Hi Christian,

On 3/8/21 11:49 AM, Christian Huitema wrote:

The list of requirement reminds me of two scenarios: the Anima problem of "bringing a clean device into the new owner's network"; and the corporate Wi-Fi problem of "connecting a device to the corporate Wi-Fi". In the Anima problem, the server can verify that the device identity corresponds to something that the owner bought, but the device has no knowledge of where it is connecting to. Anima proposed to close the security loop by having the device connect to the enterprise first, then check a certificate issued by the manufacturer to device owner. The Wi-Fi scenario uses EAP over TLS and the classic solution is a variation of TOFU: ask the device user to verify that the key is what it expects for the SSID, then remember that for the following connections. In this scenario, the Wi-Fi server is always entitled to verify the client's identity and authorization.

  Yes, this is the scenario. Although there is no "expects for the SSID". The client has no knowledge of anything, no provisioning, no credentials, and in many cases no UI by which someone would provision an SSID and some credential. It's a classic catch-22-- I need a credential to get on the network but I need to get on the network
to get a credential.

  Wi-fi solves this problem by doing DPP over special 802.11 frames which are sent pre-association. So the client doesn't need to know an SSID or connect to anything in order to engage in a handshake. The network entity authenticates the client based on the bootstrapped public key and the client gets an assurance that this is the right network because the network entity knew its public key (based on the resurrecting
duckling model from [1]).

  For the wired case, which is what TLS-pok is addressing, the network is whatever port the device is plugged into and it wants to get an assurance that the entity on
the other side of that port knows its public key. It's a bit more than TOFU
because if the other end doesn't know its public key (if it's not the legitimate
network) then it won't complete the TLS handshake.


I don't think that these scenarios lend themselves easily to "reversing the roles". At least, not easily.

  You're right, they don't.

  regards,

  Dan.

[1] https://link.springer.com/chapter/10.1007/10720107_24

--
"The object of life is not to be on the side of the majority, but to
escape finding oneself in the ranks of the insane." -- Marcus Aurelius

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to