Re: [radext] Review of draft-winter-radext-populating-eapidentity-01

Stefan Winter <stefan.winter@restena.lu> Tue, 21 July 2015 19:34 UTC

Return-Path: <stefan.winter@restena.lu>
X-Original-To: radext@ietfa.amsl.com
Delivered-To: radext@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E271D1A883F for <radext@ietfa.amsl.com>; Tue, 21 Jul 2015 12:34:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.909
X-Spam-Level:
X-Spam-Status: No, score=-1.909 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5xdPwHuLHvAd for <radext@ietfa.amsl.com>; Tue, 21 Jul 2015 12:34:57 -0700 (PDT)
Received: from smtp.restena.lu (legolas.restena.lu [IPv6:2001:a18:1::34]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 65ADA1B2AA4 for <radext@ietf.org>; Tue, 21 Jul 2015 12:34:57 -0700 (PDT)
Received: from viper.local (unknown [158.64.15.195]) by smtp.restena.lu (Postfix) with ESMTPSA id 148DCBB73C for <radext@ietf.org>; Tue, 21 Jul 2015 21:34:56 +0200 (CEST)
To: radext@ietf.org
References: <11856_1427820628_551AD054_11856_4576_1_6B7134B31289DC4FAF731D844122B36EEF6888@PEXCVZYM13.corporate.adroot.infra.ftgroup> <tsllhid84gm.fsf@mit.edu> <BLU181-W6B49664DD504DDAF5CC9F93F40@phx.gbl> <30317_1427824394_551ADF0A_30317_14370_1_6B7134B31289DC4FAF731D844122B36EEF74CD@PEXCVZYM13.corporate.adroot.infra.ftgroup> <BLU181-W86B005505E6468F75180593F40@phx.gbl> <tsl4mp182ku.fsf@mit.edu> <BA6CBD09-148F-4F8C-9B81-8A4A88B64287@deployingradius.com> <BLU406-EAS343D630A63D85F897C0EC8793F40@phx.gbl> <14078_1427880628_551BBAB4_14078_5155_1_6B7134B31289DC4FAF731D844122B36EF0B91F@PEXCVZYM13.corporate.adroot.infra.ftgroup> <190D3355-0BB7-48D5-BEA2-55773E9BD785@deployingradius.com> <24001_1437383629_55ACBBCD_24001_3716_1_6B7134B31289DC4FAF731D844122B36E01CC9ED3@OPEXCLILM43.corporate.adroot.infra.ftgroup> <BLU181-W94C6FC52C2E3CD666F631A93850@phx.gbl>
From: Stefan Winter <stefan.winter@restena.lu>
Openpgp: id=AD3091F3AB24E05F4F722C03C0DE6A358A39DC66
X-Enigmail-Draft-Status: N1111
Message-ID: <55AE9EDF.9000105@restena.lu>
Date: Tue, 21 Jul 2015 21:34:55 +0200
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:38.0) Gecko/20100101 Thunderbird/38.0.1
MIME-Version: 1.0
In-Reply-To: <BLU181-W94C6FC52C2E3CD666F631A93850@phx.gbl>
Content-Type: multipart/signed; micalg="pgp-sha512"; protocol="application/pgp-signature"; boundary="5UJPk1kxXi2ws3m7X3AMETRBfeGSq9nrg"
Archived-At: <http://mailarchive.ietf.org/arch/msg/radext/lTV9dBB7685XLp3NMKwwjDQjH_g>
Subject: Re: [radext] Review of draft-winter-radext-populating-eapidentity-01
X-BeenThere: radext@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: RADIUS EXTensions working group discussion list <radext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/radext>, <mailto:radext-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/radext/>
List-Post: <mailto:radext@ietf.org>
List-Help: <mailto:radext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/radext>, <mailto:radext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 21 Jul 2015 19:35:00 -0000

Hi,

croping to the remaining bits...

> Also, the EAP-Response/Identity is frequently anonymous and is used
> to prevent a snooping attacker from obtaining the method-specific
> identities, which are typically encrypted.  For this reason and others
> described below, it is not advisable for EAP implementations to
> determine the EAP-Response/Identity based on the method-specific
> identities.

And yet, this is what pretty much every supplicant I've seen does.
Inner ID: john@example.com
Outer ID: (not configured)
EAP-Response/Identity: john@example.com

(again, an example: this is what Windows 7 does if you do not configure
Identity Privacy)

That may be a bad idea (but what's the alternative? Bail out with
"config error, need outer ID"?). The draft does not take any position on
whether that's a good or bad thing to do. It merely states that if an
implementation does that, it needs to be cautious to convert the inner
ID to UTF-8 before sending at as outer ID.

> Most EAP methods created subsequent to RFC 3748 have incorporated
> their own Identity Exchanges, and those methods are therefore not
> influenced by the EAP-Response/Identity.   Since the
> EAP-Response/Identity is distinct from the method-specific identity,
> the recommendations of Section 4 will not have an effect on EAP
> authentication, other than perhaps forcing the selection of a
> different EAP server:  
>  
>    If an EAP authentication gets rejected, the EAP peer SHOULD re-try
> the authentication using a
>    different EAP-Response/Identity than before.  The EAP peer SHOULD try
>    all user identifiers from the entire set of configured EAP types
>    before declaring final authentication failure.

>  The advice has a number of major downsides.  Since most
> authentication failures will be due to mistyping the password,
> responding to an authentication failure by retrying all conceivable
> user identities will lead to major delays

... in the order of magnitude of several hundred milliseconds ...
> and very high levels of user annoyance.
... or user joy and happiness, if going that extra mile turned a DoS
into a successful authentication.

> By responding to an authentication failure by trying method-specific
> identities, implementations would divulge identity information that
> was designed to be kept secret, compromising privacy. Also, an
> implementation following this advice would utilize method-specific
> identities that may not be in the appropriate format or character
> encoding for an EAP-Response/Identity. 

That's exactly why the draft states that a conversion to UTF-8 needs to
be done before sending as EAP-Response/Identity. True, if the format is
not what is needed on the routing level, the authentication still won't
succeed. However, in the absence of an actual outer ID config, there's
nothing an RFC can do to fix this; the user needs to fix his config then.

>  Since RFC 3748 makes it clear that the EAP-Response/Identity is not
> related to the method-specific identity, constructing the
> EAP-Response/Identity from the method-specific one is inadvisable.  
> The re-encoding described above may not be possible for a variety of
> reasons, including the fact that the method-specific identity need not
> be in NAI form at all. 

Encoding (as in: to UTF-8) should always be possible (the EAP peer
hopefully knows the original encoding). Again, if the resulting string
is not a NAI but a NAI would be needed to route the authentication -
time to give up.

Greetings,

Stefan Winter
>
>  
>  
>  
>
>  
>  
>  
>  
>  
>
>
> _______________________________________________
> radext mailing list
> radext@ietf.org
> https://www.ietf.org/mailman/listinfo/radext