Re: [Emu] EMU Meetings

Alan DeKok <aland@deployingradius.com> Wed, 19 January 2022 12:58 UTC

Return-Path: <aland@deployingradius.com>
X-Original-To: emu@ietfa.amsl.com
Delivered-To: emu@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F26963A1C83 for <emu@ietfa.amsl.com>; Wed, 19 Jan 2022 04:58:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wb8648udovtD for <emu@ietfa.amsl.com>; Wed, 19 Jan 2022 04:58:21 -0800 (PST)
Received: from mail.networkradius.com (mail.networkradius.com [62.210.147.122]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E90B93A1D94 for <emu@ietf.org>; Wed, 19 Jan 2022 04:57:49 -0800 (PST)
Received: from smtpclient.apple (24-52-251-6.cable.teksavvy.com [24.52.251.6]) by mail.networkradius.com (Postfix) with ESMTPSA id B616A380; Wed, 19 Jan 2022 12:57:45 +0000 (UTC)
Authentication-Results: NetworkRADIUS; dmarc=none (p=none dis=none) header.from=deployingradius.com
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 15.0 \(3693.20.0.1.32\))
From: Alan DeKok <aland@deployingradius.com>
In-Reply-To: <HE1PR0701MB3050DF0C6E47F4181E74FE8489599@HE1PR0701MB3050.eurprd07.prod.outlook.com>
Date: Wed, 19 Jan 2022 07:57:44 -0500
Cc: EMU WG <emu@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <169749C9-5C37-40A3-8434-9B11D928C889@deployingradius.com>
References: <CAOgPGoAWz78BfYppQFNQfVXox0mOBA1zb1ccCmHMUm0XZH0UHA@mail.gmail.com> <HE1PR0701MB3050E55BBBEBDD67ECA5F98C89559@HE1PR0701MB3050.eurprd07.prod.outlook.com> <A5257AE5-AB7E-499D-AA7C-FECC38816D2F@deployingradius.com> <HE1PR0701MB3050DF0C6E47F4181E74FE8489599@HE1PR0701MB3050.eurprd07.prod.outlook.com>
To: John Mattsson <john.mattsson@ericsson.com>
X-Mailer: Apple Mail (2.3693.20.0.1.32)
Archived-At: <https://mailarchive.ietf.org/arch/msg/emu/aP0Yc2T3MHu7HOr6U23QquGfTuc>
Subject: Re: [Emu] EMU Meetings
X-BeenThere: emu@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "EAP Methods Update \(EMU\)" <emu.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/emu>, <mailto:emu-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/emu/>
List-Post: <mailto:emu@ietf.org>
List-Help: <mailto:emu-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/emu>, <mailto:emu-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Jan 2022 12:58:26 -0000

On Jan 19, 2022, at 6:38 AM, John Mattsson <john.mattsson@ericsson.com> wrote:
> >    draft-arkko-emu-rfc3748bis
> 
>   I heard significant opposition to that at the last EMU meeting.  I don't see a compelling reason to rev 3748.
>  
> John: I think we should get back to this topic for more discussion on if and how. Bernard expressed opposition to obsolete as he said that would require recertification of products. But there was also a suggestion that we should instead do Internet Standard instead. EAP does definitly deserve to be an Internet Standard. Another suggestion was to make an update instead of obsolete which would not trigger recertification.

  Are there any implementors of EAP who are asking for it to be updated?  From what I can see, the answer is "no".  Which means that the IETF is free to work on a document, but it will be either opposed, or at best, ignored.

> The following has been brought up as reasons for doing some kind of update:
> - EAP is essential for network acces authentication and should be an Internet Standard

  Like RADIUS accounting.  But we've lived for 25+ years without that.  I think it's fine.

> - "Master" should be changed to "Main" tofollow inclusive language recommendations (TLS is already doing this).

  This reminds me of a comment about "codes of conduct" for software projects.  The observation was that in many cases, the proponents of such codes engaged in such extreme behavior that they should have been banned under the codes which they were proposing.  Yet that never happened.  The only conclusion then is that something else is going on.

  In linguistics these re-naming of "bad" things is called the "euphemism treadmill".  History has other names for such morality plays.

> - Several of the methods defines in RFC 3748 like MD5-Challenge would benefit from security consideration and references to more recommended methods such as EAP-TLS.

  While that's true, I would like to see how that benefit is worth the effort involved in updating the standard.

> - There are errata.
> - The consideration and recommendations for identity protection is not up to data with current best practice.

  For me, that's been adequately patched in updates to EAP methods.  i.e. methods where identity protection matter.  For insecure methods, they're used in situations where identity protection doesn't really matter.

> - RFC 3748 does not even mention forward secrecy is more and more becoming a requirement to acceptable security.
> - Mention new access technologies such as 5G where EAP is an essential part.

  I don't understand how this is useful.

> - Mention of recommend use of documents such as [RFC4137] [RFC5113] [RFC5247] [RFC6677] [RFC7029].
>  
> IETF is at least nowadays very often making updates such as this (RFC7296, RFC8446bis, RFC7616, RFC8489, RFC8656, RFC8445, etc.)
>  
> My personal view would be that the security considerations considering MD5, identity protection, and forward secrecy would be worthwhile doing in some way. It would also be good to mention essential updates such as RFC 4137.

  Given the significant opposition, I don't see how WG consensus can be achieved here.  The only way forward would be to ignore all of the EAP implementors, and declare consensus despite their objections.

> >    draft-ingles-eap-edhoc
> 
>   That seems useful for limited situations (i.e. IoT).  It also has issues with publicizing identities.
> 
> John: I think the only thing that is missing is to mandate use of ananymous NAIs.

  I don't see any provision in the draft for providing a "real" identity.  So the only NAI used is the outer one, which therefore cannot be fully anonymized.

  Alan DeKok.