Re: [perpass] perpass: what next?
Stefan Winter <stefan.winter@restena.lu> Thu, 30 April 2015 07:21 UTC
Return-Path: <stefan.winter@restena.lu>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E4EFB1ACEAD for <perpass@ietfa.amsl.com>; Thu, 30 Apr 2015 00:21:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.909
X-Spam-Level:
X-Spam-Status: No, score=-1.909 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01, WEIRD_PORT=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kU2wERSQGoWU for <perpass@ietfa.amsl.com>; Thu, 30 Apr 2015 00:21:03 -0700 (PDT)
Received: from smtprelay.restena.lu (smtprelay.restena.lu [158.64.1.62]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 159951ACE9D for <perpass@ietf.org>; Thu, 30 Apr 2015 00:21:03 -0700 (PDT)
Received: from aragorn.restena.lu (aragorn.restena.lu [IPv6:2001:a18:1:8::155]) by smtprelay.restena.lu (Postfix) with ESMTPS id C0EFA43A47 for <perpass@ietf.org>; Thu, 30 Apr 2015 09:21:01 +0200 (CEST)
Message-ID: <5541D7DD.9010504@restena.lu>
Date: Thu, 30 Apr 2015 09:21:01 +0200
From: Stefan Winter <stefan.winter@restena.lu>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.6.0
MIME-Version: 1.0
To: perpass@ietf.org
References: <5530EEAB.5050601@cs.tcd.ie> <25042.1429279352@sandelman.ca>
In-Reply-To: <25042.1429279352@sandelman.ca>
OpenPGP: id=AD3091F3AB24E05F4F722C03C0DE6A358A39DC66; url=http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xC0DE6A358A39DC66
Content-Type: multipart/signed; micalg="pgp-sha512"; protocol="application/pgp-signature"; boundary="eTA7XL5PdqVwvb92Pp8rihK56XE56PMSh"
Archived-At: <http://mailarchive.ietf.org/arch/msg/perpass/4PdXfGLJ1dzdPjr1NGszdcD1VU0>
Subject: Re: [perpass] perpass: what next?
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 30 Apr 2015 07:21:05 -0000
Hi, > The biggest issue that I see in the perpass space has been persistent market > failures of some of our key technologies. Not entirely our problem, but each > time I see an industry "consortia" write a specification behind closed doors > that is more than a list of RFCs, I think we have failed. [..] > This is very much a case where there has been a significant gap between what > we specify, and what there are resources to actually implement *AND* > deploy. I have one example where we have left spec-writing to third parties and thus seem to neglect the "deploy" part of the value chain to some extent, and one which leads to security and privacy problems. My main focus of work is secure enterprise wireless networks. The medium is of course IEEE's "problem", but the secure authentication part brings in EAP, which is an IETF spec. EAP is a really complex protocol and needs server *and* client side config to deliver its security properties. Two short examples: a) the end-user device /can/ configure an anonymous outer identity for authentication routing purposes (concealing the local part of the username); but that's extra config. If neglected, the end-device leaks the actual username of the person trying to authenticate across the AAA infrastructure. b) the end-user device /can/ be configured to verify the X.509 certificate of its EAP server before it sends the user credentials; but the user needs to install CAs and whatnot. If neglected, the end-user device will send passwords to random third parties (and we have some anecdotal evidence suggesting the rate of such "don't care" configs is >>50%). EAP asks much from a server operator and the end user trying to configure it. Assuming that everybody will just get it right is delusional. A variety of (non-interoperable) third-party approaches to automated/better/more convenient EAP configuration has blossomed, creating a mess of config formats / sane defaults / insane defaults landscape. I've tried to bring work to the IETF to create a config file format for EAP; the basic idea being that if IETF created EAP, we should also create a means to communicate EAP *configuration*. I didn't find a spot-on working group to take this to and presented it to opsarea / opsawg instead. There was only a rather mild interest in the draft, it hasn't led to much review activity or a motion to adopt it as a WG draft at this point. I find that a bit disappointing. I'm considering to go AD shopping to publish this in the ISE stream for the lack of a better path to publication. But really... this is privacy (and security!) relevant work, it's about an IETF technology, it is about a technology which is in active use out there, and it obviously is a piece of work that needs standardisation because there are so many non-interoperable approaches. So... why does such an item gain so little traction? I don't know the answer; if anyone does... BTW, the current draft is here; as it happens, it expires today, and honestly I'm wondering if it's worth refreshing it: https://tools.ietf.org/html/draft-winter-opsawg-eap-metadata-01 Greetings, Stefan Winter -- Stefan WINTER Ingenieur de Recherche Fondation RESTENA - Réseau Téléinformatique de l'Education Nationale et de la Recherche 6, rue Richard Coudenhove-Kalergi L-1359 Luxembourg Tel: +352 424409 1 Fax: +352 422473 PGP key updated to 4096 Bit RSA - I will encrypt all mails if the recipient's key is known to me http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xC0DE6A358A39DC66
- Re: [perpass] perpass: what next? John Levine
- [perpass] perpass: what next? Stephen Farrell
- Re: [perpass] perpass: what next? Michael Richardson
- Re: [perpass] perpass: what next? Mike Liebhold
- Re: [perpass] perpass: what next? Watson Ladd
- Re: [perpass] perpass: what next? Stephen Farrell
- Re: [perpass] perpass: what next? Tim Bray
- Re: [perpass] perpass: what next? Adam Caudill
- Re: [perpass] perpass: what next? Paul Wouters
- Re: [perpass] perpass: what next? carlo von lynX
- Re: [perpass] perpass: what next? Mike Liebhold
- Re: [perpass] perpass: what next? Watson Ladd
- Re: [perpass] perpass: what next? carlo von lynX
- Re: [perpass] perpass: what next? Joseph Lorenzo Hall
- Re: [perpass] perpass: what next? Christian Huitema
- Re: [perpass] perpass: what next? Stefan Winter
- Re: [perpass] perpass: what next? Michael Richardson
- Re: [perpass] perpass: what next? Ted Lemon
- Re: [perpass] perpass: what next? Mike Liebhold
- Re: [perpass] perpass: what next? Stefan Winter
- Re: [perpass] perpass: what next? Stefan Winter
- Re: [perpass] perpass: what next? Stephen Farrell
- Re: [perpass] perpass: what next? Kathleen Moriarty