Alan DeKok [mailto:al...@deployingradius.com] writes:

> Glen Zorn wrote:
> > If certificate-based TLS authentication is used & the TTLS server is
> located
> > in the visited network (something that the client can check by
> matching the
> > identity advertised with a name in the cert), the task is accomplished
> (in
> > that the problem becomes one of policy, provisioning and
> implementation
> > rather than protocol design or standardization).
> 
>   My understanding was that the TLS tunnel was used for at least two
> purposes.  One was to perform TLS server validation, as you suggest
> above.  Another was to provide privacy for authentication credentials.
> 
>   The proposal above satisfies the first purpose, but satisfies the
> second only when the TTLS & home AAA server are co-located, or in the
> same management domain.
> 
>   For roaming, the TTLS server is not in the same management domain as
> the home AAA server.  The proposal above would require that the TTLS
> server take the authentication credentials from inside of the TLS
> tunnel, and proxy them over normal RADIUS, without the protection of a
> TLS tunnel
> 
>   This proxying violates the privacy requirements.

What privacy requirements are those?

> 
>   The only way I could see this method working is if the data inside of
> the TLS tunnel was another TLS session.  The client could verify that
> the outer session matched the local network, and that the inner session
> matched the home network.
> 
>   Unless I'm missing something, that would require standards action, as
> there is no document describing TLS inside of TTLS.  

EAP-TTLS provides for the transport of EAP inside the TLS tunnel.  

> There is no
> document describing how the client could perform the certificate checks
> against the local network information, so that would require standards
> action, too.

Why?  I thought that we were talking about commercial entities here:
certainly roaming consortia can specify how they want to take care of
internal matters...

> 
>   And I'm not sure why this applies only to TTLS.  I see this as
> applying equally well (or poorly) any other TLS-based EAP method.
> 
>   Alan DeKok.


_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to