If I understand you correctly Alan, your implementation would have different 
databases (one resumption DB and one external PSK DB) and you do not want to do 
two database lookups. The format of the PSKidentities is free for the 
deployment to decide upon and the resumption PSKs can be completely be 
determined by the EAP-TLS implementation. Your implementation could for example 
put a message authentication code inside the PSK identity. The MAC would be 
calculated with a symmetric key the EAP server has randomly generated by 
itself. I think that would solve your problem.

I do not see how an attacker could do anything..... an attacker can definitely 
reuse any PSK identity, but would not have the corresponding PSK and the 
ClientHello would therefore not be accepted. The worst thing an attacker could 
do is to replay a ClientHello, then the handshake would fail then the EAP 
server verifies the Finished message.

I don't see why this would be more of a problem in EAP-TLS with TLS 1.3 that in 
any other application of EAP-TLS.

/John

-----Original Message-----
From: Alan DeKok <al...@deployingradius.com>
Date: Wednesday, 18 September 2019 at 15:07
To: "Owen Friel (ofriel)" <ofr...@cisco.com>
Cc: John Mattsson <john.matts...@ericsson.com>, 
"draft-ietf-emu-eap-tl...@ietf.org" <draft-ietf-emu-eap-tl...@ietf.org>, EMU WG 
<emu@ietf.org>
Subject: Re: [Emu] POST WGLC Comments draft-ietf-emu-eap-tls13

    On Sep 18, 2019, at 8:45 AM, Owen Friel (ofriel) <ofr...@cisco.com> wrote:
    > 
    >> 
    >>  Which means that if PSK was allowed, the server can't look at the 
packets to
    >> distinguish resumption from "raw" PSK.  Instead, the server has to look 
at it's
    >> resumption cache which may be in a DB.
    > 
    > The server can use the PskIdentity in the PreSharedKeyExtension to 
differentiate between an offline PSK used for authentication vs. a PSK 
established via NewSessionTicket.
    
      Please define "use".  As an implementor, I can't implement "my code USES 
a field".  I need to know what the code *does* with it.
    
      How does the code differentiate between PSK identities?  Are the identity 
formats different?  If so, how and why?
    
      What prevents a malicious attacker from "using" a format which matches an 
identity coming from NewSessionTicket?
    
      My understanding is that the code *cannot* make any decisions simply by 
looking at the PSK identity field.  Instead, it has to look at the resumption 
cache to see if a given PSK matches a cached one.  Or maybe the code looks in a 
DB to see if the given PSK is a real "end-user" PSK in the DB.
    
      Simply waving your hands and saying it "uses" a field is unhelpful.  
Please give substantive feedback and/or advice about what the code *does*.
    
      Alan DeKok.
    
    

_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to