On Feb 21, 2022, at 4:26 AM, Oleg Pekar <[email protected]> wrote:
> 1) Section: 2.1. Key Derivation
> When talking about EAP types "Type = value of the EAP Method type" suggest
> providing an example of a Type here so it will be clear what is it about for
> the rest of the document (e.g. for PEAP Type is 0x19)
It's difficult to tif that into an already long sentence. I'll see if
there's a way to do that.
> 2) Here TLS-Exporter function is mentioned for the first time in the
> document. Suggest to put a direct reference to the original document where it
> is defined:
> "TLS-Exporter is defined in [RFC8446] section-7.5 as TLS-Exporter(label,
> context_value, key_length) = HKDF-Expand-Label(Derive-Secret(Secret, label,
> ""), "exporter", Hash(context_value), key_length).
> This could help the reader to understand better what do the function
> parameters mean and what does the function do. Such a reference to a PRF is
> used in other documents (e.g. TEAP RFC 7170)
I'd prefer to just reference RFC 9190 Section 2.3. It would be more
confusing to define TLS-Exporter again, in terms of other undefined fields.
> 3) Section: 2.2 TEAP
> "IMSK = TLS-Exporter("[email protected]", EMSK, 32)" - this may be not
> clear to the reader since this formula is effective when inner method
> generates EMSK. It worth mentioning that in other case IMSK is selected per
> TEAP RFC
Sure. I'll add a reference to 7170.
> 4) In this sentence "For TLS 1.3, the hash function used is the same as the
> ciphersuite hash function negotiated for HKDF" suggest saying "the MAC
> function" instead of "the hash function"
Fixed.
> 5) Section: 2.3. FAST
> "For FAST, the session_key_seed is also used as the key_block, as defined in
> [RFC4851] Section 5.1" - suggest rephrasing to "For FAST, the
> session_key_seed is also a part of the key_block..."
Fixed.
> 6) There are references to implement some EAP-FAST keys with TLS 1.3 similar
> to TEAP. I think the section about the specific protocol should be
> self-contained since the reader may be interested in EAP-FAST but is not
> familiar with TEAP. We should also specify the exact key derivation schemes
> instead of referencing to TEAP. E.g. "T-PRF is replaced with TLS 1.3
> TLS-Exporter function".
Fixed.
> 7) In addition, since TLS 1.3 allows session resumption using PSK, suggest to
> explain explicitly why PAC cannot be supported anymore.
OK, I'll add some text.
> 8) "EAP-FAST previously used a PAC, which is a type of pre-shared key (PSK)"
> - it is more correct to say "PAC is a session ticket that contains pre-shared
> key and other data"
> Suggest also directly mentioning the PAC Provisioning RFC5422.
Fixed.
> 9) Section: 5. Implementation Status
> "Implementors have demonstrated significant interest in getting PEAP and TTLS
> working for TLS 1.3, but less interest in EAP-FAST and TTLS" - probably the
> last method should be "TEAP"
Fixed.
> 10) Section: 7. IANA Considerations
> "These labels are used only for TEAP" - should say "...for TEAP and FAST".
Fixed.
> 11) Section: 8.1. Normative References
> RFC 5422 "Dynamic Provisioning Using Flexible Authentication via Secure
> Tunneling Extensible Authentication Protocol (EAP-FAST)" is missing
I think it should be an Informative reference, as we're not really depending
on it, and 5422 is "Informational". But I suppose it doesn't matter a lot
either way.
> 12) Section: 2.5. PEAP
> Some PEAP versions support CryptoBinding. PRF+ is used there so we should
> mention that it is replaced with TLS-Exporter also.
The first paragraph of that section makes it clear we're not using the
TLS-Exporter here.
> 13) Section: 3. Application Data
> "behavior seen in earlier TLS versions/" - typo, should end with a dot
> instead of a slash
Fixed.
> 14) Section: 3.1. Identities
> "Using an anonymous NAI has two benefits. First, an anonymous identity makes
> it more difficult to track users. Second, an NAI allows the EAP session to
> be routed in an AAA framework" - could you please explian what does the
> second benefit mean?
I'll add a reference to RFC 7542 Section 3. That text describes routing in
an AAA system, using NAIs.
> 15) "EAP servers MUST cause authentication to fail if an EAP peer uses an
> anonymous "inner" identity for any TLS-based EAP method" - the word "inner"
> identity should be always either with double quotes or without. It was
> mentioned witout double quotes before and now with them.
Fixed.
> 16) If there is such a strict requirement "MUST fail" for anonymous identity
> used inside the tunnel - then it worth defining exactly what is anonymous
> identity
I'll add a reference to RFC 7542 Section 2.4.
> 17) "The outer identity contains an NAI realm, which ensures that the inner
> authentication method is routed to the correct destination." - suggest
> explaining more on how NAI realm is used as outer identity. Should it be in
> the form of "anonymous@my_ad.example.com" or in any other form?
RFC 7542 explains this in detail. I'll add a reference.
> 18) "In general, routing identifiers should be strongly tied to the data
> which they are routing" - could you please explain this sentence?
If you want some authentication data routed to a destination (via AAA),
that's done via an NAI, e.g. "@example.com". If the authentication data is for
a user in realm "example.org", it doesn't make sense to have an NAI of
"@example.com".
In general, routing identifiers should agree with the authentication
data which they are routing. For example, if a user has an inner
identity of "[email protected]", then it generally makes no sense to
have an outer identity of "@example.org". The authentication request
could then be routed to the "example.org" domain, which would have no
idea what to do with the credentials for "[email protected]". At best,
the authentication request would be discarded. At worst, the
"example.org" domain could harvest user credentials for use in later
attacks on "example.com".
> 19) Suggest explaining explicitly what the routing identifier is.
I'll add a reference to 7542.
> 20) "The inner identity can then be fully qualified (user name plus realm) of
> the organization" - suggest to rephrase "The inner identity can then be fully
> qualified name of the organization", since "fully qualified name" is a
> standard term
The term from RFC 7542 is "realm", so it's best to continue using that
terminology here.
Alan DeKok.
_______________________________________________
Emu mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/emu