Re: [IPsec] Mandatory Public Key based authentication with EAP

2014-09-22 Thread Tero Kivinen
Tero Kivinen writes:
 Yaron Sheffer writes:
  This is why RFC 5998 is listed as updates 5996. So RFC 5998 does apply 
  here. Note that it only applies in specific cases, and for specific EAP 
  methods.
  
  Yes, we should have updated the text in RFC 5996 to refer to 5998, but 
  we forgot. Sigh.
 
 Hmm.. I hope this does not mean we should update
 draft-kivinen-ikev2-rfc5996bis (now in AUTH48) to say something about
 this?

As there has not been any support in the list to add anything like
this to the draft-kivinen-ikev2-rfc5996bis, I assume we do not then
need to change it. 

 The RFC 5998 is standard track protocol that extends IKEv2 by
 including new notifications to negotiate the mutual EAP
 authentication, and also changes the payloads sent in the exchanges.
 
 The current text in the draft is not incorrect, as if you follow the
 protocol described in this draft, then the in draft is correct:
 
An implementation using EAP MUST also use a public-key-based
authentication of the server to the client before the EAP
authentication begins, even if the EAP method offers mutual
authentication.  This avoids having additional IKEv2 protocol
variations and protects the EAP data from active attackers.
 
 What we could do, is to add reference to the RFC5998 there, but I
 think it might not be needed, as RFC5998 is clearly an extension to
 the IKEv2, and we do not need to list all extensions to IKEv2 in the
 specification.
 
 What do others think? If we would earlier in the publication process,
 I would say go for it, but adding this kind of text in AUTH48 is not
 something I would like to be doing... 
-- 
kivi...@iki.fi

___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


Re: [IPsec] Mandatory Public Key based authentication with EAP

2014-09-22 Thread Yaron Sheffer
So for the record, I do think we should add to RFC 5996, at the end of 
the paragraph that starts with An implementation using EAP MUST also 
use a public-key-based something like:


As an exception to this rule, public key authentication of the server is 
not required when using the extension defined in [RFC5998].


Thanks,
Yaron


On 09/22/2014 02:59 PM, Tero Kivinen wrote:


As there has not been any support in the list to add anything like
this to the draft-kivinen-ikev2-rfc5996bis, I assume we do not then
need to change it.



___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


Re: [IPsec] Mandatory Public Key based authentication with EAP

2014-09-11 Thread Valery Smyslov

Hi Rahul, Yaron,


Hi Rahul,

I am not aware of any additional conditions.


Sorry to pop up, but doesn't text from RFC5998 apply only
to EAP-only authentication? Isn't it an additional condition?

I mean, that if you perform EAP authentication, as described
in RFC5996, i.e. when responder does send AUTH payload
in its first reply to IKE_AUTH, then even if you use
EAP method with mutual authentiaction, the responder
must use public signature to compute this AUTH payload.

So, from my reading, RFC5998 updates RFC5996 in the sense,
that responder is not needed to send this AUTH payload
(and therefore, to use PK signature to compute it)
if (and only if) it receives EAP_ONLY_AUTHENTICATION and honors it.

Regards,
Valery.


EAP-AKA is actually listed in the table in RFC 5998, Sec. 4.

Thanks,
Yaron

On 09/11/2014 08:44 AM, Rahul Vaidya wrote:

Thanks for the quick reply, Yaron,

So does it mean that if an EAP method provides mutual authentication
(e.g., EAP-AKA), then this particular text from 5996 does not apply? Or
are their further conditions which are not mentioned in 5998 where still
the public key based authentication is required?

Regards,
Rahul

On Thu, Sep 11, 2014 at 11:05 AM, Yaron Sheffer yaronf.i...@gmail.com
mailto:yaronf.i...@gmail.com wrote:

Hi Rahul,

This is why RFC 5998 is listed as updates 5996. So RFC 5998 does
apply here. Note that it only applies in specific cases, and for
specific EAP methods.

Yes, we should have updated the text in RFC 5996 to refer to 5998,
but we forgot. Sigh.

Thanks,
 Yaron


On 09/11/2014 06:56 AM, Rahul Vaidya wrote:

Dear IPsec Experts,

In RFC 4306, 5996 as well as
draft-kivinen-ipsecme-ikev2-__rfc5996bis,
there is a statement:

An implementation using EAP MUST also use a public-key-based
authentication of the server to the client before the EAP 
exchange

begins, even if the EAP method offers mutual authentication.

RFC 5998 which updates 5996 says:
This document specifies how EAP methods that provide mutual
authentication and key agreement can be used to provide 
extensible

responder authentication for IKEv2 based on methods other than
public
key signatures.

The 2 statements are contradictory, given the 'MUST' requirement 
for

public -key based authentication in RFC 5996.

I request a view from the IPsec community on whether public key
based
authentication can be avoided without impacting the security of 
the

connection/network.

Regards,
Rahul Vaidya


_
IPsec mailing list
IPsec@ietf.org mailto:IPsec@ietf.org
https://www.ietf.org/mailman/__listinfo/ipsec
https://www.ietf.org/mailman/listinfo/ipsec




___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec 


___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


Re: [IPsec] Mandatory Public Key based authentication with EAP

2014-09-11 Thread Tero Kivinen
Yaron Sheffer writes:
 This is why RFC 5998 is listed as updates 5996. So RFC 5998 does apply 
 here. Note that it only applies in specific cases, and for specific EAP 
 methods.
 
 Yes, we should have updated the text in RFC 5996 to refer to 5998, but 
 we forgot. Sigh.

Hmm.. I hope this does not mean we should update
draft-kivinen-ikev2-rfc5996bis (now in AUTH48) to say something about
this?

The RFC 5998 is standard track protocol that extends IKEv2 by
including new notifications to negotiate the mutual EAP
authentication, and also changes the payloads sent in the exchanges.

The current text in the draft is not incorrect, as if you follow the
protocol described in this draft, then the in draft is correct:

   An implementation using EAP MUST also use a public-key-based
   authentication of the server to the client before the EAP
   authentication begins, even if the EAP method offers mutual
   authentication.  This avoids having additional IKEv2 protocol
   variations and protects the EAP data from active attackers.

What we could do, is to add reference to the RFC5998 there, but I
think it might not be needed, as RFC5998 is clearly an extension to
the IKEv2, and we do not need to list all extensions to IKEv2 in the
specification.

What do others think? If we would earlier in the publication process,
I would say go for it, but adding this kind of text in AUTH48 is not
something I would like to be doing... 
-- 
kivi...@iki.fi

___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


[IPsec] Mandatory Public Key based authentication with EAP

2014-09-10 Thread Rahul Vaidya
Dear IPsec Experts,

In RFC 4306, 5996 as well as draft-kivinen-ipsecme-ikev2-rfc5996bis, there
is a statement:

An implementation using EAP MUST also use a public-key-based
authentication of the server to the client before the EAP exchange begins,
even if the EAP method offers mutual authentication.

RFC 5998 which updates 5996 says:
This document specifies how EAP methods that provide mutual authentication
and key agreement can be used to provide extensible responder
authentication for IKEv2 based on methods other than public key signatures.

The 2 statements are contradictory, given the 'MUST' requirement for public
-key based authentication in RFC 5996.

I request a view from the IPsec community on whether public key based
authentication can be avoided without impacting the security of the
connection/network.

Regards,
Rahul Vaidya
___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


Re: [IPsec] Mandatory Public Key based authentication with EAP

2014-09-10 Thread Rahul Vaidya
Thanks for the quick reply, Yaron,

So does it mean that if an EAP method provides mutual authentication (e.g.,
EAP-AKA), then this particular text from 5996 does not apply? Or are their
further conditions which are not mentioned in 5998 where still the public
key based authentication is required?

Regards,
Rahul

On Thu, Sep 11, 2014 at 11:05 AM, Yaron Sheffer yaronf.i...@gmail.com
wrote:

 Hi Rahul,

 This is why RFC 5998 is listed as updates 5996. So RFC 5998 does apply
 here. Note that it only applies in specific cases, and for specific EAP
 methods.

 Yes, we should have updated the text in RFC 5996 to refer to 5998, but we
 forgot. Sigh.

 Thanks,
 Yaron


 On 09/11/2014 06:56 AM, Rahul Vaidya wrote:

 Dear IPsec Experts,

 In RFC 4306, 5996 as well as draft-kivinen-ipsecme-ikev2-rfc5996bis,
 there is a statement:

 An implementation using EAP MUST also use a public-key-based
 authentication of the server to the client before the EAP exchange
 begins, even if the EAP method offers mutual authentication.

 RFC 5998 which updates 5996 says:
 This document specifies how EAP methods that provide mutual
 authentication and key agreement can be used to provide extensible
 responder authentication for IKEv2 based on methods other than public
 key signatures.

 The 2 statements are contradictory, given the 'MUST' requirement for
 public -key based authentication in RFC 5996.

 I request a view from the IPsec community on whether public key based
 authentication can be avoided without impacting the security of the
 connection/network.

 Regards,
 Rahul Vaidya


 ___
 IPsec mailing list
 IPsec@ietf.org
 https://www.ietf.org/mailman/listinfo/ipsec


___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


Re: [IPsec] Mandatory Public Key based authentication with EAP

2014-09-10 Thread Yaron Sheffer

Hi Rahul,

I am not aware of any additional conditions.

EAP-AKA is actually listed in the table in RFC 5998, Sec. 4.

Thanks,
Yaron

On 09/11/2014 08:44 AM, Rahul Vaidya wrote:

Thanks for the quick reply, Yaron,

So does it mean that if an EAP method provides mutual authentication
(e.g., EAP-AKA), then this particular text from 5996 does not apply? Or
are their further conditions which are not mentioned in 5998 where still
the public key based authentication is required?

Regards,
Rahul

On Thu, Sep 11, 2014 at 11:05 AM, Yaron Sheffer yaronf.i...@gmail.com
mailto:yaronf.i...@gmail.com wrote:

Hi Rahul,

This is why RFC 5998 is listed as updates 5996. So RFC 5998 does
apply here. Note that it only applies in specific cases, and for
specific EAP methods.

Yes, we should have updated the text in RFC 5996 to refer to 5998,
but we forgot. Sigh.

Thanks,
 Yaron


On 09/11/2014 06:56 AM, Rahul Vaidya wrote:

Dear IPsec Experts,

In RFC 4306, 5996 as well as
draft-kivinen-ipsecme-ikev2-__rfc5996bis,
there is a statement:

An implementation using EAP MUST also use a public-key-based
authentication of the server to the client before the EAP exchange
begins, even if the EAP method offers mutual authentication.

RFC 5998 which updates 5996 says:
This document specifies how EAP methods that provide mutual
authentication and key agreement can be used to provide extensible
responder authentication for IKEv2 based on methods other than
public
key signatures.

The 2 statements are contradictory, given the 'MUST' requirement for
public -key based authentication in RFC 5996.

I request a view from the IPsec community on whether public key
based
authentication can be avoided without impacting the security of the
connection/network.

Regards,
Rahul Vaidya


_
IPsec mailing list
IPsec@ietf.org mailto:IPsec@ietf.org
https://www.ietf.org/mailman/__listinfo/ipsec
https://www.ietf.org/mailman/listinfo/ipsec




___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec