Re: [Emu] POST WGLC Comments draft-ietf-emu-eap-tls13

"Owen Friel (ofriel)" <ofriel@cisco.com> Mon, 11 November 2019 17:52 UTC

Return-Path: <ofriel@cisco.com>
X-Original-To: emu@ietfa.amsl.com
Delivered-To: emu@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BA203120AF8 for <emu@ietfa.amsl.com>; Mon, 11 Nov 2019 09:52:35 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -13.901
X-Spam-Level:
X-Spam-Status: No, score=-13.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_SBL=0.5, URIBL_SBL_A=0.1, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=d68sYn/m; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=cvQcmGCh
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id s-EzJtOvEykg for <emu@ietfa.amsl.com>; Mon, 11 Nov 2019 09:52:32 -0800 (PST)
Received: from rcdn-iport-3.cisco.com (rcdn-iport-3.cisco.com [173.37.86.74]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 563CB120A59 for <emu@ietf.org>; Mon, 11 Nov 2019 09:52:32 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=3653; q=dns/txt; s=iport; t=1573494752; x=1574704352; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=YZ+f1+7Eg8g6CQeWooMmVltSZmdxVQhnlygQnr0zzmA=; b=d68sYn/mcmlktDrricsaISHH0phHsr107FJPymBzRisiI6S4XrLCxGcw lV/4YJ5QT4BbmNo++OkYfC28wfze9shpjxsPIHqAVMyOw2X9cF9buKrLy zLwHwVJYB8uvD0FJojnGXUuGw8jHnkmvUd6jXlaYwIssp6g5TnjnGyn47 Y=;
IronPort-PHdr: 9a23:pVQu7h3reRcN5LJFsmDT+zVfbzU7u7jyIg8e44YmjLQLaKm44pD+JxGOt+51ggrPWoPWo7JfhuzavrqoeFRI4I3J8RVgOIdJSwdDjMwXmwI6B8vQDkPhLfPuRyc7B89FElRi+iLzPA==
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AKAAD7nsld/5tdJa1bCRkBAQEBAQEBAQEBAQEBAQEBAREBAQEBAQEBAQEBAYFrAwEBAQEBCwGBSlAFbFggBAsqCodlA4pqgl6YAIEugSQDVAkBAQEMAQEYCwoCAQGEQAKEFCQ1CA4CAwsBAQQBAQECAQUEbYU3DIVRAQEBAQIBAQEQKAYBASwLAQsEAgEIEQQBAQEeECcLHQgCBAENBQgagwGCRgMOIAECDKF6AoE4iGCCJ4J+AQEFhQ4YghcDBoE2AYt2HRiBQD+BEUaCTD6CYgEBgTcUGINAgiytJm4KgiWVX5l5jkeZdgIEAgQFAg4BAQWBUwE3gVhwFTuCbFARFJA2BwIag1CFFIU/dIEoiw4rgQQBgQ4BAQ
X-IronPort-AV: E=Sophos;i="5.68,293,1569283200"; d="scan'208";a="649408519"
Received: from rcdn-core-4.cisco.com ([173.37.93.155]) by rcdn-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 11 Nov 2019 17:52:31 +0000
Received: from XCH-RCD-009.cisco.com (xch-rcd-009.cisco.com [173.37.102.19]) by rcdn-core-4.cisco.com (8.15.2/8.15.2) with ESMTPS id xABHqVwS002219 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Mon, 11 Nov 2019 17:52:31 GMT
Received: from xhs-rtp-001.cisco.com (64.101.210.228) by XCH-RCD-009.cisco.com (173.37.102.19) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Mon, 11 Nov 2019 11:52:30 -0600
Received: from xhs-rcd-002.cisco.com (173.37.227.247) by xhs-rtp-001.cisco.com (64.101.210.228) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Mon, 11 Nov 2019 12:52:29 -0500
Received: from NAM02-BL2-obe.outbound.protection.outlook.com (72.163.14.9) by xhs-rcd-002.cisco.com (173.37.227.247) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Mon, 11 Nov 2019 11:52:29 -0600
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=c2pY3SJOYDu0/UoT4gXDI7/+qToo7pRhlRyMT1DiGAJ405bbpOlSeiseYB8jZgEAOLnVGygtwDdLsTBnQ77yIXT/MDbuMclqUgLQoyiHS3rpW+4QkplV2VnDctmIlRj8RJj/G59+x6MWMFHd/C+tOG1vKWM1MAhwKDmySNgUKFSbRxfMIE5xxURRpmw/GiX0WTvMm55YQq01ZERjnCfxDKI5WJt0FGx7MTjyGAynD1YAO231QpkflTmQUVZytT0qOumo4ZCvh7NeNrB2SEmIVGmoC009oREqyG1WyygpZ85UStORIq/qrQt+2W3QYRMuwqM/Kv9WHtMmyDQh0gwcgA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=9sVVvxWsZll/xv0U8q96dj9PPbburLQXeTrnQ01D9oo=; b=Qz4U9MHqqG2aieuZ+K8YEFvKzRPGZsKwPKmHNj6LBRvgmbl6aC71EKreH6ef6s8viJNlDn0XoSPm+iSDrJ3IVYJ8rpsEOGj15hDSxg7GA5I8cNV0p101VLbdkS2mCkCYs3pJz4Ez8jITr+j7xt/hXhA/k7n/wTvfmSzK9RpJAtsHlDnWcA5ZVCTJtv0CUCV+UP0B6Dfjca555GL7KJi2ROuBSpPl9feTP7ipfF59b5lBCKPkzwCCtcBX/rzEPpmb7UIfj3RmgtXqTpn5OzhGxB7fiQcuXVKlcZvm2XtuRgxsqVEz3mHNQjij80UnF7N2BElBsej0Z3oj1h+CilAJtA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=9sVVvxWsZll/xv0U8q96dj9PPbburLQXeTrnQ01D9oo=; b=cvQcmGChX/rgvppVYTyWM0C/653w3stY+90Ej5D1LvBhhAEFI72h5kLuvmcwFrgnW+yOtaayKQRe4tinABL2DmqfvcL5xWMb37qBza77KXJOXS5EQZ6YIPGIUxYaPxNfcwKEJgx7X/CuFyO5WqGHJdRFWldYYBoFMaeYzpklROo=
Received: from MN2PR11MB3901.namprd11.prod.outlook.com (20.179.150.76) by MN2PR11MB3614.namprd11.prod.outlook.com (20.178.250.139) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2430.20; Mon, 11 Nov 2019 17:52:28 +0000
Received: from MN2PR11MB3901.namprd11.prod.outlook.com ([fe80::7127:bf0:d3be:3153]) by MN2PR11MB3901.namprd11.prod.outlook.com ([fe80::7127:bf0:d3be:3153%7]) with mapi id 15.20.2430.027; Mon, 11 Nov 2019 17:52:28 +0000
From: "Owen Friel (ofriel)" <ofriel@cisco.com>
To: Alan DeKok <aland@deployingradius.com>, Joseph Salowey <joe@salowey.net>
CC: EMU WG <emu@ietf.org>
Thread-Topic: [Emu] POST WGLC Comments draft-ietf-emu-eap-tls13
Thread-Index: AdVKJoKyKr1G5+9hQuKLAEK5rLYqPgfSdnOQAABeFAAABkCJgP//55mA//bAJjCAEoqCAIADGZ8AgBnulgCABSSTAIAB0o2AgAAF5ACAAC3sAIAABveAgB1CFQCAAD1cgIAAJDQAgAEmKQD/9DAisIAXqxMAgAE9TG7/+vl+wA==
Date: Mon, 11 Nov 2019 17:52:28 +0000
Message-ID: <MN2PR11MB390100371FD5EF13342AA3E4DB740@MN2PR11MB3901.namprd11.prod.outlook.com>
References: <7828_1564869242_5D46027A_7828_348_1_02e001d54a45$e92ae900$bb80bb00$@augustcellars.com> <20b118932a4843b6b88e605799fafea8@aalto.fi> <211AD83C-D111-4EEB-AAF0-D9B5E521F4CF@deployingradius.com> <8F355C6F-DF1E-4E03-B75E-0F1D2508B9D4@ericsson.com> <246280B8-6E5C-484B-95BD-9C940C98C507@deployingradius.com> <CY4PR1101MB22781AB8C8982ACF99B61544DB8E0@CY4PR1101MB2278.namprd11.prod.outlook.com> <17E08795-4E4E-4507-8384-836020966BCF@deployingradius.com> <634C375D-FBF3-4297-A5C0-E68C903CA34A@ericsson.com> <CAOgPGoBko6N_JebmisoSk_EJ=Hq21sV3xoXjLw4r7D+OFSsdZA@mail.gmail.com> <CC58A292-03D6-4D70-A11F-B8FEE7311E78@cisco.com> <26738.1570791861@dooku.sandelman.ca> <AD799A14-8268-4BAF-8925-3567973C7507@cisco.com> <9501.1570802988@dooku.sandelman.ca> <DCC85780-B079-4AD0-8870-7528270B70D8@cisco.com> <CAOgPGoA0RCY+J5bDOyUiKtFy5Vk=C11yvE8O=rsJPQeS8Fzk0A@mail.gmail.com> <B31BF8C4-6568-49F2-BBD1-BD6AC66D393C@cisco.com> <20826A11-1881-40F9-8C54-82BB90820851@deployingradius.com> <CAOgPGoCAb6hbWfPLLGDXAv80Grxn1vTTxOzLctx4E+R0ZhBvGg@mail.gmail.com> <MN2PR11MB390137BA293101102515A3AFDB780@MN2PR11MB3901.namprd11.prod.outlook.com> <0D21C6F3-DCF7-41FA-BEFB-9408575524A8@deployingradius.com> <CAOgPGoDMkMUCbdY6WL+StR22d2qkq87ycGQbVUncExYW_+-8Tg@mail.gmail.com> <2FF842AE-0FA8-40EA-9A82-672E3068EBAB@deployingradius.com>
In-Reply-To: <2FF842AE-0FA8-40EA-9A82-672E3068EBAB@deployingradius.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=ofriel@cisco.com;
x-originating-ip: [173.38.220.50]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: f601b441-7d9f-4bb8-e3c0-08d766cfeaf1
x-ms-traffictypediagnostic: MN2PR11MB3614:
x-ms-exchange-purlcount: 2
x-microsoft-antispam-prvs: <MN2PR11MB36142F2E9257EC145EF6CE04DB740@MN2PR11MB3614.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0218A015FA
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(136003)(346002)(376002)(396003)(39860400002)(366004)(13464003)(189003)(199004)(110136005)(256004)(14454004)(316002)(74316002)(86362001)(14444005)(52536014)(478600001)(966005)(33656002)(102836004)(76176011)(11346002)(486006)(26005)(6506007)(446003)(2906002)(7736002)(305945005)(25786009)(186003)(7696005)(53546011)(8936002)(9686003)(5660300002)(6306002)(4326008)(6436002)(55016002)(6246003)(476003)(8676002)(66946007)(99286004)(81166006)(81156014)(229853002)(6116002)(76116006)(3846002)(66066001)(66476007)(66556008)(66446008)(71200400001)(71190400001)(64756008); DIR:OUT; SFP:1101; SCL:1; SRVR:MN2PR11MB3614; H:MN2PR11MB3901.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: s8cKKqJ9Rl0Jcxwbjq4qgo2TBGBB33h8iiq0bFRbhBA9rdzIHUZjG/wryYxkEaxnXcsvJplgzWc98WfHT8TasakBBvXWOvegfD/TyCn7xe0U707onofaU2TOzHU+Vt5+Odtl65I/LC5fK+mlrrrI8QIVUjfaw7ImiHnSQeEb5SlrAB1HpeLakd1SYANO9UeAdRkSCbaoWp3EHWw3+7oaIePts/P8ujDfNXjdbE9xzhqa0jdT5smu6JsrxHYOZ82pyRWB2JoiMGirFQAhbWDN4oVT7ow7gWJDkI0usfyzegHnPQUF2fj/xBquocKBCyvY1/j3QNOXg/9/aOGYwvZioPx3ItStysEyhWNZZV/D+fS4PRV8ixc1laEaOrdq7XcjXmcqsiqZpHlMGiEx+AiX+Q209zTYkw5emv/paGpWf350WQfbTt+R7a7C4dWegVDyF+LX3VErewj+hi1nfG+T2fpl4GvsMEzEZ+ES/BQdZx0=
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: f601b441-7d9f-4bb8-e3c0-08d766cfeaf1
X-MS-Exchange-CrossTenant-originalarrivaltime: 11 Nov 2019 17:52:28.0349 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: UV7oNVOaE2Xi/G5wvO8RDFiQKWtHpA49wBU48KsDvl+wudQO/QVGNSpfcc0yB4RszHTFYEWaVFAxyOX+cXJ2Nw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR11MB3614
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.19, xch-rcd-009.cisco.com
X-Outbound-Node: rcdn-core-4.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/emu/QuRrqemrFNGMVBxhdr2LBMgzoFs>
Subject: Re: [Emu] POST WGLC Comments draft-ietf-emu-eap-tls13
X-BeenThere: emu@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "EAP Methods Update \(EMU\)" <emu.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/emu>, <mailto:emu-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/emu/>
List-Post: <mailto:emu@ietf.org>
List-Help: <mailto:emu-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/emu>, <mailto:emu-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 11 Nov 2019 17:52:36 -0000


> -----Original Message-----
> From: Emu <emu-bounces@ietf.org> On Behalf Of Alan DeKok
> Sent: 08 November 2019 12:43
> To: Joseph Salowey <joe@salowey.net>
> Cc: EMU WG <emu@ietf.org>
> Subject: Re: [Emu] POST WGLC Comments draft-ietf-emu-eap-tls13
> 
> On Nov 7, 2019, at 11:08 PM, Joseph Salowey <joe@salowey.net> wrote:
> > [Joe] How about
> > "If an implementation supports an external PSK it MUST provide a way to
> configure the realm so it can create an Anonymous NAI to send in the EAP-
> Identity response.  An EAP-TLS 1.3  implementation MUST NOT copy the PSK-ID
> into the EAP-Identity response. "
> 
>   That's good.

[ofriel]  Is the primary reason they MUST NOT be copied because of encoding differences? UTF-8 vs. TLS raw bytes?

On the privacy aspect, as the TLS PSK ID is sent unprotected and unencrypted in cleartext in the ClientHello, what information leakage are we preventing by not sending that same data in cleartext in the Identity Response?

Note that TLS1.3 PSK IDs are different to TLS1.3 client certs: PSK IDs are sent in cleartext in the ClientHello, client certs are sent encrypted inside the client's second flight. PSK IDs are not protected, client certs are (assuming of course that the client can validate the server identity when the server sends its first flight to the client).


> 
> > If someone thinks there is a need to allow the PSK-ID to be copied then the
> phrase could be extended with " unless there is prior knowledge that this will
> have an acceptable impact to privacy and the use case supports Identity
> responses that are not in the form of an NAI.
> 
>   ... and the PSK identity is compatible with the requirements of the EAP Identity
> field, i.e. UTF-8.
> 
> > [Joe] The TLS 1.3 base spec teats certificate auth and external PSK auth as
> mutually exclusive for a particular handshake.   I do not think it restricts a
> particular server from supporting both external PSK and certificate
> authentication for separate connections.

[ofriel] Right.

> 
>   OK.  I'm back to "how do you tell?"

[ofriel]  You can of course trivially tell the difference between an extern PSK and a cert based auth - the ClientHellos are different.

This is a different question to the difference between an extern PSK and a resumption PSK. That is implementation specific and not defined in TLS1.3

> 
>   If the document suggests that plain PSK is OK, it would be very useful to
> describe the impact of that.  What does an implementation do?  How should
> administrators tell PSK identities apart?  If the EAP authenticator can't control
> the derivation of PSK identities for resumption, is it even possible to have
> manually provisioned PSKs?

[ofriel] I agree some implementation advice would be good here. Should this be in EAP, or should we push for a TLS1.3 errata? It's the same advice that a standard TLS1.3 server implementor needs. OpenSSL for example defines its own resumption format, and provides a callback hook to check for extern PSKs, and it looks like OpenSSL lets the application check for an extern PSK match first before checking its internal resumption cache: https://github.com/openssl/openssl/blob/master/ssl/statem/extensions_srvr.c#L1093. But of course that is TLS stack specific. We would need to document guidance olong the lines of checking for TLS stack behaviour.

> 
>   Alan DeKok.
> 
> _______________________________________________
> Emu mailing list
> Emu@ietf.org
> https://www.ietf.org/mailman/listinfo/emu