RE: Last Call: 'Guidance for AAA Key Management' to BCP (draft-housley-aaa-key-mgmt)

2006-11-19 Thread Alper Yegin
> > I'm talking about MSK, not TSK. By the time EAP authentication is > completed > > successfully, there is an MSK but the EAP peer does not know the > "identifier > > of the parties to whom the session key is available." > > At the completion of the EAP method conversation, the MSK/EMSK is provi

RE: Last Call: 'Guidance for AAA Key Management' to BCP (draft-housley-aaa-key-mgmt)

2006-11-19 Thread Bernard Aboba
> MSK is exported by the EAP method. So, I'd think the EAP method shall > provide the authenticator identity. EAP methods (optionally) export the Peer-Id and Server-Id. They don't export the authenticator identity, since the authenticator is not a party in the EAP method conversation; it only a

RE: Last Call: 'Guidance for AAA Key Management' to BCP (draft-housley-aaa-key-mgmt)

2006-11-19 Thread Alper Yegin
> > Through the exchange of such identifiers one can bind the MSK to the > > identity of the authenticator. But this has issues, imho. RFC 3748 > does > > not mandate such a feature on the EAP lower layers. > > RFC 3748 doesn't talk about this because it isn't an EAP issue -- EAP > methods tre

RE: Last Call: 'Guidance for AAA Key Management' to BCP (draft-housley-aaa-key-mgmt)

2006-11-17 Thread Bernard Aboba
> Through the exchange of such identifiers one can bind the MSK to the > identity of the authenticator. But this has issues, imho. RFC 3748 does > not mandate such a feature on the EAP lower layers. RFC 3748 doesn't talk about this because it isn't an EAP issue -- EAP methods treat the authe

RE: Last Call: 'Guidance for AAA Key Management' to BCP (draft-housley-aaa-key-mgmt)

2006-11-17 Thread Alper Yegin
> >Can you please provide a pointer? > > Authenticator and peer identication issues are discussed in Section > 2.2.1 of draft-ietf-eap-keying-15.txt According to my reading, we rely on this piece of text: The following steps enable lower layer identities to be securely verified by all part

RE: Last Call: 'Guidance for AAA Key Management' to BCP (draft-housley-aaa-key-mgmt)

2006-11-17 Thread Bernard Aboba
>Can you please provide a pointer? Authenticator and peer identication issues are discussed in Section 2.2.1 of draft-ietf-eap-keying-15.txt >I'm wondering why we open the door for children keys living longer than the >parent key. There is a distinction between maximum and actual lifetime which

RE: Last Call: 'Guidance for AAA Key Management' to BCP (draft-housley-aaa-key-mgmt)

2006-11-17 Thread Russ Housley
Alper: > >And how would we apply this to EAP? There is no authenticator ID known to > >EAP peer, yet they share an MSK. > > I believe that this is being addressed in draft-ietf-eap-keying. Can you please provide a pointer? It has peer-id and server-ids defined. But even that has issues, as the

RE: Last Call: 'Guidance for AAA Key Management' to BCP (draft-housley-aaa-key-mgmt)

2006-11-17 Thread Alper Yegin
Hi Russ, > >And how would we apply this to EAP? There is no authenticator ID known to > >EAP peer, yet they share an MSK. > > I believe that this is being addressed in draft-ietf-eap-keying. Can you please provide a pointer? It has peer-id and server-ids defined. But even that has issues, as t

RE: Last Call: 'Guidance for AAA Key management' to BCP (draft-housley-aaa-key-mgmt)

2006-11-15 Thread Russ Housley
Joe: > 5. Unique Key Names > > This section states "the key name MUST NOT be based on the > keying material itself." 802.11i uses this technique; are > there vulnerabilities associated with this? Does this proposed text resolve your concern? AAA key management proposals require a robust key n

RE: Last Call: 'Guidance for AAA Key management' to BCP (draft-housley-aaa-key-mgmt)

2006-11-10 Thread Joseph Salowey \(jsalowey\)
Thanks Bernard, Comments inline. > -Original Message- > From: Bernard Aboba [mailto:[EMAIL PROTECTED] > Sent: Wednesday, November 08, 2006 2:00 PM > To: ietf@ietf.org > Cc: Joseph Salowey (jsalowey) > Subject: Re: Last Call: 'Guidance for AAA Key management&#x

RE: Last Call: 'Guidance for AAA Key Management' to BCP (draft-housley-aaa-key-mgmt)

2006-11-10 Thread Joseph Salowey \(jsalowey\)
> -Original Message- > From: Russ Housley [mailto:[EMAIL PROTECTED] > Sent: Wednesday, November 08, 2006 10:48 AM > To: Joseph Salowey (jsalowey); ietf@ietf.org > Subject: RE: Last Call: 'Guidance for AAA Key Management' to > BCP (draft-housley-aaa-key-mg

Re: Last Call: 'Guidance for AAA Key management' to BCP (draft-housley-aaa-key-mgmt)

2006-11-09 Thread Sam Hartman
> "Yoshihiro" == Yoshihiro Ohba <[EMAIL PROTECTED]> writes: Yoshihiro> On Wed, Nov 08, 2006 at 02:00:14PM -0800, Bernard Aboba Yoshihiro> wrote: >> I believe that the document will have implications for the >> RADIUS protocol. For example, during the RADEXT WG meeting at >

Re: Last Call: 'Guidance for AAA Key management' to BCP (draft-housley-aaa-key-mgmt)

2006-11-08 Thread Yoshihiro Ohba
On Wed, Nov 08, 2006 at 02:00:14PM -0800, Bernard Aboba wrote: > I believe that the document will have implications for the RADIUS > protocol. For example, during the RADEXT WG meeting at IETF 67, we > discussed the need for crypto-agility in RADIUS, and the current lack of > ability to negotia

Re: Last Call: 'Guidance for AAA Key management' to BCP (draft-housley-aaa-key-mgmt)

2006-11-08 Thread Bernard Aboba
I believe that the document will have implications for the RADIUS protocol. For example, during the RADEXT WG meeting at IETF 67, we discussed the need for crypto-agility in RADIUS, and the current lack of ability to negotiate cryptographic algorithms. This is why Crypto-agility was added as

RE: Last Call: 'Guidance for AAA Key Management' to BCP (draft-housley-aaa-key-mgmt)

2006-11-08 Thread Russ Housley
Joe: I'm not really clear on the purpose of the document. What does it apply to? Does it require changes to existing AAA protocols? Does it add new requirements to EAP methods that are not in RFC3748? It would probably be good to reference 3748 when it applies to a requirement in this document

RE: Last Call: 'Guidance for AAA Key Management' to BCP (draft-housley-aaa-key-mgmt)

2006-11-08 Thread Joseph Salowey \(jsalowey\)
t the authenticator can be separated from a AAA client as long as the context of the request is communicated correctly between parties. Is this it? Joe > -Original Message- > From: Russ Housley [mailto:[EMAIL PROTECTED] > Sent: Tuesday, November 07, 2006 8:00 AM > To: Na

RE: Last Call: 'Guidance for AAA Key Management' to BCP (draft-housley-aaa-key-mgmt)

2006-11-08 Thread Lakshminath Dondeti
I agree that such a section on key management claims makes sense, but that should go in security considerations. I have some of the reservations that Sam has, but this is a necessary evil, IMO. Lakshminath At 03:08 PM 11/7/2006, Bernard Aboba wrote: > Adding such a statement would at l

Re: Last Call: 'Guidance for AAA Key Management' to BCP (draft-housley-aaa-key-mgmt)

2006-11-07 Thread Sam Hartman
As an individual I would prefer not having this level of formality. ___ Ietf mailing list Ietf@ietf.org https://www1.ietf.org/mailman/listinfo/ietf

RE: Last Call: 'Guidance for AAA Key Management' to BCP (draft-housley-aaa-key-mgmt)

2006-11-07 Thread Bernard Aboba
> Bernard: > > Your rewording of section 2 seems fine to me. As co-author, you could have > provided it many months ago ;-) > > Are you suggesting the addition of something like: > > Authors who follow these guidelines specified in this document > should incorporate this phrase near the beginni

RE: Last Call: 'Guidance for AAA Key Management' to BCP (draft-housley-aaa-key-mgmt)

2006-11-07 Thread Russ Housley
Vidya: My concern is the origins of this whole effort. In March 2003, I was asked to put together criteria for acceptable AAA key management. I received this request at the beginning of IETF 56, and it resulted in the "Key Management in AAA" presentation to the AAA WG a few days later. This

RE: Last Call: 'Guidance for AAA Key Management' to BCP (draft-housley-aaa-key-mgmt)

2006-11-07 Thread Russ Housley
Bernard: Your rewording of section 2 seems fine to me. As co-author, you could have provided it many months ago ;-) Are you suggesting the addition of something like: Authors who follow these guidelines specified in this document should incorporate this phrase near the beginning of the

RE: Last Call: 'Guidance for AAA Key Management' to BCP (draft-housley-aaa-key-mgmt)

2006-11-07 Thread Bernard Aboba
Here are my comments on the document: Overall Comments While this document includes a lot of useful requirements, it does not provide guidance on how document authors should demonstrate adherence to the principles that are described. For example, a AAA key management document may not include

RE: Last Call: 'Guidance for AAA Key Management' to BCP (draft-housley-aaa-key-mgmt)

2006-11-07 Thread Narayanan, Vidya
> Vidya: > > > > I agree, the document is really addressing AAA/EAP key management. > > > >Why would the scope be limited to EAP? It seems to me that > most, if not > >all, of the requirements would be applicable to just about any > >AAA-based key management protocol. Would it not be useful to

RE: Last Call: 'Guidance for AAA Key Management' to BCP (draft-housley-aaa-key-mgmt)

2006-11-07 Thread Russ Housley
Vidya: > I agree, the document is really addressing AAA/EAP key management. Why would the scope be limited to EAP? It seems to me that most, if not all, of the requirements would be applicable to just about any AAA-based key management protocol. Would it not be useful to generalize it? You ar

RE: Last Call: 'Guidance for AAA Key Management' to BCP (draft-housley-aaa-key-mgmt)

2006-11-07 Thread Narayanan, Vidya
Hi Russ, > I agree, the document is really addressing AAA/EAP key management. > Why would the scope be limited to EAP? It seems to me that most, if not all, of the requirements would be applicable to just about any AAA-based key management protocol. Would it not be useful to generalize it? Vi

RE: Last Call: 'Guidance for AAA Key Management' to BCP (draft-housley-aaa-key-mgmt)

2006-11-06 Thread Russ Housley
Alper: I think this is a good and much-needed document. Thanks to the authors and whoever else contributed to it. Thanks for your review. The title and the abstract starts reading like a general AAA key management guideline, but later the document gets too EAP-specific. Is the intent to prov

RE: Last Call: 'Guidance for AAA Key Management' to BCP (draft-housley-aaa-key-mgmt)

2006-10-10 Thread Alper Yegin
I think this is a good and much-needed document. Thanks to the authors and whoever else contributed to it. The title and the abstract starts reading like a general AAA key management guideline, but later the document gets too EAP-specific. Is the intent to provide general guidelines that should