Re: [radext] I-D Action: draft-ietf-radext-tls-psk-03.txt

Alan DeKok <aland@deployingradius.com> Mon, 18 September 2023 18:07 UTC

Return-Path: <aland@deployingradius.com>
X-Original-To: radext@ietfa.amsl.com
Delivered-To: radext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0A380C15106F for <radext@ietfa.amsl.com>; Mon, 18 Sep 2023 11:07:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.906
X-Spam-Level:
X-Spam-Status: No, score=-1.906 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IGF3zghBV9cD for <radext@ietfa.amsl.com>; Mon, 18 Sep 2023 11:07:07 -0700 (PDT)
Received: from mail.networkradius.com (mail.networkradius.com [62.210.147.122]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EECFAC151063 for <radext@ietf.org>; Mon, 18 Sep 2023 11:07:06 -0700 (PDT)
Received: from smtpclient.apple (unknown [75.98.136.130]) by mail.networkradius.com (Postfix) with ESMTPSA id 873DE2BA; Mon, 18 Sep 2023 18:07:04 +0000 (UTC)
Authentication-Results: NetworkRADIUS; dmarc=none (p=none dis=none) header.from=deployingradius.com
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3696.120.41.1.1\))
From: Alan DeKok <aland@deployingradius.com>
In-Reply-To: <CAOW+2du1RLGymyy8u4C_dq76OogXH819a3u5m86dBi_s59BrdA@mail.gmail.com>
Date: Mon, 18 Sep 2023 14:07:03 -0400
Cc: radext@ietf.org
Content-Transfer-Encoding: quoted-printable
Message-Id: <56640CFB-C826-428C-B1E0-8C256A3B222E@deployingradius.com>
References: <C3B7208C-C5E9-4F24-A4A3-9786A4568134@gmail.com> <0A108CC4-20E0-4089-9C73-6C321969133D@deployingradius.com> <CAOW+2dtDiL1DVd+uc0cga5ng+540v1h-Fgdm3Yo=GPOUGCYR0g@mail.gmail.com> <8D4A5243-47E4-44E1-825E-8B74772FD6AF@deployingradius.com> <CAOW+2du1RLGymyy8u4C_dq76OogXH819a3u5m86dBi_s59BrdA@mail.gmail.com>
To: Bernard Aboba <bernard.aboba@gmail.com>
X-Mailer: Apple Mail (2.3696.120.41.1.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/radext/luQC6qpsGfWpQX_TYsED3gxbJbE>
Subject: Re: [radext] I-D Action: draft-ietf-radext-tls-psk-03.txt
X-BeenThere: radext@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: RADIUS EXTensions working group discussion list <radext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/radext>, <mailto:radext-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/radext/>
List-Post: <mailto:radext@ietf.org>
List-Help: <mailto:radext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/radext>, <mailto:radext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Sep 2023 18:07:11 -0000

On Sep 18, 2023, at 11:25 AM, Bernard Aboba <bernard.aboba@gmail.com> wrote:
> [BA] Yes, but most likely it's TLS 1.2 or earlier.  The time between 1.2 and 1.3 was so long that a lot of equipment end-of-life'd before 1.3 came out, but is still operating.  That equipment will never get a TLS 1.3 upgrade, which means that when TLS 1.2 is deprecated it will need to be retired. As an example,  for enterprise WiFi, there are probably many 802.11AC deployments out there from the mid to late 2010s that are now at or nearing end-of-life and therefore may not get a TLS 1.3 upgrade. Will be interesting to see if those devices will be offered an upgrade to secure RADIUS with TLS 1.2.  Often vendors limit those upgrades to newer equipment. 

  I think then mandating TLS 1.3 is best then.  If it takes a while for people to add TLS-PSK, there are few reasons to allow TLS 1.2.

  We can also hope that RADIUS/1.1 is getting implemented.  And perhaps also some provisioning.

> [BA] Yes, it's useful to think of the set of functionality that you want an organization like WiFi Alliance to certify.  It's not just secure RADIUS.  Ideally, I think customers want is equipment (and RADIUS servers) that can continue to operate securely, through transitions from TLS 1.3 to 1.4 and post-quantum crypto.  That's a tall order, but I think we're potentially entering a period where the pace of transitions could become very difficult to navigate. 

  I think that's the driving factor here.  We're fixing things, we might as well fix all of the things.

  So the next question is how to solve the bootstrapping problem.  Maybe we can dust off an old draft from Bob Moskowitz and I:

https://datatracker.ietf.org/doc/html/draft-moskowitz-radius-client-kickstart-01

  That uses SNMP, but a similar approach is used in a number of places.

  Or, perhaps approach similar to this:

https://datatracker.ietf.org/doc/html/draft-friel-tls-eap-dpp-05

https://www.ietf.org/archive/id/draft-ietf-emu-bootstrapped-tls-03.html

  If RADIUS servers already need to support these for EAP, then the framework will be there for doing something similar at the RADIUS/TLS layer.

  Those document describe how a TLS connection can be established based on a raw public / private key.  The application data can then contain some ??? extra magic to provision the RADIUS client.

  The details have to be worked out, but given that there's similar work being done already, the hope is that the details aren't too complex.

  Alan DeKok.