Re: [radext] CUI comments in "deprecating insecure transports"

Alexander Clouter <alex+ietf@coremem.com> Wed, 26 July 2023 18:55 UTC

Return-Path: <alex+ietf@coremem.com>
X-Original-To: radext@ietfa.amsl.com
Delivered-To: radext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 89DB1C16950E for <radext@ietfa.amsl.com>; Wed, 26 Jul 2023 11:55:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.805
X-Spam-Level:
X-Spam-Status: No, score=-2.805 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=coremem.com header.b="Hf281Lnd"; dkim=pass (2048-bit key) header.d=messagingengine.com header.b="FQ8ICsVF"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id U2mD2f0gTUIz for <radext@ietfa.amsl.com>; Wed, 26 Jul 2023 11:55:30 -0700 (PDT)
Received: from out2-smtp.messagingengine.com (out2-smtp.messagingengine.com [66.111.4.26]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BC8AEC1E8BB3 for <radext@ietf.org>; Wed, 26 Jul 2023 11:55:22 -0700 (PDT)
Received: from compute5.internal (compute5.nyi.internal [10.202.2.45]) by mailout.nyi.internal (Postfix) with ESMTP id 1AD845C0101; Wed, 26 Jul 2023 14:55:22 -0400 (EDT)
Received: from imap46 ([10.202.2.96]) by compute5.internal (MEProxy); Wed, 26 Jul 2023 14:55:22 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=coremem.com; h= cc:cc:content-type:content-type:date:date:from:from:in-reply-to :in-reply-to:message-id:mime-version:references:reply-to:sender :subject:subject:to:to; s=fm2; t=1690397722; x=1690484122; bh=Er XYaG9babo46PiMuuLnp4XbxqNGQ3BtgsPKm5pMqoo=; b=Hf281Lndjf/xAwRlQn A0PHj8ZhnNKCieGEHsvBlRgxDyIc97gGXHNTkS8uY5urAsgFZXefMgFzOuWj4WUi t56/E0AXdnHiHX/qNtjJRLCSWtTIqteczmOyStFGhLEVTLds54hO9HjmsaSgzHjr qs8Vlzl1wyK4t0fLgnGWrG/e1KXVMMqfKmS5vtZaQOHNtmmxhPksU5HjmBUjBaJH JBI4aNSy7H0qlOJ7djGbzHerMEWeQC+dTT0gkIh+h0D73+jYPV1oBndUMNMM2g4h icxqeQEFTyAgISneUmMdgWxqPUY7cRznZvfW9ftrUuTuIgbCD0kqxV9t62ixpT1p pWRg==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:cc:content-type:content-type:date:date :feedback-id:feedback-id:from:from:in-reply-to:in-reply-to :message-id:mime-version:references:reply-to:sender:subject :subject:to:to:x-me-proxy:x-me-proxy:x-me-sender:x-me-sender :x-sasl-enc; s=fm3; t=1690397722; x=1690484122; bh=ErXYaG9babo46 PiMuuLnp4XbxqNGQ3BtgsPKm5pMqoo=; b=FQ8ICsVFBOf4lsYmMf4UcaUTxaaNH 4IQyqvEeuegFmP3RbqLTgrXC0lknazsVVrHZAL2Q2ywnCqdUs7bYGbir2tmkou0V mpy/ZKxX7oNfFidvO2gVCCP9iN0sPz09MW8abB3bXG+2FaODE6kTDdomKNZrp39G 0vOU0D/yvjaVf797dgrBGhna3pXPGfuYBTpoSXQozAbv6klRnkSqZV7Dl/YOCChc M3OdibW/HmaoI7vjKR16FCsFFCyj6Yma0olrujaAztzqoaG3GYTtRZG/29Q3hCLl SJxauXzODnZJ1d1/BMfst5V1xvan+JrPUx4apUbW22GWvARZZQ3FSxYNw==
X-ME-Sender: <xms:GWzBZGIZw3_jUCFeq7LPMtbreh09Kx2BuTJdgKcPCvbBGhGlC5KhUQ> <xme:GWzBZOL2LVlGVigmZQqDUQCQ4ZAAMokolQTRjQsj8hsAx4PfKdsnjGhOqR_tLJ15J VKGlIaU8HTru2WY5w>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedviedriedvgdduvdekucetufdoteggodetrfdotf fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen uceurghilhhouhhtmecufedttdenucesvcftvggtihhpihgvnhhtshculddquddttddmne cujfgurhepofgfggfkjghffffhvfevufgtsehttdertderredtnecuhfhrohhmpedftehl vgigrghnuggvrhcuvehlohhuthgvrhdfuceorghlvgigodhivghtfhestghorhgvmhgvmh drtghomheqnecuggftrfgrthhtvghrnhepveegheejueevkeevvdfhheeuudefheegudeu tdelleeiteehgeffieettddugfdunecuvehluhhsthgvrhfuihiivgeptdenucfrrghrrg hmpehmrghilhhfrhhomheprghlvgigodhivghtfhestghorhgvmhgvmhdrtghomh
X-ME-Proxy: <xmx:GWzBZGuCGdCXtfvSmJw3xGiPNQJkjnhCQTjulOwn_nG6OdAy7FfVbg> <xmx:GWzBZLYVkM9_e1q4gwOaHsRDEkU3W7n8Whb7CFaDf34HGHvHSeDmhA> <xmx:GWzBZNaG5uef9Eut7WrpRo1vv0nQvTTMlcILwOMtxzxrTBQPAND9zg> <xmx:GmzBZMlYLza5ZdkIzDd1AR9UbdIM_K_73C2BLtjwbEtuXu2HHWioOQ>
Feedback-ID: ie3614602:Fastmail
Received: by mailuser.nyi.internal (Postfix, from userid 501) id D550F2A20085; Wed, 26 Jul 2023 14:55:21 -0400 (EDT)
X-Mailer: MessagingEngine.com Webmail Interface
User-Agent: Cyrus-JMAP/3.9.0-alpha0-592-ga9d4a09b4b-fm-defalarms-20230725.001-ga9d4a09b
Mime-Version: 1.0
Message-Id: <6e9100c1-9be2-4526-9283-e3e5f21c38e3@app.fastmail.com>
In-Reply-To: <3752E2C9-D184-4C0F-9474-6FAE1204C107@freeradius.org>
References: <06c301d9bfc0$e07154d0$a153fe70$@gmail.com> <5390176A-A8D1-40E5-AA3B-9008328650F9@gmail.com> <0D326753-2295-4FA9-B14E-06FE55C9AFB4@deployingradius.com> <61776FFB-7C8B-4234-8B1F-C4F33150106D@deployingradius.com> <3752E2C9-D184-4C0F-9474-6FAE1204C107@freeradius.org>
Date: Wed, 26 Jul 2023 19:55:01 +0100
From: Alexander Clouter <alex+ietf@coremem.com>
To: Arran Cudbard-Bell <a.cudbardb=40freeradius.org@dmarc.ietf.org>, Alan DeKok <aland@deployingradius.com>
Cc: Margaret Cullen <mrcullen42@gmail.com>, "josh.howlett" <josh.howlett@gmail.com>, radext@ietf.org
Content-Type: text/plain
Archived-At: <https://mailarchive.ietf.org/arch/msg/radext/cWmCvxXYp5F5iUqXpf9AW9Mh1eM>
Subject: Re: [radext] CUI comments in "deprecating insecure transports"
X-BeenThere: radext@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: RADIUS EXTensions working group discussion list <radext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/radext>, <mailto:radext-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/radext/>
List-Post: <mailto:radext@ietf.org>
List-Help: <mailto:radext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/radext>, <mailto:radext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 26 Jul 2023 18:55:35 -0000

On Wed, 26 Jul 2023, at 19:01, Arran Cudbard-Bell wrote:
> Regarding session tickets for TLS 1.3 there's a ticket_nonce (and the 
> blob itself), but I'm fairly sure it's not sent in the clear by the 
> server?
>
>    - All handshake messages after the ServerHello are now encrypted.
> The newly introduced EncryptedExtensions message allows various
> extensions previously sent in the clear in the ServerHello to also
> enjoy confidentiality protection.
>
> SessionTickets and SessionIDs were sent in the clear with TLS <= 1.2.

As a visited site I am not looking to block the home sites RADIUS server (I can do that on the realm) I am looking to block the client.

The contents of the 'pre_shared_key' extension in TLSv1.3 of the ClientHello is what I would block on. Any 'opaque' bit is there, sure I cannot decode but I do not care as I would be treating it as a stable 

Once I see abuse I would grab the value seen when that user last authenticated and block on that.

Of course the server could punt a new ticket each time to the client effectively making them single use; as long as it has the smarts to know to burn previous used tokens but that can be an exotic deployment for some sites.

The workaround for the workaround is to then forcible disconnect the user and capture the currently in use ticket and continue blocking based on that.

That said, there is likely to be a stable mapping of Calling-Station-Id to this ticket, making it questionable if this effort would even be worth it when a ticket is valid for a short period and the MAC address is likely stable for a given network across sessions.

Cheers