Re: [Emu] Murray Kucherawy's No Objection on draft-ietf-emu-tls-eap-types-12: (with COMMENT)

Alan DeKok <aland@deployingradius.com> Thu, 16 February 2023 14:22 UTC

Return-Path: <aland@deployingradius.com>
X-Original-To: emu@ietfa.amsl.com
Delivered-To: emu@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 23B28C15256B; Thu, 16 Feb 2023 06:22:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2CSXR0ba8tnA; Thu, 16 Feb 2023 06:22:18 -0800 (PST)
Received: from mail.networkradius.com (mail.networkradius.com [62.210.147.122]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3E33FC1BE867; Thu, 16 Feb 2023 06:20:41 -0800 (PST)
Received: from smtpclient.apple (135-23-95-173.cpe.pppoe.ca [135.23.95.173]) by mail.networkradius.com (Postfix) with ESMTPSA id 86A94357; Thu, 16 Feb 2023 14:20:38 +0000 (UTC)
Authentication-Results: NetworkRADIUS; dmarc=none (p=none dis=none) header.from=deployingradius.com
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3696.120.41.1.1\))
From: Alan DeKok <aland@deployingradius.com>
In-Reply-To: <167652491813.36764.476349210854644496@ietfa.amsl.com>
Date: Thu, 16 Feb 2023 09:20:36 -0500
Cc: The IESG <iesg@ietf.org>, draft-ietf-emu-tls-eap-types@ietf.org, emu-chairs@ietf.org, emu@ietf.org, jsalowey@gmail.com
Content-Transfer-Encoding: quoted-printable
Message-Id: <43E1546C-8114-44B7-A662-57B8D07F3E01@deployingradius.com>
References: <167652491813.36764.476349210854644496@ietfa.amsl.com>
To: Murray Kucherawy <superuser@gmail.com>
X-Mailer: Apple Mail (2.3696.120.41.1.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/emu/O4IurezIjyCIQl_lO1VnjnWX54g>
Subject: Re: [Emu] Murray Kucherawy's No Objection on draft-ietf-emu-tls-eap-types-12: (with COMMENT)
X-BeenThere: emu@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "EAP Methods Update \(EMU\)" <emu.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/emu>, <mailto:emu-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/emu/>
List-Post: <mailto:emu@ietf.org>
List-Help: <mailto:emu-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/emu>, <mailto:emu-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 16 Feb 2023 14:22:20 -0000

On Feb 16, 2023, at 12:21 AM, Murray Kucherawy via Datatracker <noreply@ietf.org> wrote:
> \\------------------
> 
> In Section 2.1:
> 
>   Which define Master Session Key (MSK) and Extended Master Session Key
>   (EMSK).
> 
> This seems to be part of a larger sentence that's partly missing.

  I'll clarify that.

>   It is RECOMMENDED that vendor-defined TLS-based EAP methods use the
>   above definitions for TLS 1.3.  There is no compelling reason to use
>   different definitions.
> 
> Why isn't this MUST if there's no compelling reason to do otherwise?

  We don't have change control over vendor-defined TLS methods.

> I concur with Roman's comment about the SHOULD NOT in Section 2.4.

  Fixed.

> In Section 2.2:
> 
>   Where || denotes concatenation.
> 
> I understand the earlier citation I made above now, but still this should be a
> complete sentence.  You later have:
> 
>   where CMK[n] is taken from the final ("n"th) inner method.
> 
> ...which is better in that it looks more like a continuation of something, but
> still it could be better.  Suggest:
> 
>   In this context, CMK[n] is taken from the final ("n"th) inner method.

  OK.

> In Section 3.1:
> 
> In other weds, [...]
> 
> I think you meant "words".
> 
>   The outer identity SHOULD use an anonymous NAI realm.  [...]
> 
> I suggest you add a sentence or two explaining why an implementer might
> legitimately choose not to do this.

  I'll reference RFC 7542 (NAI), which goes over these issues in detail.  Perhaps:

The outer identity SHOULD use an anonymous NAI realm, which allows for
both user privacy, and for the EAP session to be routed in an AAA
framework as described in [RFC7542] Section 3.  Where NAI realms are
not used, packets will not be routable outside of the local
organization.

  i.e. follow the recommendation and work with others, or don't follow it and you're on your own.

>   This practice is NOT RECOMMENDED.  User accounts for an organization
>   should be qualified as belonging to that organization, and not to an
>   unrelated third party.  There is no reason to tie the configuration
>   of user systems to public realm routing, that configuration more
>   properly belongs in the network.
> 
> This formulation is curious; you first give implementers an "out" with NOT
> RECOMMENDED, and then basically argue that it should be a MUST NOT.  I suggest
> revisiting this pattern anywhere you've used it.  If you prefer to keep it, I
> suggest changing the prose a bit to explain why one might choose to deviate
> from the advice presented.

  TBH I don't see any valid reasons for deviating from the advice given.  It's more that this document cannot mandate (a) changes from historical practices defined in previous documents, and (b) what people do in their own private environment.

  It's really "If you want your systems to work on the Internet, here's what you do.  If you don't care about that, you're on your own.  Go figure it out yourself".

> Thanks for including Section 5.
> 
> In Section 6.1:
> 
>   There MAY be
>   additional protocol exchanges which could still cause failure, so we
>   cannot mandate sending success on successful authentication.
> 
> This should just be "may", not "MAY".  You're not presenting an implementation
> choice.

  Fixed.

  Alan DeKok.