[Emu] Review of draft draft-ms-emu-eaptlscert-02

"Anoop Kumar Pandey" <anoop@cdac.in> Mon, 06 May 2019 10:47 UTC

Return-Path: <anoop@cdac.in>
X-Original-To: emu@ietfa.amsl.com
Delivered-To: emu@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4DE211200BA for <emu@ietfa.amsl.com>; Mon, 6 May 2019 03:47:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.889
X-Spam-Level:
X-Spam-Status: No, score=-1.889 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id myD7lRmM6TzP for <emu@ietfa.amsl.com>; Mon, 6 May 2019 03:47:42 -0700 (PDT)
Received: from mailsender.cdac.in (mailsender.cdac.in [196.1.113.117]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BDC57120059 for <emu@ietf.org>; Mon, 6 May 2019 03:47:40 -0700 (PDT)
Received: from ims.pune.cdac.in (ims.pune.cdac.in [10.208.1.15]) by mailsender.cdac.in (8.14.2/8.13.8) with ESMTP id x46AlKk3003257 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Mon, 6 May 2019 16:17:20 +0530
Received: from mailgw.pune.cdac.in ([10.208.1.4]) by ims.pune.cdac.in (8.14.4/8.14.4) with ESMTP id x46Al6b0009426; Mon, 6 May 2019 16:17:09 +0530
X-AuthUser: anoop
Received: from DESKTOPV9MK6VP ([223.31.121.170]) (authenticated bits=0) by mailgw.pune.cdac.in (8.14.2/8.13.8) with ESMTP id x46Al44Z014013; Mon, 6 May 2019 16:17:04 +0530
From: Anoop Kumar Pandey <anoop@cdac.in>
To: emu@ietf.org
Date: Mon, 06 May 2019 16:17:01 +0530
Message-ID: <009e01d503f9$0a9848f0$1fc8dad0$@cdac.in>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_009F_01D50427.2451BD70"
X-Mailer: Microsoft Outlook 15.0
Thread-Index: AdUD9TDpPh9cnjiSTGGx5WQgI53wxA==
Content-Language: en-in
X-CDAC-PUNE-MailScanner-ID: x46Al6b0009426
X-CDAC-PUNE-MailScanner: Found to be clean, Found to be clean
X-CDAC-PUNE-MailScanner-MCPCheck-IMS: MCP-Clean, MCP-Checker (score=0, required 1)
X-CDAC-PUNE-MailScanner-SpamCheck: not spam, SpamAssassin (not cached, score=-0.188, required 6, autolearn=disabled, ALL_TRUSTED -1.00, BAYES_50 0.80, HTML_MESSAGE 0.00, T_KAM_HTML_FONT_INVALID 0.01, URIBL_BLOCKED 0.00), not spam, SpamAssassin (not cached, score=-5.299, required 6, autolearn=disabled, ALL_TRUSTED -1.80, BAYES_00 -3.50, HTML_MESSAGE 0.00)
X-CDAC-PUNE-MailScanner-Information: Please contact npsfhelp@cdac.in/mailadmin@cdac.in for more information
X-MailScanner-ID: x46AlKk3003257
X-CDAC-PUNE-MailScanner-From: anoop@cdac.in
X-CDAC-MailScanner-Spam-Status: No
Archived-At: <https://mailarchive.ietf.org/arch/msg/emu/19Jd4K4vtUCW_SvoRdJ0VaUQfv0>
Subject: [Emu] Review of draft draft-ms-emu-eaptlscert-02
X-BeenThere: emu@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "EAP Methods Update \(EMU\)" <emu.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/emu>, <mailto:emu-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/emu/>
List-Post: <mailto:emu@ietf.org>
List-Help: <mailto:emu-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/emu>, <mailto:emu-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 06 May 2019 10:47:44 -0000

Draft Review (draft-ms-emu-eaptlscert-02)
Title: Handling Large Certificates and Long Certificate Chains in TLS-based
EAP Methods
URL: https://tools.ietf.org/html/draft-ms-emu-eaptlscert-02 


Description: 
The draft talks about large TLS certificates with long certificate chains.
This may result in fragmentation into smaller packet as EAP fragment size is
typically is just 1000-1500 bytes. The fragmentations could cause latency
and in some cases EAP authenticator implementations may drop the EAP session
after 40-50 packets. The draft gives an overview of methods and tools for
overcoming the deployment challenges induced by large certificates.


Review: 

Section 3 talks about various reasons for a certificate being large. Subject
Alternative Name field is typically used for multi-domain or wildcard
certificates (fb.com, *.facebook.om, facebook.net, messenger.com) where all
domains are protected by same certificate. I doubt that SAN will be a reason
in IoT world for larger certificate. 

Similarly key size and signature field is in bits (e.g. 2048 bit key, 2048
bit signature, 224 bit key if ECC is used). So this also shouldn't
contribute to a larger certificate.

The same can be said about OID and user groups. Key usage is limited to
digital signature (80) [just one usage] in an end device certificate.  

 

Section 4.1 claims RSA key sizes and digital signature size to be 384 bytes
which is wrong. The RSA key size is 1K to 4K (1024 bit to 4096 bit)
practically and corresponding ECC key will range from 160 bits to 256 bits.
The size mentioned by the authors is the size of the entire certificate.
Authors may refer (
<https://csrc.nist.gov/csrc/media/events/workshop-on-elliptic-curve-cryptogr
aphy-standards/documents/presentations/session2-ford-warwick.pdf>
https://csrc.nist.gov/csrc/media/events/workshop-on-elliptic-curve-cryptogra
phy-standards/documents/presentations/session2-ford-warwick.pdf) for further
optimizations pertaining to ECC adoption. 


Section 4.1.1 talks about shortening or avoid certain fields in the
certificate. Mostly the changes are marginal and the authors have not
presented quantitatively, how much saving in certificate size could be
achieved with it and will it be sufficient.


Section 4.2.1 talks about pre-distributing and omitting CA certificate. It
will require constant update of CA certificates whenever new CAs are
licensed or license of existing CA is revoked. Large chain validation can be
avoided by using cross CA validation also instead of hierarchical
validation. A common certificate repository (like Google Certificate
Transparency
<https://transparencyreport.google.com/https/certificates?hl=en>
https://transparencyreport.google.com/https/certificates?hl=en) could also
be used and chain validation may not be required in this case. 


Section 4.2.2 will only work if at least one successful authentication has
occurred. If any certificate change happens (expiry, revocation, key
change), then again this method will fail.


Section 4.2.3 talks about compressing the certificate. This is achievable,
however the capability to compress, decompress and performing ECC
certificate validation within a small IoT device is questionable. 

 

P.S: In EAP-TLS, isn't there clear direction on how many packets exchange
are allowed before dropping EAP session. Why do some implementations drop
session after 40-50 packets itself? 

In the standard of EAP-TLS, can the no. of exchange packets be increased? If
yes, apart from latency, what other impact could it have?

 

 

Regards,

Anoop Kumar Pandey

Principal Technical Officer

C-DAC Bangalore

India


------------------------------------------------------------------------------------------------------------
[ C-DAC is on Social-Media too. Kindly follow us at:
Facebook: https://www.facebook.com/CDACINDIA & Twitter: @cdacindia ]

This e-mail is for the sole use of the intended recipient(s) and may
contain confidential and privileged information. If you are not the
intended recipient, please contact the sender by reply e-mail and destroy
all copies and the original message. Any unauthorized review, use,
disclosure, dissemination, forwarding, printing or copying of this email
is strictly prohibited and appropriate legal action will be taken.
------------------------------------------------------------------------------------------------------------