Re: [radext] PSK identity in draft-ietf-radext-tls-psk-01

Heikki Vatiainen <hvn@radiatorsoftware.com> Thu, 17 August 2023 19:34 UTC

Return-Path: <hvn@radiatorsoftware.com>
X-Original-To: radext@ietfa.amsl.com
Delivered-To: radext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 56AD0C151532 for <radext@ietfa.amsl.com>; Thu, 17 Aug 2023 12:34:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.908
X-Spam-Level:
X-Spam-Status: No, score=-6.908 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=radiatorsoftware-com.20221208.gappssmtp.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3TGvVH0uhNob for <radext@ietfa.amsl.com>; Thu, 17 Aug 2023 12:34:43 -0700 (PDT)
Received: from mail-ed1-x52a.google.com (mail-ed1-x52a.google.com [IPv6:2a00:1450:4864:20::52a]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8F58BC151080 for <radext@ietf.org>; Thu, 17 Aug 2023 12:34:43 -0700 (PDT)
Received: by mail-ed1-x52a.google.com with SMTP id 4fb4d7f45d1cf-523d2ef19e4so165202a12.2 for <radext@ietf.org>; Thu, 17 Aug 2023 12:34:43 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=radiatorsoftware-com.20221208.gappssmtp.com; s=20221208; t=1692300881; x=1692905681; h=to:subject:message-id:date:from:in-reply-to:references:mime-version :from:to:cc:subject:date:message-id:reply-to; bh=NtD+L0FXHI/cp84/ca4nxyBbP+1Shk1NGvKe1NRi/RA=; b=OlzY/EZ5j9acRzGDrGrYnWpkJZTeY8VhkuV9VBjCCv1zJgdfrDYEAWPSpmbJAxuJIj a2/3Y4al7jjIiwgVgbBhQ/ORl2sCkV4eVdirYeCMPG+pDtY5JD0UFrf7RqQoM0d3x/5/ P7mxy+uqo7WO0REi0CMw9kmzr8MA3hif0CufGC6JzUH3DjJz89T3GYpuFWzAuAcgYx+4 jzIbGhbxDVrKmEt4b0ykOrItf1IR9fLmDBYpPDm7q7WH2vesmG47W76bQyxFPr82FUJE H4tMhf9gFKVw9aRokMRzbNQU+ZN/dP1Cr9hxK2lC8g0v+ZJHdZiKizff0CDeNqKHpAUu xEbg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1692300881; x=1692905681; h=to:subject:message-id:date:from:in-reply-to:references:mime-version :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=NtD+L0FXHI/cp84/ca4nxyBbP+1Shk1NGvKe1NRi/RA=; b=EpMdqSCoNPiG0JZFecR/EjtiJxrBcCskXaFluAFpjE0V6aSe//LRnaHjTM4OdzKM7Q EFqWxgZU0IfbgmJn5sklUQuDAxJ5s6kvaSGvrZUuiKs1BKmjQs1nIB0hUzg5TbKQwuGd ptumD3YXtvZGGq5+/QSkCgnFZN0T/GemMSa9yonKNoS2NuPC0X7161F5H3TcGRIwkIiS 9dql+L5uepMU8A/15/cP56N58k6xbIBhmmkewYMzvbm5JZ6TVWyVOZEV3l7zIyODV4xF TstuXcuzh2HAFZxvipR20f8CezSmAJGvUxu3eAM8dTYErbNI9urndsAhB9GcGtQB+GM8 livw==
X-Gm-Message-State: AOJu0YznSsGOzAvpex+w1ZE8QV98dVzytaFXLyBI4ydETu43qX7H7gUJ 8fHKJFXcc8Ykd36cswci2PLpsGyQ3zf0WELGpIeecfos8ns4Arn/
X-Google-Smtp-Source: AGHT+IE3PKTEg/NOuXwHK7K0poxWFOVlV/vqDR2goor7VE4BCkRaBw1L46D01KlHTQmtoVoA6x2sXOdY3y+mRM9MgvU=
X-Received: by 2002:a50:ee07:0:b0:523:3ff6:dfc2 with SMTP id g7-20020a50ee07000000b005233ff6dfc2mr528726eds.29.1692300881136; Thu, 17 Aug 2023 12:34:41 -0700 (PDT)
MIME-Version: 1.0
References: <CAA7Lko8W5T+7KQ0fr3KwvuBJM0_D-6NTAe9gZNvi8h5apPHLxw@mail.gmail.com> <10343A98-2E69-4838-8776-736265CF68FE@deployingradius.com>
In-Reply-To: <10343A98-2E69-4838-8776-736265CF68FE@deployingradius.com>
From: Heikki Vatiainen <hvn@radiatorsoftware.com>
Date: Thu, 17 Aug 2023 22:34:25 +0300
Message-ID: <CAA7Lko9nDsUj0O_RP-AWd+LOKNvxT-Bai-AJoY1SOU3Za5wUFw@mail.gmail.com>
To: radext@ietf.org
Content-Type: multipart/alternative; boundary="000000000000dfa2d806032380bc"
Archived-At: <https://mailarchive.ietf.org/arch/msg/radext/yFRfoEVEbGJrzuM6PvUuscJdaw8>
Subject: Re: [radext] PSK identity in draft-ietf-radext-tls-psk-01
X-BeenThere: radext@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: RADIUS EXTensions working group discussion list <radext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/radext>, <mailto:radext-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/radext/>
List-Post: <mailto:radext@ietf.org>
List-Help: <mailto:radext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/radext>, <mailto:radext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 17 Aug 2023 19:34:44 -0000

On Thu, 17 Aug 2023 at 20:25, Alan DeKok <aland@deployingradius.com> wrote:

> On Aug 17, 2023, at 12:13 PM, Heikki Vatiainen <hvn@radiatorsoftware.com>
> wrote:
>


> > - be a combination of all the above, and whatever else too, up to 65535
> octets long
>
>   That's worth noting in the doc.  I'll update it and issue a new revision
> shortly.
>

Thanks! One thing I forgot from the list, not that it changes anything, but
now in year 2023 the identity lookup is likely to involve a HTTP based
interface which means they could end up in HTTP GET, POST and other
parameters, HTTP headers and payload. Lots of possibilities to inject
unauthenticated data over the network.


> > Client authentication with certificates is typically not visible to a
> radsec server because the TLS stack does all the work. With PSKs the server
> must be aware that it handles data from unauthenticated clients during the
> TLS handshake.
>
>   Radsec servers can also verify / use the identities in client certs for
> policies, logging etc..  But that's a minor issue.
>

True, this is the 'a bit trusted' case with certificate authentication I
wrote about earlier. It's not trusted, but at least somewhat vetted by
checks that the TLS stack does when it goes through the certificate chain.
Getting access to a CA and creating certificates with exploit payload in
subjectAltName and other fields would be, well, interesting.

Thanks,
Heikki

-- 
Heikki Vatiainen
hvn@radiatorsoftware.com