[Emu] Updated IETF 118 EMU agenda posted

2023-10-31 Thread peter
I've posted a revised agenda for the EMU session at IETF 118. That can be found at: https://datatracker.ietf.org/meeting/118/session/emu The change is to slip 5 minutes into the schedule for a follow-up discussion of EAP-EDHOC. This was a topic during IETF 116. At that time, it was decided that

Re: [Emu] New I-D: A new EAP method called EAP-FIDO

2023-10-31 Thread Alan DeKok
On Oct 31, 2023, at 6:28 AM, josh.howl...@gmail.com wrote: > Playing Devil's Advocate and going a bit OT: this is an excellent goal, so > why stop at EAP-FIDO? > > We could define a similar validation logic for the existing TLS-based methods > to obtain the same benefit. For example: > * The

Re: [Emu] New I-D: A new EAP method called EAP-FIDO

2023-10-31 Thread Alan DeKok
On Oct 31, 2023, at 3:12 AM, Jan-Frederik Rieckers wrote: > But actually I don't know if **provisioning** the credentials in-band is such > a good idea. > Because, in order to provision the credentials, the user needs to prove that > they are authorized, and how would they do that? That was

Re: [Emu] New I-D: A new EAP method called EAP-FIDO

2023-10-31 Thread josh.howlett
> For the current EAP-TLS based methods, the "service" of putting on the > harness and hooking you in is not provided. And that is exactly what I want to > achieve with the TLS part of EAP-FIDO. The users shoulnd't see any of the > certificate check parameters, it should be implicit and that is

Re: [Emu] New I-D: A new EAP method called EAP-FIDO

2023-10-31 Thread Jan-Frederik Rieckers
On 30.10.23 17:39, Behcet Sarikaya wrote:> - The draft talks about Fido but there is no introduction to Fido. Yes, you gave the standards references but I think that is not sufficient. I have a T2TRG draft: https://datatracker.ietf.org/doc/draft-irtf-t2trg-security-setup-iot-devices/

Re: [Emu] New I-D: A new EAP method called EAP-FIDO

2023-10-31 Thread Jan-Frederik Rieckers
On 30.10.23 12:20, Hannes Tschofenig wrote:> you cannot complain about the use of TLS in EAP when the EAP method you propose relies on TLS. The TLS-based authentication is an essential part of the FIDO solution. Without TLS it is completely insecure. I don't complain about TLS or EAP-TLS

Re: [Emu] New I-D: A new EAP method called EAP-FIDO

2023-10-31 Thread Jan-Frederik Rieckers
On 30.10.23 15:55, Alan DeKok wrote: Today's turnkey EAP provisioning solutions are not *conceptually* dissimilar to this (often using self-signed CAs with EAP-TLS for mutual authn; and LDAP to the Enterprise directory to authz the client cert's SAN). The onboarding would just be transparent