Re: [Emu] Working Group Last Call for draft-ietf-emu-chbind-04.txt (part 3)‏

Bernard Aboba <bernard_aboba@hotmail.com> Tue, 08 December 2009 06:33 UTC

Return-Path: <bernard_aboba@hotmail.com>
X-Original-To: emu@core3.amsl.com
Delivered-To: emu@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B61FF3A683F for <emu@core3.amsl.com>; Mon, 7 Dec 2009 22:33:09 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.289
X-Spam-Level:
X-Spam-Status: No, score=-0.289 tagged_above=-999 required=5 tests=[AWL=-0.405, BAYES_40=-0.185, HTML_MESSAGE=0.001, MIME_8BIT_HEADER=0.3]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Uq-RT2jdTjj4 for <emu@core3.amsl.com>; Mon, 7 Dec 2009 22:33:08 -0800 (PST)
Received: from blu0-omc3-s18.blu0.hotmail.com (blu0-omc3-s18.blu0.hotmail.com [65.55.116.93]) by core3.amsl.com (Postfix) with ESMTP id EEAFE28C0FF for <emu@ietf.org>; Mon, 7 Dec 2009 22:33:05 -0800 (PST)
Received: from BLU137-W22 ([65.55.116.72]) by blu0-omc3-s18.blu0.hotmail.com with Microsoft SMTPSVC(6.0.3790.3959); Mon, 7 Dec 2009 22:32:55 -0800
Message-ID: <BLU137-W224800D5E4F025B20DA32A938F0@phx.gbl>
Content-Type: multipart/alternative; boundary="_a9fbc4d6-6a57-4358-82a7-6942fa2873bf_"
X-Originating-IP: [24.19.160.219]
From: Bernard Aboba <bernard_aboba@hotmail.com>
To: emu@ietf.org
Date: Mon, 07 Dec 2009 22:32:55 -0800
Importance: Normal
MIME-Version: 1.0
X-OriginalArrivalTime: 08 Dec 2009 06:32:55.0879 (UTC) FILETIME=[46D5A570:01CA77D0]
Subject: Re: [Emu] Working Group Last Call for draft-ietf-emu-chbind-04.txt (part 3)‏
X-BeenThere: emu@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "EAP Methods Update \(EMU\)" <emu.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/emu>, <mailto:emu-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/emu>
List-Post: <mailto:emu@ietf.org>
List-Help: <mailto:emu-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/emu>, <mailto:emu-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 08 Dec 2009 06:33:12 -0000

Section 9.2
 

   Additional network entities (such as proxies) might be on the
   communication path between peer and server and may attempt to
   manipulate the channel binding protocol.  If these entities do not
   possess the keying material used for integrity protection of the
   channel binding messages, the same threat analysis applies as for the
   dishonest authenticators.  Hence, such entities can neither
   manipulate single channel binding messages nor the outcome.  On the
   other hand, entities with access to the keying material must be
   treated like a server in a threat analysis.  Hence such entities are
   able to manipulate the channel binding protocol without being
   detected.  However, the required knowledge of keying material is
   unlikely since channel binding is executed before the EAP method is
   completed, and thus before keying material is typically transported
   to other entities.

[BA] Unless the transient EAP keys used for integrity protection are derivable from the 
MSK, possession of the MSK would not be sufficient to enable an authenticator to modify 
the channel bindings.  As a result, the only entities relevant to the threat analysis 
are those that possess the TEKs, not just those that possess the MSK or other derived keys.