Re: [Emu] teap-brski

2019-06-10 Thread Owen Friel (ofriel)




-Original Message-
From: Emu  On Behalf Of Dan Harkins
Sent: 06 June 2019 15:13
To: an...@ietf.org; emu@ietf.org
Subject: [Emu] teap-brski





  Hello,



  In a private thread on teap-brski the topic of co-location of the TEAP server 
and the BRSKI registrar was brought up. It was suggested that the discussion 
move to these lists to get more input from the experts.



  In draft-lear-eap-teap-brski-02 the architecture shows a the TEAP server and 
the BRSKI registrar as separate while mentioning that they can be co-located.

The following assumes they are not co-located.



  The BRSKI pledge in this draft is called a "device" and the device 
establishes a provisional TLS connection (through TEAP) to the TEAP server over 
802.1X or something similar. The device does not connect to the registrar. The 
device then creates a voucher request and sends it to the TEAP server using a 
newly defined TEAP TLV. The registrar signs the request, forwards it onto a 
MASA, and sends the voucher it gets back from the MASA to the device using 
another newly defined TEAP TLV.



  So the question is, will this even work? If the TEAP server and BRSKI 
registrar are separate entities then the voucher will include the TEAP server's 
EE certificate but it will be signed by the registrar's EE certificate. From my 
admittedly limited understanding of BRSKI I think the MASA will reject this 
voucher request because it fails the "proximity" check (if I understand the 
proximity check correctly). The MASA will treat the registrar as a 
man-in-the-middle.



  BRSKI folks: is this correct? Will a voucher request be rejected from a 
deployment like this?



[ofriel] I believe this will fail the proximity check as outlined in 
https://tools.ietf.org/html/draft-ietf-anima-bootstrapping-keyinfra-20#section-5.5.5



However, there is an interesting definition in 
https://tools.ietf.org/html/draft-ietf-anima-bootstrapping-keyinfra-20#section-3.4



leaf prior-signed-voucher-request {

  type binary;

  description

"If it is necessary to change a voucher, or re-sign and

 forward a voucher that was previously provided along a

 protocol path, then the previously signed voucher SHOULD be

 included in this field.



 For example, a pledge might sign a voucher request

 with a proximity-registrar-cert, and the registrar

 then includes it in the prior-signed-voucher-request field.

 This is a simple mechanism for a chain of trusted

 parties to change a voucher request, while

 maintaining the prior signature information.



 The Registrar and MASA MAY examine the prior signed

 voucher information for the

 purposes of policy decisions. For example this information

 could be useful to a MASA to determine that both pledge and

 registrar agree on proximity assertions. The MASA SHOULD

 remove all prior-signed-voucher-request information when

 signing a voucher for imprinting so as to minimize the

 final voucher size.";

}



Most notable: “This is a simple mechanism for a chain of trusted parties to 
change a voucher request, while maintaining the prior signature information.”



So with some extra definition, one could envisage the TEAP server signing the 
Voucher request using its cert and including the Pledge’s voucher request in 
its prior-signed-voucher-request and sending it to the RA, and then the RA in 
turn signing the request using its own cert, and including the TEAP server’s 
voucher request in its prior-signed-voucher-request. The pledge could also 
assert the TEAP EE cert in its voucher request, with the TEAP server asserting 
the RA’s cert in its voucher request. The MASA could in theory then validate 
the full chain of trust back.



Now, that’s reading a lot into that one statement, and the rest of BRSKI 
certainly doesn’t describe operation like that, and its far easier to mandate 
that the TEAP server *is* the Registrar.







  EMU folks: if the answer from the BRSKI folks is that this doesn't work then 
is there any sort of weird tunneling or "phase 2" trickery that can be added to 
TEAP to get this to work or should we just explicitly state that the TEAP 
server and the registrar are the same entity (they authenticate with the same 
certificate)?



  Thanks,



  Dan.





___

Emu mailing list

Emu@ietf.org<mailto:Emu@ietf.org>

https://www.ietf.org/mailman/listinfo/emu
___
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu


[Emu] teap-brski

2019-06-06 Thread Dan Harkins


  Hello,

  In a private thread on teap-brski the topic of co-location of the 
TEAP server
and the BRSKI registrar was brought up. It was suggested that the 
discussion

move to these lists to get more input from the experts.

  In draft-lear-eap-teap-brski-02 the architecture shows a the TEAP 
server and
the BRSKI registrar as separate while mentioning that they can be 
co-located.

The following assumes they are not co-located.

  The BRSKI pledge in this draft is called a "device" and the device 
establishes
a provisional TLS connection (through TEAP) to the TEAP server over 
802.1X or
something similar. The device does not connect to the registrar. The 
device then
creates a voucher request and sends it to the TEAP server using a newly 
defined
TEAP TLV. The registrar signs the request, forwards it onto a MASA, and 
sends the
voucher it gets back from the MASA to the device using another newly 
defined TEAP

TLV.

  So the question is, will this even work? If the TEAP server and BRSKI 
registrar
are separate entities then the voucher will include the TEAP server's EE 
certificate
but it will be signed by the registrar's EE certificate. From my 
admittedly limited
understanding of BRSKI I think the MASA will reject this voucher request 
because it
fails the "proximity" check (if I understand the proximity check 
correctly). The

MASA will treat the registrar as a man-in-the-middle.

  BRSKI folks: is this correct? Will a voucher request be rejected from 
a deployment

like this?

  EMU folks: if the answer from the BRSKI folks is that this doesn't 
work then is there
any sort of weird tunneling or "phase 2" trickery that can be added to 
TEAP to get
this to work or should we just explicitly state that the TEAP server and 
the registrar

are the same entity (they authenticate with the same certificate)?

  Thanks,

  Dan.


___
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu