[Uta] Re: [Last-Call] Re: Concern about draft-ietf-uta-require-tls13-10 with IoT protocols

2025-04-14 Thread Alan DeKok
andate TLS 1.3 now, but perhaps we will mandate it one day. I just don't see any of the current arguments against mandating TLS 1.3 changing in 10 or even 20 years. Alan DeKok. ___ Uta mailing list -- uta@ietf.org To unsubscribe send an email to uta-le...@ietf.org

Re: Opsdir early review of draft-ietf-bfd-secure-sequence-numbers-18

2025-04-10 Thread Alan DeKok
Thanks. I will address these comments, and the updated text will be available in the next revision of the document. > On Apr 6, 2025, at 8:04 AM, Yingzhen Qu via Datatracker > wrote: > > Document: draft-ietf-bfd-secure-sequence-numbers > Title: Meticulous Keyed ISAAC for BFD Authentication

[Anima] Re: [Last-Call] [Uta] Concern about draft-ietf-uta-require-tls13-10 with IoT protocols

2025-04-10 Thread Alan DeKok
erywhere _else_ is fine. And if that's true, what is the plan for mandating TLS 1.3, and when we will put that plan into effect. If those other issues can't be addressed, then by the same token, there's no need to address the "don't mandate TLS 1.3" argumen

[Uta] Re: [Last-Call] Concern about draft-ietf-uta-require-tls13-10 with IoT protocols

2025-04-10 Thread Alan DeKok
erywhere _else_ is fine. And if that's true, what is the plan for mandating TLS 1.3, and when we will put that plan into effect. If those other issues can't be addressed, then by the same token, there's no need to address the "don't mandate TLS 1.3" argument. Al

Re: Rtgdir last call review of draft-ietf-bfd-secure-sequence-numbers-18

2025-04-10 Thread Alan DeKok
Thanks. I will address these comments, and the updated text will be available in the next revision of the document. > On Mar 20, 2025, at 7:22 AM, Ben Niven-Jenkins via Datatracker > wrote: > > Reviewer: Ben Niven-Jenkins > Review result: Ready > > Hello, > > I have been selected as the

[Anima] Re: [Uta] [Last-Call] Re: Concern about draft-ietf-uta-require-tls13-10 with IoT protocols

2025-04-10 Thread Alan DeKok
andate TLS 1.3 now, but perhaps we will mandate it one day. I just don't see any of the current arguments against mandating TLS 1.3 changing in 10 or even 20 years. Alan DeKok. ___ Anima mailing list -- anima@ietf.org To unsubscribe send an email to anima-le...@ietf.org

[Emu] Re: Adoption Call for draft-sawant-eap-ppt

2025-04-10 Thread Alan DeKok
rdless authentication > schemes such as the CTAP2 version of FIDO2." > > We could make some modifications to this if necessary. We also have some > items for provisioning. > > Alan DeKok. > ___ Emu mailing list -- emu@ietf.org To unsubscribe send an email to emu-le...@ietf.org

[Emu] Re: Adoption Call for draft-sawant-eap-ppt

2025-04-09 Thread Alan DeKok
m/emu-wg/charter/pull/4/files and indicate if you support > the charter revision. You may comment on the charter by responding to this > thread or commenting on the pull request. The charter updates describe one privacy-preserving proposal. Given the EAP-FIDO draft, should we allow for

[auth48] Re: [AD] AUTH48: RFC-to-be 9765 for your review

2025-04-09 Thread Alan DeKok via auth48archive
ticator are discussed in >> [draft-ietf-radext-deprecating-radius]. > > Is it correct that we should add this sentence to the end of Section 5.2 as > its own paragraph, and add draft-ietf-radext-deprecating-radius as an > informative reference, with anchor &q

[Anima] Re: Concern about draft-ietf-uta-require-tls13-10 with IoT protocols

2025-04-08 Thread Alan DeKok
ps a different question is "Do we want to avoid mandating TLS 1.3 for everyone *else* in the world, simply because one use-case refuses to upgrade?" My answer to that would be "no". The benefit gained everywhere else by mandating TLS 1.3 likely outweighs the minor problems of

[Uta] Re: [Anima] Concern about draft-ietf-uta-require-tls13-10 with IoT protocols

2025-04-08 Thread Alan DeKok
ps a different question is "Do we want to avoid mandating TLS 1.3 for everyone *else* in the world, simply because one use-case refuses to upgrade?" My answer to that would be "no". The benefit gained everywhere else by mandating TLS 1.3 likely outweighs the minor problems o

[auth48] Re: AUTH48: RFC-to-be 9765 for your review

2025-04-04 Thread Alan DeKok via auth48archive
On Apr 3, 2025, at 6:33 PM, rfc-edi...@rfc-editor.org wrote: > 1) This is fine. > 2) This is fine. > 3) I will do that shortly. > 4) The changes are fine. > > 8) The "no ALPN" and "1.0" are used only in the row / column headings, not in the table entries. The intent is to

[Emu] Re: 7170bis news (was Re: IETF 122 EMU agenda)

2025-03-25 Thread Alan DeKok
If EMSK is not essential, TEAPv2 could then be the version that clearly > defines how EMSK is used. Yes. Even if EMSK is essential, it's worth documenting TEAPv1. And we can't change TEAPv1 without declaring that existing deployments are not compliant. So we pretty much have to publ

[Emu] Re: 7170bis news (was Re: IETF 122 EMU agenda)

2025-03-22 Thread Alan DeKok
so note that TEAP doesn't define implicit challenges for EAP-MSCHAPv2, while TTLS does. I suspect that it would be a good idea to do that, too. Alan DeKok. ___ Emu mailing list -- emu@ietf.org To unsubscribe send an email to emu-le...@ietf.org

[Emu] Re: 7170bis news (was Re: IETF 122 EMU agenda)

2025-03-15 Thread Alan DeKok
> 1) declare the MSFT behaviour TEAPv0. Crypto-Binding contains only the >> MSK Compound MAC, the EMSK Compound MAC is always zero > > Is version 0 even valid? > What do these old versions declare as their version? Sorry, TEAPv1. So TEAPv1 is "MSK Compoun

[Emu] Re: [EXTERNAL] 7170bis news (was Re: IETF 122 EMU agenda)

2025-03-06 Thread Alan DeKok
be required to upgrade to TEAPv2, but people who do upgrade will be able to use the EMSK Compound MAC. Alan DeKok. ___ Emu mailing list -- emu@ietf.org To unsubscribe send an email to emu-le...@ietf.org

[Emu] 7170bis news (was Re: IETF 122 EMU agenda)

2025-03-06 Thread Alan DeKok
ive the EMSK Compound MAC. Write it down. Test it with implementations. 3) issue TEAPv1 which defines the EMSK Compound MAC, and uses it in the Crypto-Binding TLV. Alan DeKok. ___ Emu mailing list -- emu@ietf.org To unsubscribe send an email to emu-le...@ietf.org

[Emu] Re: Charter Item for EAP-PPT

2025-02-27 Thread Alan DeKok
+1 > On Feb 27, 2025, at 2:09 PM, Peter Yee wrote: > > For the record, I think that charter statement is fine. The sole change I > would suggest is s/user and/user, and/ . It’s an awfully long, uninterrupted > sentence otherwise. > -Peter > On 2/27/25, 10:13

[Emu] Re: I-D Action: draft-ietf-emu-rfc7170bis-21.txt

2025-02-14 Thread Alan DeKok
spect the answer is that everyone uses the MSK Compound-MAC, and ignores the EMSK Compound-MAC. If so, it needs to be documented. Alan DeKok. ___ Emu mailing list -- emu@ietf.org To unsubscribe send an email to emu-le...@ietf.org

[Emu] Re: I-D Action: draft-ietf-emu-rfc7170bis-21.txt

2025-02-07 Thread Alan DeKok
to get the final draft before the cutoff for IETF 122. Alan DeKok. ___ Emu mailing list -- emu@ietf.org To unsubscribe send an email to emu-le...@ietf.org

[Emu] Re: I-D Action: draft-ietf-emu-rfc7170bis-21.txt

2025-02-06 Thread Alan DeKok
of the EAP Method Update (EMU) WG of the IETF. > > Title: Tunnel Extensible Authentication Protocol (TEAP) Version 1 > Author: Alan DeKok > Name:draft-ietf-emu-rfc7170bis-21.txt > Pages: 120 > Dates: 2025-02-06 > > Abstract: > > This docum

[Emu] TEAP is not done (or 7170bis forever!)

2025-02-03 Thread Alan DeKok
ng each individual change as a separate git commit. The hope is that the resulting series of commits will be easy to understand and to review. So I had hoped that 7170bis was done. But in the interest of improving the document to increase interoperability, it looks like it needs

[Emu] Re: AD review of draft-ietf-emu-eap-arpa-05

2025-01-29 Thread Alan DeKok
any any" - remove duplicate "any" Done. > I find the following sentences a bit weird. I think it can just be removed: > > We now discuss the NAI format in more detail. We first discuss > the eap.arpa realm, and second the use and purpose of the > u

Re: [Bug 2096611] Revert Upstream dependency on wtmpdb last in radlast

2025-01-29 Thread Alan DeKok
On Jan 29, 2025, at 10:24 AM, John Chittum <2096...@bugs.launchpad.net> wrote: > When is 3.2.7 likely to land? Moving forward to 3.2.7 makes sense. in > the short term, I can land my removal of the `wtmpdb` dependency, and > note that `radlast` won't function. that's true in 24.10 now. I'm > slight

[Bug 2096611] Re: Revert Upstream dependency on wtmpdb last in radlast

2025-01-27 Thread Alan DeKok
We're going to put `radlast` behind a `configure` flag in 3.2.7. That way the packages can be built without it. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2096611 Title: Revert Upstream dependen

[Bug 2096611] Re: Revert Upstream dependency on wtmpdb last in radlast

2025-01-24 Thread Alan DeKok
TBH I don't know if anyone is still using the radlast / radutmp stuff. It might be OK to just delete that functionality entirely. For compatibility, perhaps move radlast and anything else it needs into a freeradius-last package? That way people who want it can still use it, and the main set of us

[Emu] Re: Agenda requests for the EMU WG session at IETF 122

2025-01-23 Thread Alan DeKok
y works, sort of". And then immediately publish TEAPv2, which would more clearly define the cryptographic derivations. Alan DeKok. ___ Emu mailing list -- emu@ietf.org To unsubscribe send an email to emu-le...@ietf.org

[Emu] Re: I-D Action: draft-ietf-emu-rfc7170bis-20.txt

2025-01-07 Thread Alan DeKok
On Jan 7, 2025, at 10:55 AM, internet-dra...@ietf.org wrote: > > Internet-Draft draft-ietf-emu-rfc7170bis-20.txt is now available. It is a work > item of the EAP Method Update (EMU) WG of the IETF. > > Title: Tunnel Extensible Authentication Protocol (TEAP) Version 1 >

[Emu] IPR declaration for draft-ietf-emu-eap-arpa

2025-01-01 Thread Alan DeKok
I do not know of any IPR for this document. I'm OK with publishing it. Alan DeKok. ___ Emu mailing list -- emu@ietf.org To unsubscribe send an email to emu-le...@ietf.org

[Emu] Re: New issues with TEAP, and proposed document updates

2024-12-30 Thread Alan DeKok
pport keys generation. However such a sentence could be > off-putting implementers. I'll clarify. Jouni also pointed out that because EAP-TLS works, it is highly likely that other EAP types work so long as they derive MSK and EMSK. Alan DeKok. ___ Emu mailing list -- emu@ietf.org To unsubscribe send an email to emu-le...@ietf.org

[Emu] New issues with TEAP, and proposed document updates

2024-12-30 Thread Alan DeKok
heir implementation matches this behaviour, then we're good to go. I fully expect this to be the case, because all implementations appear to be interoperable. But it would be good to get explicit feedback from the implementors that this is the case. Alan DeKok.

[Emu] Re: draft-sawant-eap-ppt

2024-12-16 Thread Alan DeKok
the challenge and the issued token to > send to the server to verify. > > > Some initial comments on the document > - I dont think EAP-PPT generates key material, it requires the tunnel method > to generate key material as the pr

[rfc-i] Re: [saag] Re: Re: RFCs vs Standards

2024-12-11 Thread Alan DeKok
t is the official position of the IETF that vendors shouldn't claim compliance with an Internet Draft, then perhaps the IETF should ensure that useful and implemented Internet Drafts are (a) published as an RFC, or (b) removed from public presence. Alan DeKok. _

[OPSAWG]Re: draft-ietf-opsawg-tacacs-tls13: Debugging TACACS+ over TLS

2024-11-26 Thread Alan DeKok
ld have been, I'll try to find some time. Alan DeKok. ___ OPSAWG mailing list -- opsawg@ietf.org To unsubscribe send an email to opsawg-le...@ietf.org

[OPSAWG]Re: draft-ietf-opsawg-tacacs-tls13: Debugging TACACS+ over TLS

2024-11-26 Thread Alan DeKok
re, it's a very good idea to recommendation that implementations support it, with a caveat that adminstrators do not enable it in production. Alan DeKok. ___ OPSAWG mailing list -- opsawg@ietf.org To unsubscribe send an email to opsawg-le...@ietf.org

[Emu] Re: Review of draft-ietf-emu-eap-edhoc-01

2024-11-18 Thread Alan DeKok
connection. That can easily be done, and is really just an implementation detail. Perhaps CoAP has issues with one CoAP client doing multiple authentications at the same time. But that's a CoAP issue, and has nothing to do with EAP. Alan DeKok. __

[OPSAWG]Re: TACACS+ TLS Resumption and PSK.

2024-11-07 Thread Alan DeKok
s must be > considered. I still don't understand this. The CA doesn't have to be online. The client has to have a copy of the CAs public cert. Perhaps any OCSP system has to be online. But I don't think anything in RFC 5280 requires t

[Emu] Re: I-D Action: draft-ietf-emu-eap-fido-00.txt

2024-10-30 Thread Alan DeKok
ward FIDO traffic to my web server. But your EAP server can't forward traffic to my web server. So is this an attack we care about? It may be sufficient to say "attacks within your organization are possible, but the solution to that is to police y

[OPSAWG]Re: TACACS+ TLS Resumption and PSK.

2024-10-29 Thread Alan DeKok
CA is unreachable. The TACACS+ TLS server has to be configured with the CA cert, and all intermediate certs. The client should ideally also be configured with the CA cert. There's no need to contact the CA, the CA cert is just a file

[Emu] Re: I-D Action: draft-ietf-emu-eap-fido-00.txt

2024-10-29 Thread Alan DeKok
o binding issues aren't relevant. i.e. the client can just use the servers challenge. Alan DeKok. ___ Emu mailing list -- emu@ietf.org To unsubscribe send an email to emu-le...@ietf.org

[Emu] Re: I-D Action: draft-ietf-emu-eap-fido-00.txt

2024-10-25 Thread Alan DeKok
phic binding. That exchange could stay inside of EAP-FIDO, and wouldn't have to affect any FIDO exchanges. Alan DeKok. ___ Emu mailing list -- emu@ietf.org To unsubscribe send an email to emu-le...@ietf.org

[Emu] Re: draft-ietf-emu-eap-arpa-02 comments

2024-10-07 Thread Alan DeKok
#x27;t support them MUST be safe. The second priority is to ensure that the provisioning workflows will always work, and do something useful. Alan DeKok. ___ Emu mailing list -- emu@ietf.org To unsubscribe send an email to emu-le...@ietf.org

[Emu] Re: draft-ietf-emu-bootstrapped-tls-06 notes

2024-10-04 Thread Alan DeKok
> tls-pok-dpp.eap.arpa. > I don't think that there are any options other than anonymous@ or > empty-string. As per Heikki's comment, it should be tls-pok-...@method.eap.arpa. i.e. tls-pok-...@teap.eap.arp Alan DeKok. ___ Emu mai

[Emu] Re: draft-ietf-emu-eap-arpa-02 comments

2024-10-04 Thread Alan DeKok
had determined that it couldn't start > provisioning at this time. Instead of being helpful, the server should be > clear that this authentication can not continue and must fail. If the server can't authenticate, it just sends EAP Failure. Alan DeKok. _

[Emu] Re: draft-ietf-emu-eap-arpa-02 comments

2024-10-04 Thread Alan DeKok
bout > eap.arpa probably shouldn't allow this to happen. Agreed. > There's more about NAKs on the list in messages discussing > draft-ietf-emu-bootstrapped-tls-06 comments, including comments Alan is > considering for this draft. I'll try to publish a new draft early next week. Alan DeKok. ___ Emu mailing list -- emu@ietf.org To unsubscribe send an email to emu-le...@ietf.org

[Emu] Re: draft-ietf-emu-bootstrapped-tls-06 notes

2024-10-01 Thread Alan DeKok
Perhaps: # EAP Peers An EAP session begins with the peer receiving an initial EAP-Request/Identity message. An EAP peer supporting this specification MUST examining the identity to see if it uses the eap.arpa realm. If not, the EAP peer MUST process the request normally. The EAP peer MUST ch

[Emu] Re: draft-ietf-emu-bootstrapped-tls-06 notes

2024-10-01 Thread Alan DeKok
+1 to all of this. I'll add some notes to the eap.arpa document to raise issues brought up here: * EAP type selection can be done by examining the provisioning NAI * NAKs should be handled specially for provisioning NAIs * There is no method to NAK a particular kind of provisioning. e.g.

[Emu] Re: WGLC for draft-ietf-emu-bootstrapped-tls

2024-09-26 Thread Alan DeKok
+1 > On Sep 24, 2024, at 5:39 PM, Eliot Lear wrote: > > Signed PGP part > I think this draft ready to go as well. I know that Owen has prototyped it, > and I'd like to see it advance. > > Eliot > > On 23.09.2024 21:01, Peter Yee wrote: >> Draft-ietf-emu-bootstrapped-tls has two days left o

Bug#1076022: Additional patch for bullseye's FreeRADIUS (was: Backport some security settings from upstream 3.2.5 release to mitigate BlastRADIUS)

2024-08-23 Thread Alan DeKok
dated their RADIUS implementation in 25 years. There is a work-around for the checkpoint issue, so additional configuration changes for FreeRADIUS aren't a good idea. Alan DeKok. signature.asc Description: Message signed with OpenPGP

Bug#1076022: Additional patch for bullseye's FreeRADIUS (was: Backport some security settings from upstream 3.2.5 release to mitigate BlastRADIUS)

2024-08-21 Thread Alan DeKok
The patch looks good to me, thanks. > On Aug 20, 2024, at 9:42 PM, Santiago Ruano Rincón > wrote: > > Hi! > > El 20/08/24 a las 15:14, Santiago Ruano Rincón escribió: >> Hello Herwin, >> >> Thanks a lot for testing the proposed packages! >> >> El 15/08/24 a las 17:04, Herwin Weststrate esc

[Emu] Re: I-D Action: draft-ietf-emu-eap-arpa-02.txt

2024-08-12 Thread Alan DeKok
EAP Method Update (EMU) WG of the IETF. > > Title: The eap.arpa domain and EAP provisioning > Author: Alan DeKok > Name:draft-ietf-emu-eap-arpa-02.txt > Pages: 18 > Dates: 2024-08-12 > > Abstract: > > This document defines the eap.arpa dom

[Emu] Re: ietf-emu-eap-arpa and ietf-emu-bootstrapped-tls

2024-08-12 Thread Alan DeKok
o note that the username portion defines the _type_ of provisioning being done. Different usernames are different kinds of provisioning. And empty usernames are different from non-empty usernames. Alan DeKok. ___ Emu mailing list -- emu@ietf.org To unsubscribe send an email to emu-le...@ietf.org

[Emu] Re: Intdir telechat review of draft-ietf-emu-rfc7170bis-16

2024-08-04 Thread Alan DeKok
On May 10, 2024, at 6:48 PM, Haoyu Song via Datatracker wrote: > > Reviewer: Haoyu Song > Review result: Ready with Nits > > I’m the assigned INTDIR reviewer for this document. This document defines the > Tunnel Extensible Authentication Protocol V1 which obsoletes RFC7010. > > I couldn’t find

[Emu] Re: I-D Action: draft-ietf-emu-eap-arpa-01.txt

2024-07-30 Thread Alan DeKok
rk > item of the EAP Method Update (EMU) WG of the IETF. > > Title: The eap.arpa domain and EAP provisioning > Author: Alan DeKok > Name:draft-ietf-emu-eap-arpa-01.txt > Pages: 17 > Dates: 2024-07-30 > > Abstract: > > This document defines

[Emu] Quick comments on draft-sawant-eap-ppt-00

2024-07-23 Thread Alan DeKok
anges per sessions, the use of resumption will tie two sessions together Alan DeKok. ___ Emu mailing list -- emu@ietf.org To unsubscribe send an email to emu-le...@ietf.org

[Int-area] Re: New version of WPADNG

2024-07-18 Thread Alan DeKok
th it". As these recent attacks show, there is a need for increased security at the edge. The question I have is how we increase security, not whether we want increased security. Alan DeKok. ___ Int-area mailing list -- int-area@ietf.org To unsubscribe send an email to int-area-le...@ietf.org

Re: [Bug 2073269] Replace radsecret script to avoid new perl dependencies from universe

2024-07-16 Thread Alan DeKok
On Jul 16, 2024, at 4:14 PM, Seth Arnold <2073...@bugs.launchpad.net> wrote: > When playing with the shell script I thought I noticed patterns in the last > character of the output so I investigated further to make sure that these are > actually emitting roughly what we expect: Due to the way

Re: [Bug 2073269] Re: [MIR] libconvert-base32-perl and libcrypt-urandom-perl

2024-07-16 Thread Alan DeKok
TBH the simplest thing to do is just to drop the rad secret program. It not used for anything, and is just a helper script. > On Jul 16, 2024, at 1:35 PM, Andreas Hasenack <2073...@bugs.launchpad.net> > wrote: > > The freeradius update to 3.2.5 enabled a new binary and two new modules, > as par

[OPSAWG]Re: WG LC: draft-ietf-opsawg-tacacs-tls13

2024-06-28 Thread Alan DeKok
ot;, and not EAP or RADIUS specific. Alan DeKok. ___ OPSAWG mailing list -- opsawg@ietf.org To unsubscribe send an email to opsawg-le...@ietf.org

[OPSAWG]Re: TACACS+ w/ TLS 1.3 implementations

2024-06-27 Thread Alan DeKok
might be late 2024 before this work starts. Alan DeKok. ___ OPSAWG mailing list -- opsawg@ietf.org To unsubscribe send an email to opsawg-le...@ietf.org

[Gen-art] Re: Genart last call review of draft-ietf-radext-radiusv11-08

2024-06-27 Thread Alan DeKok
ementations can tweak their transport layer, and change almost nothing else. So it's closer to a transport profile than a brand new protocol, packet encoding, state machine, etc. > Q_ED_1: > > I think the Abstract is too long. Any explanations, clarifications and details > shoul

[OPSAWG]Re: WG LC: draft-ietf-opsawg-tacacs-tls13

2024-06-24 Thread Alan DeKok
e draft, and the lack of experience with implementations, I'd suggest that "Experimental" is more appropriate. Alan DeKok. ___ OPSAWG mailing list -- opsawg@ietf.org To unsubscribe send an email to opsawg-le...@ietf.org

Re: draft-ietf-bfd-secure-sequence-numbers (WGLC for the 3 BFD auth documents and IPR check)

2024-06-13 Thread Alan DeKok
date this one. > Section 6 > > - "The Auth Type field MUST be set to TBD1 (Meticulous Keyed ISAAC)". There > is no IANA registration for just ISAAC anymore, so it will be one of the 2 > auth types from optimizing-authentication? It may be best to update the IANA section of this document to define Meticulous Keyed ISAAC. That way everything is in one document. Alan DeKok.

Re: Secdir early review of draft-ietf-bfd-stability-13

2024-06-08 Thread Alan DeKok
(removing secdir) The security analysis is perhaps simplified a bit by understanding the limited use-case for BFD. From the introduction to RFC 5880: The goal of Bidirectional Forwarding Detection (BFD) is to provide low-overhead, short-duration detection of failures in the path be

[Emu] Re: I-D Action: draft-ietf-emu-rfc7170bis-19.txt

2024-06-07 Thread Alan DeKok
m of the EAP Method Update (EMU) WG of the IETF. > > Title: Tunnel Extensible Authentication Protocol (TEAP) Version 1 > Author: Alan DeKok > Name:draft-ietf-emu-rfc7170bis-19.txt > Pages: 110 > Dates: 2024-06-07 > > Abstract: > > This document de

Re: WGLC for the 3 BFD auth documents and IPR check

2024-06-04 Thread Alan DeKok
I'm not aware of any IPR on the drafts. > On Jun 3, 2024, at 9:29 PM, Reshad Rahman > wrote: > > BFD WG, > > This email starts a 2 week Working Group Last Call for the following 3 > documents, please review and provide comments by end of day on June 17th. > Feedback such as "I believe the d

[Emu] Re: Éric Vyncke's No Objection on draft-ietf-emu-rfc7170bis-17: (with COMMENT)

2024-05-30 Thread Alan DeKok
ot; list for too long. > Alas, I had no opportunity to check whether all nits from > https://author-tools.ietf.org/api/idnits?url=https://www.ietf.org/archive/id/draft-ietf-emu-rfc7170bis-17.txt > are false positive. I'll double-check. Alan DeKok. _

[Emu] Re: Warren Kumari's No Objection on draft-ietf-emu-rfc7170bis-17: (with COMMENT)

2024-05-30 Thread Alan DeKok
On May 29, 2024, at 2:29 PM, Warren Kumari via Datatracker wrote: > My primary remaining comment is that Abstract for the document briefly should > say *how* it updates RFC9427 - that way when someone reads RFC9427 they need > only check this new document's Abstract to know if they need to read t

[Emu] Re: Roman Danyliw's Discuss on draft-ietf-emu-rfc7170bis-17: (with DISCUSS and COMMENT)

2024-05-28 Thread Alan DeKok
ype Type > Codes’ > registries for new registrations and updates there registries with a NOTE:” Will do. > ** idnits reports: > > -- Obsolete informational reference (is this intentional?): RFC 5226 > (Obsoleted by RFC 8126) Updated, thanks. Alan DeKok. ___

Re: WGLC for draft-ietf-bfd-large-packets

2024-05-28 Thread Alan DeKok
On May 28, 2024, at 10:43 AM, Jeffrey Haas wrote: > > Hopefully this addresses Alan's comments: > > https://author-tools.ietf.org/iddiff?url2=draft-ietf-bfd-large-packets-11 That looks good, thanks. Alan DeKok.

[Emu] Re: Deb Cooley's No Objection on draft-ietf-emu-rfc7170bis-17: (with COMMENT)

2024-05-28 Thread Alan DeKok
Yes. > '[]' I have no idea, in TLS 1.3 it would signify encrypted messages, but > clearly that can't be the case here (TLS server_key_exchange can't be > encrypted). TBH that's left over from 7170, and I'm not entirely sure. > I like the ASCII art in Section C.1-C.10, not so much in C.11 on > because it is harder to see which way the arrows point (less white space). That diagram was a later addition. I'll see if I can find time to re-do the diagrams manually before AUTH 48. Alan DeKok. ___ Emu mailing list -- emu@ietf.org To unsubscribe send an email to emu-le...@ietf.org

[Emu] Re: Orie Steele's No Objection on draft-ietf-emu-rfc7170bis-16: (with COMMENT)

2024-05-23 Thread Alan DeKok
hat allow doing this. Maybe, for example, IOT experts > could say if they see use for TEAP/PEAP/EAP-TTLS used for tunnelling SIM > based EAPs? Sure. I'll update the document. Alan DeKok. ___ Emu mailing list -- emu@ietf.org To unsubscribe send an email to emu-le...@ietf.org

[Emu] Re: Gunter Van de Velde's No Objection on draft-ietf-emu-rfc7170bis-17: (with COMMENT)

2024-05-23 Thread Alan DeKok
plicit that > this is data used by EAP? The rest of the document discusses how the EAP server handles the inner tunnel data, so I think it's already explicit that the data is handled by EAP. Alan DeKok. ___ Emu mailing list -- emu@ietf.org To unsubscribe send an email to emu-le...@ietf.org

Re: WGLC for draft-ietf-bfd-large-packets

2024-05-22 Thread Alan DeKok
opped". Alan DeKok.

[Emu] Re: Orie Steele's No Objection on draft-ietf-emu-rfc7170bis-16: (with COMMENT)

2024-05-21 Thread Alan DeKok
> The options are send one or the other, depending on the conditions or just > send one regardless of the conditions, perhaps the answer is to just send > Result TLV regardless? The document already mandates sending a Result TLV to indicate the final result of authentication, so I t

[Emu] Re: Orie Steele's No Objection on draft-ietf-emu-rfc7170bis-16: (with COMMENT)

2024-05-21 Thread Alan DeKok
On May 20, 2024, at 8:12 PM, Orie Steele wrote: > > On Mon, May 20, 2024 at 6:24 PM Alan DeKok > wrote: >> >> "It MUST only send a NAK TLV for a TLV which is marked mandatory." >> > > It MUST send a NAK TLV for any TLV which is marked mandatory but

[Emu] Re: Orie Steele's No Objection on draft-ietf-emu-rfc7170bis-16: (with COMMENT)

2024-05-20 Thread Alan DeKok
PKCS#10 TLV (see Section 4.2.17). The TEAP server > issues a > 1232 Simple PKI Response using a PKCS#7 [RFC2315] degenerate (i.e. > 1233 unsigned) "Certificates Only" message encoded into the body of a > 1234 PKCS#7 TLV (see Section 4.2.16), only after an inner

Re: [OPSAWG] I-D Action: draft-ietf-opsawg-tacacs-tls13-07.txt

2024-04-23 Thread Alan DeKok
P address filtering? If the client has correct TLS credentials, does it really matter what IP it comes from? i.e. will the move to TLS still have servers identify clients by IP address? Servers could also be configured to limit connections by source IP, as an additional layer of security. Alan DeKok. ___ OPSAWG mailing list OPSAWG@ietf.org https://www.ietf.org/mailman/listinfo/opsawg

Re: [Uta] Adoption call for draft-rsalz-uta-require-tls13-01

2024-04-04 Thread Alan DeKok
24. > Please, send your opinions on the list by this date. Please also indicate > whether you are ready to review / contribute. (chair hat off) I support adoption. I'm ready to review / contribute. Alan DeKok. ___ Uta mailing

Re: [Emu] draft-dekok-emu-eap-arpa-01 and WBA unauthenticated EAP-TLS

2024-03-28 Thread Alan DeKok
n479 > > Wikipedia has more info about its history and pointers to the first commits > from 10+ years ago: > https://en.wikipedia.org/wiki/Extensible_Authentication_Protocol#EAP-TLS > > I haven't seen any use of "WFA-UNAUTH-TLS&

Re: [Emu] I-D Action: draft-ietf-emu-rfc7170bis-16.txt

2024-03-26 Thread Alan DeKok
U) WG of the IETF. > > Title: Tunnel Extensible Authentication Protocol (TEAP) Version 1 > Author: Alan DeKok > Name:draft-ietf-emu-rfc7170bis-16.txt > Pages: 111 > Dates: 2024-03-26 > > Abstract: > > This document defines the Tunnel Extensib

Re: [Uta] Comments as draft-rsalz-uta-require-tls13

2024-03-25 Thread Alan DeKok
r" construct and at what > Tn+delta? And if you say "the highest version available" you're making it > even more intractable/worse. > > The current wording seems the least disruptive to me. Yes, in some number of > years we'll have to

[Uta] Comments as draft-rsalz-uta-require-tls13

2024-03-25 Thread Alan DeKok
358 Of the different methods, I think the wpa_supplicant method is the least preferred. Alan DeKok. ___ Uta mailing list Uta@ietf.org https://www.ietf.org/mailman/listinfo/uta

Re: [Emu] Adoption call for eap.arpa

2024-03-21 Thread Alan DeKok
e.g. provisioning.t...@eap.arpa instead of provision...@teap.eap.arpa I think the second looks clearer to me. Alan DeKok, ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

Re: [Emu] Adoption call for eap.arpa

2024-03-21 Thread Alan DeKok
> > PS: There was also an issue that the current draft recommends Expert Review > for assignment of new values but then also expects RFCs: "The intention is > that any non-prefix allocation will be accompanied by a published RFC.". I > think it will be beneficial to have &q

Re: [Emu] Adoption call for eap.arpa

2024-03-13 Thread Alan DeKok
unauthenticated mode since 2008 (RFC 5216 Section 2.1.1). But there's been no way to actually use it. Hopefully this set of documents will address that issue. Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

Re: [Emu] Updated EMU charter

2024-03-07 Thread Alan DeKok
pa document, too. * define an eap.arpa domain for use with a number of proposed provisioning methods. Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

Re: [Emu] New Version Notification for draft-janfred-eap-fido-02.txt

2024-03-05 Thread Alan DeKok
OR > messages sent in EAP-FIDO. Is that fixed, or negotiated? Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

Re: [Emu] New Version Notification for draft-janfred-eap-fido-02.txt

2024-03-04 Thread Alan DeKok
to be explicit. If we have an attribute that says "MUST be of > length one", some vendor will ignore it, on the sending or receiving side. > How do we deal with two PKIDs? do we take the first one? The last one? Do we > abort completely? > I find it better to be explicit,

Re: [Emu] New Version Notification for draft-janfred-eap-fido-02.txt

2024-03-04 Thread Alan DeKok
ate versions. An alternative would be to do the version negotiation inside of the TLS tunnel. That's also imperfect, but at least gives EAP-FIDO complete control over all aspects of the protocol. Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

Re: [Emu] Secdir last call review of draft-ietf-emu-rfc7170bis-15

2024-03-03 Thread Alan DeKok
is problem; sort of like > GREASE...but to fix an insecurity instead. I think that changes existing implementations. Unless the recommendation is for each end to add a dummy Outer-TLV which implementations are *known* to ignore. Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

Re: [Emu] [secdir] Secdir last call review of draft-ietf-emu-rfc7170bis-15

2024-03-03 Thread Alan DeKok
x27;t > send it by default to unauthenticated servers, but offer a way for the user > to override that default? I believe that Identity-Hint is not useful for server unauthenticated provisioning, and therefore should not not be used in that

Re: [Emu] Secdir last call review of draft-ietf-emu-rfc7170bis-15

2024-03-03 Thread Alan DeKok
On Mar 1, 2024, at 10:21 PM, David Mandelberg via Datatracker wrote: > > (nit) If I understand the TEAP version negotiation and Crypto-Binding > correctly, the negotiated version is not cryptographically verified until > either (1) after the first inner method is completed or (2) just before the

Re: [Emu] AD review draft-ietf-emu-rfc7170bis-14

2024-02-26 Thread Alan DeKok
[THIS-DOCUMENT] Fixed. > > Protection against Man-in-the-Middle Attacks > > Maybe rename to "on-path attacks" ? Fixed. > Appendix C.4 should clarify the TLS version used (1.2). Should it be > changed to use a TLS 1.3 example? I think so, yes. I'll have to dig into that. I don't think I can get that updated today before the deadline. Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

[Emu] Fwd: New Version Notification for draft-dekok-emu-eap-arpa-01.txt

2024-02-26 Thread Alan DeKok
This update includes guidelines for DNS operators and implementors. > Begin forwarded message: > > From: internet-dra...@ietf.org > Subject: New Version Notification for draft-dekok-emu-eap-arpa-01.txt > Date: February 25, 2024 at 5:23:32 PM EST > To: "Alan DeKok&

Re: I-D Action: draft-ietf-bfd-secure-sequence-numbers-13.txt

2024-02-05 Thread Alan DeKok
Looking at the paper in more detail, I think we should be fine. The attacks are for things like "seed is all zero", which we don't care about here. The main take-away is to change the way we seed ISAAC a little bit, and we should be fine. I'll work something out tomorrow.

Re: I-D Action: draft-ietf-bfd-secure-sequence-numbers-13.txt

2024-02-05 Thread Alan DeKok
On Feb 5, 2024, at 4:50 PM, Reshad Rahman wrote: > > Yes wikipedia links to https://eprint.iacr.org/2006/438.pdf Ah, OK. Unfortunately there's no source code, and no test vectors. So I'm a bit wary of "rolling my own". That being said, Page 5 has this text: It is straightforward to dis

Re: I-D Action: draft-ietf-bfd-secure-sequence-numbers-13.txt

2024-02-05 Thread Alan DeKok
+. Wikipedia only lists ISAAC: https://en.wikipedia.org/wiki/ISAAC_(cipher) Alan DeKok.

Re: Optimizing Authentication - periodic re-authentication

2024-01-30 Thread Alan DeKok
in overflow, which can make the software do things". I think it took about 4 rounds before I manage to get it through that if an attacker can write to the configuration files, he can just *configure* the software to do something. He doesn't need to "exploit" it with an overflow. I that hope that the secdir review can avoid commenting on useless and irrelevant attacks. Alan DeKok.

Re: draft-ietf-bfd-optimizing-authentication-13 nits

2024-01-24 Thread Alan DeKok
packet is a new signal that the session is still up. I don't see much use for a non-meticulous Auth Type method, as packets can just be replayed. Alan DeKok.

  1   2   3   4   5   6   7   8   9   10   >