This is a review of ITU Study Group 17, TD 0495, which represents a revision
of ITU-T X.1034.  For details, see:

https://datatracker.ietf.org/documents/LIAISON/file714.pdf

 

General Observations

 

Looking at this document, I don't see much evidence that the ITU-T has made
an effort to incorporate the

feedback that EMU provided during the last review:

https://datatracker.ietf.org/liaison/470/

 

 

This document is out of date, given that it doesn't reflect EAP developments
over the last 5+ years.  Looking

through the reference section, there are still references to RFC 2284
(instead of RFC 3748),  and no references to later

EAP-related documents including RFC 4851,  RFC 5247, RFC 5296, etc.    Those
references that are provided are frequently

out of date, represent expired or incorrect versions, etc.   Even the
references to IEEE 802.11 are years out of date. 

 

The problem goes deeper than just the references, though.  In the past 5
years, we have seen development of quite a 

few new EAP methods, new approaches to key management, new applications
lower layers incorporating EAP, etc. 

We have also see organizations such as NIST (with 800-120) providing
in-depth security analyses.  

 

Given all of this new activity, the most basic question that this document
raises for me is "What unique value is this

document attempting to provide above and beyond what the IETF, IEEE 802,
NIST and other groups are already

doing?"

 

After reading this document, I still didn't have a clear idea of the goals
and objectives. 

 

One possible answer to the question lies in Table 1, which attempts to
classify EAP methods in terms of their "levels of security" 

(fundamental, middle-level, high-level).  

 

However, I'm not clear what value this table adds beyond what is already in
NIST 800-120, RFC 4017 or other documents. 

In fact, one might argue that it muddies the waters since a number of
fundamental security properties such as Authorization 

and Unique Naming are not listed as only recommended or optional, whereas
these are treated as not as method properties 

but as fundamental properties of the EAP/AAA system as described in RFC
3748, 4296 and RFC 5247.   

 

Another possibility lies in the general description of the security
properties of EAP.  However, in the last five years we have

seen many, many studies of this published none of which are referenced in
the document.  This includes formal analyses

(e.g. The Stanford analysis of IEEE 802.11 security, by John Mitchell's
team, work in Bill Arbaugh's group, etc.),  NIST

800-120, RFC 4296, 5247, etc.  

 

Of course, we have also seen extensions to the EAP model introduced in RFC
5296.  This is also not described in the

document. 

 

Not only are all these aspects not referenced or described, but in numerous
places the document uses terminology

specific to IEEE 802.   For example, the document discusses "types of PTK",
and "group key handshake".    Non-IEEE 802

technologies typically don't use the term "PTK", and IEEE 802.1X-REV does
not include a "group key handshake". 

Moreover the "general flow of key management" described in Section 8.4 is
not general at all, since this does not

describe the lower layer key management used in IKEv2 or IEEE 802.16. 

 

Moving on to Table I.1, the document evaluates EAP MD5 (does anyone care
about this anymore?),  EAP SRP (long abandoned)

against a series of critieria.  If this table is worth including at all,
it's worth making the effort to bring it up to date.  

 

_______________________________________________
Emu mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/emu

Reply via email to