Re: [87attendees] IETF wireless

Stefan Winter <stefan.winter@restena.lu> Thu, 08 August 2013 12:10 UTC

Return-Path: <stefan.winter@restena.lu>
X-Original-To: 87attendees@ietfa.amsl.com
Delivered-To: 87attendees@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5AD0621F9D0D for <87attendees@ietfa.amsl.com>; Thu, 8 Aug 2013 05:10:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.237
X-Spam-Level:
X-Spam-Status: No, score=-2.237 tagged_above=-999 required=5 tests=[AWL=0.362, BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AvehU6rA6kJ3 for <87attendees@ietfa.amsl.com>; Thu, 8 Aug 2013 05:10:46 -0700 (PDT)
Received: from smtprelay.restena.lu (smtprelay.restena.lu [IPv6:2001:a18:1::62]) by ietfa.amsl.com (Postfix) with ESMTP id E54B821E8083 for <87attendees@ietf.org>; Thu, 8 Aug 2013 05:10:45 -0700 (PDT)
Received: from smtprelay.restena.lu (localhost [127.0.0.1]) by smtprelay.restena.lu (Postfix) with ESMTP id D59E81058D; Thu, 8 Aug 2013 14:10:43 +0200 (CEST)
Received: from aragorn.restena.lu (aragorn.restena.lu [IPv6:2001:a18:1:8::155]) by smtprelay.restena.lu (Postfix) with ESMTPS id C611B1058C; Thu, 8 Aug 2013 14:10:43 +0200 (CEST)
Message-ID: <52038ABF.5010201@restena.lu>
Date: Thu, 08 Aug 2013 14:10:39 +0200
From: Stefan Winter <stefan.winter@restena.lu>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:17.0) Gecko/20130620 Thunderbird/17.0.7
MIME-Version: 1.0
To: chelliot@pobox.com
References: <767558DB-5546-4361-862E-0342F02AD435@ecs.soton.ac.uk> <EMEW3|a98bd69aea4959b1596d153ba8019962p74AmS03tjc|ecs.soton.ac.uk|767558DB-5546-4361-862E-0342F02AD435@ecs.soton.ac.uk> <alpine.OSX.2.01.1308050439080.146@173-11-110-132-sfba.hfc.comcastbusiness.net> <EB27A179-6515-43BE-B17B-2B853791788E@kumari.net> <alpine.DEB.2.02.1308080755220.5289@uplift.swm.pp.se> <52033C35.8060707@restena.lu> <CAO_RpcLxTeFvXBNvTJn3Hw0jFDKUzymod7_Siy9V7FseKYUT=g@mail.gmail.com>
In-Reply-To: <CAO_RpcLxTeFvXBNvTJn3Hw0jFDKUzymod7_Siy9V7FseKYUT=g@mail.gmail.com>
X-Enigmail-Version: 1.5.2
Content-Type: multipart/signed; micalg="pgp-sha1"; protocol="application/pgp-signature"; boundary="GB7Mn3Uwrg8uAF6Vxkiw8qtrH9kbuG9Xo"
X-Virus-Scanned: ClamAV
Cc: "87attendees@ietf.org" <87attendees@ietf.org>
Subject: Re: [87attendees] IETF wireless
X-BeenThere: 87attendees@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <87attendees.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/87attendees>, <mailto:87attendees-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/87attendees>
List-Post: <mailto:87attendees@ietf.org>
List-Help: <mailto:87attendees-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/87attendees>, <mailto:87attendees-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 08 Aug 2013 12:10:47 -0000

Hi,

> The cert we are using for the IETF SSIDs authenticated via 802.1X (not
> including eduroam) is from the same CA that is providing the certs for
> the rest of the IETF (including web, email, dnssec, and more, I
> believe). This CA (Starfield Secure Certification Authority) is in most
> or all recent OSes and browsers root certificate store. Which means most
> 802.1X supplicants /can/ verify the server cert we supply. It's up to
> the user to not un-check the "Check server cert" box! Our thought was
> that that was sufficient.

No! This is a common misconception. The "browser trust" and EAP trust
are different, and it is insignificant if the CA used is in the browser
trust store or not.

It may save you the step of installing the PEM file itself, sure, but
the crucial part is that you need to be able to tell your EAP supplicant
on the device that the expected server cert comes from *exactly one* CA.

Further to this, contrary to the web browser case, you need to manually
configure which server name to expect; in the browser, this is
explicitly input by the user in his URL bar - but no equivalent of that
exists for EAP.

We have fought for years to get that into our Identity Providers' heads.
Our official eduroam documentation has an extensive section about all
the concepts and nits to consider:

https://confluence.terena.org/display/H2eduroam/EAP+Server+Certificate+considerations

If you don't pin the exact CA *and* server name in config, you make
yourself susceptible to MitM attacks still:

- if you trust all CAs in the "browser trust" store: the MitM gets
himself an arbitrary certificate from any CA in the trust store and uses
it for his fraudulent EAP server - your EAP supplicant would trust it,
even if it has nothing to do with your EAP server.

- if you don't verify the name (but the exact CA): the MitM tries to
connect to the genuine network once, sees which CA is expected, goes to
the same CA and gets himself a certificate for an unrelated name (to
which he is entitled to by say having a corresponding domain name). He
sets up a fraudulent EAP server with that certificate - your EAP
supplicant will accept it even if he does the extra step of verifying
the CA.

> However, we certainly can look into doing as you suggest and publishing
> more information. Of course, the page we post this to will probably also
> be verified by this same CA... ;-)

That's the default CA bootstrap problem. You can put the CA's
fingerprint in a text file, and PGP-sign the file with IETF brass PGP
keys if you like :-)

In eduroam, we *require* IdPs to "publish all information needed to
uniquely identify the authentication server"; and we even have an
automated provisioning tool which sets up supplicants with all the
correct and secure settings - including the CA installation.

It works everywhere except on Karen O'Donoghue's Mac. ;-)

Greetings,

Stefan Winter

> 
> Chris.
> 
> 
> On Thu, Aug 8, 2013 at 2:35 AM, Stefan Winter <stefan.winter@restena.lu
> <mailto:stefan.winter@restena.lu>> wrote:
> 
>     Hi,
> 
>     > Scary how many are using the unencrypted wifi.
> 
>     Don't only count the ietf.1x network. The IETF also provides eduroam,
>     which is WPA2/AES with 802.1X and - sorry, NOC: actual server
>     certificate verification, not a "don't verify ours, and we won't verify
>     yours".
> 
>     The Max numbers in the NOC report are
> 
>     the 3 "secure" ones: 25+27+37 = 89
>     the two "edu" ones: 38 53 = 91
> 
>     Which makes for a total of 180 max simultaneous encrypted connections.
> 
>     Sure, compared to approx. 700 on the open networks it's not so really
>     great, but still quite a significant portion.
> 
>     > A suggestion for next IETF would be to call the 802.1x wifi "IETF" and
>     > the open one "IETF_UNENCRYPTED".
> 
>     Without verifying the server cert of the 802.1x network, you may well
>     talk to the network encryptedly, but the network might be a MitM who can
>     decrypt and snoop out your traffic.
> 
>     The ietf.1x network is just not as good as it could be - maybe more
>     people would be inclined to use it if it provides the extra benefit of
>     being able to identify itself as *the genuine* IETF network. Neither the
>     open network nor the ietf.1x currently do that.
> 
>     The fix would be surprisingly simple: in the Network Information page,
>     actually *publish* the CA cert and its fingerprint that signs the auth
>     server, and also publish the server's subject/subjectAltNames. This
>     allows every user to check whether he's on the real thing when
>     connecting.
> 
>     There are also provisioning tools that can install the CA certs and EAP
>     settings onto client devices. It's not rocket science.
> 
>     Greetings,
> 
>     Stefan Winter
> 
> 
> 
> 
>     --
>     Stefan WINTER
>     Ingenieur de Recherche
>     Fondation RESTENA - Réseau Téléinformatique de l'Education Nationale et
>     de la Recherche
>     6, rue Richard Coudenhove-Kalergi
>     L-1359 Luxembourg
> 
>     Tel: +352 424409 1 <tel:%2B352%20424409%201>
>     Fax: +352 422473 <tel:%2B352%20422473>
> 
> 
>     _______________________________________________
>     87attendees mailing list
>     87attendees@ietf.org <mailto:87attendees@ietf.org>
>     https://www.ietf.org/mailman/listinfo/87attendees
> 
> 
> 
> 
> -- 
> Chris Elliott
> chelliot@pobox.com <mailto:chelliot@pobox.com>


-- 
Stefan WINTER
Ingenieur de Recherche
Fondation RESTENA - Réseau Téléinformatique de l'Education Nationale et
de la Recherche
6, rue Richard Coudenhove-Kalergi
L-1359 Luxembourg

Tel: +352 424409 1
Fax: +352 422473