[radext] Re: Lack of Channel Bindings in RADIUS/(D)TLS

Bernard Aboba <bernard.aboba@gmail.com> Fri, 26 July 2024 22:00 UTC

Return-Path: <bernard.aboba@gmail.com>
X-Original-To: radext@ietfa.amsl.com
Delivered-To: radext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0A17EC14CEE4 for <radext@ietfa.amsl.com>; Fri, 26 Jul 2024 15:00:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.862
X-Spam-Level:
X-Spam-Status: No, score=-5.862 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, NORMAL_HTTP_TO_IP=0.001, NUMERIC_HTTP_ADDR=1.242, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xnybVE4Xn57k for <radext@ietfa.amsl.com>; Fri, 26 Jul 2024 15:00:31 -0700 (PDT)
Received: from mail-pj1-x1033.google.com (mail-pj1-x1033.google.com [IPv6:2607:f8b0:4864:20::1033]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8F2FBC180B5F for <radext@ietf.org>; Fri, 26 Jul 2024 15:00:23 -0700 (PDT)
Received: by mail-pj1-x1033.google.com with SMTP id 98e67ed59e1d1-2cb09dc1dafso1010442a91.2 for <radext@ietf.org>; Fri, 26 Jul 2024 15:00:23 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1722031223; x=1722636023; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=CD9/8thM6iqWe0G7KoCYCkLagzKTJkvCQ5PFqIYlLwE=; b=ZwGg4xGAIOPPbhvanbFqk9p66JYrw1QUjwfVwh4a93gD72RrPdMYQyuJEg9HVnIYYj gbPim12HSvbZa3YRN0pX0R7mKFcewxQjTfO3qMFfIh2BzaGu8mJSUsNhyEQ3RtE9NWp9 6Eh+Wi6WTuMBHA+/twy2UCwKCaK1gH0BnevV/rADkK/TwUb+d1ICGrJy758J3pAPkjrH ufy3qTnsDe3KKVEK2Eb8wAi2SC0Zm7qksRzgNAzGPhlnZfHym+8UAAJ4S3ctRrBtbDMm k/9v9kUtln4MXo2sh+5RMiufll6iCzkRYZA+Xm3Ee4Igr8p56XPZbNZd62Rls3qRoGsl 1AWw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1722031223; x=1722636023; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=CD9/8thM6iqWe0G7KoCYCkLagzKTJkvCQ5PFqIYlLwE=; b=eDndLsGSbz7Uyk1CYg9H3GgwlU99gbVYLMe9GpEyGE8SGprKeYLD9JOC5aWX4WHwjo 6xgnOKvsmdxR7pbLcEkktzIK665UHzpHr4ZkvBppe/RqHFhirmJRKvSykBcCQiq39R6s aTeQOs6EjhjzfP/iCMhfU6JGnrpvcBOFDRHgd2+Ik1Lpz/sZqX711MRhqPcyCzUaP0lB UNCuZ5E7pCMteJa37Mc1Va7HZjGU+C+ydazJPcDgnPw2VEFAYx4GebCJqh6PZieF+vwV 35T2W0ZiVeAF45oLyhyW2FOOp+dtDUUnb+XBZg7OVjTieyVqngpuZMmn/5F22qWDwQ/X mOfA==
X-Forwarded-Encrypted: i=1; AJvYcCV35llsgCXthjmbus6iYO/MTEKpPp439QsO7n76WlwCkv9QzSxkQdzbPHoaLlyMWPnWoQ65hZ80x8+bUwn1qHE=
X-Gm-Message-State: AOJu0YwVXaYFlaEnw3aXn5QreL3P9Hg1mbqooWyxU6PGuyN2FNbHtORA 67dePBUScphb8pMVioT4QLNzP907bfFHMQk+TbQC579Mb87IL70ry93ztwhomnLwtl4ApE7H6Yf B1jjTEnLEyk+tCYPv4Cba6wD92GM=
X-Google-Smtp-Source: AGHT+IH/BWB9VvpTUky5003Ro94Ehup+lEGsR2GpC+138yRx+pg+MczzlDcXsoiBCM6ppeuGY+Qcitlz44rzV0Iz7/E=
X-Received: by 2002:a17:90a:67c3:b0:2ca:4a6f:1dd with SMTP id 98e67ed59e1d1-2cf7e72cdafmr856851a91.41.1722031222594; Fri, 26 Jul 2024 15:00:22 -0700 (PDT)
MIME-Version: 1.0
References: <3A0631E2-9679-4AC6-82DC-0ECD5DDCBE03@gmail.com> <06c787ed-b989-f0ea-5a1e-0762fa63053b@iea-software.com> <84133.1721926586@dyas>
In-Reply-To: <84133.1721926586@dyas>
From: Bernard Aboba <bernard.aboba@gmail.com>
Date: Fri, 26 Jul 2024 15:00:11 -0700
Message-ID: <CAOW+2dtmPRL6CoeUZJSMHee+ae=DUMhEyJqzYtVHod4hgQ8xEA@mail.gmail.com>
To: Michael Richardson <mcr+ietf@sandelman.ca>
Content-Type: multipart/alternative; boundary="00000000000050a489061e2da368"
Message-ID-Hash: ZCE5O6ROW2TZXW7M5QRXBD2N56PIJHHP
X-Message-ID-Hash: ZCE5O6ROW2TZXW7M5QRXBD2N56PIJHHP
X-MailFrom: bernard.aboba@gmail.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-radext.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Peter Deacon <peterd@iea-software.com>, Margaret Cullen <mrcullen42@gmail.com>, radext@ietf.org
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [radext] Re: Lack of Channel Bindings in RADIUS/(D)TLS
List-Id: RADIUS EXTensions working group discussion list <radext.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/radext/xtz8uW9qzXa3uUQh81BlqL8JXDo>
List-Archive: <https://mailarchive.ietf.org/arch/browse/radext>
List-Help: <mailto:radext-request@ietf.org?subject=help>
List-Owner: <mailto:radext-owner@ietf.org>
List-Post: <mailto:radext@ietf.org>
List-Subscribe: <mailto:radext-join@ietf.org>
List-Unsubscribe: <mailto:radext-leave@ietf.org>

Michael said:

"I'm also lost as to why mutual TLS authentication isn't enough.
Yes, if some unauthenticated keys are used, there might be concern, but that
just doesn't seem to make sense to me."

[BA] "mutual (D)TLS authentication and authorization" has to be well
defined.

RFC 7585 "Dynamic Peer Discovery" (published in 2017) establishes
authorization requirements that are quite different from those that apply
to RADIUS/UDP.   From Section 2.1.1.3:

"This document defines one mandatory-to-implement mechanism that allows
verification of whether the contacted host is authoritative for an NAI
realm or not."

Does "RADIUS over (D)TLS" authorization imply the RFC 7585 definition,
something closer to the RADIUS/UDP model or both??

This deserves some careful consideration.  As Alan has noted, dynamic
discovery opens up potential routing attacks that have not triggered much
concern in RADIUS/UDP "static routing" systems.

In 2024, many of the security assumptions that were commonplace in 2017 no
longer feel as rock solid.  Overall, the pace of change appears to be
accelerating, which implies that we need to look "further down the road"
than we have been used to doing.

Since 2017 we have seen depreciation of TLS 1.0/1.1, and exposure of
multiple weaknesses in TLS 1.2.  Along with explosive demand for "Quantum
as a Service", we have seen introduction of support for post-quantum
ciphersuites in TLS 1.3 (see:
https://aws.amazon.com/security/post-quantum-cryptography/ ).

At IETF 120 PQUIP WG, NIST gave an update on NIST PQC standards:
https://datatracker.ietf.org/meeting/120/materials/slides-120-pquip-nist-pqc-standards

Once NIST issues initial PQC standards, I am expecting there to be
considerable demand for support in TLS 1.3 libraries.  So we should not
just think of TLS 1.3 deployment as being motivated by issues with TLS 1.2.
PQC will also be a deployment motivator. Also, note the addition of
"pessimistic migration" in PQUIP "migration use cases":
https://datatracker.ietf.org/meeting/120/materials/slides-120-pquip-post-quantum-cryptography-migration-use-cases




















On Thu, Jul 25, 2024 at 9:59 AM Michael Richardson <mcr+ietf@sandelman.ca>
wrote:

>
> Peter Deacon <peterd@iea-software.com> wrote:
>     >> While working through the RADIUS (D)TLS document last night, I
>     >> realized that RADIUS/(D)TLS does not include support for TLS channel
>     >> binding. In other words, there is nothing in the RADIUS/(D)TLS layer
>     >> that ensures that both ends of a single RADIUS hop are using the
> same
>     >> unique (D)TLS session.  Without channel binding, RADIUS running over
>     >> (D)TLS may be open to MITM attacks including: blocking valid
> traffic,
>     >> spoofing Access-Accepts or Rejects, viewing sensitive data, replay
>     >> attacks, redirection, DoS, etc.
>
>     > Since channel for per-hop RADIUS data is always mutually
> authenticated
>     > via client cert or shared key I don't see a need for additional
> per-hop
>     > security.
>
> I'm also lost as to why mutual TLS authentication isn't enough.
> Yes, if some unauthenticated keys are used, there might be concern, but
> that
> just doesn't seem to make sense to me.
>
> --
> Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software Works
>  -= IPv6 IoT consulting =-                      *I*LIKE*TRAINS*
>
>
>
> _______________________________________________
> radext mailing list -- radext@ietf.org
> To unsubscribe send an email to radext-leave@ietf.org
>