Re: [radext] FW: New Version Notification fordraft-xue-radext-key-management-01.txt

" gaobo " <gaobo@sttri.com.cn> Fri, 12 July 2013 14:17 UTC

Return-Path: <gaobo@sttri.com.cn>
X-Original-To: radext@ietfa.amsl.com
Delivered-To: radext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B0A9821F9A1B for <radext@ietfa.amsl.com>; Fri, 12 Jul 2013 07:17:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.494
X-Spam-Level:
X-Spam-Status: No, score=0.494 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FROM_EXCESS_BASE64=1.456, HTML_FONT_FACE_BAD=0.884, HTML_MESSAGE=0.001, J_CHICKENPOX_46=0.6, SARE_SUB_ENC_UTF8=0.152]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qHyCdvqq2pNy for <radext@ietfa.amsl.com>; Fri, 12 Jul 2013 07:17:44 -0700 (PDT)
Received: from corp.21cn.com (corp.forptr.21cn.com [121.14.129.40]) by ietfa.amsl.com (Postfix) with ESMTP id A643A21F9BEB for <radext@ietf.org>; Fri, 12 Jul 2013 07:17:41 -0700 (PDT)
HMM_SOURCE_IP: 10.27.101.9:38719.1200190524
HMM_ATTACHE_NUM: 0000
HMM_SOURCE_TYPE: SMTP
Received: from gaobo-nb (unknown [10.27.101.9]) by corp.21cn.com (HERMES) with ESMTP id C63E31A481A; Fri, 12 Jul 2013 22:17:33 +0800 (CST)
Received: from gaobo-nb ([114.91.154.127]) by 21CN-entas9(MEDUSA 10.27.101.9) with ESMTP id 1373638651.22773 for xueli@huawei.com ; Fri Jul 12 22:17:39 2013
0/X-Total-Score: 0:
2/X-Total-Score: -120:
3/X-Brightmail-Tracker: AAAAAA==
X-FILTER-SCORE: to=<9996868d8a6189968298868a4f84908e94958687828f4f988a8f9586936193869495868f824f8d96938285869995618a8695874f909388>, score=<1373638659AgAXrg9UYQdKAAAAAXAArAMa6lM+wHbt4aaaaa6aalaa>
X-REAL-FROM: gaobo@sttri.com.cn
X-Receive-IP: 114.91.154.127 gaobo@sttri.com.cn
Date: Fri, 12 Jul 2013 22:17:35 +0800
From: gaobo <gaobo@sttri.com.cn>
To: Xueli <xueli@huawei.com>, Stefan Winter <stefan.winter@restena.lu>, "radext@ietf.org" <radext@ietf.org>
References: <01FE63842C181246BBE4CF183BD159B448525BE5@NKGEML512-MBS.china.huawei.com>, <51DFA493.5000005@restena.lu>
Message-ID: <201307122217319377026@sttri.com.cn>
X-mailer: Foxmail 6, 15, 201, 21 [cn]
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="=====003_Dragon573820155088_====="
X-Mailman-Approved-At: Sun, 14 Jul 2013 13:19:00 -0700
Subject: Re: [radext] FW: New Version Notification fordraft-xue-radext-key-management-01.txt
X-BeenThere: radext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: RADIUS EXTensions working group discussion list <radext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/radext>, <mailto:radext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/radext>
List-Post: <mailto:radext@ietf.org>
List-Help: <mailto:radext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/radext>, <mailto:radext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 13 Jul 2013 01:12:01 -0000

   I supplement my view as follows:
For the traditional operators, WLAN network is stacked in the existing broadband network. SGW is responsible for the broadband user authentication, address assignment, user management and other functions. In the WLAN DHCP+Portal user authentication, SGW is responsible for the allocation of WLAN address, user authentication and user management, and AC is only responsible for radio resource management and AP management. For EAP authentication, AC as the authentication point, SGW acts as Radius Proxy. At the same time, SGW is responsible for the user EAP address allocation and user management. This configuration enables the network complex, and maintenance of network management becomes complex. If the SGW acts as EAP authentication, the network becomes simple, but we need to solve the PMK exchange between SGW and AC.
By the way, SGW acts as the EAP authentication, for the operators more than one option.
Thanks!
   
   Bo Gao
   China Telecom
   No. 1835, South Pudong Road
   Shanghai  200122
   China

 



发件人: Xueli 
发送时间: 2013-07-12  18:17:32 
收件人: Stefan Winter; radext@ietf.org 
抄送: gaobo 
主题: RE: [radext] FW: New Version Notification fordraft-xue-radext-key-management-01.txt 
 
Hi, Stefan
Thanks for your comments..
And please see my reply in line.
BR
Li 
>-----Original Message-----
>From: radext-bounces@ietf.org [mailto:radext-bounces@ietf.org] On 
>Behalf Of Stefan Winter
>Sent: Friday, July 12, 2013 2:39 PM
>To: radext@ietf.org
>Subject: Re: [radext] FW: New Version Notification for 
>draft-xue-radext-key-management-01.txt
>
>Hello,
>
>> There is a new version for RADIUS Extensions for Key Management in 
>> WLAN
>network.
>>
>>
>> It is a general case that authenticator is deployed on gateway 
>> instead of AC. So In this scenario, the encryption/decryption node  
>> can't obtain Pairwise Master Key (PMK) information during Extensible 
>> Authentication Protocol (EAP) procedure, it is not sufficient to 
>> achieve traffic
>encryption/decryption requirement in Wireless Local Area Network (WLAN) 
>network.
>>
>> This document analyzes the requirement and issue for key management 
>> that has arisen so far during authentication process in WLAN network.
>> Meanwhile, the control messages for key management are defined.
>>
>> This drat is updated with China-telecom as co-author.
>> Your comments are appreciated.
>
>When you submitted -00, you got substantial criticism as per the use 
>cases for this document; the approach taken to offload the 
>authenticator function to the SGW was seen as a rather odd move.
>Now, in -01, you don't really react to this; the only statement in that 
>direction I see is that you repeatedly make the assertion that "It is a 
>general case in operators networks".
>I simply doubt that this is generally true; merely making an unbacked 
>assertion that it is so doesn't make it true.
[xueli] I appreciated the comments to scenario to offload the authenticator function to SGW.
There are two reasons, which I clarified the scenario in the document version 01 as :
   "In EAP framework, SGW could act as the Authenticator instead of AC
   because of several reasons.  First of all, a powerful AC that
   aggregates the Authenticator function is not a appreciated choice for
   some operators. There are large numbers of AC devices in the operators
   existing network.  The Authentication Server (AS) will overload the communication with large
   numbers of AC devices if ACs acts as the Authenticator.  On the other
   hand, SGW MUST support the RADIUS proxy function when AC acts as the
   Authenticator in EAP framework.  In this scenario, both SGW and AC
   should be responsible for authentication procedure.  For operators,
   it is cost in large-scale upgraded deployment."
Meanwhile, this requirement is also mentioned in the draft " http://tools.ietf.org/html/draft-cao-capwap-eap-00"
It is described as
"AR acts as authenticator in the EAP framework.  After authentication, the AR
   receives the EAP keying message for the session.  But AC is supposed
   to delieve these keying messages to the AP, and AR has no standard
   interface to ship them to the AP or the AC.  This is unacceptable in
   the scenario of EAP-based auto-authentication.
" AR is the access router. 
>I also can't help but notice that many of your normative references are 
>old and obsolete.
>* For key exchange, you reference an unapproved draft of IEEE-802.11i!
>All of the features from that draft are meanwhile part of IEEE
>802.11-2012 (and I hope you don't implement an old draft version in 
>your products!).
>* The next reference is the IEEE 802.1X version from 2001 - it has two 
>successors meanwhile.
>* RFC3576 is obsoleted by RFC5176. You mention both in the normative 
>references; the main text uses the Authenticator field from 3576, but 
>the type definition from 5176. That's probably an oversight; the 
>calculation of Authenticator hasn't changed between the two revs.
[xueli] thanks a lot. 
802.11i is already approved in 2004. I am not sure why you say it is an unapproved draft.
For other references, I will update. 
>Your security considerations are very inadequate. You simply state that 
>the link between SGW and AC must be secure. From my (skimming) 
>understanding of the draft, these two entities are not typically 
>located inside the same premises, right? If they aren't, simply 
>assuming securtiy on the link blindly is an extremely bad idea. IMHO, 
>not protecting the keys and sending them in the clear is a no-go.
[xueli] I don't think I mentioned that the link between AC and SGW is secure. 
I have already recognized the key transported in the link must be encrypted. 
>
>In the same section, you state roughly "Oh, if you need security, use 
>IPSec!" - which is too superficial a statement to be useful; you should 
>at least discuss how the IPSec endpoints are supposed to negotiate 
>IPSec keying material to be able to communicate confidentially.
[xueli] I totally agree with you and this part of work will be presented in the next version. 
>
>BTW, if I recall correctly your draft was motivated by the "fact" (or 
>so you presented it) that changing the AC to take over the 
>authenticator role is too costly in terms of implementation or 
>computing power. Now in security considerations, you generously 
>recommend to implement the entire IPSec stack on the AC. I would argue 
>that it's easier to implement the authenticator function of IEEE 802.1X than it is to implement IPSec.
[xueli] I see. I just give a possible solution to address the security problem. I agree that there could be more optimal solutions. 
I would like to mention during the meeting and collect comments from the security guys. Is that fair enough?
>
>The same section also suggests MD5 encryption/decryption. Here I am 
>completely lost. The KoA and KoA ACK/NAK messages are RADIUS packets, 
>right? As such they are always making use of the MD5 shared secret for 
>integrity checks; if you want to protect the 802.11 keying material 
>then you could use encrypted attributes with the same shared secret 
>(that's the way how User-Password gets encrypted). With little to no 
>additional implementation cost. If that's what you want - don't put a 
>half-sentence into security considerations. *Write in the spec itself 
>that the attribute is to be encrypted*.
>
[xueli] Yes, that is what I want to do.. I will clarify it.
>BTW, even if you do write that in the spec, you'd still get a beating 
>for suggesting MD5 RADIUS crypto in 2013. This encryption method is not 
>contemporary.
[xueli] Thank you for your advice. 
Security is important part of this work. 
It is my plan to go into technique details and give a more concrete security solution by the next IETF meeting. 
>Greetings,
>
>Stefan Winter
>
>--
>Stefan WINTER
>Ingenieur de Recherche
>Fondation RESTENA - Réseau Téléinformatique de l'Education Nationale et 
>de la Recherche 6, rue Richard Coudenhove-Kalergi
>L-1359 Luxembourg
>
>Tel: +352 424409 1
>Fax: +352 422473