[Emu] Re: I-D Action: draft-ietf-emu-rfc7170bis-19.txt

2024-06-13 Thread Alexander Clouter
On Fri, 7 Jun 2024, at 13:15, internet-dra...@ietf.org wrote: > Internet-Draft draft-ietf-emu-rfc7170bis-19.txt is now available. It is a work > item of the EAP Method Update (EMU) WG of the IETF. > >Title: Tunnel Extensible Authentication Protocol (TEAP) Version 1 >Author: Alan DeKok >

Re: [Emu] Adoption call for eap.arpa

2024-03-12 Thread Alexander Clouter
On Tue, 12 Mar 2024, at 14:45, Jan-Frederik Rieckers wrote: > On 12.03.24 13:45, Alexander Clouter wrote: >> On Tue, 12 Mar 2024, at 12:37, Yanlei(Ray) wrote: >>> My understanding here is that the EAP server and client will not >>> authenticate each other in EAP-TLS,

Re: [Emu] Adoption call for eap.arpa

2024-03-12 Thread Alexander Clouter
On Tue, 12 Mar 2024, at 12:37, Yanlei(Ray) wrote: > My understanding here is that the EAP server and client will not > authenticate each other in EAP-TLS, and all the authentication will be > done in the " captive portal ". So why recommend EAP-TLS as a > provisioning method? Just send the

Re: [Emu] Adoption call for eap.arpa

2024-03-12 Thread Alexander Clouter
On Thu, 7 Mar 2024, at 22:38, Peter Yee wrote: > The deadline for feedback is March 21st. Yes, that's during IETF > 119 but after the EMU time slot, so hopefully you will have > formed an opinion by then, if not sooner. We hope to hear > from lots of you! > > 1)

Re: [Emu] New Version Notification for draft-janfred-eap-fido-02.txt

2024-03-05 Thread Alexander Clouter
On Mon, 4 Mar 2024, at 19:11, Alan DeKok wrote: > The downside is that CBOR is likely more expressive than TLVs, and > perhaps what people should be moving towards. There's no reason to > stick with TLVs simply because we've been using them for years. It's > 2024, new technologies exist.

Re: [Emu] New Version Notification for draft-janfred-eap-fido-02.txt

2024-03-04 Thread Alexander Clouter
On Mon, 4 Mar 2024, at 10:06, Alexander Clouter wrote: > On Fri, 1 Mar 2024, at 21:08, Jan-Frederik Rieckers wrote: >> I just posted a new version of the EAP-FIDO draft. >> >> [snipped] >> >> Comments are welcome, as always. > > Trying to understa

Re: [Emu] New Version Notification for draft-janfred-eap-fido-02.txt

2024-03-04 Thread Alexander Clouter
On Fri, 1 Mar 2024, at 21:08, Jan-Frederik Rieckers wrote: > I just posted a new version of the EAP-FIDO draft. > > [snipped] > > Comments are welcome, as always. Trying to understand the need for 'Credentials IDs (PKIDs) in the authentication request. My thinking here is "I miss my EAP

Re: [Emu] Secdir last call review of draft-ietf-emu-rfc7170bis-15

2024-03-04 Thread Alexander Clouter
On Sun, 3 Mar 2024, at 23:02, Alan DeKok wrote: >> My proposal would be to just use a dummy (marked optional) Outer-TLV that >> would be ignored by the other end to avoid this problem; sort of like >> GREASE...but to fix an insecurity instead. > > I think that changes existing implementations.

Re: [Emu] Secdir last call review of draft-ietf-emu-rfc7170bis-15

2024-03-03 Thread Alexander Clouter
On Sun, 3 Mar 2024, at 15:52, Alan DeKok wrote: >> If not, then in theory a MITM might be able to remove the last >> server-to-peer outer TLV and prepend it to the peer-to-server TLVs, or vice >> versa, and the MAC would be the same. However, each side knows which outer >> TLVs >> it sent before

Re: [Emu] Secdir last call review of draft-ietf-emu-rfc7170bis-15

2024-03-03 Thread Alexander Clouter
On Sat, 2 Mar 2024, at 18:20, David Mandelberg wrote: >> Maybe a TEAPv2 could use ALPN for the TLS jacket to avoid this..erk, I think >> I may have suggested something that could be retro fitted here without >> impacting existing implementations; assuming they would just ignore the ALPN. > >

Re: [Emu] New Version Notification for draft-janfred-eap-fido-02.txt

2024-03-03 Thread Alexander Clouter
On Fri, 1 Mar 2024, at 21:08, Jan-Frederik Rieckers wrote: > Comments are welcome, as always. Section 4.1.2 - It just popped up as an idea in my reply to the the SEC review of TEAP but... EAP-TLS sub-methods have been copying the version bits since forever. Maybe it is time to break

Re: [Emu] Secdir last call review of draft-ietf-emu-rfc7170bis-15

2024-03-02 Thread Alexander Clouter
On Sat, 2 Mar 2024, at 03:21, David Mandelberg via Datatracker wrote: > > (nit) If I understand the TEAP version negotiation and Crypto-Binding > correctly, the negotiated version is not cryptographically verified until > either (1) after the first inner method is completed or (2) just before the

Re: [Emu] FW: New Version Notification for draft-ingles-eap-edhoc-05.txt

2023-11-07 Thread Alexander Clouter
Hello, On Thu, 28 Sep 2023, at 15:47, John Mattsson wrote: > > EDHOC is high level very similar to the TLS 1.3 handshake but has much > smaller message sizes and is therefore useful in IoT. EAP-EDHOC is just > EDHOC over EAP using the EAP-TLS request and response packet formats. To help get me

Re: [Emu] Patch: revert some IMSK derivation changes

2023-08-28 Thread Alexander Clouter
On Mon, 28 Aug 2023, at 15:43, Heikki Vatiainen wrote: > >> If an inner method supports export of an Extended Master Session Key >> (EMSK), then the IMSK SHOULD be derived from the EMSK as defined in >> [RFC5295]. > > Why the SHOULD? If something else is done, how could it work with other >

Re: [Emu] Patch: revert some IMSK derivation changes

2023-08-28 Thread Alexander Clouter
On Sun, 27 Aug 2023, at 18:16, Heikki Vatiainen wrote: > RFC 7170 and the current draft have diverged in how IMSK is calculated. > > In short: > 1. RFC 7170 pass EMSK to TLS-PRF whereas the draft passes both EMSK and MSK > to TLS-PRF. > 2. While RFC 7170 adjusts only MSK to 32 octet length, the

Re: [Emu] WGLC on draft-ietf-emu-rfc7170bis-11

2023-08-27 Thread Alexander Clouter
On Sun, 27 Aug 2023, at 10:57, Heikki Vatiainen wrote: > Weren't the observed differences against RFC 7170 one the main > reasons why the draft was needed? Exactly. In particular it was the use of the EAP-FAST-MSCHAPv2 key derivative (reversed upper/lower bits) that triggered this and the fun

Re: [Emu] I-D Action: draft-ietf-emu-rfc7170bis-13.txt

2023-08-26 Thread Alexander Clouter
On Tue, 22 Aug 2023, at 15:57, internet-dra...@ietf.org wrote: > A New Internet-Draft is available from the on-line Internet-Drafts > directories. This Internet-Draft is a work item of the EAP Method Update (EMU) > WG of the IETF. > >Title : Tunnel Extensible Authentication Protocol

Re: [Emu] WGLC on draft-ietf-emu-rfc7170bis-11

2023-08-25 Thread Alexander Clouter
On Fri, 25 Aug 2023, at 19:10, Heikki Vatiainen wrote: > When the outer TLS-based EAP is processed by a different EAP server than the > inner EAP-TLS, then the why inner EAP-TLS resumption shouldn't be simply a > matter of the EAP peer and the inner EAP server? In this case the outer EAP >

Re: [Emu] WGLC on draft-ietf-emu-rfc7170bis-11

2023-08-20 Thread Alexander Clouter
On Fri, 18 Aug 2023, at 01:01, Michael Richardson wrote: > I'm not sure it's sane to use EAP-TLS for Inner method myself. If you mean in the general sense, I can imagine placing the user credential on a hardware key whilst the machine credential is either a regular software keychain or even

Re: [Emu] WGLC on draft-ietf-emu-rfc7170bis-11

2023-08-20 Thread Alexander Clouter
On Thu, 17 Aug 2023, at 23:33, Alan DeKok wrote: >> If I did run EAP-TLS as an Inner method (whether once or twice), could I use >> resumption? > > Uh... why didn't anyone mention this before? TEAP is a near-endless > source of surprises and corner cases. In fairness I think you could have

Re: [Emu] Housekeeping functionality (Was: Re: I-D Action: draft-ietf-emu-rfc7170bis-09.txt)

2023-08-02 Thread Alexander Clouter
On Wed, 2 Aug 2023, at 18:49, Eliot Lear wrote: > Keep this in mind: end devices should be presumed to be pressed for > resources, and anything requiring additional unnecessary authentications > should be avoided in that case. I could imagine a realtime video streaming device that during a

Re: [Emu] [Ace] [suspect] Re: Iotdir early review of draft-ietf-ace-wg-coap-eap-08

2023-07-28 Thread Alexander Clouter
On Fri, 28 Jul 2023, at 10:30, josh.howl...@gmail.com wrote: > The fragmentation issue that Heikki mentions is specific to EAP over RADIUS, > where RADIUS is using UDP transport. It isn’t a property of EAP itself, and > so I don’t follow why this makes EAP impractical for IoT. As the

Re: [Emu] Working group Last Call for RFC 7170bis

2023-03-25 Thread Alexander Clouter
On Sat, 25 Mar 2023, at 12:03, Eliot Lear wrote: > I ask that as you consider this thread, you think beyond Basic-Auth to the > PKCS operations. > I definitely am not qualified to think on this, I would be a fool to not yield to those using those attributes! Other than your group, is anyone

Re: [Emu] Working group Last Call for RFC 7170bis

2023-03-25 Thread Alexander Clouter
On Sat, 25 Mar 2023, at 01:08, Heikki Vatiainen wrote: >>> If you are using eapol_test prior to a few TEAP patches (reversed EAP-FAST >>> MSK calculation and ordering of the Cryptobinding processing) then it >>> should just work out the box. > I think the case in question where the inner methods

Re: [Emu] Working group Last Call for RFC 7170bis

2023-03-24 Thread Alexander Clouter
On Fri, 24 Mar 2023, at 18:41, Alexander Clouter wrote: > On Fri, 24 Mar 2023, at 17:51, Heikki Vatiainen wrote: >> The implementation was done based on the RFC and the draft but required >> tailoring to make it interoperable with wpa_supplicant's eapol_test with >> c

Re: [Emu] Working group Last Call for RFC 7170bis

2023-03-24 Thread Alexander Clouter
On Fri, 24 Mar 2023, at 17:51, Heikki Vatiainen wrote: > My colleague has been working on a TEAP implementation. "A new contestant has entered the arena..." > The implementation was done based on the RFC and the draft but required > tailoring to make it interoperable with wpa_supplicant's

Re: [Emu] IMCK derivation for PKCS ops still not clear (Re: Working group Last Call for RFC 7170bis)

2023-03-10 Thread Alexander Clouter
On Fri, 10 Mar 2023, at 16:17, Eliot Lear wrote: > In Section 4.2.9, the beginning text reads: > >> The Request-Action TLV MAY be sent by both the peer and the server in >> response to a successful or failed Result TLV. > > I believe this text is overly restrictive, and should be relaxed to say:

Re: [Emu] I-D Action: draft-ietf-emu-rfc7170bis-04.txt

2023-03-09 Thread Alexander Clouter
On Tue, 7 Mar 2023, at 01:26, internet-dra...@ietf.org wrote: > A New Internet-Draft is available from the on-line Internet-Drafts > directories. > This Internet-Draft is a work item of the EAP Method Update WG of the IETF. > > Title : Tunnel Extensible Authentication Protocol (TEAP) Version 1 >

Re: [Emu] Call for EMU agenda items for IETF 116

2023-02-28 Thread Alexander Clouter
On Wed, 1 Mar 2023, at 01:44, Meiling Chen wrote: > I would like to discuss EAP-TLS-IBS this time, Since last adoption process, > we are still waiting for more people to be interested. I thought the hold up was OpenSSL does not support RFC7250 without patching?

Re: [Emu] RFC7170bis and lack of identities

2023-02-03 Thread Alexander Clouter
On Sat, 4 Feb 2023, at 01:40, Alan DeKok wrote: >> Should we state somewhere that the client can "effectively rollback the >> entire inner state machine" so Result TLV is not final for the whole session? >> >> Should the client be able to do this multiple times? > > I would say "no". I really

Re: [Emu] RFC7170bis and lack of identities

2023-02-03 Thread Alexander Clouter
On Thu, 2 Feb 2023, at 19:16, Alan DeKok wrote: >> The documentation does not but I did see Appendix C.9 lets the client state >> what it wants to do: >> >> https://datatracker.ietf.org/doc/html/draft-ietf-emu-rfc7170bis-03#name-c9-peer-requests-inner-meth > > i.e. the client authenticates in

Re: [Emu] RFC7170bis and lack of identities

2023-02-02 Thread Alexander Clouter
On Thu, 2 Feb 2023, at 18:31, Alan DeKok wrote: > On Feb 2, 2023, at 2:22 AM, Eliot Lear wrote: >> I am wondering if we should close this issue. At the end of the day, if the >> client knows it's doing something like 2FA that requires an EAP method, it >> can initiate. > > I'm not clear how

Re: [Emu] Question about rfc7170bis && PAC

2023-01-23 Thread Alexander Clouter
On Mon, 23 Jan 2023, at 14:05, Heikki Vatiainen wrote: > On Tue, 17 Jan 2023 at 16:24, Alan DeKok > wrote: >> >> On Jan 16, 2023, at 8:00 PM, Joseph Salowey wrote: >> > [Joe] Speaking as a contributor, I would rather see the text deleted if >> > no-one plans on implementing it. This would make

Re: [Emu] Question about rfc7170bis && PAC

2023-01-16 Thread Alexander Clouter
On Mon, 16 Jan 2023, at 13:54, Alan DeKok wrote: > And as a related note, if the PAC goes away, so does the Authority-ID > TLV, and related things like A-ID. I was wondering what to do with A-ID[1] (and everything around PAC-Info) but starting to figure that as you can stuff anything you want

Re: [Emu] I-D Action: draft-ietf-emu-tls-eap-types-10.txt

2023-01-14 Thread Alexander Clouter
On Fri, 13 Jan 2023, at 19:06, internet-dra...@ietf.org wrote: > Title : TLS-based EAP types and TLS 1.3 > Author : Alan DeKok > Filename: draft-ietf-emu-tls-eap-types-10.txt > Pages : 22 > Date: 2023-01-13 The TEAP section will need a

Re: [Emu] I-D Action: draft-ietf-emu-rfc7170bis-02.txt

2023-01-10 Thread Alexander Clouter
On Mon, 9 Jan 2023, at 22:36, Alan DeKok wrote: >> Section 3.3.1 - EAP Sequences >> >> * "Upon completion of each EAP method in the tunnel, the server MUST send an >> Intermediate-Result TLV indicating the result of the inner EAP method. The >> peer MUST respond to the Intermediate-Result TLV

Re: [Emu] I-D Action: draft-ietf-emu-rfc7170bis-02.txt

2023-01-10 Thread Alexander Clouter
On Mon, 9 Jan 2023, at 22:17, Heikki Vatiainen wrote: > I'd say this is a major change because EAP-FAST-MSCHAPV2 can be directly > integrated with Windows AD but EAP-pwd and EAP-EKE can not. This is not to > bring back EAP-FAST-MSCHAPv2 but simply a note that Server Unauthenticated >

Re: [Emu] Resolution for TEAP Errata 5128

2023-01-09 Thread Alexander Clouter
On Mon, 9 Jan 2023, at 14:11, Heikki Vatiainen wrote: >> On a related note, whilst we are here, it does raise the question on how we >> got: >> >> "...the length is 64 octets..." and "First 32 octets of TLS-PRF(...)" >> >> The '0x00 || 0x40' (64 network order 16bit length concatenation) looks

Re: [Emu] I-D Action: draft-ietf-emu-rfc7170bis-02.txt

2023-01-09 Thread Alexander Clouter
On Thu, 5 Jan 2023, at 20:13, internet-dra...@ietf.org wrote: > Title : Tunnel Extensible Authentication Protocol (TEAP) Version 1 > Filename: draft-ietf-emu-rfc7170bis-02.txt > Pages : 101 <-- "now available over the counter to deal with > insomnia..." > Date

Re: [Emu] Meta Issue (Re: I-D Action: draft-ietf-emu-rfc7170bis-02.txt)

2023-01-09 Thread Alexander Clouter
On Mon, 9 Jan 2023, at 07:53, Eliot Lear wrote: > My suggestion is that this draft not be moved to WGLC until we have > working code in hostap for it.  Even better if FR and ISE also match and > can test against MSFT. FreeRADIUS interops with Win10/11 and hostapd (wpa_supplicant/eapol_test)

Re: [Emu] Resolution for TEAP Errata 5128

2023-01-09 Thread Alexander Clouter
On Mon, 9 Jan 2023, at 03:34, Joseph Salowey wrote: > The definition of the TLS-PRF is given in 5246 as: > > PRF(secret, label, seed) = P_(secret, label | seed) > > This construction only defines 3 parameters and does not define a length. I > don't think current implementations include the

Re: [Emu] I-D Action: draft-ietf-emu-rfc7170bis-02.txt

2023-01-08 Thread Alexander Clouter
On Thu, 5 Jan 2023, at 20:13, internet-dra...@ietf.org wrote: > Title : Tunnel Extensible Authentication Protocol (TEAP) Version 1 > Filename: draft-ietf-emu-rfc7170bis-02.txt > Pages : 101 > Date: 2023-01-05 Abstract: obseletes -> obsoletes

Re: [Emu] Fwd: New Version Notification for draft-dekok-emu-rfc7170bis-00.txt

2023-01-07 Thread Alexander Clouter
On Wed, 7 Dec 2022, at 13:48, Alan DeKok wrote: > * perhaps mentioning TLS 1.3? As the PEAP and EAP-TTLS RFCs do not there probably is no need to. At some stage draft-ietf-emu-tls-eap-types will brand an 'Updated by ...' onto those RFCs including RFC7170bis. One question though is can an

Re: [Emu] I-D Action: draft-ietf-emu-tls-eap-types-09.txt

2023-01-04 Thread Alexander Clouter
On Wed, 4 Jan 2023, at 09:17, Alexander Clouter wrote: > > For TEAP (and similarly for FAST) we need to do more than just state > "PACs are dead use NewSessionTicket"[1]. Looks like I jumped at this too quickly, there is some text from the original RFC7170: https://datat

Re: [Emu] I-D Action: draft-ietf-emu-tls-eap-types-09.txt

2023-01-04 Thread Alexander Clouter
On Tue, 27 Sep 2022, at 13:25, internet-dra...@ietf.org wrote: > A New Internet-Draft is available from the on-line Internet-Drafts > directories. > This draft is a work item of the EAP Method Update WG of the IETF. > > Title : TLS-based EAP types and TLS 1.3 > Author :

Re: [Emu] Reminder EMU WG Virtual Interim 2023-01-04

2023-01-03 Thread Alexander Clouter
On Tue, 3 Jan 2023, at 21:34, Alan DeKok wrote: > I've pushed back all of the fixes I know about based on discussion on > the mailing list. There is also some gold[1] to be found in https://github.com/emu-wg/teap-errata that I am working through porting over. I will blend this into my draft

Re: [Emu] TEAP erratum 5775

2023-01-03 Thread Alexander Clouter
On Tue, 3 Jan 2023, at 14:16, Eliot Lear wrote: >> My expectation is that you use the EMSK from the outer-TLS authentication to >> do this calculation. >> >> However, I now understand your point about the *value* of doing this. >> Generating a Cryptobinding on the outer-TLS authentication does

Re: [Emu] TEAP erratum 5775

2023-01-03 Thread Alexander Clouter
On Tue, 3 Jan 2023, at 08:20, Eliot Lear wrote: > My use case is IOT. I'm interested in two states: > > * Nominal: everything looks very similar to EAP-TLS. > * Exceptional: a new certificate or a new trust anchor or something else is > needed. In which case, I would expect the server to

Re: [Emu] draft-ietf-emu-rfc7170bis-00.txt Review

2023-01-03 Thread Alexander Clouter
On Mon, 2 Jan 2023, at 21:20, Alan DeKok wrote: >> It shows it for the *first* method but not subsequent methods. > > Ah. > > And it doesn't show the inner EAP authentication method finishing with > EAP Success or EAP Failure. ...and should continue to *not* show EAP Success/Failure for each

Re: [Emu] I-D Action: draft-ietf-emu-tls-eap-types-09.txt

2023-01-03 Thread Alexander Clouter
On Tue, 27 Sep 2022, at 13:25, internet-dra...@ietf.org wrote: > A New Internet-Draft is available from the on-line Internet-Drafts > directories. > This draft is a work item of the EAP Method Update WG of the IETF. > > Title : TLS-based EAP types and TLS 1.3 > Author :

Re: [Emu] draft-ietf-emu-rfc7170bis-00.txt Review

2023-01-02 Thread Alexander Clouter
On Mon, 2 Jan 2023, at 20:15, Alan DeKok wrote: >> Appendix C.6 (Sequence of EAP Methods) will need to be updated to show this >> too. > > The text has this, which seems sufficient: > > <- EAP-Request/ > EAP-Type=TEAP, V=1 >

Re: [Emu] TEAP erratum 5775

2023-01-02 Thread Alexander Clouter
On Thu, 1 Dec 2022, at 13:44, Eliot Lear wrote: > Th proposed change is as follows: > > > >> 4.2.13. Crypto-Binding TLV >> >> The Crypto-Binding TLV is used to prove that both the peer and server >> participated in the tunnel establishment and sequence of authentications. It >> also provides

Re: [Emu] draft-ietf-emu-rfc7170bis-00.txt Review

2023-01-02 Thread Alexander Clouter
On Sat, 31 Dec 2022, at 17:14, Oleg Pekar wrote: > Few initial comments: > > [snipped EAP sequences scene setting] > > Thus we considered in one of the previous discussions to say in Section 3.3.1 > of TEAP "Upon completion of each EAP __authentication__ method in the tunnel, > the server MUST

Re: [Emu] [EXTERNAL] Re: More TEAP issues

2022-12-02 Thread Alexander Clouter
On Thu, 1 Dec 2022, at 05:41, Eliot Lear wrote: > No, but I would ask that we still have an interim to close the errata. > It was that Errata (stalled effort on GitHub) that helped me over the line in implementing TEAP, so this definitely gets my nod of

Re: [Emu] More TEAP issues

2022-11-30 Thread Alexander Clouter
Hello, On Tue, 29 Nov 2022, at 22:34, Alan DeKok wrote: > Based on interoperability testing, it looks like implementations > followed EAP-FAST for derivation of the MS-MPPE keys, and not RFC 7170: > > http://lists.infradead.org/pipermail/hostap/2022-July/040639.html > >

Re: [Emu] WG last call for draft-ietf-emu-tls-eap-types ?

2022-09-22 Thread Alexander Clouter
Hello, On Tue, 20 Sep 2022, at 20:50, Alan DeKok wrote: > >> Section 2.2 - TEAP >> -- >> I do not think changing the language for the definition of the MAC used for >> the Compound MAC was necessary. > > I don't see if changing the definition that much, There's just a >

Re: [Emu] WG last call for draft-ietf-emu-tls-eap-types ?

2022-09-10 Thread Alexander Clouter
Hello, On Fri, Sep 09, 2022 at 05:35:26PM -0400, Alan DeKok wrote: I guess the argument is that those are the labels that are used in TEAP (without exporter) and the same labels are used by EAP-FAST (with different method ID). My main concern is that they labels are somewhat generic

Re: [Emu] WG last call for draft-ietf-emu-tls-eap-types ?

2022-09-10 Thread Alexander Clouter
Hello, On Tue, Sep 06, 2022 at 09:57:02PM -0700, Joseph Salowey wrote: I think we need to have some review of the EAP-FAST and TEAP sections before publication. If we can't get the review then maybe we should remove those sections. Is someone willing to step up and review these sections of