Re: [Emu] POST WGLC Comments draft-ietf-emu-eap-tls13

2019-10-11 Thread Mohit Sethi M
I am aware that Openssl has support for external PSK. The Selfie attack 
was demonstrated using this Openssl implementation: 
https://eprint.iacr.org/2019/347

However, the github issue you posted is still helpful. If I understand 
the resolution of this issue: Openssl will first check for a valid 
external PSK before checking for resumption PSKs.

I think we can include EAP-TLS-PSK without major changes to the current 
document. I only want to ensure that EAP-TLS-PSK does not leave any 
implementation ambiguities.

--Mohit

On 10/10/19 7:18 PM, John Mattsson wrote:
> Mohit Sethi M mailto:mohit.m.se...@ericsson.com wrote:
>
>> Can you give an example of an existing TLS 1.3 deployment that offers both 
>> resumption PSKs and external PSKs?
> Don’t know if it is deployed anywhere, but OpenSSL supports resumption of PSK 
> sessions. There was a bug that stopped it from working that was patched 12 
> months ago.
> https://github.com/openssl/openssl/issues/7433
>
>
> ___
> Emu mailing list
> Emu@ietf.org
> https://www.ietf.org/mailman/listinfo/emu
___
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu


Re: [Emu] POST WGLC Comments draft-ietf-emu-eap-tls13

2019-10-11 Thread Eliot Lear


> On 11 Oct 2019, at 16:09, Michael Richardson  wrote:
> 
> So, can wired just be a degenerate version of wifi, where there can be only
> one "ESSID", and there are no beacons to consider?


On the whole that has been my thought.  But it is a matter of which mechanism 
to degenerate to.  Is it TLS-PSK?  eDPP++?  TLS with naked public keys++?  And 
again, this is the on-prem case.  For cloud, we are well along.

Eliot


signature.asc
Description: Message signed with OpenPGP
___
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu


Re: [Emu] POST WGLC Comments draft-ietf-emu-eap-tls13

2019-10-11 Thread Michael Richardson

Eliot Lear  wrote:
>> Eliot Lear  wrote:
>>> Before we nail this down, it seems like we need to have a discussion
>>> about how best to onboard wired IoT devices in particular from an
>>> on-prem view.  The issue here is that EAP-TLS-PSK is useful for that
>>> purpose, as we discussed.  Now there is nothing particularly special
>>> about PSK and we could run with a naked public key pair as well in
>>> 1.3, but we have to choose something.
>> 
>> okay, so why do you prefer PSK?

> I do not.  But we need to have *a* flow for on prem onboarding.
> TLS-PSK is one approach, but there are others.  I just want a
> discussion before we nail this down, as I wrote.

>> 
>>> The fundamental question is what does a manufacturer stamp into the
>>> device and what is placed on a label.  We have a running example of
>>> DPP doing this for wireless with public key code, but that doesn’t
>>> get us to proper onboarding for wired – the signaling just isn’t
>>> there.
>> 
>> I don't understand this.  Are you saying that because it's wired,
>> people do not expect to scan anything?

> No quite the opposite- I’m saying that there is at least one way to do
> this with Wifi, but no way to do this for wired right now, an we need
> one.

So, can wired just be a degenerate version of wifi, where there can be only
one "ESSID", and there are no beacons to consider?

-- 
]   Never tell me the odds! | ipv6 mesh networks [ 
]   Michael Richardson, Sandelman Software Works| network architect  [ 
] m...@sandelman.ca  http://www.sandelman.ca/|   ruby on rails[ 



signature.asc
Description: PGP signature
___
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu


Re: [Emu] POST WGLC Comments draft-ietf-emu-eap-tls13

2019-10-11 Thread Eliot Lear


> On 11 Oct 2019, at 13:04, Michael Richardson  wrote:
> 
> 
> Eliot Lear  wrote:
>> Before we nail this down, it seems like we need to have a discussion
>> about how best to onboard wired IoT devices in particular from an
>> on-prem view.  The issue here is that EAP-TLS-PSK is useful for that
>> purpose, as we discussed.  Now there is nothing particularly special
>> about PSK and we could run with a naked public key pair as well in 1.3,
>> but we have to choose something.
> 
> okay, so why do you prefer PSK?

I do not.  But we need to have *a* flow for on prem onboarding.  TLS-PSK is one 
approach, but there are others.  I just want a discussion before we nail this 
down, as I wrote.

> 
>> The fundamental question is what does
>> a manufacturer stamp into the device and what is placed on a label.  We
>> have a running example of DPP doing this for wireless with public key
>> code, but that doesn’t get us to proper onboarding for wired – the
>> signaling just isn’t there.
> 
> I don't understand this.
> Are you saying that because it's wired, people do not expect to scan
> anything?

No quite the opposite- I’m saying that there is at least one way to do this 
with Wifi, but no way to do this for wired right now, an we need one.

Eliot

> 
> --
> ]   Never tell me the odds! | ipv6 mesh networks [
> ]   Michael Richardson, Sandelman Software Works| network architect  [
> ] m...@sandelman.ca  http://www.sandelman.ca/|   ruby on rails
> [
> 



signature.asc
Description: Message signed with OpenPGP
___
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu


Re: [Emu] POST WGLC Comments draft-ietf-emu-eap-tls13

2019-10-11 Thread Michael Richardson

Eliot Lear  wrote:
> Before we nail this down, it seems like we need to have a discussion
> about how best to onboard wired IoT devices in particular from an
> on-prem view.  The issue here is that EAP-TLS-PSK is useful for that
> purpose, as we discussed.  Now there is nothing particularly special
> about PSK and we could run with a naked public key pair as well in 1.3,
> but we have to choose something.

okay, so why do you prefer PSK?

> The fundamental question is what does
> a manufacturer stamp into the device and what is placed on a label.  We
> have a running example of DPP doing this for wireless with public key
> code, but that doesn’t get us to proper onboarding for wired – the
> signaling just isn’t there.

I don't understand this.
Are you saying that because it's wired, people do not expect to scan
anything?

-- 
]   Never tell me the odds! | ipv6 mesh networks [ 
]   Michael Richardson, Sandelman Software Works| network architect  [ 
] m...@sandelman.ca  http://www.sandelman.ca/|   ruby on rails[ 



signature.asc
Description: PGP signature
___
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu