[radext] Comments on draft-wierenga-ietf-eduroam-00
"Jim Schaad" <ietf@augustcellars.com> Thu, 28 March 2013 22:43 UTC
Return-Path: <ietf@augustcellars.com>
X-Original-To: radext@ietfa.amsl.com
Delivered-To: radext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7EBD121F8F0D for <radext@ietfa.amsl.com>; Thu, 28 Mar 2013 15:43:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.599
X-Spam-Level:
X-Spam-Status: No, score=-3.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7I25tGGHyGbt for <radext@ietfa.amsl.com>; Thu, 28 Mar 2013 15:43:55 -0700 (PDT)
Received: from smtp4.pacifier.net (smtp4.pacifier.net [64.255.237.176]) by ietfa.amsl.com (Postfix) with ESMTP id 4E97221F8F0B for <radext@ietf.org>; Thu, 28 Mar 2013 15:43:52 -0700 (PDT)
Received: from Philemon (mail.augustcellars.com [50.34.17.238]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) (Authenticated sender: jimsch@nwlink.com) by smtp4.pacifier.net (Postfix) with ESMTPSA id B77E738EF4; Thu, 28 Mar 2013 15:43:51 -0700 (PDT)
From: Jim Schaad <ietf@augustcellars.com>
To: draft-wierenga-ietf-eduroam@tools.ietf.org
Date: Thu, 28 Mar 2013 15:43:15 -0700
Message-ID: <003501ce2c05$a2f4bd90$e8de38b0$@augustcellars.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 14.0
Thread-Index: Ac4qe+LoC9LeZppTRz2g9935nx0TGA==
Content-Language: en-us
Cc: radext@ietf.org
Subject: [radext] Comments on draft-wierenga-ietf-eduroam-00
X-BeenThere: radext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: RADIUS EXTensions working group discussion list <radext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/radext>, <mailto:radext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/radext>
List-Post: <mailto:radext@ietf.org>
List-Help: <mailto:radext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/radext>, <mailto:radext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Mar 2013 22:43:57 -0000
Remember you asked for it. I am CC-ing the radext list for completeness not because I believe this should be a radext working group document. 1. It is not clear to me that the use of RFC 2119 language is appropriate to a document that is describing what the current design is. 2. Introduction: Suggest that the introduction should give a layout of the document as well. Specifically there are two ways to organize the second half of the draft <problem, solution> or <problems><solutions> and it would be good to set expectations of this upfront. 3. Given that RFC 6614 and 6613 are experimental - do you want to say /IETF standardization efforts/? 4. Section 1.3 - Who has to be able to identify users? Just the IdP or the NAS as well? 5. what does it mean to either impersonate someone or to take over their identity? If I give you my name and password it is possible for you to impersonate me. This language should be tightened. 6. Do you really want me to be able to access your network or are you going to provide a public network for me to be able to access and use? It might need to be clearer what is going on. The first implies a greater degree of identification that might actually exist. 7. I can see three different vectors of scalability - it might be useful to tease that out. Users, Orgs providing access, Orgs hosting users. Are the last two a one-to-one or not? 8. For whom does it need to be easy to install and use - just clients or organizations as well? Can it be hard for an org to setup and still be easy for clients? 9. In the paragraph on security, I don't understand the purpose of the first sentence. This would tend to argue that secure is not an absolute design goal. There may be a trade off, but that would be a design goal of usability which is separate. 10. The goal is secure and privacy preserving - however there is nothing in the text about who the privacy is supposed to be protected from. While I guess it could be the third part, that is hardly the limit of who one could wish for privacy to be protected from. Do you care about privacy from the visited SP? Should the IdP be able to know who the client is visiting? 11. It is laid out that organizations should be able to set their own authentication structure. Is there going to be a minimum security that is imposed on organizations by the eduroam federation? 12. Were any other options considered for the architecture? If so why were they not used? 13. Section 2 - If you read the ABFAB architecture document, I think we talk about three different trust relationships. Two of which are "pre-existing" and one of which is established during the protocol. 14. Going from the term type of trust to trust relationship does don't flow well. 15. The term establishment is potentially confusing in this location. Are you talking about for a single event or initial establishment (i.e. introduction ) between the user and the IdP. 16. Section 2.1 - I can understand that authentication uses EAP. However how does it use 802.1X and not use RADIUS for authentication? If 802.1x does anything other than carry EAP this should be covered. Otherwise you should probably include RADIUS here as well. 17. Section 2.1.1 ?? wireless networks MUST support WPA2+AES - What does this mean? It is a requirement that all networks deploy this or merely that the hardware has the capability to use it? If a network deploys both WPA2 and WPA does that require that multiple SSIDs be used? If so is there a naming convention that is documented for this usage type? 18. What are the security implications of not knowing who the SP is - since all SSIDs are "eduroam" it is not possible to distinguish from a user perspective which are not to be used. 19. Discuss the trade of for not always using "eduroam-foo" as the SSID 20. Section 2.1.2 - What guidance is the federation giving on EAP methods - is that of interest to this document? 21. What is the "policy with regards to security properties" 22. I don't understand the purpose of Figure 1 - It does not appear to be reference from the text in any way. The picture would seem to be underspecified in that the specific protocols are not put any place (i.e. X802.1x) and the term EAP tunnel is not introduced in any manner. As with the ABFAB document I did like that it is not clear that the tunneled eap is not traveling directly between the host and the authentication server. 23. Note that mutual authentication does not imply privacy. If I authenticate with EAP-TLS and send both the server and the client certificates in the clear then I have mutual authentication however I have no privacy on identities. 24. The term outer identity is problematic. There is the EAP outer identity - and then there is the RADIUS user-identity attribute. The routing is done on the later and it is generally (but not always) copied from the initial EAP method. However not all methods will have a distinct inner identity. Is there an identity that is transmitted on 802.1x that is used rather than the first eap name? 25. When did you suddenly say than a TLS tunnel was required. If this is true it should be stated someplace explicitly. This is not a requirement on IdPs that was not there before. 26. Do you want to say that outer identities must be NAIs or not? 27.. Section 2.2.1 - You just sprang a national server on me without telling me what it represents. Are you assuming that all routing is two levels deep or is there three and four level deep routing. 28. Do you want to say at this point who is operating the national servers and root servers? On what basis will they setup or remove shared secrets with organizations? 29. What are the trade offs of using anonymous@surfnet.nl vs @surnet.nl for the outer identity? 30. What, if anything needs to be said about the trust needed between the access points and the organization RADIUS server. Is this under some type of protections? 31. Section 3 - Not all of the issues appear to be future problems that are expected. This paragraph should be expanded to say that current operations have identified problems, in addition others are expected with an increase of ... 32. Section 3.1 - I think the word you are looking for is deduced rather than deducted in many of these sentences. 33. I have a slight problem with the fact that you are using down the authentication path since you have just told me that it is a tree and thus has both an up and a down component. 'Along' might be a better choice. 34. I would not use the term proxy chain when looking at the length. I would just say that the radius authentication chain contains more than one hop. If there were no proxies then you have no problems, but in that case the proxy chain is 0 hops? 1 hop? Not clear. 35. I assume that if a server which is believed to be "dead" sends you an authentication request then you would also know that it is now live (step 3) 36. One option that is not discussed here is the option of always flooding and never assuming anything but realms fail. What are the operational problem with this approach. 37. Presumably the use of TCP rather than UDP would also help this situation. Since you seem to be talking about ways that can be used to fix this here. 38. Section 3.2 - ? reactively or retroactively? 39. You don't say how much improvements from section 3.1 would deal with this issue. If you could get reliable - don't fail because I did not get a reply - does this help the situation in the event of no reply? 40. What would be the security implications of being able to inject an error code into the stream by a middle man? Are they any worse than the injection of an access-deny? 41. Do you need to talk about dropped packets in this context as well as dead servers? 42. If 802.1x does not allow for returning errors. Are you suggesting that the RADIUS servers would inject EAP packets in the event of failures or should this be handled by the NAS? 43. Section 3.3 - You need to tell me what a ccTLD and a gTLD are 44. What are the "downsides" to routing based on insertion of new "national" servers that can talk directly to the org servers? These servers would potentially need to be more intelligent - but it would restrict the places where tables need to be routed. Was this considered? 45. I am not sure that I understand why doing an add of a new route would be especially error prone. It seems that this should be easily fixable by a simple tool. Are you ever removing this from the table - it seems that this would be overwhelmed by adds. Are these mappings made at more than just the root level - that is not clear from the discussion although I assume it would be true. 46. Who are you imposing the recommendation on? Is this a new 802.1x requirement for an updated draft? If so is this really what you want - or do you want to be able to negotiate the L2 packet size all the way down? 47. For whom are they hard to diagnose? Are you just talking about users or are you talking about IT departments as well? Are there recommendations on how to do this diagnosis? 48. Section 3.5 - Are EAP MSKs used in this configuration? If so then you have low level encryption on these and it could potentially be stolen and used. 49. It is not clear to me that using a pseudonymous client identifier for the client does much of anything to prevent linking to an actual client. You still can build a large mobility profile. 50. You have not dealt with the issue for TLS of checking that the server certificate is still valid. This is also not currently done. 51. Have you brought up the concept of an EAP configuration meta data format in the EMU group? It is about to close. 52. Is there a reason why you don't reference RADIUS-TLS at this point as this would deal with this issue to a certain extent. I.e. no protection from the proxies but from eavesdroppers. 53. Section 4.1.1 - why is the translation not satisfactorily answered by NASREQ? 54. The last pargraph of 4.1.1. should be the first paragraph of 4.1.2 55. Section 5 - It would seem that placing the policy enforcement with Chargeable User Identity at the RADIUS server nearest the NAS - or at the edge of the organization, would make as much sense as placing it on the NAS itself. This would allow for correlation between different access points and given a better idea of abuse on the network as a whole. Thus using the servers that do this would solve the problem better. 56. Section 5.1 - It may be also taken as evidence that you have no idea of what is going on as you have not identified the serious incident as being serious. 57. Section 5.2 - How does the fact that the home site is now going have the ability to block reflect back on the question of differences of opinion on if the action was abuse or not? What type of protocol is setup for dealing with this type of request- is it automated, done by hand or through the infrastructure? 58. Section 5.3 - Given that home servers are required to regularly churn CUIs, how does this affect the local accounting problems in terms of tracking and preventing people from abusing the system. Can the home IdP simply deal with this issue by changing the CUI of an individual every time an abuse is reported? Random changes s/Abfab/ABFAB/ s/in all continents/on all continents/ s/like for example/like/ s/alternative use/alternative uses/ s/foresaw/?????? - I am not sure what this sentence is supposed to say/ Update reference to privacy terminology draft - it is now draft-iab-private-considerations
- [radext] Comments on draft-wierenga-ietf-eduroam-… Jim Schaad
- Re: [radext] Comments on draft-wierenga-ietf-edur… Klaas Wierenga (kwiereng)
- Re: [radext] Comments on draft-wierenga-ietf-edur… Klaas Wierenga