Re: [Emu] New I-D: A new EAP method called EAP-FIDO

Hannes Tschofenig <hannes.tschofenig@gmx.net> Mon, 30 October 2023 11:21 UTC

Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: emu@ietfa.amsl.com
Delivered-To: emu@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7B5EEC14CE44 for <emu@ietfa.amsl.com>; Mon, 30 Oct 2023 04:21:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.806
X-Spam-Level:
X-Spam-Status: No, score=-2.806 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmx.net
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BdI1jhR01j15 for <emu@ietfa.amsl.com>; Mon, 30 Oct 2023 04:21:08 -0700 (PDT)
Received: from mout.gmx.net (mout.gmx.net [212.227.15.18]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 82288C151065 for <emu@ietf.org>; Mon, 30 Oct 2023 04:21:07 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gmx.net; s=s31663417; t=1698664859; x=1699269659; i=hannes.tschofenig@gmx.net; bh=+OUMQ7HAP2/EeoaTuex8dT/s6PpAUNGkn48eUFO85ro=; h=X-UI-Sender-Class:Date:Subject:To:References:From:In-Reply-To; b=Y0A3zfBHtSFj3o0CKq9AxjN53uEhPFBbTngonoCaXbaxt0Tuj7E7ubH0muYq34Rb EGeKeNcqfJOU4+zghek79sejfWh4tXp1353jsv6oi7g/Dijl9BbXAnmHQZ43KFT7d 3F3wd1mMrOUDqPYv+3QUbaNFdD6oGMOmubfzoztwHZnt4bOfr9DYAi8LOofnI2cPG d+1Ii3CdTh4DJb/yTx0rEGdI/WiwFxSxu+wPW3isOguvxmT6bSDQmNDJ0dyeCn2iJ jgOyeao+swQYAlIKRH4W2d1E8EZoyv6r/5Vc3IgvKSTo3f+YI8i4/aZ4r2Z33CNaX 7ObtTpkldytXww8hSQ==
X-UI-Sender-Class: 724b4f7f-cbec-4199-ad4e-598c01a50d3a
Received: from [172.16.254.186] ([185.176.157.173]) by mail.gmx.net (mrgmx004 [212.227.17.190]) with ESMTPSA (Nemesis) id 1MWics-1qzib43eKO-00X0JZ; Mon, 30 Oct 2023 12:20:58 +0100
Message-ID: <ed839392-5717-462d-afa9-2403ecb30ca6@gmx.net>
Date: Mon, 30 Oct 2023 12:20:59 +0100
MIME-Version: 1.0
User-Agent: Mozilla Thunderbird
To: Jan-Frederik Rieckers <rieckers@dfn.de>, emu@ietf.org
References: <7aebfa69-1ed4-433a-b506-e0aa52b5eafb@dfn.de> <041a01da0658$49cea8a0$dd6bf9e0$@gmail.com> <28c411dc-b6ff-42e2-92d2-6fc4b7d6588f@dfn.de>
From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
In-Reply-To: <28c411dc-b6ff-42e2-92d2-6fc4b7d6588f@dfn.de>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: quoted-printable
X-Provags-ID: V03:K1:AGo1Zmtk5ngObnntGPXdZk6S8tGgi8p9b5PqA1Zr2Px3V3TmgQT +7uK/KsgpHFZK/UfDyhG84XFab5M5rj/gVX8V9UkWAdkms96x8eDk3jp287DjM59jEcXWdM dAzVbfxlBKcIs32FuwZa74WeClHI9WVJ84bPVs6pA1ARbVwRCCvTG8ZzYsCn3aUEw1lzZ9w Y/zX4wnNXnXA1CKRY/Ttg==
UI-OutboundReport: notjunk:1;M01:P0:GR7tELSruDI=;IyP01LXSLQ/4OZckEiJqkLrOoBW l2FfqQtofMi0aJQN9+jP83GecCteHD9HWN1zh7bJslkvRTOo7BSpXB1d+ACerUVSmwZaRiPrp CttN2gXLDxl3pYOAUUljZ/lEvIQ64Xe5q63YbgdAoSH9khj1xcvDezIKj5orVKfLrCuCoQku3 Rx3yZ2h/qiBd0dUlZ7d/4DTah/aMOJOhaWBbISJeyVZ3Op86rp6Dof7/lQ9iG53nkqWqWdTny IDRIJknvCc+yj9kQwjbYYA2BXxaEBZJYQjjmLyu+R0EzKtchtthm9Omkf+7z9KBepYp09CsWh YwAvq41z/e/C3yXaVFELBlfQM41mfx75WgvYOwkTkKV4cJb35Z36qqBK/jmrK/S+M7ZOHdaaC z92iw091Etak05xnKE9tWZ0w1l1BOz/uBCR/hUIHW5V24ITrtQM6pEB2fOvSq2e1NOK0L399j R73U/pQ4gviWQqLsjJ0AG3QWWG4cihY8ks93RoaHJqEgaNnu+9+ZMD0GMYAPfvev7E4stUORS dXt4dZO7CIRX+D6JPRFrc6m15vnGBn+2JTrMGL5BxMN/OSdXvdvI0WNb/REfvEPfv+M4p+pnG cGCua9/LoM20vXc0sF0yRy1Yi4yGcuox/q8LTJHDzHSWvioQSy1h3c2KIR0simwMu2fPI68DJ 0VSgvMchdUClBDWgI5roiWcngBvLUtm2Ylgb5sIQjOKozASy3jc08t+cMBrT/JrSak1pacWDO iKDxg4LrHPo64dmbvGXaraPG8e9nT9IQdXVT1dr2PfL89/BUUQISj2naUFy6BsvJu/tDoJB+e b1Ug9weYVvy+DiyI0mNoOC2RBxc/wPaiUi/qvbQKFkzwhBgK6tXelZ53Qq1538K1y4cSm88w1 xye+0O8unvRBA9MFJ9q7GbFH+lvZRONl+/tf8RKNU5nP+DjwNyj75uUlHAPf0pVl92A2S4lOG OenfMg==
Archived-At: <https://mailarchive.ietf.org/arch/msg/emu/f0BjVJ4aQ2-74fwW-c7_DHAUny0>
Subject: Re: [Emu] New I-D: A new EAP method called EAP-FIDO
X-BeenThere: emu@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "EAP Methods Update \(EMU\)" <emu.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/emu>, <mailto:emu-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/emu/>
List-Post: <mailto:emu@ietf.org>
List-Help: <mailto:emu-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/emu>, <mailto:emu-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 30 Oct 2023 11:21:12 -0000

Hi Jan,


you cannot complain about the use of TLS in EAP when the EAP method you
propose relies on TLS. The TLS-based authentication is an essential part
of the FIDO solution. Without TLS it is completely insecure.


Regarding the key extractor use you describe below: I don't remember
this technique being used by FIDO. I have worked in the FIDO Alliance in
the early days on U2F / UAF but might have missed some more recent
developments.


Regarding the benefit of FIDO: I don't think the "main benefit of using
FIDO is the ease of provisioning a credential to the supplicant". Once
you have an authenticated channel, it is trivial to provision new
credentials. There are hundreds of protocols that do that. IMHO the
benefit of FIDO is that you have an installed base of hardware tokens
that allow you to store these newly minted credentials.


On the security front I am wondering whether the introduction of this
use case weakens the use of FIDO for the web. In the web case, an
important aspect is to perform authentication and authorization of the
domain name with which the credentials are later utilized. For network
access authentication the domain authentication and authorization is, as
you have been mentioning in the draft and also in your emails, rather
weak. Have you looked into this aspect? Attacks that result from
cross-protocol use isn't uncommon.


Ciao

Hannes



Am 24.10.2023 um 12:22 schrieb Jan-Frederik Rieckers:
> On 24.10.23 10:58, josh.howlett@gmail.com wrote:
>> It is good to see this work progressing.
>>
>> 1. I agree with Hannes' observation that it isn't necessary to
>> premise EAP-FIDO on the claimed weaknesses of other EAP methods.  I
>> suggest replacing paragraphs 2-5 with content summarising the
>> proposal. In particular I am surprised that the document doesn't
>> discuss (what I would consider to be) the main benefit of using FIDO:
>> the ease of provisioning a credential to the supplicant.
>
> I must confess, the text is mainly driven by my bad experience from my
> days as part of the eduroam administration team at the university of
> Bremen, and my current experience with a change in the root
> certificate for almost every eduroam IdP in Germany, because the
> self-operated CA almost every institution used stopped issuing server
> certificates and we are now migrating to a new CA provider.
>
>
> The wording in the draft is a bit harsh, and I sincerely apologize to
> everyone that felt offended by that wording, that wasn't my intention.
> I'll adjust that for a future version of the draft.
>
>
> There are several reasons to specify the EAP-TLS certificate
> validation the way it is specified, and it works fine if the
> configuration is pushed to the clients, i.e. by MDM mechanisms.
> The spec leaves all degrees of freedom for server operators, and does
> not have any external dependencies, which is great for managed devices.
>
> But the moment you enter the BYOD world, users will get it wrong and
> there is no default way that is secure. Admins need to publish the
> information about CA and Server Name and need to rely on the user's
> ability to configure this correctly. And server operators have no way
> of verifying the configuration on client devices, unless they operate
> a rogue AP and log which users log in there, to give them a slap on
> the wrist.
>
> And the reason that Android for a long time hat "Do not validate" as a
> default setting for EAP-TTLS/EAP-PEAP is a symptom of the problem
> here: It is much more easy to just disable the security checks than it
> is to configure them correctly.
>
>> 2. I am not persuaded by the two arguments given in section 6.3 for
>> not reusing existing tunnelled methods.
>
> I'm open to discuss this with an open mind, the first draft is just
> the way that I imagined it, if there are reasons to do it another way,
> I'm not set on the current spec.
>
>> * Misconfiguration of server certificate validation parameters:
>> perhaps I am missing something, but in terms of the UI can't this be
>> solved by disabling the parameter options/fields if the EAP-FIDO
>> inner method is selected?
>
> Definitely this could be done. Maybe I'm just too pessimistic here to
> expect that UIs will get it wrong.
>
>> * Export of TLS material: I thought this TLS material is often
>> required by phase 2 of other tunnelled methods? E.g. for validating
>> cryptobindings.
>
> I don't know exactly what you mean by that?
> The current spec uses exported TLS material to generate the FIDO
> challenge, so the FIDO-Auth is bound to the TLS tunnel.
> One question would be if we can achieve the opoosite, that is: binding
> the exported MSPPE-Keys to the FIDO auth too, not just the TLS tunnel.
>
>>
>> I think there is an argument that defining EAP-FIDO as a method that
>> could be used within PEAP, TTLS and TEAP could drive adoption.
>>
>> 3. I have unsure about tying this specification so tightly to the
>> WebPKI. There is a tremendous convenience in using the WebPKI for
>> validating the server certificate, but the WebPKI is not a
>> well-defined concept. In practice, it is the bucket of CAs that my OS
>> vendor preinstalls on my device. The conflation of protocol design
>> (fixed in code) with operational choices taken by third-parties (so
>> subject to change) could lead to unexpected outcomes.
>
> I agree with your last sentence, we definitely introduce a third party
> that we cannot control (or even anticipate their actions).
> But the idea here is to build a system where we have a default way of
> configuration that is somewhat secure, and since we can't really
> establish a trusted EAP-FIDO CA that every device will trust,
> leveraging the WebPKI for that is the next best thing.
> And we already need the WebPKI for the FIDO registration process.
>
> Janfred
>
>
> _______________________________________________
> Emu mailing list
> Emu@ietf.org
> https://www.ietf.org/mailman/listinfo/emu