Re: [Emu] Issue 47 Certificate identity checks

Tim Cappalli <Tim.Cappalli@microsoft.com> Mon, 12 April 2021 18:16 UTC

Return-Path: <Tim.Cappalli@microsoft.com>
X-Original-To: emu@ietfa.amsl.com
Delivered-To: emu@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8110A3A10B0 for <emu@ietfa.amsl.com>; Mon, 12 Apr 2021 11:16:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level:
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Gv0FMsoqroc6 for <emu@ietfa.amsl.com>; Mon, 12 Apr 2021 11:16:00 -0700 (PDT)
Received: from NAM06-BL2-obe.outbound.protection.outlook.com (mail-eopbgr650103.outbound.protection.outlook.com [40.107.65.103]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C10803A10AA for <emu@ietf.org>; Mon, 12 Apr 2021 11:15:59 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=LAAV1upL2dn0C5SKvaAc9Kswgxrq//CvS+8B7s1qF/NPqS6+LbxDMw3Y0NGLNKq2jPL0dNuKqP0Fjj4BFPRk2DHRbV3kk2LkqVzkasDB54idKVzZRJB3znrLYsZs+w2xvosIDesLoj3qcJYkWrlVAdkMmmDMG2CMUIsIn7lCkiSe9rDzFUUWOs1KDyctziWSn2L4qWZzxW5yfXL6QRawDUIZDyq098WvEwItvCjssQAS/6j3YJERqP6XUqdyzUCtwCtp5rIBsbv/w51tO0wms9UvLgM6EHPq431KkiHdDUaDcIUAHg7wZMznF/xxdIxT16xvFmjma+VeXz2e8KEyow==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=NHS6EVHqbHfAcRjtjiEmPsU0O51hVvTWQHDIbbKkoK0=; b=nQffgcJaW+Ps9G0Raim3f9R+XH57FzlN83OqONhd7bOslzfzpcCijkmSLAwnwZ+8LmHOZieoJ1zSVDI1fLYuda0EU/T577DiqMeILWrEGlKo3zyX9Wija8jFi/KQ44XvEdLb2Eiwo6nbVftSwgoQ2a79DwWElIk5VzWg9XC8XN69FIaaRSjHMJLaAwXeyOH0wUCpRRYAAQf6/KrMV5VOaUc24hDwzAwCcYvLNLRd3c0vydpBCjXarXtBIKbqV22WPuAiU2RJKmKwkKp7mgF6l3i937U+JDbYq9Wk1/ScZW3Gg8LFW5B5QJRwa49hoNskKKw2RTFCC4cRWSAtriEBGw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=microsoft.com; dmarc=pass action=none header.from=microsoft.com; dkim=pass header.d=microsoft.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=NHS6EVHqbHfAcRjtjiEmPsU0O51hVvTWQHDIbbKkoK0=; b=XltZiIRzclKnthdz8ZltNMfStzJLFcuXYKeRH6ceejDYdDrkXRd+AOe2PVVSb9C1VLl7PJYCZ28pwL+nhdw7TiYMSv+GSioGfQ7oEk2GCvdKhNGGLVfqE5+mOSbJwFQ8oTe/8EXBk/IPXEiJl4sntma0Wa+qtHPggD2XO5dQJKM=
Received: from SJ0PR00MB1038.namprd00.prod.outlook.com (2603:10b6:a03:2aa::7) by BY5PR00MB0806.namprd00.prod.outlook.com (2603:10b6:a03:1dc::8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4066.0; Mon, 12 Apr 2021 18:15:50 +0000
Received: from SJ0PR00MB1038.namprd00.prod.outlook.com ([fe80::94ab:679:82f3:c1fe]) by SJ0PR00MB1038.namprd00.prod.outlook.com ([fe80::94ab:679:82f3:c1fe%4]) with mapi id 15.20.4071.000; Mon, 12 Apr 2021 18:15:50 +0000
From: Tim Cappalli <Tim.Cappalli@microsoft.com>
To: "lear=40cisco.com@dmarc.ietf.org" <lear=40cisco.com@dmarc.ietf.org>, "aland@deployingradius.com" <aland@deployingradius.com>
CC: "emu@ietf.org" <emu@ietf.org>
Thread-Topic: [Emu] Issue 47 Certificate identity checks
Thread-Index: AQHXL0rNRD32n4jkC0uxRZYFBIRVJKqw1ZGAgAA754CAABmmgIAAA7yAgAAA5lQ=
Date: Mon, 12 Apr 2021 18:15:50 +0000
Message-ID: <SJ0PR00MB10385E0212FE3B777BD634BC95709@SJ0PR00MB1038.namprd00.prod.outlook.com>
References: <CAOgPGoArm2RdEN4V-L9XEUvOeG0Vs+58Zj_p3Y2yRY0aYsVV_A@mail.gmail.com> <950CF2A7-2C9A-4BAE-8EA2-0FC2DE3C740C@deployingradius.com> <CAOgPGoBm7pas9i6n-y8g1yqP+ea68=_8DueHqywDQLBcMGEJ9g@mail.gmail.com> <2DE1DAF6-FA19-4F57-AF5C-BA6A39869B0C@deployingradius.com>, <2A01F606-4B26-4B7D-BEA1-3BEF89A153DB@cisco.com>
In-Reply-To: <2A01F606-4B26-4B7D-BEA1-3BEF89A153DB@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Enabled=True; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SiteId=72f988bf-86f1-41af-91ab-2d7cd011db47; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SetDate=2021-04-12T18:15:49.540Z; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Name=General; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ContentBits=0; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Method=Standard;
authentication-results: dmarc.ietf.org; dkim=none (message not signed) header.d=none;dmarc.ietf.org; dmarc=none action=none header.from=microsoft.com;
x-originating-ip: [108.7.218.223]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: e494ce37-733f-44d0-b566-08d8fddf00c6
x-ms-traffictypediagnostic: BY5PR00MB0806:
x-microsoft-antispam-prvs: <BY5PR00MB08067577E688747BC51F97DD95709@BY5PR00MB0806.namprd00.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:SJ0PR00MB1038.namprd00.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(366004)(71200400001)(316002)(19627405001)(53546011)(10290500003)(83380400001)(2906002)(9686003)(33656002)(478600001)(86362001)(26005)(110136005)(8936002)(82960400001)(38100700002)(76116006)(66476007)(82950400001)(64756008)(8676002)(66946007)(66446008)(66556008)(52536014)(6506007)(5660300002)(7696005)(55016002)(8990500004)(4326008)(186003); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_SJ0PR00MB10385E0212FE3B777BD634BC95709SJ0PR00MB1038namp_"
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: SJ0PR00MB1038.namprd00.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: e494ce37-733f-44d0-b566-08d8fddf00c6
X-MS-Exchange-CrossTenant-originalarrivaltime: 12 Apr 2021 18:15:50.4396 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: DnwfPzc0z7T+K8Y3Av7QcqsL11utrVxDVT7Qqzh4t1QMAKW2/7oXXYWqaOfkMO0a+OM/Op+XdzRz3HXmLCo45w==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY5PR00MB0806
Archived-At: <https://mailarchive.ietf.org/arch/msg/emu/hmR2rmFrbWmteEDEGEgH8fBZoeo>
Subject: Re: [Emu] Issue 47 Certificate identity checks
X-BeenThere: emu@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "EAP Methods Update \(EMU\)" <emu.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/emu>, <mailto:emu-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/emu/>
List-Post: <mailto:emu@ietf.org>
List-Help: <mailto:emu-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/emu>, <mailto:emu-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 12 Apr 2021 18:16:05 -0000

Pinning the server certificate is unrealistic. A properly configured supplicant with a trusted private root and subject match is adequate and allows good security hygiene with server cert rotation.

I believe the id-kp-eapOverLAN EKU should be a MUST. Public CAs should not be issuing server certificates for EAP in the first place. I feel like this debate comes up every few years. Any public CA-signed TLS web server certificate that is used for EAP can be requested to be revoked for misuse.

If an organization cannot ensure proper configuration of a supplicant, they should not be using EAP.

tim
________________________________
From: Emu <emu-bounces@ietf.org> on behalf of Eliot Lear <lear=40cisco.com@dmarc.ietf.org>
Sent: Monday, April 12, 2021 14:07
To: Alan DeKok <aland@deployingradius.com>
Cc: EMU WG <emu@ietf.org>
Subject: Re: [Emu] Issue 47 Certificate identity checks



> On 12 Apr 2021, at 19:54, Alan DeKok <aland@deployingradius.com> wrote:
>
> On Apr 12, 2021, at 12:22 PM, Joseph Salowey <joe@salowey.net> wrote:
>> [Joe]  without some sort of name matching using certs from a public CA is unwise.
>
>  The only other alternative is to "pin" the server cert.  Many systems support this.  Perhaps mentioning [Trust On] First Use (TOFU) would help here.
>

That won’t work for headless wireless.

Yes, we have kicked that hornet’s nest.  I hope everyone is wearing appropriate netting.

Eliot