> > authenticated the identity sent in the access-request payload (= the > >> > identity in the IDi payload). For example, if I pass the identifier > >> > “ynir” (which is unique at my company) or > >> “y...@checkpoint.com”, which > >> > is globally unique, this is good enough for policy updates, even if > >> the > >> > EAP server did not send another identity. > >> > > >> > Of course, in some cases the IDi could be an anonymized identity, and > >> > then if the server doesn’t give us a real identity, then something > >> is > >> > wrong. But this distinction is a matter for local policy, which I > >> don’t > >> > think we can specify in ikev2bis. In any case, policy lookups have to > >> > be done using the authenticated identity, either the one in IDi or the > >> > one supplied by the AAA server. I think the line “It is important > >> that > >> > policy lookups and access control decisions use the actual > >> > authenticated identity.” conveys that. > >> > > >> > > >> > ________________________________________ > >> > From: ipsec-boun...@ietf.org [mailto:ipsec-boun...@ietf.org] On > Behalf > >> > Of Raj Singh > >> > Sent: Wednesday, February 03, 2010 8:22 AM > >> > To: Yaron Sheffer > >> > Cc: ipsec > >> > Subject: Re: [IPsec] Fwd: Issue : Regarding EAP identity > >> > > >> > Hi Yaron, > >> > > >> > The question is more towards when EAP identity is needed and > >> > is different from IDi. But AAA server doesn't send it, we will fail. > >> > But draft doesn't have any say for this scenario. So it becomes > >> > mandatory for AAA server to send identity. > >> > > >> > Regards, > >> > Raj > >> > On Wed, Feb 3, 2010 at 11:22 AM, Yaron Sheffer <yar...@checkpoint.com > > > >> > wrote: > >> > The authenticated identity needs to be sent by the AAA server to the > >> > IKE responder in some cases only. For example, in EAP-SIM/AKA people > >> > often use “temporary” (anonymized) identities in IDi. But in other > >> > cases, like EAP-MSCHAPv2 or (God forbid!) EAP-GTC, there’s no need > >> for > >> > a separate “authenticated identity”. In these cases the IKE > >> responder > >> > should simply use the original IDi for policy lookup. > >> > > >> > Thanks, > >> > Yaron > >> > > >> > From: ipsec-boun...@ietf.org [mailto:ipsec-boun...@ietf.org] On > Behalf > >> > Of Raj Singh > >> > Sent: Wednesday, February 03, 2010 7:45 > >> > To: ipsec > >> > Subject: [IPsec] Fwd: Issue : Regarding EAP identity > >> > > >> > Hi Paul, Ticket Issue#174 opened for it. Regards, Raj > >> > ---------- Forwarded message ---------- > >> > From: Paul Hoffman <paul.hoff...@vpnc.org> > >> > Date: Wed, Feb 3, 2010 at 9:41 AM > >> > Subject: Re: Issue : Regarding EAP identity > >> > To: Raj Singh <rsjen...@gmail.com> > >> > Cc: Yaron Sheffer <yar...@checkpoint.com> > >> > At 9:09 AM +0530 2/3/10, Raj Singh wrote: > >> > Hi Paul, > >> > > >> > In ikev2bis07 > >> > ----- ikev2-bis-07 section 2.16, last paragraph > >> --------------------- > >> > ---------------------- > >> > When the initiator authentication uses EAP, it is possible that the > >> > contents of the IDi payload is used only for AAA routing purposes and > >> > selecting which EAP method to use. This value may be different from > >> > the identity authenticated by the EAP method. It is important that > >> > policy lookups and access control decisions use the actual > >> > authenticated identity. Often the EAP server is implemented in a > >> > separate AAA server that communicates with the IKEv2 responder. In > >> > this case, the authenticated identity has to be sent from the AAA > >> > server to the IKEv2 responder. > >> > > ----------------------------------------------------------------------- > >> > ---------------------------------------- > >> > It says the autheticated EAP identity "has to" be send from AAA > >> server, > >> > our iterpretation is "has to" is obvious MUST. > >> > > >> > I believe that is correct. > >> > If AAA doesn't send the authenticated EAP identity, what should be > >> > the behavior? > >> > > >> > I would assume "everything stops" > >> > > >> > Also, what if AAA server EAP server is not AAA server? > >> > > >> > Good question. > >> > Can i open a ticket for it? > >> > > >> > Yes, please! > >> > > >> > --Paul Hoffman, Director > >> > --VPN Consortium > >> > > >> > > >> > _______________________________________________ > >> > IPsec mailing list > >> > IPsec@ietf.org > >> > https://www.ietf.org/mailman/listinfo/ipsec > >> > >> > >> > >> Scanned by Check Point Total Security Gateway. > >> > > _______________________________________________ > > IPsec mailing list > > IPsec@ietf.org > > https://www.ietf.org/mailman/listinfo/ipsec > > > > >
_______________________________________________ IPsec mailing list IPsec@ietf.org https://www.ietf.org/mailman/listinfo/ipsec