Sam Hartman [mailto:hartm...@mit.edu] writes:
> >>>>> "Glen" == Glen Zorn <g...@net-zen.net> writes: > Hi. I have read the later messages on this thread, but it sounded like > you and Alan were talking past each other a bit, so I want to come back > to where I think the disagreement is introduced. > > > Glen> Sam Hartman [mailto://hartmans-i...@mit.edu] writes: > > >> Consider a corporation that has an internal network and that also > >> has agreements with WIFI hotspots to provide its employees > >> connectivity. Policy requires that people use a different set of > >> firewall rules and VPN configuration when connecting at the WIFI > >> hotspots than when connecting to the home network. Typically > >> clients determine which network is in use by the SSID. They use > >> the same EAP credentials in both cases. > >> > >> You can imagine that the corporation would know the identities of > >> its own access points. In particular, a combination of > >> configuration on the AAA servers and at the boundary firewall > >> could mean that the AAA servers know whether a given request for > >> access is coming from the corporate network or a WIFI hotspot. > >> Today, however, the corporate AAA infrastructure does not know > >> what the client thinks it is connecting to. If the client > >> disclosed the SSID it sees then the corporation would be in a > >> position to enforce the security policy. > >> > >> Glen agreed that channel binding could address this. > > Glen> Indeed it could, but all you really seem to be asking for is a > Glen> way for the corporation to be able to control the > Glen> configuration of the client. As you point out, it is > Glen> reasonable to expect that the corporation knows the identity > Glen> of its own access points; why does it matter what the client > Glen> _thinks_ (for lack of a better word) that it is attached to? > Glen> I cannot see any purpose for the client sending the SSID of > Glen> the network to which it attached. In fact, it seems that all > Glen> that is necessary is the ability to remotely modify the > Glen> configuration of a client; why is the job of EAP, again? > > > > The client has two different policies both of which have been configured > by the corporate infrastructure. > > The first policy is a policy to be used when connected directly to the > corporate network. The second policy is a policy to be used when > connected to more open networks. > > The client knows both policies. The client needs to choose which one to > use. > The client needs a procedure for connecting to the network such that on > success: > > 1) The client uses the corporate policy on the corporate network and the > other policy on other networks > 2) The client has an authenticated EAP and 802.11I association; the EAP > association to the EAP server and the 802.11I association to the access > point > 3) No attacker can convince the client to use the corporate policy when > connecting to other networks or the other policy when connecting to the > corporate network without the cooperation of the corporate AAA > infrastructure > > So, somehow the client needs to discover which policy to use. We could > use an insecure discovery mechanism and validate the results of that > discovery with a secure protocol later. Alternatively we could use a > secure discovery mechanism and bind the results of that mechanism to the > rest of our protocol. As far as I can tell binding secure discovery to > the later stages of the protocol is exactly as hard as validating > insecure discovery, so I'll design a solution for insecure discovery. I > propose that the client discover which policy to use by looking at the > SSIDs advertised by the APs. I understand SSIDs may not be unique; as a > consequence our client will end up being unable to connect to a > non-corporate network that happens to have chosen the same SSID as the > corporate network. If you design a better discovery mechanism we can > remove this defect; in practice if the corporate SSID is well-chosen > this is not a significant problem. > > So, based on the SSID, we have discovered what policy we will try to > use. Since our discovery approach is entirely insecure, an attacker can > give us the wrong policy to try. If our overall approach is secure, > then we must fail at a later step if that happens. > > In this system, we've posited that the corporate AAA infrastructure > knows whether a given AP is corporate or other. So, we want to take > advantage of that information. We need to change the corporate AAA > behavior to do that as it doesn't provide that service today. We could: > > 1) We can tell the corporate AAA infrastructure what policy we plan to > use and have it validate that decision. > 2) The corporate AAA infrastructure can tell us what policy we should > be using. Or we could use the more direct & much simpler approach of allowing the client to authenticate the network to which it is attached & use that data to decide by itself. This can be done today using EAP-TTLS. > > The channel binding approach is option 1. We tell the corporate > infrastructure what policy we're using as a channel-binding attribute in > the EAP exchange. If we indicate we're using the corporate policy on an > other network, then the corporate AAA infrastructure sends an > access-reject. Otherwise if we're planning to use the other policy on > the corporate network then the infrastructure sends an > access-reject. Finally, if the policies match, then the infrastructure > returns a result based on existing practice--if everything goes well, an > access-accept. > > So, in this design, we communicate the policy we wish to use to the > corporate infrastructure so that our decision can be validated. No > amount of configuration could allow the client to validate this decision > on its own: it has no secure way to distinguish access points. > > I've specifically constructed this example so that transitive roaming > issues do not pop up. Note that transitive trust issues are irrelevant if EAP-TTLS is used. > They were discussion in your thread with > Alan. I'll get to that in the second of three messages I plan to write > in response. > > --Sam _______________________________________________ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu