RE: [Emu] EMU PSK Method work Item

2006-02-01 Thread Bernard Aboba
It seems we might achieve this goal and the two other work group items, TLS-based EAP method and existing password database support, using a single EAP method, e.g., a TLS based EAP method supporting PSK. One of the attractions of PSK is to implement it on an embedded device. So while it is p

Re: [Emu] EMU PSK Method work Item

2006-02-01 Thread Bernard Aboba
the specific characteristics of these environments elaborated. Second, intended / future application scenarios should be taken into account (mesh networks, p2p, ...). Thomas is correct that RFC 4017 only expresses requirements for WLAN authentication in IEEE 802.11 infrastructure networks. Ho

RE: [Emu] EMU PSK Method work Item

2006-02-02 Thread Bernard Aboba
But could not EAP-TLS be modified/updated to also allow "pure" TLS-PSK, without requiring use of server certificates? AFAICS this would still be TLS, not "TLS-derived" or "based on TLS". RFC 2716 requires support for certificate authentication. Making this optional would break backward compa

Re: [Emu] EMU PSK Method work Item

2006-02-04 Thread Bernard Aboba
>> But could not EAP-TLS be modified/updated to also allow "pure" >> TLS-PSK, without requiring use of server certificates? AFAICS >> this would still be TLS, not "TLS-derived" or "based on TLS". Bernard, I think a simpler and more constructive way of saying what you're trying to say

[Emu] RFC 2716: request for implementations

2006-02-17 Thread Bernard Aboba
We've made an initial start on RFC 2716bis which should be showing up on the archive soon: http://www.ietf.org/internet-drafts/draft-simon-emu-rfc2716bis-00.txt This first draft mostly focusses on cleaning up "PPP"isms, updating references and examples, etc. Next step is to identify EAP TLS i

Re: [Emu] RFC 2716: request for implementations

2006-02-24 Thread Bernard Aboba
5. Security Considerations This needs more work, to fill in the descriptions required by RFC 3748. Right. Here are the claims that I think can be made: Auth. mechanism: Certifications Ciphersuite negotiation: Yes Mutual authentication: Yes Integrity protec

RE: [Emu] ICV in EAP-PAX

2006-04-29 Thread Bernard Aboba
The ICV is computed as the MAC over the entire EAP packet, including the EAP header, the EAP-PAX header, and the EAP-PAX payload. The MAC is keyed using the 16-octet ICK, using the MAC type specified by the MAC ID in the EAP-PAX header. For packets of type PAX_STD-1, PAX_SEC-1, PA

Re: [Emu] Identity Protection in EAP-TLS

2006-06-04 Thread Bernard Aboba
Clearly using this within eap-tls would require some specification work, but I think would be preferable to your approach. The EMU WG charter states: "Backwards compatibility with RFC 2716 is a requirement." So I'd like to understand which approach (if any) is backward compatible with existing

Re: [Emu] Identity Protection in EAP-TLS

2006-06-05 Thread Bernard Aboba
Furthermore if the server ignores the TLS extension the client MAY send its certificate encrypted with its preferred encryption algorithm (the first in the TLS extension list) This definitely breaks backward compatibility. ___ Emu mailing list Emu

RE: [Emu] EMU PSK opaque blogs

2006-06-06 Thread Bernard Aboba
Just a random comment: "Server identity as an opaque blog." Many blogs are in fact quite opaque, but do we really need to force the user to read an opaque blog as part of the protocol? :) ___ Emu mailing list Emu@ietf.org https://www1.ietf.org/mai

RE: [Emu] Identity Protection in EAP-TLS

2006-06-08 Thread Bernard Aboba
Do we know what the client and server implementation problems with TLS extensions are? At IETF 65, Yngve Petterson gave a presentation relating to TLS interoperability issues: http://www3.ietf.org/proceedings/06mar/slides/tls-6.pdf Slide 3 states: Many SSL/TLS server implementations are brok

Re: [Emu] EAP-GPSK comments

2006-06-11 Thread Bernard Aboba
Yes, I just listed the first one. If PSK does not match, server will find an incorrect MAC in GPSK-2. What should it do? Just send EAP-Failure? I would recommend silent discard for packets with MAC failures, since that is most resilient against forgery. Otherwise, an attacker only needs to co

Re: [Emu] EAP-GPSK comments

2006-06-11 Thread Bernard Aboba
If the EAP Server silently drops EAP-Response/GPSK-2, then how would the client know the PSK is incorrect? Would the conversation just time out? Yes. Perhaps we should add a "MAC Failed" message as Jouni suggested? Sending it would leave the server state unchanged. What is the peer supposed

[Emu] EAP-TLS implementers?

2006-06-14 Thread Bernard Aboba
The EMU WG charter requires that RFC 2716bis remain backward compatible with existing EAP-TLS implementations: "- An update to RFC 2716 to bring EAP-TLS into standards track, clarify specification, interoperability, and implementation issues gathered over the years, and update the document to me

[Emu] Partial Proposed Resolution to RFC 2716bis Review

2006-06-24 Thread Bernard Aboba
Find enclosed below some review questions from Joe Salowey. I still am researching the answers to questions 1A and 1B, so I have not included a proposal for these yet. -- C.

RE: [Emu] Partial Proposed Resolution to RFC 2716bis Review

2006-06-24 Thread Bernard Aboba
I will add some text on this vulnerablity, which is enabled because some TLS-based methods share the same key-derivation formula. How about this? "4.6. Packet Modification Attacks The integrity protection of EAP-TLS packets does not extend to the EAP header fields (Code, Identifier, Lengt

RE: [Emu] Partial Proposed Resolution to RFC 2716bis Review

2006-06-27 Thread Bernard Aboba
[Joe] OK, I'm not sure we need to include text about the key derivation. If it is the key derivation that is the only difference then change will only be caught after the completion of the method if the keys are used. The problem is that if the EAP-TLS key derivation formula is re-used in an an

RE: [Emu] Partial Proposed Resolution to RFC 2716bis Review

2006-06-27 Thread Bernard Aboba
[Joe] OK I think this is good. How does 1.1 and 1.2 impact backwards compatibility? I don't think we know yet. To get clarity, we need to do some tests. It is possible that only a subset of the problems that Y. Pettersen describes in his draft afflict TLS-based EAP methods: http://www.wate

Re: [Emu] GPSK as a working group item

2006-07-21 Thread Bernard Aboba
No objection. On 7/20/06, Joseph Salowey (jsalowey) <[EMAIL PROTECTED]> wrote: At IETF 66 EMU working group meeting there was consensus to take on draft-clancy-emu-eap-shared-secret-01.txt as a working group item. Are there any objections to taking this on as a working group item? Thanks, Jo

RE: [Emu] Duplicate integrity protection on Protected Payload datainGPSK

2006-08-15 Thread Bernard Aboba
AES-CBC seems like a good choice. This might also be a decent choice for the EAP-TLS mandatory-to-implement ciphersuite (unless the issues with 3DES can be ironed out). ___ Emu mailing list Emu@ietf.org https://www1.ietf.org/mailman/listinfo/emu

[Emu] EMU WG issues tracker?

2006-08-15 Thread Bernard Aboba
Does the EMU WG have an issues tracker? ___ Emu mailing list Emu@ietf.org https://www1.ietf.org/mailman/listinfo/emu

Re: [Emu] EAP-GPSK: Ciphersuites

2006-08-22 Thread Bernard Aboba
let us for a moment assume that RFC 4307 makes some reasonable algorithm choices (we are talking about IKEv2 here). If we take the text and apply it to EAP-GPSK then we would produce something like: Conservative Choice: --- (Integrity) AUTH_HMAC_SHA1_962

[Emu] RFC 2716bis update

2006-08-23 Thread Bernard Aboba
At IETF 66, we discussed a number of issues, including: o Optional privacy support o Ciphersuite support o Changes from RFC 2716 I've updated RFC 2716bis to include a new section 2.7 on privacy, have clarified the ciphersuite requirements, and have included an Appendix A on changes from RFC 27

RE: [Emu] Re: new authenticated encryption draft and a proposed use in EMU GPSK

2006-08-24 Thread Bernard Aboba
Hi David, I have a problem with the suggested approach for a couple of reasons: * There is no problem with the currently defined cipher suites. The design team has just picked something; Different cipher suites got proposed during the design team discussions and almost all of them got removed f

RE: [Emu] GPSK issue - KDF Data

2006-10-03 Thread Bernard Aboba
Can you be a bit more specific? Are you talking about mixing of client and server nonces or something else? From: "Joseph Salowey (jsalowey)" <[EMAIL PROTECTED]> To: Subject: [Emu] GPSK issue - KDF Data Date: Tue, 3 Oct 2006 15:18:49 -0700 The current GPSK draft includes the capability for

Re: [Emu] GPSK issue - KDF Data

2006-10-04 Thread Bernard Aboba
this aspect refers to the ability to put arbitrary data exchanged between the end points into the key derivation function. It is therefore not about the nonces, identities etc. that is typically incorporated into the key derivation function. Why would someone want todo this? I don't think it

[Emu] Review requested: draft-simon-emu-rfc2716bis-03.txt

2006-10-17 Thread Bernard Aboba
I have updated RFC 2716bis with a list of changes, added a section on privacy, rewritten the key hierarchy section to utilize modern terminology (MSK, EMSK), and updated the security considerations section. The updated document is available here: http://www.ietf.org/internet-drafts/draft-simon-

RE: [Emu] Review requested: draft-simon-emu-rfc2716bis-03.txt

2006-10-22 Thread Bernard Aboba
The document should also state in the security considerations section that the identity in the identity response is not necessarily related to the identity authenticated in EAP-TLS and should not be relied upon for any access control or accounting purposes. Here is some proposed new text for Sec

RE: [Emu] Review requested: draft-simon-emu-rfc2716bis-03.txt

2006-10-22 Thread Bernard Aboba
Joe Salowey said: Currently the section states that the peer identity is obtained from the subjectAltName in the certificate. Is this text meant to be normative? Currently there are implementations that use elements of the subject distinguished name and do not provide a subjectAltName. Perhaps

RE: [Emu] Tying EAP-TLS method type to specific ciphersuites

2006-10-23 Thread Bernard Aboba
During the EMU BOF we talked about the high cost that would be imposed on customers by introducing new non-certificate ciphersuites during EAP-TLS. EAP-TLS is now ten years old, and has a very large installed base. Virtually all of these installations only support certificate-based authentica

RE: [Emu] Tying EAP-TLS method type to specific ciphersuites

2006-10-23 Thread Bernard Aboba
Should the split be EAP-TLS-v1 (PKI only) vs EAP-TLS-v2 (PKI and PSK)? Or EAP-TLS-PKI and EAP-TLS-PSK? If we have both legacy issues AND footprint issues, perhaps something like ... So far, we've talked about handling PSK support by creating a new EAP method with a distinct name: "EAP-TLS-PSK

RE: [Emu] Tying EAP-TLS method type to specific ciphersuites

2006-10-25 Thread Bernard Aboba
By certificate-based ciphersuites, do you mean TLS_RSA_WITH_* ciphersuites from RFC 2246 specifically, or any ciphersuite that uses any kind of certificates? Any ciphersuite supporting client certificate authentication would be ok. (To me it looks like many of these arguments would also sugges

RE: [Emu] Review requested: draft-simon-emu-rfc2716bis-03.txt

2006-11-01 Thread Bernard Aboba
>A valid EAP-TLS client certificate SHOULD contain an > extendedKeyUsage >value indicating support for Client Authentication >(1.3.6.1.5.5.7.3.2). A valid EAP-TLS server certificate SHOULD >contain an extendedKeyUsage value indicating support for Server >Authentication (1.3.6.

RE: [Emu] Comment on 2716bis: Examples in Appendix B

2006-11-06 Thread Bernard Aboba
client sends change_cipher_spec/finished twice? I think the client will send the Alert at that point, no? I don't see how this message sequence could ever occur. It is possible for a session resume attempt to fail, but if so, it will not look like the example. A client could mistakenly att

RE: [Emu] Comment on 2716bis: Examples in Appendix B

2006-11-06 Thread Bernard Aboba
Here is a strawman responding to Pasi's comments: http://www.drizzle.com/~aboba/EMU/draft-simon-emu-rfc2716bis-05.txt From: "Bernard Aboba" <[EMAIL PROTECTED]> To: [EMAIL PROTECTED], emu@ietf.org Subject: RE: [Emu] Comment on 2716bis: Examples in Appendix B Date: Mon,

RE: [Emu] Comment on 2716bis: TLS fragmentation

2006-11-07 Thread Bernard Aboba
On re-reading Section 2.3 on Fragmentation, I realized that it still contained some PPP-centric material (such as discussion of negotiation of PPP Multilink MRRU). Here is an updated section that hopefully addresses your comment: "2.3. Fragmentation A single TLS record may be up to 16384

RE: [Emu] Review requested: draft-simon-emu-rfc2716bis-03.txt

2006-11-07 Thread Bernard Aboba
: Madjid Nakhjiri <[EMAIL PROTECTED]> To: 'Bernard Aboba' <[EMAIL PROTECTED]>, [EMAIL PROTECTED],emu@ietf.org Subject: RE: [Emu] Review requested: draft-simon-emu-rfc2716bis-03.txt Date: Thu, 02 Nov 2006 18:07:29 -0800 I have a question that is somewhat related (at least w

RE: [Hokeyp] [Emu] Re: MSK but no EMSK

2006-11-16 Thread Bernard Aboba
Hi Yoshi, As Alper pointed out in the text from RFC3748, it is not optional to produce an EMSK. Its usage is undefined at the moment, but, a compliant implementation should be producing the EMSK, nevertheless. It's worth keeping in mind that there are very few existing RFC 3748-compliant EAP im

RE: [Hokeyp] [Emu] Re: MSK but no EMSK

2006-11-18 Thread Bernard Aboba
If we are going by existing implementations, there is probably more than one flavor and then there is the question of when the MSK is directly delivered to the authenticator and when it isn't and how the peer knows that. The Wifi Alliance (WFA) WPA2 certification includes EAP interoperability t

RE: [Emu] MSK but no EMSK

2006-11-19 Thread Bernard Aboba
I remember someone in Hokey WG meeting mentioned that not all methods generate EMSK (even though they generate MSK). Is that accurate? The simple answer is "we don't know" because prior to RFC 3748, EAP Type Codes could be allocated without a specification. However, for methods published as R

RE: [Emu] MSK but no EMSK

2006-11-22 Thread Bernard Aboba
One question though. I couldn't find any mention of "MSK" or "EMSK" in RFC 2716. Can you tell us how to get those keys out of that spec? RFC 2716bis explains how the send and receive keys map to the MSK/EMSK: http://www.ietf.org/internet-drafts/draft-simon-emu-rfc2716bis-05.txt __

RE: [Emu] Issue: Definition of Session-Id, Peer-Id, Server-Id for EAP GPSK

2006-11-22 Thread Bernard Aboba
[Joe] It seems that the server ID is as authenticated as the client ID. The server ID and client ID are associated with the shared key. If a different identity is asserted a different key would be selected and the protocol should fail. Since more than one AAA server can have access to the crede

Re: [Emu] Issue: Definition of Session-Id, Peer-Id, Server-Id forEAP GPSK

2006-11-22 Thread Bernard Aboba
Sounds reasonable, but I'm not entirely sure I'd call the ID_Server unauthenticated. It's authenticated in GPSK-3 when the server includes it in the key derivation to compute SK. If the value was changed by an attacker, the authentication would fail. The client only confirms that the server

Re: [Emu] WG Last Call: draft-simon-emu-rfc2716bis-05

2006-12-01 Thread Bernard Aboba
However, this requires more cryptographic computations since both entities will encrypt the second TLS session packets and it augments significantly the number of rounds trips over the wireless link, which is not always widely available. As you point out, the approach described in the document i

RE: [Emu] WGLC comments for draft-simon-emu-rfc2716bis

2006-12-11 Thread Bernard Aboba
Thank you for your detailed and thoughtful review comments. Roughly in order of importance: 1) Section 2.7: "An EAP-TLS server supporting privacy MUST NOT treat a certificate list containing no entries as a terminal condition; instead it MUST bring up the TLS session and then send a server_hell

RE: [Emu] WGLC comments for draft-simon-emu-rfc2716bis

2006-12-12 Thread Bernard Aboba
Here are some of the changes to deal with the privacy comment. Let me know if this resolves the issue. In Section 2.6: An EAP-TLS server supporting privacy MUST NOT treat a certificate list containing no entries as a terminal condition; instead it MUST bring up the TLS session and then

RE: [Emu] WGLC comments for draft-simon-emu-rfc2716bis

2006-12-12 Thread Bernard Aboba
I think I have now incorporated most of these comments into a strawman -06 document: http://www.drizzle.com/~aboba/EMU/draft-simon-emu-rfc2716bis-06.txt Let me know if I've missed something. From: <[EMAIL PROTECTED]> To: Subject: [Emu] WGLC comments for draft-simon-emu-rfc2716bis Date: Mon,

RE: [Emu] WGLC comments for draft-simon-emu-rfc2716bis

2006-12-13 Thread Bernard Aboba
ecify mandatory-to-implement TLS version (which is required in addition to mandatory-to-implement cipher suite to get interoperability). About 11: The S bit was removed from the bit diagram, but the text "The S bit (EAP-TLS start) is set in an EAP-TLS Start message" is still there. Best

RE: [Emu] WGLC comments for draft-simon-emu-rfc2716bis

2006-12-18 Thread Bernard Aboba
> How about rephrasing the text to something like this? > >Since the identity presented in the Identity Response need not be >related to the identity presented in the peer certificate, EAP-TLS >implementations SHOULD NOT require that they be identical. >However, if they are not ide

Re: [Emu] WG Last Call: draft-simon-emu-rfc2716bis-05

2006-12-18 Thread Bernard Aboba
Thanks for catching this. Yes, it is a typo. From: Jouni Malinen <[EMAIL PROTECTED]> To: emu@ietf.org Subject: Re: [Emu] WG Last Call: draft-simon-emu-rfc2716bis-05 Date: Thu, 14 Dec 2006 19:52:06 -0800 On Thu, Nov 30, 2006 at 10:28:51AM -0800, Joseph Salowey (jsalowey) wrote: > This is a wor

RE: [Emu] WGLC comments for draft-simon-emu-rfc2716bis

2007-01-08 Thread Bernard Aboba
>Comparing the Server-Id in the certificate to the expected server >name limits the damage that will result from an attacker compromising >a server private key. If the peer does not check the Server-Id, then >the peer would accept a compromised server certificate chaining to >

RE: [Emu] Open issues with draft-simon-emu-rfc2716bis-06.txt

2007-01-16 Thread Bernard Aboba
1. Use of TLS-WWW EKU The question was raised that the TLS WWW EKU may not be appropriate for EAP-TLS. The suggestion was made to remove the text on EKU. Are members of the working group in favor of removing this text? There are a number of EAP-TLS implementations that require TLS WWW EKUs (o

[Emu] Removal of key strength table in RFC 2716bis

2007-01-18 Thread Bernard Aboba
On the EAP WG list, Lakshminath Dondeti has pointed out the problems with including a copy of the RFC 3766 Key Strength table in another document: "Section 3.7 has a copy of the attack resistance table from RFC 3766. It is sufficient to provide a reference to that RFC. There is no need to repr

RE: [Emu] Open issues with draft-simon-emu-rfc2716bis-06.txt

2007-01-19 Thread Bernard Aboba
How about including: "Some deployments may require the presence of client and server authentication extended key usage extensions in certificates. Client implementations wishing to interoperate in these environments SHOULD check the server's certificate for an Extended Key Usage field implementa

Re: [Emu] Open issues with draft-simon-emu-rfc2716bis-06.txt

2007-01-21 Thread Bernard Aboba
What about RFC 4334? As far as I know, no EAP-TLS implementation supports RFC 4334 and I don't think we should be encouraging implementers to support it. The OIDs defined in RFC 4334 do not correspond to values of the NAS-Port-Type attribute, so the backend authentication server certificate

Re: [Emu] Open issues with draft-simon-emu-rfc2716bis-06.txt

2007-01-22 Thread Bernard Aboba
So your objection is that essentially different lower layers have been hard-coded into 4334 (PPP and EAPoL), and consequently into the cert handling code, such that new RFCs and new code would be required to support EAP over different L2/L3 technologies? The problem is that the RFC 4334 lower la

Re: [Emu] Questions on draft-ietf-emu-eap-gpsk-02.txt

2007-01-22 Thread Bernard Aboba
I don't see anything in RFC 3748 saying a peer CANNOT send an EAP-Failure, but perhaps it would be better for GPSK to respond with another GPSK-Failure message, and then have the sever send the EAP-Failure. RFC 3748 Section 4.1 says: The peer MUST send a Response packet in reply to a valid R

Re: [Emu] Open issues with draft-simon-emu-rfc2716bis-06.txt

2007-01-23 Thread Bernard Aboba
I don't care about client authorization -- there should be server-side ACLs for this. Right. I guess for EAP-TLS, server authorization isn't a huge deal. If an unauthorized server is giving you access to the network, what difference does it make to a client? The only compromise is maybe that

[Emu] Review of draft-ietf-emu-eap-gpsk-03.txt

2007-02-09 Thread Bernard Aboba
Review of draft-ietf-emu-eap-gpsk-03.txt Section 1 " At present, several pre-shared key EAP methods are specified, most notably o EAP-PAX [RFC4746] o EAP-PSK [I-D.bersani-eap-psk] o EAP-TLS-PSK [I-D.otto-emu-eap-tls-psk] and o EAP-SAKE [I-D.vanderveen-eap-sake]. Each method h

RE: [Emu] RE: draft-simon-emu-rfc2716bis-07.txt

2007-02-13 Thread Bernard Aboba
Question: What about a device that has a MAC address as a name? Use of EAP-TLS with MAC certificates is being discussed in WiMAX Forum and IEEE 802.1AR. Where should the MAC address be placed (subject vs. subjectAltName) and what field type should it have? Is there a reference that defines

RE: [Emu] RE: draft-simon-emu-rfc2716bis-07.txt

2007-02-14 Thread Bernard Aboba
If possible, I'd like to include text arising from this thread in the -08 version of the document, submitted by the IETF 68 deadline. To make it easier for me to figure out what that text is, it would be helpful for someone to post the suggested changes in their entirety, with modifications ag

RE: [Emu] RE: draft-simon-emu-rfc2716bis-07.txt

2007-02-19 Thread Bernard Aboba
From the discussion it seems that if OCSP is a SHOULD implement, then we need a MUST for revocation checking after authentication, since some servers might not implement OCSP, right? I don't think we can add "MUST use" text for something that is a "SHOULD implement". In terms of usage, it is p

RE: [Emu] RE: draft-simon-emu-rfc2716bis-07.txt

2007-02-20 Thread Bernard Aboba
The subject field identifies the entity associated with the public key stored in the subject public key field. The subject name MAY be carried in the subject field and/or the subjectAltName extension... If subject naming information is present only in the subjectAlt

RE: [Emu] RE: draft-simon-emu-rfc2716bis-07.txt

2007-02-21 Thread Bernard Aboba
[Joe] What is the issue? I'm not sure. That's why I asked about text :) ___ Emu mailing list Emu@ietf.org https://www1.ietf.org/mailman/listinfo/emu

RE: [Emu] RE: draft-simon-emu-rfc2716bis-07.txt

2007-02-21 Thread Bernard Aboba
[rmh] As for the value, EAP is not 802.11 only therefore a device id should not be a MAC, also a MAC has locally administered and globally adminstered versions, you would probably want to restrict the use to the globally issued ones, then there are the privacy issues since the MAC is used

RE: [Emu] RE: draft-simon-emu-rfc2716bis-07.txt

2007-02-21 Thread Bernard Aboba
[Joe] I don't see any more confusion over having multiple serial numbers than having multiples of any other attribute. Placing multiple identities into a peer certificate represents an assertion that the identities are equivalent. If they are not equivalent, then they should be placed into se

RE: [Emu] RFC4279 support in draft-simon-emu-rfc2716bis?

2007-03-05 Thread Bernard Aboba
According to RFC 2716, a compliant EAP-TLS implementation must support certificates. Since the resources required to support certificates is much larger than the resources required for TLS-PSK, a combined method would not be optimal for use within an embedded environment. There would also be

Re: [Emu] RFC4279 support in draft-simon-emu-rfc2716bis?

2007-03-07 Thread Bernard Aboba
Hannes Tschofenig said: We discussed this already several times and this lead me to work on a draft together with Thomas Otto: http://tools.ietf.org/id/draft-otto-emu-eap-tls-psk-02.txt Which begs the question: what is the WG doing with this draft? From where I sit, it seems quite likely t

RE: [Emu] RFC4279 support in draft-simon-emu-rfc2716bis?

2007-03-07 Thread Bernard Aboba
[Joe] The KDF needs to be looked at, but I do not think it is necessarily a show stopper, it does provide KDF agility. Reports from people who implemented EAP-GPSK indicate that it was simple to implement. I have heard push back from embedded system implementers on EAP-TLS stating that it is too

RE: [Emu] Q & C on 2716bis-08

2007-03-09 Thread Bernard Aboba
What sort of benefit does this provide. If a server fails to authenticate due to a security reason, then its EAP failure would not matter, since it cannot be trusted anyway. This is an optional mechanism for enabling the server to log the reason for the error. This might allow an administrator

RE: [Emu] Re: On my suggestion to use CTR mode instead of CBC

2007-03-13 Thread Bernard Aboba
CBC mode is much more widely available in libraries than CTR mode. RFC 3723 specified CTR mode and this was probably a mistake. ___ Emu mailing list Emu@ietf.org https://www1.ietf.org/mailman/listinfo/emu

Re: [Emu] EAP-GPSK update

2007-03-19 Thread Bernard Aboba
Getting more details on this would be interesting for other reasons, too, since there are new designs (e.g., IEEE 802.11r) which are using HMAC-SHA256 -based KDF. Since the 802.11r KDF construction is also claimed to be compliant to NIST recommendations, it is somewhat odd to see EAP-GPSK take the

[Emu] Thoughts on Password-based EAP Methods

2007-03-27 Thread Bernard Aboba
After listening to the IETF 68 presentation on a password-based EAP method, I would like to voice some concerns. Today we already have an "over abundance" of such methods. These include PEAPv0, PEAPv1, EAP-TTLSv0, EAP-TTLSv1, and EAP-FAST. In my discussions with customers, I invariably hear

[Emu] Re: Thoughts on Password-based EAP Methods

2007-03-28 Thread Bernard Aboba
The latest EAP-TTLSv0 draft is available here: http://www.watersprings.org/pub/id/draft-funk-eap-ttls-v0-00.txt In terms of publication interest, back in the fall Jari Arkko had announced a program to encourage widely implemented EAP methods to publish their specifications as RFCs. As I recal

Re: [Emu] Re: Thoughts on Password-based EAP Methods

2007-04-02 Thread Bernard Aboba
Part of the problem with EAP methods is that people should have started to standardize them within the IETF several years ago. Unfortunately, there was no interest by some of the EAP method authors nor from the EAP WG chairs to allow that. In fact, the IETF was on track to standardize EAP meth

RE: [Emu] Thoughts on Password-based EAP Methods

2007-04-02 Thread Bernard Aboba
I'm not sure that adding yet another version to TTLS specifically for supporting passwords will make things better for customers. Multiple versions certainly has caused quite a confusion in PEAP. I would agree that "versioning" is not a good idea. However, as I understand it, EAP-TTLSv0 is th

Re: [Emu] Thoughts on Password-based EAP Methods

2007-04-03 Thread Bernard Aboba
For example, at least one server uses "client PEAP encryption" as the label for PRF whereas most use "client EAP encryption". That is clearly an interoperability issue (I've only seen this with PEAPv1 and one RADIUS server, but anyway that is the label described in some of the drafts). Using the

[Emu] Re: Next Steps on Passwd-based EAP Methods

2007-04-03 Thread Bernard Aboba
During the meeting the group said that they want to have a password-based only approach (no >tunneled EAP support). Even CHAP etc. was left for future work, if ever done. For this purpose >PAP over TLS + room for extensibility is just good enough. FWIW, EAP-TTLSv0 does support non-EAP authenti

RE: [Emu] Thoughts on Password-based EAP Methods

2007-04-03 Thread Bernard Aboba
Also, Pascal asked about a patent application. I asked Paul about that and he said it isn't about EAP-TTLS. Searching the IETF IPR page, I found the following disclosure, which relates to TLS-IA, and therefore is only relevant to EAP-TTLSv1: https://datatracker.ietf.org/public/ipr_detail_show.

RE: [Emu] Re: Thoughts on Password-based EAP Methods

2007-04-07 Thread Bernard Aboba
I'm glad to hear from Steve here that there is support for publishing TTLSv0. I would like to see that happen regardless of whether it is done as an EMU work item or not. My understanding is that a new version of the TTLSv0 document will be forthcoming which will fill in some of the details tha

[Emu] Re: Last call comments:draft-williams-on-channel-binding-01.txt: EAP chann

2007-04-07 Thread Bernard Aboba
This is something that IEEE 802.11r/D5.0 is doing. R0KH-ID is set to the identity of the NAS Client (e.g., NAS-Identifier if RADIUS is used as the backend protocol) and this identifier is sent to the peer during association (before EAP authentication). In addition, both the R0KH-ID (NAS-Identifier

RE: [Emu] Last call comments: draft-williams-on-channel-binding-01.txt: EAP channel bindings

2007-04-12 Thread Bernard Aboba
I agree with Lakshminath on this. From: Lakshminath Dondeti [mailto:[EMAIL PROTECTED] Sent: Wed 4/11/2007 11:03 PM To: Sam Hartman Cc: [EMAIL PROTECTED]; Bernard Aboba; [EMAIL PROTECTED]; [EMAIL PROTECTED] Subject: Re: [Emu] Last call comments: draft-williams

RE: [Emu] Re: Thoughts on Password-based EAP Methods

2007-04-14 Thread Bernard Aboba
I am ready to organize a meeting in Paris in June, if the working group intends to debate about >these points Paris in June (or any time, really) sounds wonderful. However, if the idea is to focus people on work, without the distractions created by art, music, good food and inspiring archit

RE: [Emu] Re: Thoughts on Password-based EAP Methods

2007-04-14 Thread Bernard Aboba
The emu working agreed on the fact that a secure channel is needed Item1. - a) Is there a consensus for TTLS (what version ?) - b) Is this possible to push TTLS as an RFC (from an IT point of view) Item2 -c) Do we need a new password based method ? I agree with Bernard point

RE: [Emu] RFC 2716bis Section 5.2. Peer and Server Identities

2007-04-16 Thread Bernard Aboba
To refresh people's memories, here is what is in Section 5.2: 5.2. Peer and Server Identities The EAP-TLS peer name (Peer-Id) represents the identity to be used for access control and accounting purposes. The Server-Id represents the identity of the EAP server. In EAP-TLS, the Peer-Id

[Emu] RFC 2716bis Issue: Use of rfc822Name

2007-05-01 Thread Bernard Aboba
The following question has come up in the WiMAX Forum with respect to EAP-TLS peer certificate usage: From RFC 3280: When the subjectAltName extension contains an Internet mail address, the address MUST be included as an rfc822Name. The format of an rfc822Name is an "addr-spec" as defin

[Emu] Multiple identity issue

2007-05-08 Thread Bernard Aboba
At the EMU WG meeting, we discussed the situation where more than one altsubjectName or subject field are present in a certificate. Here is some text which can be added to the end of Section 5.2 to address this issue: "It is possible for more than one subjectAltName field to be presentin a p

[Emu] RFC 2818 reference

2007-05-08 Thread Bernard Aboba
A question has arisen about the reference to RFC 2818 section 3.1 within Section 5.3: When performing this comparison implementations MUST follow the validation rules specified in [RFC2818] Section 3.1. In the case of the server this involves ensuring the certificate presented by the

RE: [Emu] Multiple identity issue

2007-05-08 Thread Bernard Aboba
n a peer or server> certificate. In this case, EAP-TLS may export > more than one Peer-Id> or more than one Server-Id; all of the exported > Peer-Id(s) and> Server-Id(s) are considered > valid. "> > > > > > From: Bernard Abob

RE: [Emu] Multiple identity issue

2007-05-09 Thread Bernard Aboba
ent with RFC 3280 if we report a> non-empty > subject name as well as the subjectAltNames since they all> are valid > identities within the certificate. > > > -Original Message-----> > From: > Bernard Aboba [mailto:[EMAIL PROTECTED] > > Sent: Tuesday, May 08

[Emu] Issue: Validation of server certificates in Section 5.3 of RFC 2716bis

2007-06-05 Thread Bernard Aboba
I was looking at Section 5.3 in RFC 2716bis, and I noticed that while RFC 3280 conformant path validation is recommended for EAP-TLS servers, there is no such recommendation for EAP-TLS peers. This seems odd. For example, Section 5.3 states: Since the EAP-TLS server is typically connected to

[Emu] Proposed Resolution to multiple Peer-Id/Server-Id Issue

2007-06-05 Thread Bernard Aboba
It has been pointed out that an EAP-TLS certificate can contain multiple subject or subjectAltName fields. To address this, I propose that we add the following text to Section 5.2:It is possible for more than one subjectAltName field to be presentin a peer or server certificate. Where more th

RE: [Emu] Proposed Resolution to multiple Peer-Id/Server-Id Issue

2007-06-06 Thread Bernard Aboba
Also, it has been pointed out that the purpose of the Peer-Id/Server-Id may not be fully explained, so that the following sentence may also need to be added to Section 5.2: "Together the Peer-Id and Server-Id name the entities involved in deriving the MSK/EMSK. " __

RE: [Emu] Proposed Resolution to multiple Peer-Id/Server-Id Issue

2007-06-07 Thread Bernard Aboba
ed valid. " > > Thanks, > > Joe > > > -Original Message----- > > From: Ryan Hurst [mailto:[EMAIL PROTECTED] > > Sent: Wednesday, June 06, 2007 4:17 PM > > To: Joseph Salowey (jsalowey); Bernard Aboba; emu@ietf.org > > Subject: RE: [Emu] Propose

[Emu] Issue: Encoding of NAIs within EAP-TLS certificates

2007-06-07 Thread Bernard Aboba
RFC 3280 Section 4.1.2.6 says: Conforming implementations generating new certificates with electronic mail addresses MUST use the rfc822Name in the subject alternative name field (section 4.2.1.7) to describe such identities. Simultaneous inclusion of the EmailAddress attribute in the

RE: [Emu] Issue: Encoding of NAIs within EAP-TLS certificates

2007-06-07 Thread Bernard Aboba
ame elements.> > > -----Original Message-> > From: Bernard Aboba [mailto:[EMAIL PROTECTED] > > Sent: Thursday, June 07, 2007 7:54 AM> > To: emu@ietf.org> > Subject: [Emu] Issue: Encoding of NAIs within EAP-TLS certificates> > > > > > RFC 3280 S

[Emu] Issue with RFC 2716bis key generation

2007-06-07 Thread Bernard Aboba
It has been pointed out by Paul Funk that the key generation formula specified in RFC 2716bis could cause backward compatibility problems once TLS v1.2 is introduced. The formula in -09 is as follows: MSK(0,63)= TLS-PRF-64(TMS, "client EAP encryption", client.random

RE: [Emu] Issue with RFC 2716bis key generation

2007-06-07 Thread Bernard Aboba
: Bernard Aboba [mailto:[EMAIL PROTECTED] Sent: Thursday, June 07, 2007 3:05 PMTo: [EMAIL PROTECTED]: [Emu] Issue with RFC 2716bis key generation It has been pointed out by Paul Funk that the key generation formula specified in RFC 2716bis could cause backward compatibility problems once TLS v1.2 is

RE: [Emu] Issue with RFC 2716bis key generation

2007-06-07 Thread Bernard Aboba
a reason why we changed to TLS-PRF-128 for the > MSK? > Is this a huge issue given that there are not likely any existing> > implementations of EAP-TLS using TLS 1.2?> > Joe> > > > -Original > Message-> > From: Bernard Aboba [mailto:[EMAIL P

RE: [Emu] Issue with RFC 2716bis key generation

2007-06-07 Thread Bernard Aboba
entations based on TLS> 1.2 will use. These implementations should interoperate with one> another. > > I'm not sure where the problem is. > > Joe> > > -Original Message-> > From: Bernard Aboba [mailto:[EMAIL PROTECTED] > > Sent: Thursday, Jun

  1   2   3   >