Attached are draft minutes for IETF 65 EMU meeting. Please let me know
if you have any additions or corrections.
Thanks,
Joe
IETF 65 EAP Method Update (EMU)
-----------------------------------
Tuesday March 21, 2006
Compiled from notes taken by Laksminath Dondeti and Nancy Cam-Winget
=========================================================
1. EMU pre shared key design team update (Uri Blumenthal)
=========================================================
Presentation (Uri): EAP method update from the PSK design team
- Goals: Create an EAP method based on a PSK, meets 3748 and 4017 reqs,
and simple and compact
- Decisions:
Not based on TLS-PSK
symmetric credentials only, no public key based credentials
No multi-party
Fast resumption is unnecessary
Must support channel bindings
Algorithm agility
Provisioning out of scope
Discussion on Key Generation/transport vs. derivation
(David McGrew)): What are the attacks on the transport of keys
(Uri): chosen-plain text attacks
(Hannes Tschofenig): I also believe there is room for analysis
Both end points contributing to key mat is good.
(Bernard Aboba): Is anyone from NIST part of the design team?
We want to be proactive about getting input from NIST.
(Joe Salowey): Jesse, David and Charles have NIST contacts,
we have contacted Lily Chen at NIST and made here aware of
the EMU efforts. Will continue with NIST interaction.
- Continuing:
Minimize number of req primitives
FIPS compliance
- Open issue:
Randomness source:
Can we live with one of the sources contributing?
Cipher selection:
Algorithm agility granularity
Identity hiding
We can probably defer
Channel Binding
format and requirement for confidentiality
(Bernard): Do we need crypto to achieve CB?
(Yoshi): Q on CB? Which type of CB this WG is assuming?
There is an issue about carrying CB over EAP method.
It appears that some config of CB is needed at the server.
Why do you need to carry CB info via EAP method?
(Hannes): We'll specify CB stuff separately, and not in EAP method.
(Joe): We determined that having the ability to carry channel binding type data,
authenticated and possibly encrypted data,
is a generic operation.
Not sure if Exact format and contents are clear
(Jari): CB in EAP method and opaque
(Joe): Defining the format is hard: potentially there may be multiple
types of data to carry. Method won't define the content of CB.
It's an opaque blob that a method carried.
(Yoshi): Why does CB info need to be carried in EAP method?
(Pasi): Different ways of doing CB. One is to carry and that allows us
to not modify APs.
(Hannes): We haven't really looked into Yoshi's latest document
(Joe): There are a number of reasons why you would carry it in EAP
method. For example keying material may not be used in all circumstances.
(Bernard): Fix it in the EAP keying framework perhaps
(Vidya): About CB and using key derivation: when you tie that to key
derivation would be too restrictive. What if the peer's view of the
CB is a subset of the AS's view of the CB
(Uri): I am not sure I agree. Let's take it offline or to mailing list
===========================================================================
2. RFC2716bis-01 (Bernard Aboba)
===========================================================================
- <see slides>
- Next steps:
Solicit feedback from implementers
Moving forward?
- Volunteers for reviews:
Several Volunteers including:
Uri (sort of interested)
Vidya
Pasi
(???): Question about EMSK derivation and what about backward
compatibility
(Hannes): Do you support PSKs?
(Bernard): No, This is just based on certs
(Hannes): Request from 3GPP2 and WiMAX use PSKs. What would they have
to do if they want to do EAP-TLS-PSK.
(Bernard): What happens with backward compatibility.
Need empirical evidence. Certs are mandatory and PSKs would be optional,
so doesn't seem to add value.
(Hannes): Cleaner approach would be a new type code
(Bernard): agrees.
(Joe): Charter item on enhanced EAP-TLS (new type code) exists
===================================
End of scheduled agenda
===================================
Channel binding discussion
===================================
(Sam Hartman): EAP channel binding is binding to a specific port or NAS, is it?
(Joe): yes
(Joe): channel binding carry two things: one for binding to a tunnel and one for
Authenticator/NAS. These are different types.
(Bernard): Has anyone implemented channel binding?
(no Answer)
(Joe): There is no need to do channel binding in many cases, since typically
all authenticators in a system provide the same services.
(Bernard): One use case, is a discussion in 802.11u about monetary
verification
(Joe): differentiated AP case might need channel binding
(Pasi): two different types of authenticators providing different services
_______________________________________________
Emu mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/emu