Thanks Jim! Below are replies to most of your comments.
>In section 2.1.5 - You are mandating support for resumption. Is this really >what you are planning to do? If this is true then lots of the previous text >seems to be off because this is not part of that discussion. That is definitely not the intention, I rewrote the text to say: "To enable resumption when using EAP-TLS with TLS 1.3, the EAP server MUST send a NewSessionTicket message (containing a PSK and other parameters) in the initial authentication." >In section 2.1.6 - Should there be a recommendation (or not) that when a >resumption ticket is used, then a new ticket (or set of tickets) ought to be >provided to the client. That would be a stronger recommendation that TLS 1.3 itself, and EAP-TLS is less sensitive to ticket reuse than many other use cases as EAP-TLS does not use 0-RTT. I suggest adding a reference to the client tracking prevention recommendations in RFC 8446. "EAP peers and EAP servers SHOULD follow the client tracking preventions in Appendix C.4 of [RFC8446]." >In section 2.5 - I don't know that I have the ability to control what the >TLS block looks like to the extent that this seems to be wanting to do. I don’t think you need any control; this is just what happens when you send a TLS record with application data 0x00. Jouni explicitly asked for these exact details (i.e. a TLS record with TLSPlaintext.type = application_data, TLSPlaintext.length = 1, and TLSPlaintext.fragment = 0x00). >I am a little surprised that the padding feature of TLS 1.3 received >absolutely no mention in this document. Good catch, I added text on padding to three different places, in the introduction, in Section 2.5: "Note that the length of the plaintext is greater than the corresponding TLSPlaintext.length due to the inclusion of TLSInnerPlaintext.type and any padding supplied by the sender." and in the privacy considerations. "Without padding, information about the size of the client certificate is leaked from the size of the EAP-TLS packets. The EAP-TLS packets sizes may therefore leak information that can be used to track or identify the user. If all client certificates have the same length, no information is leaked. EAP peers SHOULD use record padding, see Section 5.4 of [RFC8446] to reduce information leakage of certificate sizes." Cheers, John -----Original Message----- From: Jim Schaad <[email protected]> Date: Saturday, 3 August 2019 at 23:53 To: "[email protected]" <[email protected]> Cc: 'EMU WG' <[email protected]> Subject: POST WGLC Comments draft-ietf-emu-eap-tls13 Resent from: <[email protected]> Resent to: John Mattsson <[email protected]>, <[email protected]> Resent date: Saturday, 3 August 2019 at 23:53 I am just finally getting caught up on mail for the EMU WG and am getting this done. It should probably be clarified that Figure 1has the additional restriction that the server is not sending any resumption tickets as well. It would also be better to label the TLS Application Data as the commitment message as no other TLS Application data is being sent. I think that it might be reasonable to put in a note for Figure 2 that if a client does receive a fatal from the hello message, then changing the offered key share algorithm is one thing that might be successful in the future - That is put in a note to match what the request retry message does. Okay - I found the use of the retry down below but it is not referenced from here but it is still labeled as a server rejects the client hello. In section 2.1.5 - You are mandating support for resumption. Is this really what you are planning to do? If this is true then lots of the previous text seems to be off because this is not part of that discussion. In section 2.1.6 - Should there be a recommendation (or not) that when a resumption ticket is used, then a new ticket (or set of tickets) ought to be provided to the client. In section 2.5 - I don't know that I have the ability to control what the TLS block looks like to the extent that this seems to be wanting to do. In section 5.7 - I am not sure why one could not re-check for revocation when doing a resumption, I would expect that this is only server side that would do it but the current paragraph two outlaws it. I am a little surprised that the padding feature of TLS 1.3 received absolutely no mention in this document. Jim _______________________________________________ Emu mailing list [email protected] https://www.ietf.org/mailman/listinfo/emu
