Skip to main content

Minutes IETF106: emu
minutes-106-emu-00

Meeting Minutes EAP Method Update (emu) WG
Date and time 2019-11-18 07:50
Title Minutes IETF106: emu
State Active
Other versions plain text
Last updated 2019-11-26

minutes-106-emu-00
IETF 106 Minutes for EMU working group
(Eliot, as note taker)

Joe promptly started the meeting.

Note well presented. Agenda bashing.  None.

WG documents

Jari

RFC-5448bis going to IESG.

EAP-AKA
 - two updates
 - no huge change
 - document is now an update.
 - use is RECOMMENDED
 - clarify references ECDSA curve25519; deletes IKEv2 reference.
 - simplified AKA sim card terminology

 One remaining issue:
     - this draft defines one algorithm (25519); carried in an attribute.
     - should we already from day 1 have two?
     - how to handle registration of numbers?
     - can we overload a registry?

Eliot:
     - are there other curves standardized?

John Mattsen:
    - p256 or p384 should be listed but one or two more optional
    - reuse where practical

Jari:
    - one has to customize for this use.

Tero:
    - what if you use someone else's registry and then you want to add a new
    algorithm but they don't want it?

Eliot:
    - Short term: agree that maybe need to create own registry
    - Long term: here we go again with yet another encryption registry.  Matter
    for IAB.

John Mattsen:
    TLS1.3 draft

    Two draft updates.  OpenSSL does not support empty application string. 
    Send \0. Same type of an issue with early data.  Not supported in library.

    some additional references.

    EAP-TLS 1.3 with PSK

Bernard:
    New modes would be viewed as an attack.
    Need a new code point.

Mohit:
    Keep document small
    Have separate

Joe: Anyone opposed to using separate code point?

No.

Joe: Anyone opposed to using separate document?

mixed hum

Owen:
    We need guidance on resumption

John:
    Relationship between EAP identity and NAI
    When using external PSK provide anonymous NAI.

Dan Harkins:
    PAKE selection process.
    Wait for PAKE?
    Offline dictionary attacks something to worry about in the general case.

Tero: PSK != password.

Dan: let's be careful that we can stop abuse with guidance.  Let's come up with
tools that are misuse-resistent.

Tero: you can't idiot-proof this.

Dan: let's not make arguments from an absurd position.

Joe: more discussion to be had.

Joe: identity binding certificates to NAI.

Alan on Identities

 - recommend use of NAI, anonymous @realm
 - common practice is that EAP identity derived from common name.

 - resumption needs to use same identity as original.

 Discussion around derivation of NAI.  Stick with anonymous NAI MTI and SHOULD
 be used.

Alan issue- have a separate identities section.  And then explain what this
means for each use case.

Bernard:
    - there might be more than one anonymous NAI.
    - using anonymous NAI happens before method negotiation.

EAP methods and TLS1.3 and various methods

Alan:  What to do with FAST?
 - TEAP updates belong here.
 - People are holding implementation on all TLS until they can do all methods.

EAP-NOOB

Toumas Aura

Did NOOB review
Two implementations
Formally modelled with mCRL2 and ProVerif
Stable implementation

Abhijan Bhattachrya

Gap in knownlege terms of securing devices.  This kind of solution could help.
Problem: When companies go to market, end customer would not like to use
anything that is non-standard. {Something about IANA} Push for adoption

Roman:
    Charter on review for final ballot in 2 weeks.

Joe: once charter is approved then we can go forward with adoption call.

BRSKI
Eliot Lear

Simplified the proposal. However, because of the many errata, it might be
better to adress TEAP, instead just BRSKI.

Mohit: I would suggest you separate the BRSKI from TEAP. Maybe splitting it up
might make sense. Eliot: I think it the opposite way - I do not want to sift
through different documents. Mohit: No strong feeling, I leave it up to you
expertise to decide.

There are a couple of places in the Errata that do require more discussions
(e.g., derivation). Others are small and we might want to just "Proceed" We
have new TLVs - we might slow-roll this, we might want to separate the
documents. There are some considerations that need to be worked out (i.e.,
802.11 capabilities - DPP or Others) The Next Steps - how do we deal with TLS
1.3 ? Let's focus on BRSKI, let's get some code working, and we deal with this
issue in the TLS document. In March the document should be in better state and
we might be ready for adoption then.

Joe: We should start knocking the Errata off.
Eliot: I will take the action to post the Errata with proposed solution. As we
do this in parallel with other things on TEAP being done.

EAP-CREDS
Max Pala

Focus on draft is to handle on mix of credentials.
This is an encapsulation mechanism.
Three different phases: initialization, management, and validation.

What has changed:
       simplified proposal.
       also added new text!
       defines SPP - simple provisioning protocol
    -
    So MORE simplification by removing SPP
    Many different use cases.

Liang Xia:
    What is the relation between this and what is currently done?

Max:
    this really takes into account appropriate deployment approach.  There are
    multiple input mechanisms and they may not match to output mechanisms.

Eliot:
    Be careful about kitchen sink approach, but possible merge opportunity. 
    Need to avoid fragmentation.  Let's try to reduce.  Why not have included
    SCEP, for instance?  Maybe merge with TEAP-BRSKI proposal.  Can we distill
    down architecturally?

Max: could use DPP through EAP with EAP-CREDS

draft-rieckers-eapparameterextension-00
Jan-Frederik Rieckers

Certificate checks are insecure.

  Questions to user that are meaningless.  Big issue for eduroam.

  EAP-TLS specification lacks information about whether cert is valid for a
  particular use.

Add new cert extension that adds a valid realm for cert.  Validatable by CAs if
realm is a domain name. > Looks a little like RFC 7585

But not the same scope

> Uae a specific prefix in domain name or CN?

Eliot: clarify use case
Jan Frederik: we need a way to bind a cert to a particular realm.

Bernard: this might be dangerous because a cert could get installed that fakes
an NAI realm.

Carsten: really helps to be able production systems such that it rejects broken
and misconfigured systems.

Alan: EAP-TLS certifictea have TLS web server OIDs.  It would help if we could
have a specific purpose cert.  There may be a need for an EAP practices
document.  This is an issue that is worth working on.

Owen Friel:

    ACME Integrations

    ACME needs the extension in the TEAP update.

    What's changed?

    ACME subdomain split into a separate doc. Nice optimization for issuing a
    large number of client certificates.

    BRSKI Cloud Registrar
    this draft only need be informational.
    Where does this go?

Max: how do you handle acct management?
Owen: TEAP server
Liang Xia: What is relation to BRSKI?
Owen: very little relation?