Hi Dan,

On Fri, Feb 5, 2010 at 2:47 AM, Dan Harkins <dhark...@lounge.org> wrote:

>
>  Hi Raj,
>
>  RFC 3748 (the RFC defining EAP) says:
>
>      The Identity Response may not be the appropriate
>      identity for the method; it may have been truncated or obfuscated
>      so as to provide privacy, or it may have been decorated for
>      routing purposes.
>
> In other words, the identity the IKEv2 gateway receives is worthless
> for authentication purposes and authentication is what IKE does. That
> identity is just to decide what EAP method to use with the peer. It is
> not an "authenticated identity" as you suggest. RFC 3748 further
> recommends:
>
>      [F]or an EAP method to include an identity exchange that supports
>      per-packet authentication, integrity and replay protection, and
>      confidentiality.
>

That sounds quite reasonable and suggests each EAP method SHOULD have
identity exchange for EAP authentication with IKEv2. Current draft doesn't
say
like that. That's my concern.


> So the identity that is used for _authentication of the peer_ is something
> that is just passed through the IKEv2 gateway and may even be encrypted by
> a key that the IKEv2 gateway does not have access to.
>
>  Imagine the next time some guard at a building or in an airport says,
> "let me see your ID please" when you attempt to gain entry and you say,
> "sorry you're not in a position to see that but our shared friend here
> can vouch for me." How do you think that's gonna fly? Not too well, I'd
> imagine.
>
> On a lighter note: It will be like flying without passport. :-)

With Regards,
Raj

>  regards,
>
>  Dan.
>
> On Thu, February 4, 2010 8:56 am, Raj Singh wrote:
> > Hi Yoav,
> >
> > According to RFC-3579 [Appendix-A] RADIUS (Remote Authentication Dial In
> > User Service) Support For Extensible Authentication Protocol (EAP) shows
> > that NAS (IKEv2 Gateway) sends an EAP-Request/Identity as the initial
> > packet
> > to IKEv2 initiator. Here IKEv2 will come to know EAP identity and apply
> > policy based on authenticated identity.
> >
> > We can add text at end of section 2.16 that if authenticated identity is
> > not
> > sent by AAA server to IKEv2 responder, the IKEv2 responder can begin EAP
> > authentication by sending EAP-Request/Identity as the initial packet to
> > IKEv2 initiator.
> >
> > Regards,
> > Raj
> >
> > 2010/2/4 Yoav Nir <y...@checkpoint.com>
> >
> >> The IKEv2 responder enforces policy, so it has to know the identity,
> >> both
> >> for enforcement and auditing. Suppose y...@checkpoint.com is allowed to
> >> access server X, while alper.ye...@yegin.org is not, then the IKEv2
> >> responder needs to both block your attempts to access server X (perhaps
> >> by
> >> failing the CREATE_CHILD_SA exchange), and to log that you tried this.
> >>
> >> If auditing is not required, it's possible to work with some kind of
> >> pseudo-identity, but in that case, for the IKEv2 responder, this is the
> >> authenticated identity.
> >>
> >> Unless there is a single policy for all authenticated users, you do need
> >> the user identity.
> >>
> >> -----Original Message-----
> >> From: Alper Yegin [mailto:alper.ye...@yegin.org]
> >> Sent: Thursday, February 04, 2010 3:40 PM
> >> To: Yoav Nir; 'Raj Singh'; Yaron Sheffer
> >> Cc: 'ipsec'
> >> Subject: RE: [IPsec] Fwd: Issue : Regarding EAP identity
> >>
> >> Hello,
> >>
> >> Why would the IKEv2 responder need to know the real identity?
> >> There can be privacy reasons for hiding it from any entity other than
> >> the
> >> AAA/authentication server.
> >>
> >> I'm thinking that mandating AAA server to reveal that value is not
> >> necessary
> >> and also problematic.
> >>
> >> Alper
> >>
> >>
> >>
> >>
> >> > -----Original Message-----
> >> > From: ipsec-boun...@ietf.org [mailto:ipsec-boun...@ietf.org] On
> Behalf
> >> > Of Yoav Nir
> >> > Sent: Wednesday, February 03, 2010 10:43 AM
> >> > To: 'Raj Singh'; Yaron Sheffer
> >> > Cc: ipsec
> >> > Subject: Re: [IPsec] Fwd: Issue : Regarding EAP identity
> >> >
> >> > Hi Raj
> >> >
> >> > I don’t think we can specify MUST requirements for the AAA servers,
> >> > because we’re not specifying RADIUS or DIAMETER here.
> >> >
> >> > For example in RADIUS, the VPN gateway sends an Access-Request to the
> >> > server, which contains the user-name, presumably the same user-name
> >> > from the IDi payload.
> >> >
> >> > If the server authenticates the user successfully, and has not sent an
> >> > user-name attribute, then I guess we can assume that it has
> >> > authenticated the identity sent in the access-request payload (= the
> >> > identity in the IDi payload). For example, if I pass the identifier
> >> > “ynir” (which is unique at my company) or
> >> “y...@checkpoint.com”, which
> >> > is globally unique, this is good enough for policy updates, even if
> >> the
> >> > EAP server did not send another identity.
> >> >
> >> > Of course, in some cases the IDi could be an anonymized identity, and
> >> > then if the server doesn’t give us a real identity, then something
> >> is
> >> > wrong. But this distinction is a matter for local policy, which I
> >> don’t
> >> > think we can specify in ikev2bis. In any case, policy lookups have to
> >> > be done using the authenticated identity, either the one in IDi or the
> >> > one supplied by the AAA server. I think the line “It is important
> >> that
> >> > policy lookups and access control decisions use the actual
> >> > authenticated identity.” conveys that.
> >> >
> >> >
> >> > ________________________________________
> >> > From: ipsec-boun...@ietf.org [mailto:ipsec-boun...@ietf.org] On
> Behalf
> >> > Of Raj Singh
> >> > Sent: Wednesday, February 03, 2010 8:22 AM
> >> > To: Yaron Sheffer
> >> > Cc: ipsec
> >> > Subject: Re: [IPsec] Fwd: Issue : Regarding EAP identity
> >> >
> >> > Hi Yaron,
> >> >
> >> > The question is more towards when EAP identity is needed and
> >> > is different from IDi. But AAA server doesn't send it, we will fail.
> >> > But draft doesn't have any say for this scenario. So it becomes
> >> > mandatory for AAA server to send identity.
> >> >
> >> > Regards,
> >> > Raj
> >> > On Wed, Feb 3, 2010 at 11:22 AM, Yaron Sheffer <yar...@checkpoint.com
> >
> >> > wrote:
> >> > The authenticated identity needs to be sent by the AAA server to the
> >> > IKE responder in some cases only. For example, in EAP-SIM/AKA people
> >> > often use “temporary” (anonymized) identities in IDi. But in other
> >> > cases, like EAP-MSCHAPv2 or (God forbid!) EAP-GTC, there’s no need
> >> for
> >> > a separate “authenticated identity”. In these cases the IKE
> >> responder
> >> > should simply use the original IDi for policy lookup.
> >> >
> >> > Thanks,
> >> >                 Yaron
> >> >
> >> > From: ipsec-boun...@ietf.org [mailto:ipsec-boun...@ietf.org] On
> Behalf
> >> > Of Raj Singh
> >> > Sent: Wednesday, February 03, 2010 7:45
> >> > To: ipsec
> >> > Subject: [IPsec] Fwd: Issue : Regarding EAP identity
> >> >
> >> > Hi Paul, Ticket Issue#174 opened for it. Regards, Raj
> >> > ---------- Forwarded message ----------
> >> > From: Paul Hoffman <paul.hoff...@vpnc.org>
> >> > Date: Wed, Feb 3, 2010 at 9:41 AM
> >> > Subject: Re: Issue : Regarding EAP identity
> >> > To: Raj Singh <rsjen...@gmail.com>
> >> > Cc: Yaron Sheffer <yar...@checkpoint.com>
> >> > At 9:09 AM +0530 2/3/10, Raj Singh wrote:
> >> > Hi Paul,
> >> >
> >> > In ikev2bis07
> >> >   ----- ikev2-bis-07 section 2.16, last paragraph
> >> ---------------------
> >> > ----------------------
> >> >  When the initiator authentication uses EAP, it is possible that the
> >> >  contents of the IDi payload is used only for AAA routing purposes and
> >> >  selecting which EAP method to use.  This value may be different from
> >> >  the identity authenticated by the EAP method.  It is important that
> >> >  policy lookups and access control decisions use the actual
> >> >  authenticated identity.  Often the EAP server is implemented in a
> >> >  separate AAA server that communicates with the IKEv2 responder.  In
> >> >  this case, the authenticated identity has to be sent from the AAA
> >> >  server to the IKEv2 responder.
> >> >
> -----------------------------------------------------------------------
> >> > ----------------------------------------
> >> > It says the autheticated EAP identity "has to" be send from AAA
> >> server,
> >> > our iterpretation is "has to" is obvious MUST.
> >> >
> >> > I believe that is correct.
> >> > If AAA doesn't send the authenticated EAP identity, what should be
> >> > the behavior?
> >> >
> >> > I would assume "everything stops"
> >> >
> >> > Also, what if AAA server EAP server is not AAA server?
> >> >
> >> > Good question.
> >> > Can i open a ticket for it?
> >> >
> >> > Yes, please!
> >> >
> >> > --Paul Hoffman, Director
> >> > --VPN Consortium
> >> >
> >> >
> >> > _______________________________________________
> >> > IPsec mailing list
> >> > IPsec@ietf.org
> >> > https://www.ietf.org/mailman/listinfo/ipsec
> >>
> >>
> >>
> >> Scanned by Check Point Total Security Gateway.
> >>
> > _______________________________________________
> > IPsec mailing list
> > IPsec@ietf.org
> > https://www.ietf.org/mailman/listinfo/ipsec
> >
>
>
>
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to