Re: [Emu] EAP and Fragmentation

2019-02-14 Thread slon v sobstvennom palto
Hi all,
These are my first steps in this group so please correct me if I don't
follow the rules.

Per my experience the existing fragmentation method described in EAP-TLS
RFC 5216 serves good for all fragmentation needs. The method is reused by
PEAP, EAP-FAST, TEAP and EAP-TTLS. There's an ambiguity in EAP-TLS RFC that
doesn't specify whether a not-fragmented message should have the L bit and
the 4 octets length field so different peers treat it differently. However,
for example, EAP-TTLS RFC closed it tightly saying that even a
single-fragment message should have it nevertheless on its redundancy.

~Oleg

On Thu, Feb 14, 2019 at 1:54 PM Mohit Sethi M 
wrote:

> Dear Dr. Pala,
> On 2/12/19 7:36 PM, Dr. Pala wrote:
>
> Hi all,
>
> I am working on a draft for credentials management via EAP. When looking
> at the different specifications, it seems a bit weird that EAP does not
> provide Fragmentation control and requires each method to define their own
> way.
>
> *This, led me to my first question:* is there a de-facto "standard" way
> to add Fragmentation support we can just use (without having to re-invent
> the wheel all the time) ? If we had such a mechanism, then we could just
> say "implement the mechanism as defined in ... ". This would definitely
> help developers that could safely re-use code/libraries. The other approach
> would be to modify EAP to add Fragmentation support there. The main reason
> to have a standard behavior is to have also better management for ack and
> nak packets. As far as the solution goes, the main ones I looked at are the
> ones mentioned in EAP-TTLS and EAP-TEAP. They are both practically the
> same, active ACK-based - are there other methods that have been implemented
> ? Has anybody ever looked at how fragmentation is handled in practice and
> if there are better solutions than others ?
>
> No hat: I think having a standard mechanism for supporting large messages
> and fragmentation independently of any particular EAP method would
> definitely be something useful. As you said, it would allow developers to
> safely re-use code. If you have a draft proposal, I would be happy to
> review it. Perhaps we could start by looking at existing mechanisms used by
> EAP-Pwd/EAP-TTLS.
>
> --Mohit
>
> *Further thinking let me to my second question:* the method we are going
> to propose requires some form of authentication for the server, therefore I
> can see its use mainly as a tunneled method where the communication with
> the server is assumed to be already secure. If we go down the route of
> requiring the use of an outer method that provides authenticity and,
> optionally, confidentiality we would also not need to provide support for
> Fragmentation control, since the records would be encapsulated within the
> outer-method messages that already provide fragmentation support. Would
> this be acceptable ? Or should the method not have such assumptions and
> provide support for explicit fragmentation control ? What would be the
> preferred path here ? I personally would like to have a method that could
> be used independently, but I would also like to focus on simplicity of
> implementation so that if you already have EAP-TTLS/EAP-TEAP support,
> adding support for EAP-CREDS would be very simple.
>
> Looking forward to some great guidance and advice :D Also, if you would
> like to collaborate/contribute, please let me know!
> --
> Best Regards,
> Massimiliano Pala, Ph.D.
> OpenCA Labs Director
> [image: OpenCA Logo]
>
> ___
> Emu mailing listEmu@ietf.orghttps://www.ietf.org/mailman/listinfo/emu
>
> ___
> Emu mailing list
> Emu@ietf.org
> https://www.ietf.org/mailman/listinfo/emu
>
___
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu


Re: [Emu] EAP and Fragmentation

2019-03-14 Thread slon v sobstvennom palto
Hi John,

>Should draft-ietf-emu-eap-tls13-04 just copy the sentence from RFC 5281 or
do the group want something different?

I remember that some EAP-TLS/PEAP clients rejected not fragmented messages
without L bit set, probably due to their wrong interpretation of EAP-TLS
RFC. Would it worth to say something like "Implementation SHOULD accept
unfragmented messages with and without L bit set" in addition to copying
the sentence above from RFC 5281?

Cheers,
Oleg


On Sun, Mar 10, 2019 at 2:39 PM John Mattsson 
wrote:

> Welcome and thanks for your comments Oleg!
>
> slon v sobstvennom palto ; wrote:
>
> >Per my experience the existing fragmentation method described in EAP-TLS
> >RFC 5216 serves good for all fragmentation needs. The method is reused by
> >PEAP, EAP-FAST, TEAP and EAP-TTLS. There's an ambiguity in EAP-TLS RFC
> that
> >doesn't specify whether a not-fragmented message should have the L bit and
> >the 4 octets length field so different peers treat it differently.
> However,
> >for example, EAP-TTLS RFC closed it tightly saying that even a
> >single-fragment message should have it nevertheless on its redundancy.
>
> I cannot find anything in EAP-TTLS (RFC 5281) saying that the L bit should
> be set. As you have noticed, EAP-TLS (RFC 5216) does not say anything about
> the L bit in unfragmented messages and my understanding is that the
> ambiguity is if unfragmented messages can (not should) have the L bit set..
> As far as I can see, EAP-TTLS (RFC 5281) states that unfragmented messages
> MAY set the L bit.
>
> RFC 5281 Section 9.2.2:
>
>“Unfragmented messages MAY have the L bit set and include the
> length of the message (though this information is redundant).”
>
> I looked through the other TLS-based EAP methods (both RFCs and drafts)
> and none of them seems to say anything new about the L bit.
> draft-ietf-emu-eap-tls13 should clarify any ambiguity.
>
> Should draft-ietf-emu-eap-tls13-04 just copy the sentence from RFC 5281 or
> do the group want something different?
>
> Cheers,
> John
>
>
___
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu


Re: [Emu] EAP and Fragmentation

2019-03-15 Thread slon v sobstvennom palto
John wrote:

>That is probably the correct behavior to standardize, i.e., something like
>"Implementations MUST NOT set the L bit in unfragmented messages, but MUST
accept unfragmented messages with and without the L bit set."

I'm for the strict approach. Anyway some implementations don't adhere it.
The sentence above narrows the behaviour to a non-ambiguous while requires
to support all kinds of existing behaviours thus it looks like the most
exact form of the requirement.

Cheers,
Oleg

On Fri, Mar 15, 2019 at 6:44 PM John Mattsson 
wrote:

> Alan wrote:
>
> >I've done a quick check.  On reception, FreeRADIUS accepts the L bit for
> any type of message.  It doesn't care >about fragments, just that the
> length is correct.
> >
>  >For sending packets, FreeRADIUS sets the L bit only if it is sending
> fragments.
>
> That is probably the correct behavior to standardize, i.e., something like
>
> "Implementations MUST NOT set the L bit in unfragmented messages, but MUST
> accept unfragmented messages with and without the L bit set."
>
> Cheers,
> John
>
> ___
> Emu mailing list
> Emu@ietf.org
> https://www.ietf.org/mailman/listinfo/emu
>
___
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu