Skip to main content

Extensible Authentication Protocol (EAP) Mutual Cryptographic Binding
draft-ietf-emu-crypto-bind-04

Revision differences

Document history

Date Rev. By Action
2013-10-02
04 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2013-09-20
04 (System) RFC Editor state changed to AUTH48 from RFC-EDITOR
2013-09-06
04 (System) RFC Editor state changed to RFC-EDITOR from EDIT
2013-08-19
04 Sean Turner Notification list changed to : emu-chairs@tools.ietf.org, draft-ietf-emu-crypto-bind@tools.ietf.org
2013-08-19
04 (System) IANA Action state changed to No IC from In Progress
2013-08-19
04 (System) IANA Action state changed to No IC from In Progress
2013-08-19
04 (System) IANA Action state changed to In Progress
2013-08-19
04 (System) IANA Action state changed to In Progress
2013-08-19
04 Cindy Morgan State changed to RFC Ed Queue from Approved-announcement sent
2013-08-19
04 (System) RFC Editor state changed to EDIT
2013-08-19
04 (System) Announcement was received by RFC Editor
2013-08-19
04 Cindy Morgan State changed to Approved-announcement sent from IESG Evaluation::Point Raised - writeup needed
2013-08-19
04 Cindy Morgan IESG has approved the document
2013-08-19
04 Cindy Morgan Closed "Approve" ballot
2013-08-19
04 Cindy Morgan Ballot writeup was changed
2013-08-16
04 Tero Kivinen Closed request for Last Call review by SECDIR with state 'No Response'
2013-08-16
04 Sean Turner Ballot writeup was changed
2013-08-15
04 Cindy Morgan State changed to IESG Evaluation::Point Raised - writeup needed from IESG Evaluation
2013-08-15
04 Stephen Farrell
[Ballot comment]

3.2.3: this confused me "First, the server and peer
prove to each other knowledge of the inner MSK.  Then, the
inner MSK is …
[Ballot comment]

3.2.3: this confused me "First, the server and peer
prove to each other knowledge of the inner MSK.  Then, the
inner MSK is combined into some outer key material to form
the tunnel's keys."  Reading that, the implication would
be that I form a tunnel, then inside the tunnel do EAP
resulting in the inner MSK, and after that I "form the
tunnel's keys" which seems impossible as I've used the
tunnel already so how can I "form" its keys? Do you
mean "confirm" instead? (And a nit: "combined into"
seems odd, "combined with" would be clearer for me.)
2013-08-15
04 Stephen Farrell [Ballot Position Update] New position, Yes, has been recorded for Stephen Farrell
2013-08-14
04 Joel Jaeggli [Ballot Position Update] New position, No Objection, has been recorded for Joel Jaeggli
2013-08-14
04 Ted Lemon [Ballot Position Update] New position, No Objection, has been recorded for Ted Lemon
2013-08-14
04 Richard Barnes [Ballot Position Update] New position, No Objection, has been recorded for Richard Barnes
2013-08-13
04 Adrian Farrel [Ballot Position Update] New position, No Objection, has been recorded for Adrian Farrel
2013-08-12
04 Jari Arkko [Ballot comment]
Is there a response to the Gen-ART review by Francis Dupont?
2013-08-12
04 Jari Arkko [Ballot Position Update] New position, No Objection, has been recorded for Jari Arkko
2013-08-09
04 Spencer Dawkins [Ballot Position Update] New position, No Objection, has been recorded for Spencer Dawkins
2013-08-08
04 Martin Stiemerling [Ballot Position Update] New position, No Objection, has been recorded for Martin Stiemerling
2013-08-06
04 Barry Leiba [Ballot comment]
Very well written; thanks.
2013-08-06
04 Barry Leiba [Ballot Position Update] New position, Yes, has been recorded for Barry Leiba
2013-08-05
04 Brian Haberman [Ballot Position Update] New position, No Objection, has been recorded for Brian Haberman
2013-08-02
04 Sean Turner State changed to IESG Evaluation from Waiting for AD Go-Ahead
2013-07-27
04 Francis Dupont Request for Last Call review by GENART Completed: Ready. Reviewer: Francis Dupont.
2013-07-25
04 (System) State changed to Waiting for AD Go-Ahead from In Last Call
2013-07-22
04 Sean Turner Notification list changed to : emu-chairs@tools.ietf.org, draft-ietf-emu-crypto-bind@tools.ietf.org, emu@ietf.org
2013-07-19
04 Sean Turner Ballot has been issued
2013-07-19
04 Sean Turner [Ballot Position Update] New position, Yes, has been recorded for Sean Turner
2013-07-19
04 Sean Turner Created "Approve" ballot
2013-07-19
04 Sean Turner Ballot writeup was changed
2013-07-19
04 Sean Turner Document shepherd changed to Alan DeKok
2013-07-18
04 (System) IANA Review state changed to IANA OK - No Actions Needed from IANA - Review Needed
2013-07-18
04 Amanda Baber
IESG/Authors/WG Chairs:

IANA has reviewed draft-ietf-emu-crypto-bind-04, which is currently in Last Call, and has the following comments:

IANA notes that this document does not …
IESG/Authors/WG Chairs:

IANA has reviewed draft-ietf-emu-crypto-bind-04, which is currently in Last Call, and has the following comments:

IANA notes that this document does not contain a standard IANA Considerations section. After examining the draft, IANA understands that, upon approval of this document, there are no IANA Actions that need completion.

If this assessment is not accurate, please respond as soon as possible.
2013-07-15
04 Sean Turner Placed on agenda for telechat - 2013-08-15
2013-07-12
04 Tero Kivinen Request for Last Call review by SECDIR is assigned to Ben Laurie
2013-07-12
04 Tero Kivinen Request for Last Call review by SECDIR is assigned to Ben Laurie
2013-07-11
04 Jean Mahoney Request for Last Call review by GENART is assigned to Francis Dupont
2013-07-11
04 Jean Mahoney Request for Last Call review by GENART is assigned to Francis Dupont
2013-07-11
04 Amy Vezza IANA Review state changed to IANA - Review Needed
2013-07-11
04 Amy Vezza
The following Last Call announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: ietf@ietf.org
Sender:
Subject: Last Call:  (EAP Mutual Cryptographic Binding) to …
The following Last Call announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: ietf@ietf.org
Sender:
Subject: Last Call:  (EAP Mutual Cryptographic Binding) to Informational RFC


The IESG has received a request from the EAP Method Update WG (emu) to
consider the following document:
- 'EAP Mutual Cryptographic Binding'
  as Informational RFC

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2013-07-25. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


  As the Extensible Authentication Protocol (EAP) evolves, EAP peers
  rely increasingly on information received from the EAP server.  EAP
  extensions such as channel binding or network posture information are
  often carried in tunnel methods; peers are likely to rely on this
  information.  RFC 3748 is a facility that protects tunnel methods
  against man-in-the-middle attacks.  However, cryptographic binding
  focuses on protecting the server rather than the peer.  This memo
  explores attacks possible when the peer is not protected from man-in-
  the-middle attacks and recommends mutual cryptographic binding, a new
  form of cryptographic binding that protects both peer and server
  along with other mitigations.




The file can be obtained via
http://datatracker.ietf.org/doc/draft-ietf-emu-crypto-bind/

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-ietf-emu-crypto-bind/ballot/


No IPR declarations have been submitted directly on this I-D.


2013-07-11
04 Amy Vezza State changed to In Last Call from Last Call Requested
2013-07-11
04 Sean Turner Last call was requested
2013-07-11
04 Sean Turner Ballot approval text was generated
2013-07-11
04 Sean Turner Ballot writeup was generated
2013-07-11
04 Sean Turner State changed to Last Call Requested from AD Evaluation::AD Followup
2013-07-11
04 Sean Turner Last call announcement was generated
2013-07-11
04 Sean Turner Changed document writeup
2013-07-10
04 (System) Sub state has been changed to AD Followup from Revised ID Needed
2013-07-10
04 Sam Hartman New version available: draft-ietf-emu-crypto-bind-04.txt
2013-06-20
03 Sean Turner State changed to AD Evaluation::Revised I-D Needed from AD Evaluation::Point Raised - writeup needed
2013-06-04
03 Sean Turner State changed to AD Evaluation::Point Raised - writeup needed from AD Evaluation
2013-05-20
03 Sean Turner State changed to AD Evaluation from Publication Requested
2013-05-15
03 Cindy Morgan
(1) What type of RFC is being requested (BCP, Proposed Standard,
Internet Standard, Informational, Experimental, or Historic)?

Informational.

Why is this the proper type of …
(1) What type of RFC is being requested (BCP, Proposed Standard,
Internet Standard, Informational, Experimental, or Historic)?

Informational.

Why is this the proper type of RFC?

It explores attacks on EAP tunneled methods, and makes
recommendations for how these attacks can be mitigated. It does not
provide a protocol.

Is this type of RFC indicated in the title page header?

Yes.


(2) The IESG approval announcement includes a Document Announcement
Write-Up. Please provide such a Document Announcement Write-Up. Recent
examples can be found in the "Action" announcements for approved
documents. The approval announcement contains the following sections:


Technical Summary:

EAP tunneled methods require that EAP peers rely on information from
the EAP server. Various security related information is carried
inside of the tunnel, and are used by the peers. Methods exist to
protect the peers against MITM attacks. The document discusses
attacks on the tunneled data, and recommends mutual cryptographic
binding to protect both parties.

Working Group Summary:

The docuemnt records the consensus of the WG as developed over the
last year. Any controversy about the contents has been resolved by
updates to the document, and WG consensus was not rough.

Document Quality:

The document provides a clear description of the attacks and
recommended solutions. There are no protocol changes in the
document, so no implementations are required.

Personnel:

The Document Shepherd is Alan DeKok.

The Responsible Area Director is Sean Turner.

(3) Briefly describe the review of this document that was performed by
the Document Shepherd. If this version of the document is not ready
for publication, please explain why the document is being forwarded to
the IESG.

I have reviewed each iteration of the document as it progressed
through the working group. The document accurately reflects the
consensus of the working group and is ready for publication.q

(4) Does the document Shepherd have any concerns about the depth or
breadth of the reviews that have been performed?

No. The document has had a number of reviews from knowledgable
participants in the working group.

(5) Do portions of the document need review from a particular or from
broader perspective, e.g., security, operational complexity, AAA, DNS,
DHCP, XML, or internationalization? If so, describe the review that
took place.

The document is focussed on security. Many secdir members have
reviewed the document.

(6) Describe any specific concerns or issues that the Document
Shepherd has with this document that the Responsible Area Director
and/or the IESG should be aware of? For example, perhaps he or she is
uncomfortable with certain parts of the document, or has concerns
whether there really is a need for it. In any event, if the WG has
discussed those issues and has indicated that it still wishes to
advance the document, detail those concerns here.

There are no concerns that the IESG should be aware of.

(7) Has each author confirmed that any and all appropriate IPR
disclosures required for full conformance with the provisions of BCP
78
and BCP 79 have already been filed. If not, explain why?

Yes.

(8) Has an IPR disclosure been filed that references this document? If
so, summarize any WG discussion and conclusion regarding the IPR
disclosures.

No IPR disclosures have been filed in relation to this document.

(9) How solid is the WG consensus behind this document? Does it
represent the strong concurrence of a few individuals, with others
being silent, or does the WG as a whole understand and agree with it?

The WG consensus is strong, across a number of individuals.

(10) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarise the areas of conflict in separate
email messages to the Responsible Area Director. (It should be in a
separate email because this questionnaire is publicly available.)

No appeals have been threatened. No extreme discontent has been
indicated.

(11) Identify any ID nits the Document Shepherd has found in this
document. (See http://www.ietf.org/tools/idnits/ and the
Internet-Drafts Checklist). Boilerplate checks are not enough; this
check needs to be thorough.

** The document seems to lack an IANA Considerations section. (See
Section
2.2 of http://www.ietf.org/id-info/checklist for how to handle the case
when there are no actions for IANA.)

No IANA considerations is necessary for this document.

== Missing Reference: 'RFC 3748' is mentioned on line 18, but not defined

== Outdated reference: draft-ietf-emu-chbind has been published as RFC
6677


== Outdated reference: A later version (-06) exists of
draft-ietf-emu-eap-tunnel-method-05

== Outdated reference: draft-ietf-emu-eaptunnel-req has been published as
RFC 6678

== Outdated reference: A later version (-09) exists of
draft-ietf-nea-pt-eap-08

These references can be updated as part of the RFC editor process.

(12) Describe how the document meets any required formal review
criteria, such as the MIB Doctor, media type, and URI type reviews.

No formal reviews are necessary for this document.

(13) Have all references within this document been identified as
either normative or informative?

Yes. The only normative references are 2119 and 3748 (EAP).
All other references are informative.

(14) Are there normative references to documents that are not ready
for advancement or are otherwise in an unclear state? If such
normative references exist, what is the plan for their completion?

No.

(15) Are there downward normative references references (see RFC
3967
)? If so, list these downward references to support the Area
Director in the Last Call procedure.

No.

(16) Will publication of this document change the status of any
existing RFCs? Are those RFCs listed on the title page header, listed
in the abstract, and discussed in the introduction? If the RFCs are
not listed in the Abstract and Introduction, explain why, and point to
the part of the document where the relationship of this document to
the other RFCs is discussed. If this information is not in the
document, explain why the WG considers it unnecessary.

Publication of this document will not change the status of any RFCs.

(17) Describe the Document Shepherd's review of the IANA
considerations section, especially with regard to its consistency with
the body of the document. Confirm that all protocol extensions that
the document makes are associated with the appropriate reservations in
IANA registries. Confirm that any referenced IANA registries have been
clearly identified. Confirm that newly created IANA registries include
a detailed specification of the initial contents for the registry,
that allocations procedures for future registrations are defined, and
a reasonable name for the new registry has been suggested (see RFC
5226
).

This document has no IANA considerations.

(18) List any new IANA registries that require Expert Review for
future allocations. Provide any public guidance that the IESG would
find useful in selecting the IANA Experts for these new registries.

This document has no IANA registries.

(19) Describe reviews and automated checks performed by the Document
Shepherd to validate sections of the document written in a formal
language, such as XML code, BNF rules, MIB definitions, etc.

This document requires no automated validation.
2013-05-15
03 Cindy Morgan Note added 'Alan DeKok (aland@deployingradius.com) is the document shepherd.'
2013-05-15
03 Cindy Morgan Intended Status changed to Informational
2013-05-15
03 Cindy Morgan IESG process started in state Publication Requested
2013-05-15
03 (System) Earlier history may be found in the Comment Log for draft-hartman-emu-mutual-crypto-bind
2013-03-14
03 Sam Hartman New version available: draft-ietf-emu-crypto-bind-03.txt
2013-02-25
02 Sam Hartman New version available: draft-ietf-emu-crypto-bind-02.txt
2013-01-05
01 Dacheng Zhang New version available: draft-ietf-emu-crypto-bind-01.txt
2012-06-29
00 Sam Hartman New version available: draft-ietf-emu-crypto-bind-00.txt