RE: [Emu] Tying EAP-TLS method type to specific ciphersuites

2006-10-25 Thread Pasi.Eronen
Bernard Aboba wrote: > In addition adding new non-certificate modes would impose large > costs on customers. Today there are interoperability and conformance > test suites for EAP-TLS that assume that only certificate-based > authentication is supported. > > In addition, EAP-TLS has been approved f

[Emu] Comment on 2716bis: TLS fragmentation

2006-11-06 Thread Pasi.Eronen
Section 2.1 contains a lot of text like "encapsulate one or more TLS records in TLS record layer format, containing a TLS client_hello handshake message." RFC 2246 also says that "multiple client messages of the same ContentType may be coalesced into a single TLSPlaintext record, or a single mes

[Emu] Comment on 2716bis: Examples in Appendix B

2006-11-06 Thread Pasi.Eronen
First of all, I'd suggest numbering the examples in Appendix B, or dividing Appendix B to subsections (this would make reading and commenting them easier). 1) 2nd example ("In the case where the peer and server support privacy and mutual authentication, the conversation will appear as follows"): i

RE: [Emu] Comment on 2716bis: Examples in Appendix B

2006-11-06 Thread Pasi.Eronen
Bernard Aboba wrote: > >> client sends change_cipher_spec/finished twice? > > I think the client will send the Alert at that point, no? TLS doesn't really specify when the alerts should be sent. For example, if the client doesn't accept the server's certificate, IMHO the most logical sequence w

[Emu] WGLC comments for draft-simon-emu-rfc2716bis

2006-12-11 Thread Pasi.Eronen
Roughly in order of importance: 1) Section 2.7: "An EAP-TLS server supporting privacy MUST NOT treat a certificate list containing no entries as a terminal condition; instead it MUST bring up the TLS session and then send a server_hello followed by a certificate_request." Not quite correct... Th

RE: [Emu] WGLC comments for draft-simon-emu-rfc2716bis

2006-12-12 Thread Pasi.Eronen
Bernard Aboba wrote: > >4) Section 2.4, "SHOULD NOT use the identity presented in the > >Identity Response for access control or accounting purposes": is > >using unauthenticated information for access control or accounting > >purposes really something where we think "there may exist valid > >reas

RE: [Emu] WGLC comments for draft-simon-emu-rfc2716bis

2006-12-12 Thread Pasi.Eronen
Thanks for handling my comments so quickly! (If every author had this fast turnaround times, IETF would get documents to RFCs in a fraction of current time... :-) About 1: the figure in 2.6 is not quite right yet. There should be a finished message after the first change_cipher_spec sent by the s

RE: [Emu] RFC 2716bis Section 5.2. Peer and Server Identities

2007-04-25 Thread Pasi.Eronen
I'm fine with this text. Best regards, Pasi -Original Message- From: Bernard Aboba [mailto:[EMAIL PROTECTED] Sent: Monday, April 16, 2007 11:25 AM To: Joseph Salowey (jsalowey); emu@ietf.org Subject: RE: [Emu] RFC 2716bis Section 5.2. Peer and Server Identities To refresh people's memor

RE: [Emu] RFC 2716bis Issue: Use of rfc822Name

2007-05-03 Thread Pasi.Eronen
Joseph Salowey wrote: > RFC4383 is a superset of RFC822. If a name does not conform to > RFC822 then it will not be compliant with RFC3280. Within a > specific community where everyone has a common understanding of how > the extension will be used then this is probably OK. If you plan on > usin

RE: [Emu] Issue with RFC 2716bis key generation

2007-06-08 Thread Pasi.Eronen
Bernard Aboba wrote: > The problem is that RFC 2716 specifies the use of TLS-PRF-128. If > TLS v1.2 negotiates a PRF where PRF-64 is not the same as the first > 64 octets of PRF-128 (the IKEv2 PRF is an example of such a PRF), > then RFC 2716bis implementations will not interoperate with RFC 2716

Re: [Emu] Review of draft-ietf-emu-eap-gpsk-08 (1st round of comments)

2008-07-04 Thread Pasi.Eronen
Charles Clancy wrote: > See comments inline. An updated draft will be released shortly. > Also note that the new draft addresses Dan's comments about > resistance to dictionary attack. Thanks for the update! I have some additional comments (see below), but they should be easy to address. > >

Re: [Emu] Review of draft-ietf-emu-eap-gpsk-08 (1st round of comments)

2008-07-22 Thread Pasi.Eronen
Hannes Tschofenig wrote: > > As Dan Harkins already pointed out, NIST 800-38B does define CMAC > > for 256-bit AES, with 256-bit key and 128-bit output. > > > > So hardcoding this assumption in EAP-GPSK seems to limit the future > > algorithm agility somewhat -- is the WG sure this is an acceptab

Re: [Emu] Review of draft-ietf-emu-eap-gpsk-08 (1st round of comments)

2008-07-29 Thread Pasi.Eronen
Charles, Thanks for the update! There's one change I'm slightly worried about: Version -10: For GPSK-3, a peer MUST silently discard messages where the RAND_Peer, the RAND_Server, or the CSuite_Sel fields do match those transmitted in GPSK-2. Version -11: For GPSK-3, a peer MUST si

[Emu] Liaison Statement on ITU-T Recommendation X.1034

2008-08-06 Thread Pasi.Eronen
The liaison statement from ITU-T SG 17 on X.1034 ("Guideline on extensible authentication protocol based authentication and key management in a data communication network"), which was briefly discussed in SAAG and EMU meetings, is now available here: https://datatracker.ietf.org/liaison/466/ Joe

Re: [Emu] Review of Requirements for an Tunnel Based EAP Method

2008-08-21 Thread Pasi.Eronen
Klaas Wierenga wrote: > 4.5.1.3 server credential revocation checking > > Perhaps with the exception of the Grid community there is no use of > OCSP (let alone SCVP) as far as I know, and popular implementations > of SSL don't implement it. I understand the requirement but I am > afraid this is t

Re: [Emu] Channel Bindings and draft-arkko-eap-aka-kdf

2008-09-02 Thread Pasi.Eronen
It's not really the "key derivation approach" as is, because the key derivation is happening outside EAP -- it's part of the revised AKA' algorithms that are used for other things than EAP. (This is why the "information exchange" approach was not possible.) Also note this text in Section 5:

Re: [Emu] Potential Issues with EAP-FAST

2009-01-26 Thread Pasi.Eronen
Chris Hessing wrote: > 1. EAP-FAST feeds the client and server random in to the TLS PRF in > the opposite order that TTLS and PEAP do. I can't think of a good > reason to do this. Is there some security advantage to doing this? > If not, why require implementations to handle this case for no rea

Re: [Emu] Potential Issues with EAP-FAST

2009-02-03 Thread Pasi.Eronen
Chris Hessing wrote: > For anonymous provisioning, it also seems there is a pretty large > security hole. It is smaller than the security issues with LEAP, > but is still rather large. > > With anonymous provisioning the supplicant has to implicitly trust > the authentication server it is talking

Re: [Emu] Potential Notes in EAP-FAST Documents

2009-02-04 Thread Pasi.Eronen
I would like to remind everyone that these documents did go through IETF Last Call, and have already been approved by IESG. If folks are opposed to publishing descriptions of deployed EAP method when they're less than perfect (or even ugly hacks with bad architecture), and may not offer perfect se

Re: [Emu] Potential Notes in EAP-FAST Documents

2009-02-05 Thread Pasi.Eronen
Dan Harkins wrote: > If the IESG doesn't want to hear opinions then maybe it shouldn't > ask. Since it did (this thread started with a post from "the IESG") > then it should listen to the opinions it solicited. With all due > respect, don't shut off this discussion with a "reminder" that these

Re: [Emu] Potential Notes in EAP-FAST Documents

2009-02-05 Thread Pasi.Eronen
Glen Zorn wrote: > > I would like to remind everyone that these documents did go > > through IETF Last Call, and have already been approved by IESG. > > Given the quality of the documents in question, perhaps that's not > something that you should be bragging about... > > > If folks are opposed to

Re: [Emu] Potential Notes in EAP-FAST Documents

2009-02-05 Thread Pasi.Eronen
Glen Zorn wrote: > Ok, so now I'm totally confused. None of the examples you cite are > IANA registries & I would have no problem w/Cisco handing out > numbers for their proprietary protocol, but that's not what they're > doing. What they're doing is establishing an _IANA registry_ but > retaini

Re: [Emu] Key derivation differences

2009-02-12 Thread Pasi.Eronen
Bernard Aboba wrote: > Are you suggesting that the version of EAP-MSCHAPv2 described in the > document differs in terms of the MSK/EMSK derivation? Or are you > suggesting that further details are needed on how padding is > accomplished with respect to ISK derivation? Hmm.. it seems the EAP-MSCHA

Re: [Emu] Key derivation differences

2009-02-12 Thread Pasi.Eronen
Bernard Aboba wrote: > > But Section 3.3 of RFC 3079 is not about EAP. It does specify how to > > calculate a 128-bit MasterKey, a 128-bit MasterSendKey, a 128-bit > > MasterReceiveKey, a 128-bit SendSessionKey, and a 128-bit > > ReceiveSessionKey. But how to get an EAP MSK from those is not > > s

[Emu] FW: New Liaison Statement, "Draft revised Recommendation ITU-T X.1034, Guideline on extensible authentication protocol based authentication and key management in a data communication network"

2009-10-20 Thread Pasi.Eronen
> -Original Message- > From: ext Georges Sebek(ITU-T SG 17) [mailto:tsbs...@itu.int] > Sent: 16 October, 2009 20:14 > To: al...@freeradius.org; al...@deployingradius.com; jsalo...@cisco.com > Cc: Eronen Pasi (Nokia-NRC/Helsinki); tim.p...@nist.gov; p...@cisco.com; > tsbs...@itu.int; pmwesi