Re: [radext] CUI comments in "deprecating insecure transports"

Arran Cudbard-Bell <a.cudbardb@freeradius.org> Wed, 26 July 2023 19:15 UTC

Return-Path: <a.cudbardb@freeradius.org>
X-Original-To: radext@ietfa.amsl.com
Delivered-To: radext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7DF03C16B5A1 for <radext@ietfa.amsl.com>; Wed, 26 Jul 2023 12:15:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.909
X-Spam-Level:
X-Spam-Status: No, score=-1.909 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eRXmym8WkMHh for <radext@ietfa.amsl.com>; Wed, 26 Jul 2023 12:15:07 -0700 (PDT)
Received: from mail.networkradius.com (mail.networkradius.com [62.210.147.122]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D7C3CC1782D5 for <radext@ietf.org>; Wed, 26 Jul 2023 12:15:06 -0700 (PDT)
Received: from smtpclient.apple (unknown [75.104.106.170]) by mail.networkradius.com (Postfix) with ESMTPSA id 3B243268; Wed, 26 Jul 2023 19:15:01 +0000 (UTC)
Authentication-Results: NetworkRADIUS; dmarc=fail (p=reject dis=none) header.from=freeradius.org
Content-Type: multipart/signed; boundary="Apple-Mail=_6552885D-EE7B-4CEC-8D75-CCCF5746C9EE"; protocol="application/pgp-signature"; micalg="pgp-sha256"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3731.700.6\))
From: Arran Cudbard-Bell <a.cudbardb@freeradius.org>
In-Reply-To: <c06f35b0-f6bb-4ed0-bea4-bb3ec348f487@app.fastmail.com>
Date: Wed, 26 Jul 2023 12:14:44 -0700
Cc: radext@ietf.org
Message-Id: <9175A7B7-F3F5-4C13-90C9-9311A8C721C8@freeradius.org>
References: <BC530A34-D348-44D0-886E-DB1ECF3A5010@deployingradius.com> <06c301d9bfc0$e07154d0$a153fe70$@gmail.com> <5F5C2E17-2061-4FFC-942A-9C4ED861EE5F@deployingradius.com> <a0df55dd-01e3-44ee-bc18-183d7057390c@app.fastmail.com> <A0D7BF87-C696-4C52-A0B7-E88AE5274D20@deployingradius.com> <c06f35b0-f6bb-4ed0-bea4-bb3ec348f487@app.fastmail.com>
To: Alexander Clouter <alex+ietf@coremem.com>
X-Mailer: Apple Mail (2.3731.700.6)
Archived-At: <https://mailarchive.ietf.org/arch/msg/radext/BskJ6Bl8n3AkQHeOP6BzAHBuoIA>
Subject: Re: [radext] CUI comments in "deprecating insecure transports"
X-BeenThere: radext@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: RADIUS EXTensions working group discussion list <radext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/radext>, <mailto:radext-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/radext/>
List-Post: <mailto:radext@ietf.org>
List-Help: <mailto:radext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/radext>, <mailto:radext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 26 Jul 2023 19:15:11 -0000


> On Jul 26, 2023, at 11:29, Alexander Clouter <alex+ietf@coremem.com> wrote:
> 
> On Wed, 26 Jul 2023, at 17:20, Alan DeKok wrote:
>>> They can always block based on the TLS session resumption materials.
>> 
>> Is the session ticket sent in the clear?  I'm not sure how a visited
>> network would block based on the ticket.
> 
> SessionTicket is there in the clear of the ClientHello, right? You cannot read the opaque part, but it is a stable identifier for about 24 hours.

Largely true for TLS < 1.3, but with TLS 1.3 all bets are off.

A new session ticket can be sent during session resumption (I think FreeRADIUS does this by default, at least in v4), and multiple session tickets can be issued per authentication attempt.  RFC8446 also describes single use tickets as an anti-replay defence.  In order to use this as a reliable cross-session identifier you'd need to be able to observe the session tickets being sent by the server, which you can't do with TLS 1.3.

RFC8446 is silent on what TLS clients should do when receiving new session tickets, but you'd hope any reasonable implementation would discard tickets from previous authentication attempts.

EAP-SIM/EAP-AKA/EAP-AKA' can all mutate or regenerate their Pseudonym and Fast-Reauth identities on every authentication attempt whether it's resumed or not, but the new values are always sent within AT_ENCR_DATA which is opaque to eavesdroppers, and so defeats tracking.

Anyway, just to make the point that privacy won't automatically be compromised by TLS or AKA based EAP methods when performing session-resumption.

-Arran