Re: [Emu] EAP-AKA' -bis and -DH implementations

2018-06-22 Thread Alan DeKok
her implementations. We're working on implementing this in FreeRADIUS. Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

[Emu] Comments on draft-lear-eap-teap-brski

2018-07-21 Thread Alan DeKok
quot;bootstrapping" once, and "provisioning" many times. My $0.02 is that "provisioning" is clearer in this context than "bootstrapping". Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

Re: [Emu] WG adoption call for draft-arkko-eap-aka-pfs

2018-11-13 Thread Alan DeKok
specific claims of the > application... I share these concerns. Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

Re: [Emu] FW: New Version Notification for draft-ietf-emu-eap-tls13-03.txt

2018-11-14 Thread Alan DeKok
of implementations and inter-operability, I would oppose yet another point of negotiation. It does not add anything IMHO. And, it makes implementations and inter-operability more complex. Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

Re: [Emu] EAP-TLS 1.3 - TLS extensions and mechanisms

2018-11-14 Thread Alan DeKok
is, we should tell the TLS working group that we are > planning this and ask for their view. My larger worry is that underlying SSL implementations may not support caching of certs from dropped handshakes. It may be hard to add features to SSL libraries which are used only by EAP-TLS. Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

Re: [Emu] FW: New Version Notification for draft-ietf-emu-eap-tls13-03.txt

2018-11-14 Thread Alan DeKok
nt does not support it, which makes it inapplicable here. Never the less, something similar could be done with User-Name in the Access-Accept. And, it should be supported by all enterprise equipment. It may be useful to discuss these topics in a "best practices" document for E

Re: [Emu] EAP-TLS 1.3 - TLS extensions and mechanisms - Review

2018-11-14 Thread Alan DeKok
to have a wider "fan out" of certificate dependencies, instead of a deeper chain of certs. Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

Re: [Emu] FW: New Version Notification for draft-ietf-emu-eap-tls13-03.txt

2018-11-14 Thread Alan DeKok
can be different, and reference Section 4.2 of RFC 7542. For an implementation of inner/outer identity checks, see: https://github.com/FreeRADIUS/freeradius-server/blob/v3.0.x/raddb/policy.d/filter#L111 It's not perfect, but it seems to work well in practice. Alan DeKok. _

Re: [Emu] FW: New Version Notification for draft-ietf-emu-eap-tls13-03.txt

2018-11-21 Thread Alan DeKok
t;MAC-ADDRESS@anonymous.realm". in order to separate the namespaces of "real" identities, and "anonymized" identities. Comments? Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

Re: [Emu] WG adoption call for draft-arkko-eap-aka-pfs

2018-11-28 Thread Alan DeKok
t help reduce your concerns? It suggests that the risk may be low. But the risk is there. TBH, there's no good solution for this situation. It's needed, but at the same time anyone using it is opening themselves to lawsuits that they can't afford to defend, much less lose. Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

Re: [Emu] WG adoption call for draft-arkko-eap-aka-pfs

2018-12-11 Thread Alan DeKok
f the standard space. And we rely only on their good will for continued use of an open standard. That tends to make me nervous. Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

Re: [Emu] WG adoption call for draft-arkko-eap-aka-pfs

2018-12-11 Thread Alan DeKok
Before you can progress away from that > and the RFC 5448-only modes, much time will pass. I've been doing my thing for 20 years. I'm not going anywhere, so I'm thinking about the long term. Anyways, I think this is necessary. Alan DeKok. __

Re: [Emu] EAP-TLS 1.3 TLS-Exporter context_value

2019-01-11 Thread Alan DeKok
there isn't much that can be done here In the end, I think any information we could use is already being used to derive TLS-Exporter, and there's no real way to get additional information. And even if there was, it's not clear what information would make the TLS-Exporter "

[Emu] Implementation report for EAP-TLS 1.3: OK, with nits

2019-01-27 Thread Alan DeKok
that output. Failure to do so will result in incorrect values being calculated for the above keying material. -- Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

[Emu] TLS 1.3 and other EAP methods

2019-01-28 Thread Alan DeKok
EAP-AKA’. The lack of this definition is a recently discovered bug in the original RFCs. I owe the WG a document for that. If the above change isn't accepted, I can add some text on TLS 1.3 key derivation, too. The document could then be a generic "fix keys in EAP methods&qu

Re: [Emu] Implementation report for EAP-TLS 1.3: OK, with nits

2019-01-28 Thread Alan DeKok
with text that says: MSK = Key_Material(0,63) EMSK = Key_Material(64,127) It's not any more text, and it removes a potential confusion. Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

Re: [Emu] TLS 1.3 and other EAP methods

2019-01-28 Thread Alan DeKok
hod_Types that are larger than 255 SHOULD use Method_Type as a 32-bit number in network byte order. --- Without such text, there will be problems. People will want to use TLS 1.3 with other EAP methods. And if there is no standards guidance, the implementors *will* choose something, so that me

Re: [Emu] Implementation report for EAP-TLS 1.3: OK, with nits

2019-01-28 Thread Alan DeKok
derived in the same manner as with EAP-TLS [RFC5216], Section 2.3. The definitions are repeated below for simplicity: Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

Re: [Emu] TLS 1.3 and other EAP methods

2019-01-28 Thread Alan DeKok
ods. I have a strong preference that *all* TLS-based EAP methods be capable of working with TLS 1.3. Maybe this document isn't the place for these updates. But IMHO, any updates to TTLS, FAST, etc. MUST be published simultaneously with this spec. Otherwise implementors will have no guidel

[Emu] Session identifiers for fast re-authentication

2019-01-28 Thread Alan DeKok
The EMU charter says: - Define session identifiers for fast re-authentication for EAP-SIM, EAP-AKA, and EAP-AKA’. The lack of this definition is a recently discovered bug in the original RFCs. I have recently uploaded a document which addresses this point. https://datatracker.ietf.org/doc/dr

Re: [Emu] TLS 1.3 and other EAP methods

2019-01-31 Thread Alan DeKok
discussion of other EAP methods is outside of the scope of this document. --- That way there's at least *some* guidance. Any additional discussion (and there may be lots) could go into another document. Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

[Emu] Question about draft-ietf-emu-eap-tls13-03 && application data

2019-01-31 Thread Alan DeKok
n 7.3 Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

Re: [Emu] TLS 1.3 and other EAP methods

2019-01-31 Thread Alan DeKok
On Jan 31, 2019, at 11:55 AM, John Mattsson wrote: > >> Alan DeKok ; wrote: >> >> Hmm... if the changes are too complex, it may be better to have a new >> document. I have a first draft written, and will be publishing it soon. >> It's only about 12 page

Re: [Emu] Question about draft-ietf-emu-eap-tls13-03 && application data

2019-01-31 Thread Alan DeKok
e the handshake, but then application data shouldn't be protected by TLS? That doesn't make sense... I'll also note that RC 5216 Section 2.4 mentions mandatory to implement ciphers, and this draft doesn't. It might be worth adding that, or

[Emu] Notes on session resumption with TLS-based EAP methods

2019-02-01 Thread Alan DeKok
ption is usually done at the TLS layer. This means there is minimal ability for the EAP layer to cross-check method types. If we do allow it, it should be called out explicitly in the EAP-TLS document. If we don't allow it, we should find a w

Re: [Emu] Notes on session resumption with TLS-based EAP methods

2019-02-02 Thread Alan DeKok
ner-tunnel authentication. In contrast, FAST and TEAP both still require phase2 to occur after session resumption. The session resumption there is just used to skip the TLS negotiation. And the MSK / EMSK depends on the inner tunnel authentication methods, so the TLS-Exporter() function nee

Re: [Emu] TLS 1.3 and other EAP methods

2019-02-03 Thread Alan DeKok
uch as TTLS / FAST > / PEAP / TEAP as well. The only thing that would change is "EAP-TLS" replaced > with " TLS-based EAP Methods" in a number of places. All the technical > content would be the same. I think that's good, thanks. Alan DeKok. ___

Re: [Emu] Session identifiers for fast re-authentication

2019-02-03 Thread Alan DeKok
use in multiple PEAP" > > Should remove ")." and add a blank line. Fixed, thanks. I'll do some more touchups and issue a new draft next week. Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

Re: [Emu] Notes on session resumption with TLS-based EAP methods

2019-02-03 Thread Alan DeKok
to skip inner authentication. If the EAP server needs to do additional *authorization*, it can always refuse to resume the session. But if there's no additional authorization, I don't see any issue here. Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

Re: [Emu] Notes on session resumption with TLS-based EAP methods

2019-02-05 Thread Alan DeKok
y to do that, I'd just like to understand the reasons behind doing it. Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

Re: [Emu] TLS 1.3 and other EAP methods

2019-02-05 Thread Alan DeKok
her methods, the customers *will* demand one, and implementors *will* create one. At that point, the IETF will have ceded change control for those EAP methods over to those implementors. Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

Re: [Emu] TLS 1.3 and other EAP methods

2019-02-05 Thread Alan DeKok
authenticating with certificates. Other TLS-based EAP methods allow the use of client certificates, too. While not the normal use-case, it is a well-known and deployed use-case. The document should add a note that the issue is less of a concern when client certificates are not used

Re: [Emu] TLS 1.3 and other EAP methods

2019-02-05 Thread Alan DeKok
ng the others is a major problem IMHO. > Anyhow, I don't expect the other document to take 18 months. I look > forward to your submission (and reviewing it once it is available). It should be small. And the WG should be incentivized to publish

Re: [Emu] Notes on session resumption with TLS-based EAP methods

2019-02-05 Thread Alan DeKok
e while changing octet 5 of the EAP packet. Saying "security properties" when only octet 5 has changed isn't a convincing argument. Maybe the answer here is "we have no idea what cross-method session resumption means, and therefore we forbid it". Tha

Re: [Emu] Notes on session resumption with TLS-based EAP methods

2019-02-05 Thread Alan DeKok
t* what I said. I don't see an issue with cross-method session resumption. I'm happy to allow it. I was pretty clear on that. What I'm saying is that if there's no consensus that it should be allowed, then I'm fine with forbidding it. Alan DeKok.

Re: [Emu] TLS 1.3 and other EAP methods

2019-02-05 Thread Alan DeKok
LS document until the other TLS-based methods are updated. I've tried to be clear on that. We can publish EAP-TLS updates quickly. I'm saying that the second document needs to be published nearly simultaneously with the EAP-TLS document. Since that document is small an

Re: [Emu] Notes on session resumption with TLS-based EAP methods

2019-02-06 Thread Alan DeKok
henticated status of a session, and refuse to resume a session when authentication had not completed. Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

Re: [Emu] Notes on session resumption with TLS-based EAP methods

2019-02-07 Thread Alan DeKok
how changing octet 5 of the EAP packet changes any of the security properties. And the explanations so far don't address any of my questions about this topic. Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

Re: [Emu] Question about draft-ietf-emu-eap-tls13-03 && application data

2019-02-07 Thread Alan DeKok
EAP-TLS peers > and servers MUST comply with the compliance requirements (cipher suites, > signature algorithms, key exchange algorithms, extensions, etc.) for the TLS > version used. For TLS 1.3 the compliance requirements are defined in Section > 9 of [RFC8446]." Looks good, th

Re: [Emu] Notes on session resumption with TLS-based EAP methods

2019-02-08 Thread Alan DeKok
he fact that the peer is unauthenticated. With this > functionality in place, I do not see that resumption as such is the problem. I agree. > I think draft-ietf-emu-eap-tls13 needs some sentence about the peer can use > specific NAIs to affect the server's behaviour. Emergency

[Emu] Fwd: New Version Notification for draft-dekok-emu-tls-eap-types-00.txt

2019-02-11 Thread Alan DeKok
This is a first draft, and is very rough. I've done things which make sense to me. But, for FAST and TEAP, I have no idea. Reviews / comments / etc. are welcome. Alan DeKok. > Begin forwarded message: > > From: internet-dra...@ietf.org > Subject: New Version Notif

Re: [Emu] EAP and Fragmentation

2019-02-12 Thread Alan DeKok
se the EAP header has a 16-bit "Length" field. > Looking forward to some great guidance and advice :D Also, if you would like > to collaborate/contribute, please let me know! I've been known to have opinions. :) Plus, it's useful to have credential provisioning methods. Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

[Emu] Review of draft-pala-eap-creds-00

2019-02-13 Thread Alan DeKok
solve, and may avoid the need for yet another protocol. These issues need to be discussed in a lot more detail before the problem statement, and solution, are clear. Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

Re: [Emu] Notes on session resumption with TLS-based EAP methods

2019-02-18 Thread Alan DeKok
rent* policy for the session resumption. This can be done by caching user identity, policy, and anything else that is relevant. The draft doesn't say much about these topics, which I think should be addressed. The issue of "auth with TTLS and resume with TLS" is just a tiny part of the iceberg. Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

Re: [Emu] Notes on session resumption with TLS-based EAP methods

2019-02-20 Thread Alan DeKok
And it means that the protocol is open to a large number of time of use, time of check" security bugs which could cause serious breaches of networks. We can't paper over security issues by saying "it's not session resumption, it&#x

Re: [Emu] Notes on session resumption with TLS-based EAP methods

2019-02-22 Thread Alan DeKok
he resumption SHOULD be rejected. I don't understand why there's so little concern about people being able to PWN your network. It's a disaster. We can't just paper over this issue. It's a major security flaw that's designed into the protocol. It needs to

Re: [Emu] Notes on session resumption with TLS-based EAP methods

2019-02-23 Thread Alan DeKok
argue if cached information is expected and non is available, resumption > MUST be rejected. For the majority of cases the security policies applied to > the different TLS based EAP methods will be identical. Yes, that has to happen, too. Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

Re: [Emu] Notes on session resumption with TLS-based EAP methods

2019-02-26 Thread Alan DeKok
Here's my $0.02 on updates to the "Security Considerations" section. --- 5.9. Authorization We note that EAP-TLS may be encapsulated in other protocols, such as PPP [RFC1661], RADIUS [RFC2865], Diameter [RFC6733], or PANA [RFC5191]. Systems implementing those protocols can make polic

Re: [Emu] Questions about EAP-NOOB

2019-03-06 Thread Alan DeKok
t looks like EAP-TEAP-BRSKI requires a similar NAI for provisioning. So it would best best to coordinate both the name, and the use of it. Perhaps "provisioning.arpa" could be used as a generic name, and then subdomains within that could be used f

Re: [Emu] Notes on session resumption with TLS-based EAP methods

2019-03-07 Thread Alan DeKok
maybe 'then it MUST be used in combination with the cached data described > above' Perhaps. > Took a couple of readings to understand exactly what you meant there. It's a difficult subject to explain properly. > The cached data isn't being updated, but i

Re: [Emu] Notes on session resumption with TLS-based EAP methods

2019-03-09 Thread Alan DeKok
nal issues which need addressing. The previous EAP-TLS spec was written largely to describe EAP-TLS and nothing more. Realistically, EAP-TLS is almost always used inside of a larger ecosystem. It is therefore also prudent to discuss how these systems can interact, and what security issue

Re: [Emu] Notes on session resumption with TLS-based EAP methods

2019-03-10 Thread Alan DeKok
int is that neither RFC 5216 nor this document gives any guidance here. They don't even mention checking cached authentication data. Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

Re: [Emu] Notes on session resumption with TLS-based EAP methods

2019-03-10 Thread Alan DeKok
dditional information. i.e. the credentials from the original authentication. As such, this document needs to give guidance on this topic. Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

Re: [Emu] Notes on session resumption with TLS-based EAP methods

2019-03-11 Thread Alan DeKok
On Mar 11, 2019, at 12:52 PM, John Mattsson wrote: > There seems to be agreement on the list to add security considerations on > authorization and resumption. With the text from Alan as a basis (thanks > again Alan!), I have added the sections below to draft-ietf-emu-eap-tls13. > > Some high le

Re: [Emu] EAP and Fragmentation

2019-03-15 Thread Alan DeKok
US sets the L bit only if it is sending fragments. Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

Re: [Emu] EAP and Fragmentation

2019-03-15 Thread Alan DeKok
t the L bit set." > > I'm for the strict approach. Anyway some implementations don't adhere it. The > sentence above narrows the behaviour to a non-ambiguous while requires to > support all kinds of existing behaviours thus it looks like the most exact

Re: [Emu] EAP-TLS 1.3 - Session-Id and extended EAP types

2019-03-25 Thread Alan DeKok
xtended EAP types. TBH, the simple approach is to extend the definition of Type-Code when extended types are used. Type-Code = 0x0d for types < 254 Type-Code = 0xFE || Vendor-Id || Vendor-Type for extended types And then use that definition for Key_Material, Method-

Re: [Emu] TLS Resumption across Server Name Indications for TLS 1.3

2019-03-25 Thread Alan DeKok
t from authenticating via EAP-TLS, and then using that TLS data to "resume" an HTTPS connection. That may be surprising to people. Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

Re: [Emu] EAP-AKA' and Re: WG adoption call for draft-arkko-eap-aka-pfs

2019-03-30 Thread Alan DeKok
talks to the engineering group. Large companies can have internal groups at odds with each other. > Finally, I want to point to: https://lwn.net/Articles/780078/ It may take $1M to get to the point where such legal arguments matter. That rules out such a defence for me. Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

Re: [Emu] EAP and Transport Protocol

2019-04-01 Thread Alan DeKok
7;s only hostap and FreeRADIUS. On the client side, it's hostap. There used to be "xsupplicant" and "open1x" on the client side, but those have been dead for 10 years. > In particular, the use of the Early truncation? Alan DeKok. __

Re: [Emu] EAP-AKA' and Re: WG adoption call for draft-arkko-eap-aka-pfs

2019-04-03 Thread Alan DeKok
*what* is that fee? A million dollars for a 5G operator / vendor? How much should an Open Source implementation pay? Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

Re: [Emu] Review of draft draft-ms-emu-eaptlscert-02

2019-05-06 Thread Alan DeKok
rd is published. Or it might not. I've seen standards take 10+ years to *start* getting adopted. Allowing more packets wouldn't generally increase latency, because 99.% of authentications won't need more packets. And realistically, if you can't authenticate someone

Re: [Emu] Review of draft draft-ms-emu-eaptlscert-02

2019-05-08 Thread Alan DeKok
ve the time, budget, or inclination to upgrade our replace them when the devices already work. I'm not sure what the disagreement is here. I'm saying that the practical limits are ~50 round trips, and maybe ~64K certificate chains. You're not disagreeing, but you're asking me to justify my position, and are arguing against it. I'm not clear what point you're trying to make. Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

[Emu] Can we get a WG last call for draft-dekok-emu-eap-session-id-00 ?

2019-05-22 Thread Alan DeKok
bug in the original RFCs. There have been minimal comments on the document. What comments have been received are supportive. Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

Re: [Emu] Can we get a WG last call for draft-dekok-emu-eap-session-id-00 ?

2019-06-06 Thread Alan DeKok
erver.random). Which is for TLS 1.2 and below. > Do you plan to update this for TLS 1.3 and use TLS-Exporter in your other > draft: draft-dekok-emu-tls-eap-types? Do we need to do this twice in > separate drafts? draft-dekok-emu-tls-eap-types already updates the Session-ID for all T

Re: [Emu] EAP-AKA' and Re: WG adoption call for draft-arkko-eap-aka-pfs

2019-06-27 Thread Alan DeKok
; informational document in the working group is preferable to the independent > submission track. Yes. > Do working group members still have objections to taking this draft into the > working group? Please respond on this thread by July 5, 2019. I have misgivings, but no o

Re: [Emu] WGLC completed for for draft-ietf-emu-eap-tls13-05

2019-07-12 Thread Alan DeKok
any data received should be ignored * non-zero octets, or more than one octet MAY indicate future extensions Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

Re: [Emu] WGLC completed for for draft-ietf-emu-eap-tls13-05

2019-07-13 Thread Alan DeKok
ries. Forcing a new session ticket to > be sent out is a way to work around this, but I'm not sure I'd call this > ideal. I think that's the only practical solution. Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

Re: [Emu] RFC 7170 (TEAP) errata

2019-07-22 Thread Alan DeKok
x27;m not sure that any existing EMU document would be appropriate for these changes. Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

Re: [Emu] I-D Action: draft-dekok-emu-eap-session-id-01.txt

2019-07-25 Thread Alan DeKok
e TLS wg document draft-ietf-tls-oldversions-deprecate (Submitted to IESG > for Publication) formally prohibits negotiation and use of TLS 1.0 > and TLS 1.1. It also updates all RFCs that use TLS. I suppose so. I do suspect, tho, that there are million

Re: [Emu] WGLC completed for for draft-ietf-emu-eap-tls13-05

2019-07-28 Thread Alan DeKok
hods will have the same issue, when resumption is used. Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

Re: [Emu] POST WGLC Comments draft-ietf-emu-eap-tls13

2019-08-06 Thread Alan DeKok
to *always* apply authorization policies. The alternative is to allow the server to *not* check authorization policies during resumption. Which then means that the client is in charge of authorization, not the server. Alan DeKok. ___ Emu mailing

Re: [Emu] POST WGLC Comments draft-ietf-emu-eap-tls13

2019-09-12 Thread Alan DeKok
s before TLS 1.3 was standardized. Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

Re: [Emu] POST WGLC Comments draft-ietf-emu-eap-tls13

2019-09-12 Thread Alan DeKok
should only be done if it has some significant > advantages over EAP-PWD, and there are people wanting to implement and use > it. 3GPP is e.g. adding identity protection and perfect forward secrecy to > EAP-AKA instead. I would prefer to forbid PSK in EAP-TLS. Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

Re: [Emu] POST WGLC Comments draft-ietf-emu-eap-tls13

2019-09-18 Thread Alan DeKok
real "end-user" PSK in the DB. Simply waving your hands and saying it "uses" a field is unhelpful. Please give substantive feedback and/or advice about what the code *does*. Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

Re: [Emu] POST WGLC Comments draft-ietf-emu-eap-tls13

2019-09-18 Thread Alan DeKok
resumption. It should reference RFC 8446 Section 8.1, and 8.2, which discuss this issue. Also, Section 4.2.11 of that document has an "Implementor's note:" which is important. Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

Re: [Emu] POST WGLC Comments draft-ietf-emu-eap-tls13

2019-09-18 Thread Alan DeKok
PSK identity. > I don't see why this would be more of a problem in EAP-TLS with TLS 1.3 that > in any other application of EAP-TLS. I agree. Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

Re: [Emu] POST WGLC Comments draft-ietf-emu-eap-tls13

2019-09-18 Thread Alan DeKok
sswords for EAP-TLS with PSK. Because that's ever so much easier than using nasty certs. That isn't something we should encourage. It may be worth just forbidding it. Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

Re: [Emu] POST WGLC Comments draft-ietf-emu-eap-tls13

2019-09-19 Thread Alan DeKok
ocess. I think we should take into account what people *do* with EAP methods. In this case, people have voted with their feet. EAP-PWD, PEAP, and EAP-TTLS are widely deployed. They all support some form of name / password authentication. PEAP and EAP-TTLS also include support for anonymous

Re: [Emu] POST WGLC Comments draft-ietf-emu-eap-tls13

2019-09-19 Thread Alan DeKok
eople will abuse it. That for me is a strong reason to forbid it. Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

Re: [Emu] POST WGLC Comments draft-ietf-emu-eap-tls13

2019-10-07 Thread Alan DeKok
AST and TEAP from draft-dekok-emu-tls-eap-types, as the remaining items are not controversial. The document should then be published simultaneously with the EAP-TLS updates. Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

Re: [Emu] POST WGLC Comments draft-ietf-emu-eap-tls13

2019-10-07 Thread Alan DeKok
to be updated so that we can create inter-operable versions. Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

Re: [Emu] TEAP Errata 5768

2019-10-08 Thread Alan DeKok
on? I will, and I think it's a good idea. > Is there any objection to move forward with making the MAC variable length? No. Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

Re: [Emu] POST WGLC Comments draft-ietf-emu-eap-tls13

2019-10-30 Thread Alan DeKok
'ing TTLS and PEAP, it will not only look bad, it will *be* bad. And the industry press will (rightfully) lambast the standards process. Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

Re: [Emu] POST WGLC Comments draft-ietf-emu-eap-tls13

2019-11-01 Thread Alan DeKok
ing TLS implementation, and cannot be controlled by the EAP authenticator. These limitations make the PSK identity unsuitable for use as the EAP Identity. --- Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

Re: [Emu] POST WGLC Comments draft-ietf-emu-eap-tls13

2019-11-01 Thread Alan DeKok
On Nov 1, 2019, at 7:53 AM, Eliot Lear wrote: > >> The EAP Identity used in resumption SHOULD be the same EAP Identity as was >> used during the original authentication. This requirement allows EAP packets >> to be routable through an AAA infrastructure to the same destination as the >> origin

Re: [Emu] POST WGLC Comments draft-ietf-emu-eap-tls13

2019-11-04 Thread Alan DeKok
After checking the draft again, Section 2.1.4 does have comments about anonymizing the NAI. But those comments are limited to NAIs derived from certificates. I think that the text needs to be expanded to make the recommendations more genetic, and clearer. I hope that my previous message c

Re: [Emu] EAP questions (RE: POST WGLC Comments draft-ietf-emu-eap-tls13)

2019-11-07 Thread Alan DeKok
no mechanism to return an error code to the peer. How could we > signal in EAP the error difference between routing vs EAP method unsupported > failures? Or can we at all? EAP provides for a NAK for negotiation, and a Notification packet for signalling errors or messages. Unfortunately,

Re: [Emu] POST WGLC Comments draft-ietf-emu-eap-tls13

2019-11-07 Thread Alan DeKok
t preclude a specific EAP server > implementation from supporting extern PSK by disallowing it in the spec. If a > particular EAP server does not want to support extern PSK - that’s fine. Then we need to give guidance on what implementors and administrators should do. Even if it m

Re: [Emu] TLS1.3 and TEAP (RE: POST WGLC Comments draft-ietf-emu-eap-tls13)

2019-11-07 Thread Alan DeKok
ch, it's probably best to move the TLS 1.3 fixes into a general "oops, we need to fix TEAP" document. Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

Re: [Emu] POST WGLC Comments draft-ietf-emu-eap-tls13

2019-11-08 Thread Alan DeKok
very useful to describe the impact of that. What does an implementation do? How should administrators tell PSK identities apart? If the EAP authenticator can't control the derivation of PSK identities for resumption, is it even possible to have manually provisioned PSKs? Alan DeKok.

Re: [Emu] Idea: New X509 Extension for securing EAP-TLS

2019-11-09 Thread Alan DeKok
eful to have two separate OIDs. On the other hand, RCC 7585 uses the OID for TLS connections which then carry RADIUS packets. This draft would use an OID for EAP-TLS authentications, which are carried inside of RADIUS, and then inside of UDP / TCP / TLS / DTLS. The

Re: [Emu] Idea: New X509 Extension for securing EAP-TLS

2019-11-10 Thread Alan DeKok
a configuration file that creates certificates with the NAIRealm is located here: https://github.com/FreeRADIUS/freeradius-server/blob/master/raddb/certs/server.cnf Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

Re: [Emu] EAP questions (RE: POST WGLC Comments draft-ietf-emu-eap-tls13)

2019-11-11 Thread Alan DeKok
d to use"? I don't think so. > And the "EAP provides for method negotiation" is via Nak messages, Ok, then > my confusion was on the EAP method selection statement in section 5.1. EAP is unfortunately complex. Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

Re: [Emu] POST WGLC Comments draft-ietf-emu-eap-tls13

2019-11-11 Thread Alan DeKok
ed to document guidance > olong the lines of checking for TLS stack behaviour. I think it's best to give guidance in this document. Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

Re: [Emu] Idea: New X509 Extension for securing EAP-TLS

2019-11-11 Thread Alan DeKok
these names, as nothing checks them. It would be useful to suggest how a supplicant can use these fields to further verify a server certificate. And for servers, what these fields should contain. Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

Re: [Emu] Idea: New X509 Extension for securing EAP-TLS

2019-11-12 Thread Alan DeKok
TPS secured web site for example.com, and then download a supplicant configuration. Stefan Winter has a draft: https://tools.ietf.org/html/draft-winter-opsec-netconfig-metadata-00 But it received little support from vendors. Security should be simple, and

Re: [Emu] Idea: New X509 Extension for securing EAP-TLS

2019-11-12 Thread Alan DeKok
ire the TLS web server auth OID (1.3.6.1.5.5.7.3.1). So yes, RFC 4334 is absolutely relevant here. Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

Re: [Emu] Idea: New X509 Extension for securing EAP-TLS

2019-11-12 Thread Alan DeKok
e work? Do public CAs verify that the OIDs in the certificate match the intended use-cases? Is there a global registry of SSIDs which the public CA could use to verify the SSID? To put it another way, I'm not sure why this question is being posed.

Re: [Emu] Idea: New X509 Extension for securing EAP-TLS

2019-11-12 Thread Alan DeKok
ontains no text about "ownership" of the SSID. i.e. inclusion of an SSID in a certificate is *not* a statement about "ownership" of that SSID. So your comments seem to be against an issue that doesn't exist. Alan DeKok. ___ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu

<    1   2   3   4   5   6   7   8   9   >