Re: [Emu] draft-ietf-emu-eap-tls13-11: OCSP Stapling

2020-10-22 Thread Hannes Tschofenig
Hi Michael, Thanks for the question. I am objecting to the mandatory use of OCSP for TLS 1.3 in EAP-TLS. I am fine with having it optional. Mbed TLS is used in implementations of EAP-TLS and we have received little interest in OCSP support. The interest is so low that the proposed code was

Re: [Emu] draft-ietf-emu-eap-tls13-11: OCSP Stapling

2020-10-22 Thread Jan-Frederik Rieckers
Hi to all, as an operator of a EAP-TLS server for eduroam at the University Bremen I just want to give some of my thoughts here, feel free to read or ignore them ;) The eduroam environment is heavily used for BYOD, so we don't have any opportunity to change certificates via a Device Management.

Re: [Emu] Proposed resolution for TEAP errata 5765

2020-10-22 Thread Oleg Pekar
The Authority-ID TLV is used by the client to identify the TEAP server it is talking to. If the same client talks to more than one TEAP server - it can keep PACs or cached data from all of them identified by the Authority-ID. If we make it optional in TEAP start message but keep mandatory in

Re: [Emu] draft-ietf-emu-eap-tls13-11: OCSP Stapling

2020-10-22 Thread Eliot Lear
+1. How does anyone even do OCSP without having first gotten onto the network? Eliot > On 21 Oct 2020, at 11:02, Hannes Tschofenig wrote: > > Hi all, > > this draft mandates OCSCP stapling (for use with TLS 1.3 in EAP-TLS) and I > believe this is a problem for implementations. This extra

Re: [Emu] Proposed resolution for TEAP errata for 5128

2020-10-22 Thread Joseph Salowey
On Thu, Oct 22, 2020 at 6:59 AM Oleg Pekar wrote: > Hi all, > Speaking about both errata 5127 and 5128, I think we need to align all key > derivation calls in TEAP RFC with the same rule/format to make the RFC > easier to understand. This can be achieved by introducing a unified single > PRF

Re: [Emu] Resolution of TEAP Errata 5767

2020-10-22 Thread Oleg Pekar
The proposal is aligned with previously discussed. One small wording I would change is: Section 4.2.13 says: It MUST be included with the Intermediate-Result TLV to perform cryptographic binding after each successful EAP authentication method in a sequence of >>>one or more<<< EAP methods, before

Re: [Emu] Proposed resolution for TEAP errata for 5128

2020-10-22 Thread Jorge Vergara
My concern with this proposal of defining a new KDF is that it is a clear breaking change to any implementation that may exist. In my opinion such a change would be fine if we want to bump some version numbers - maybe the TEAP version number has to be bumped, or maybe this can be achieved

Re: [Emu] Proposed resolution for TEAP errata for 5128

2020-10-22 Thread Alan DeKok
On Oct 22, 2020, at 10:12 AM, Jorge Vergara wrote: > > My concern with this proposal of defining a new KDF is that it is a clear > breaking change to any implementation that may exist. I am wary of breaking existing and deployed implementations. > In my opinion such a change would be fine

Re: [Emu] Proposed resolution for TEAP errata for 5128

2020-10-22 Thread Oleg Pekar
Hi all, Speaking about both errata 5127 and 5128, I think we need to align all key derivation calls in TEAP RFC with the same rule/format to make the RFC easier to understand. This can be achieved by introducing a unified single PRF function that will be called from all the relevant RFC locations.

Re: [Emu] Proposed resolution for TEAP errata for 5128

2020-10-22 Thread Joseph Salowey
On Thu, Oct 22, 2020 at 9:29 AM Oleg Pekar wrote: > I agree that changing the KDF is harmful to existing implementations. > However, if I understood correctly, Joe's suggestion for IMCK[j] also > breaks the existing implementation. I still see that we can define a > unified KDF by changing the

Re: [Emu] Proposed resolution for TEAP errata for 5128

2020-10-22 Thread Jorge Vergara
>[Joe] This is the one we have not discussed yet. This derivation is also >ambiguous. THis section does not reference 5295. It's not clear if the >original intent was to include the length in the hash or not. I think there >are a few interpretations: > >1. TLS-PRF(S-IMCK[j], "Session Key

Re: [Emu] Proposed resolution for TEAP errata for 5128

2020-10-22 Thread Oleg Pekar
I agree that changing the KDF is harmful to existing implementations. However, if I understood correctly, Joe's suggestion for IMCK[j] also breaks the existing implementation. I still see that we can define a unified KDF by changing the API in the RFC but with the same harm to the existing

Re: [Emu] Proposed resolution for TEAP errata for 5128

2020-10-22 Thread Oleg Pekar
>No, Microsoft implements number 1 of Joe’s presented options. That is - P_(S-IMCK[j], "Session Key Generating Function"). >This follows the same pattern as the errata we are discussion. I am very surprised to hear that Cisco’s implementation may be different. Oleg, could you please double

Re: [Emu] draft-ietf-emu-eap-tls13-11: OCSP Stapling

2020-10-22 Thread Michael Richardson
Hannes Tschofenig wrote: > Thanks for the question. I am objecting to the mandatory use of OCSP for TLS 1.3 in EAP-TLS. > I am fine with having it optional. okay, so it's not about the stapling, at all for you, it's about the OCSP itself. -- Michael Richardson. o O ( IPv6 IøT

Re: [Emu] draft-ietf-emu-eap-tls13-11: OCSP Stapling

2020-10-22 Thread Joseph Salowey
On Thu, Oct 22, 2020 at 8:08 AM Eliot Lear wrote: > +1. How does anyone even do OCSP without having first gotten onto the > network? > > [Joe] THat is what OCSP stapling is supposed to solve since the OCSP messages are sent in the TLS handshake. I believe there are some EAP-TLS

Re: [Emu] draft-ietf-emu-eap-tls13-11: OCSP Stapling

2020-10-22 Thread Michael Richardson
Joseph Salowey wrote: > On Thu, Oct 22, 2020 at 8:08 AM Eliot Lear > wrote: >> +1. How does anyone even do OCSP without having first gotten onto the >> network? > [Joe] THat is what OCSP stapling is supposed to solve since the OCSP > messages are sent in the TLS