Re: [Emu] Version Notification for draft-dekok-emu-eap-usability-00.txt

Alan DeKok <aland@deployingradius.com> Fri, 11 February 2022 14:04 UTC

Return-Path: <aland@deployingradius.com>
X-Original-To: emu@ietfa.amsl.com
Delivered-To: emu@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9408B3A0F3D for <emu@ietfa.amsl.com>; Fri, 11 Feb 2022 06:04:44 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level:
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TKNQ_0m5kfrF for <emu@ietfa.amsl.com>; Fri, 11 Feb 2022 06:04:40 -0800 (PST)
Received: from mail.networkradius.com (mail.networkradius.com [62.210.147.122]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CE8BB3A0F0E for <emu@ietf.org>; Fri, 11 Feb 2022 06:04:39 -0800 (PST)
Received: from smtpclient.apple (24-52-251-6.cable.teksavvy.com [24.52.251.6]) by mail.networkradius.com (Postfix) with ESMTPSA id 61A0F34A; Fri, 11 Feb 2022 14:04:35 +0000 (UTC)
Authentication-Results: NetworkRADIUS; dmarc=none (p=none dis=none) header.from=deployingradius.com
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 15.0 \(3693.60.0.1.1\))
From: Alan DeKok <aland@deployingradius.com>
In-Reply-To: <HE1PR0701MB3050816DC3B7AF70E0AFE8F589309@HE1PR0701MB3050.eurprd07.prod.outlook.com>
Date: Fri, 11 Feb 2022 09:04:33 -0500
Cc: Carolin Baumgartner <latze@angry-red-pla.net>, "emu@ietf.org" <emu@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <4C04495A-713D-410D-B03B-CDE04D483108@deployingradius.com>
References: <162611255836.29278.13767587856449885761@ietfa.amsl.com> <D71E4C2D-53AC-4453-AF26-39D8684CEAF0@deployingradius.com> <887c07d9-c62f-0fa4-e422-4e9bcfc39756@angry-red-pla.net> <3FDB94D5-CD72-446F-839C-C0130E9FD5E0@deployingradius.com> <ff264fc0-b374-c564-da05-63483cdfa9a7@angry-red-pla.net> <974B27AF-1570-44EC-8232-3CFADA6DD6C8@deployingradius.com> <HE1PR0701MB3050816DC3B7AF70E0AFE8F589309@HE1PR0701MB3050.eurprd07.prod.outlook.com>
To: John Mattsson <john.mattsson@ericsson.com>
X-Mailer: Apple Mail (2.3693.60.0.1.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/emu/X3s-uXvFMQLyv1o2kYgh76bHzEs>
Subject: Re: [Emu] Version Notification for draft-dekok-emu-eap-usability-00.txt
X-BeenThere: emu@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "EAP Methods Update \(EMU\)" <emu.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/emu>, <mailto:emu-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/emu/>
List-Post: <mailto:emu@ietf.org>
List-Help: <mailto:emu-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/emu>, <mailto:emu-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Feb 2022 14:04:45 -0000

On Feb 11, 2022, at 6:04 AM, John Mattsson <john.mattsson@ericsson.com> wrote:
> I think it would be very good if IETF/EMU could agree on simpler, more automatic, and secure deployment and configuration of TLS-based EAP methods. This is severely needed. Both complexity and security are very real problems.
>  
> https://threatpost.com/misconfiguration-university-wifi-login-credentials/175157/

  That attack was in fact first publicly presented by my team in 2016, at NetworkShop 44.  We also published an article on it in August of 2021 on our web site:

https://networkradius.com/articles/2021/08/04/wifi-spoofing.html

  Then magically in September 29 2021, Wizcase says "WizCase’s security team, ... has discovered a major security issue affecting the users of WiFi provider eduroam".  And "We contacted eduroam on December 2020 "

  No, they didn't discover anything.  This issue was well known for years before they did their "research".

> RFC 8446, RFC 5216, and draft-ietf-emu-eap-tls13 does not give much guidance on this and the security requirement for cerficates are soft.

  The IETF has historically avoided doing configuration in this space.

> Any work should likely align with https://datatracker.ietf.org/doc/draft-ietf-uta-rfc6125bis/

  On quick inspection, that document could have some relevance.

> I have not read draft-dekok-emu-eap-usability-00 yet.

  Despite it's length, it makes a very simple proposal.  One which draft-ietf-uta-rfc6125bis touches on in Section 4.2:

   Consider an IMAP-accessible email server at the host mail.example.net
   servicing email addresses of the form user@example.net and
   discoverable via DNS SRV lookups on the application service name of
   example.net.  A certificate for this service might include SRV-IDs of
   _imap.example.net and _imaps.example.net 

  At it's heart, draft-dekok-emu-eap-usability-00 makes a similar proposal for EAP.  A client can do DNS SRV lookups for _eap.example.net, and can determine location, etc. for EAP services.

  Where my document extends this idea is that it also allows clients to discover which certificates are being used for a service.  draft-ietf-uta-rfc6125bis does not seem to touch on this topic, and gives only examples of public (not private) CAs.  In contrast, many EAP deployments use private CAs for security and ease of management.  As such, it is important to have an easy way to discover these certificates.

  If we're doing DNS SRV lookups for services, we might was well do DNS SRV lookups for information associated with those certificates.

  For example, there's no reason for a company to use a public CA for private services such as IMAP.  It would add security for IMAP servers to use private CAs and client certs issued by those private CAs.  The only reason this isn't done is that configuring mail clients is difficult.

  I'll also add a personal note that I wish SRV records would become more ubiquitous.  I fail to understand why in 2021 I have to manually configure IMAP for a new mail client, when the client could simply ask for a SRV recorrd of "_imaps.example.net", and get told "IMAP servers are at this DNS name, using this certificate".

> Inter-operability issues between implementations seems to be an issue, how easy will it be to reach consensus between different implementations?

  Inter-operability for my draft?  The happy news is that there are no implementations other than my toy one.

  Even better, my draft proposes nothing more than well-known DNS lookups, and well-known URIs.  We know that DNS and HTTPS work very well.  Any client EAP configuration is done solely by code on the client, which means that it doesn't have to inter-operate with anything.

  Stefan Winter proposed a standard EAP configuration format in the IETF many years ago.  It never got traction, so he went to the WiFi alliance.  Their latest spec now mandates an XML configuration format.

  Alan DeKok.