Re: [Emu] AD review draft-ietf-emu-rfc7170bis-14

Alan DeKok <aland@freeradius.org> Mon, 26 February 2024 15:49 UTC

Return-Path: <aland@freeradius.org>
X-Original-To: emu@ietfa.amsl.com
Delivered-To: emu@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1FC47C151524 for <emu@ietfa.amsl.com>; Mon, 26 Feb 2024 07:49:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.909
X-Spam-Level:
X-Spam-Status: No, score=-1.909 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EpTeERETFLKe for <emu@ietfa.amsl.com>; Mon, 26 Feb 2024 07:49:20 -0800 (PST)
Received: from mail.networkradius.com (mail.networkradius.com [62.210.147.122]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1B445C14F75F for <emu@ietf.org>; Mon, 26 Feb 2024 07:49:18 -0800 (PST)
Received: from smtpclient.apple (135-23-95-173.cpe.pppoe.ca [135.23.95.173]) by mail.networkradius.com (Postfix) with ESMTPSA id 4EA193C6; Mon, 26 Feb 2024 15:49:16 +0000 (UTC)
Authentication-Results: NetworkRADIUS; dmarc=fail (p=reject dis=none) header.from=freeradius.org
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3696.120.41.1.1\))
From: Alan DeKok <aland@freeradius.org>
In-Reply-To: <CAGL5yWaU33DV1hkZdz0j78-tG6QpO0+TJJ6u00H5UyO2noxRmA@mail.gmail.com>
Date: Mon, 26 Feb 2024 10:49:14 -0500
Cc: emu@ietf.org
Content-Transfer-Encoding: quoted-printable
Message-Id: <CAD92956-34BE-4E9D-929E-65B9EB825AC4@freeradius.org>
References: <CAGL5yWaU33DV1hkZdz0j78-tG6QpO0+TJJ6u00H5UyO2noxRmA@mail.gmail.com>
To: Paul Wouters <paul.wouters@aiven.io>
X-Mailer: Apple Mail (2.3696.120.41.1.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/emu/f-L5zsDOie-GHVWlgMM6A8-xAPk>
Subject: Re: [Emu] AD review draft-ietf-emu-rfc7170bis-14
X-BeenThere: emu@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "EAP Methods Update \(EMU\)" <emu.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/emu>, <mailto:emu-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/emu/>
List-Post: <mailto:emu@ietf.org>
List-Help: <mailto:emu-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/emu>, <mailto:emu-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 26 Feb 2024 15:49:22 -0000

On Feb 25, 2024, at 9:15 PM, Paul Wouters <paul.wouters@aiven.io> wrote:
> I think in general this document is ready to go. I have some hopefully minor issues that would be good to resolve or clarify before starting IETF LC.
> 
>        As such, the PAC has been removed from this document.
> 
> This reads a bit weird. Can it say PAC has been deprecated instead? This
> occurs twice in the document.

  I'll fix that.

> draft-ietf-uta-rfc6125bis-15 -> RFC 9525

  Fixed.

> I am a bit confused by:
> 
>         Server Certificates MAY be constructed with a SubjectDN containing a
>         single element, "CN=" containing the FQDN of the server.  It is also
>         permissible for the server to have an empty subjectDN as recommended
>         by {!{I-D.ietf-uta-rfc6125bis}}.
> 
> That document (RFC 9525 now) actually says:
> 
>         The Common Name RDN MUST NOT be used to identify a service
>         because it is not strongly typed (it is essentially free-form
>         text) and therefore suffers from ambiguities in interpretation.
> 
>         For similar reasons, other RDNs within the subjectName MUST NOT
>         be used to identify a service.
> 
> It seems to me that RFC9525 says to only use subjectAltName (SANs) ?

  I think that's reasonable.  I'll rearrange the text to say:

Server Certificates MUST include a subjectAltName extension, with the dnsName attribute containing an FQDN string.  Server certificates MAY also include with a SubjectDN containing a single element, "CN=" containing the FQDN of the server.  However, this use of  SubjectDN is deprecated for TEAP, and is forbidden in {{RFC9525}} Section 2.


> Now this document also follows with:
> 
>         Server Certificates MUST include a subjectAltName extension
> 
> Perhaps some text can be added to the "Server Certificates MAY be constructed"
> text by saying that authentication decisions MUST NOT be made based on the
> SubjectDN ?

  Sure.  The next section of 7170bis is server certificate validation, and suggests that RFC 9525 should be followed.  I'll clarify.

>         Note that since TLS client certificates are sent in the clear with
>         TLS 1.2 and earlier
> 
> Can "and earlier" be removed? Eg can this document say the TLS version MUST
> be 1.2 or later?

  I think it's fine.  In theory, people might have implemented TLS 1.0 and 1.1 for TEAP.  But all known implementations are much more recent, and start with TLS 1.2.

  I'll update the introduction to match.  And add a referenced to RFC8996 explaining why we don't do TLS 1.0 or TLS 1.1.

>         The first Basic-Password-Auth-Req TLV received in a session MUST
>         include a prompt, which the peer displays to the user.
> 
> Should this receive some Security Considerations to avoid log4j/JNDI type
> issues?

  I can add a few sentences.  I think most EAP implementations are tied to RADIUS implementations, and those have clear-text passwords flying around everywhere.

>         While [RFC8446] allows for the TLS conversation to be restarted,
> 
> Maybe write "TLS 1.3" instead of "[RFC8446]" here? Or use both?

 Both is fine

> The IANA considerations lists:
> 
>         11,PAC TLV,(DEPRECATED) [RFC7170]
> 
> As it is [THIS-DOCUMENT] that deprecates it, it should be added to the
> reference RFC as well, eg:
> 
>        11,PAC TLV,(DEPRECATED) [RFC7170] [THIS-DOCUMENT]

  Fixed.

> 
>         Protection against Man-in-the-Middle Attacks
> 
> Maybe rename to "on-path attacks" ?

  Fixed.

> Appendix C.4 should clarify the TLS version used (1.2). Should it be
> changed to use a TLS 1.3 example?

  I think so, yes.  I'll have to dig into that.  I don't think I can get that updated today before the deadline.

  Alan DeKok.