Notes: Janfred, MCR

Administrivia (5 min)

Working Group Documents (5 min)

Tunnel Extensible Authentication Protocol (TEAP) Version 1 (2 min)

Waiting for write-up by Paul Wouters (relevant Security AD)

Forward Secrecy for the Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA' FS) (3 min)

It's in the hand of the authors, there are two things:
One nit from IANA reviewers, promised to review things from previous

Non-Working group Items (50 min)

EAP-EDHOC (5 min)

There was discussion about adoption in Yokohama, not much support.
Hasn't gone anywhere.

This is a new EAP method for EDHOC. EDHOC itself was just approved and
is currently in the RFC Editor queue.

EAP-EDHOC is basically mimicking EAP-TLS. Draft is still WIP.

Asked about support, some of the supporters are in the CBOR WG right
now, there is support from people who are not present.
Interest in automotive industry, 3GPP, ...

Chairs: We need to see support from the WG, have not seen statements of
support from the people working in this WG.

Renzo Navas: EDHOC fits nicely for EAP with IoT use cases.

Margaret Cullen: With remote participation, I want to hear from people
why they need this and why current EAP methods don't fit their needs.

Alexander: Worked on EAP over LoRaWAN, really regret that it was not the
EAP-based standard that was chosen. LoRaWAN is one case, but there are a
lot of low-power solutions popping off, important to work on this.

Göran Selander: What we are trying to do is reduce the message overhead,
which has a big impact on usability and lifetime of devices.

Chairs: Will do a Call for Adoption on the Mailing List.

EAP over IP

Hooman Bigdoli presenting. This is really MKA (MACsec Key Agreement
protocol) over IP, as the slides are actually titled.

Joe Salowey: While this WG has EAP in the name, EAPOL is part of IEEE
802.1. This WG probably won't deal with this, since we deal with
authentication. We could give it to secdispatch or we could recharter.
Paul (AD): Initial thought was this might not be the best WG, maybe
routing dispatch, it sounds a bit like routing.
Paul (AD hat off) You talk about "Quantum safe", but that depends on the
key agreement. Just using PSK is quantum safe, but the problem is
distributing the PSK.

Dan Harkins: Why not PANA (RFC 5191)? This is EAP over UDP, should
solve your problem.

MCR: There are already several protocols that solve the problem.

MCR asks what the point of this is, and the answer was that this is to
key MPLS and some other L2.5 protocols such that they can use the MACsec
line speed hardware to encrypt these other L2 protocols, but for many of
these, they need to be able to do keying between IP/UDP end-points. Thus
MKA over UDP would make sense.

Deb Cooley: Just because you're using PSK doesn't mean you're (Quantum)

The eap.arpa domain and EAP provisioning (15 min)

Alan DeKok presenting.

Define a non-routable domain for provisioning EAP.

We need to have a domain under IETF control, that is not routable.

Suggestion: Add eap.arpa. to the arpa registry. This is fail-safe.
Then add a new registry under eap.arpa, maybe with a designated name
space for vendor-specific

Paul Wouters (no hats): Recently we got .alt for TLS, which is
guaranteed not routable.
Alan: Possible, but we want to have a reliable, interoperable way (with
a registry, and a pointer to RFCs).

Eliot Lear: There are a couple of differences between .arpa and .alt.
This is not so much alternate name resolution, it is a signal for a
mechanism for IETF-related protocols. It needs to have specifications,
to know what to do if you observe this domain. This is specifically for
the NAI.

Alan: Example: If the device uses dpp@eap.arpa, the server knows to
start DPP.

This draft defines the eap.arpa domain and the related registry.
Idea: Every spec would define an identifier and what to do when you see
that identifier.

EAP-FIDO (20 min)

Focused on Bring-Your-Own-Device, and user can be expected to do a web
transaction to enroll their FIDO token.
?- will DNS people accept something like
?- does the device have DNS access to be able to do this lookup.

Eliot: "FIDO" is vague, please be clearer about which thing you are
Alan: Historical issue is how to configure it, too difficult, so it's
good that you are simplifying things. Passkey looks way better than
passwords. A key thing is that the end-user should be able to configure
without getting it wrong.
Margaret: Generally supportive, a previous presentation wanted to make
some changes to EAP-TLS to make this work, and maybe we need to do this,
and then use it for FIDO.
Decided to make a new method that was EAP-TLS baked in, but as a new
method, rather than an inner EAP method.
Haiguang Wang: what kind of credential are you using?
Janfred: Completely dependent upon what the authenticator wants to do?
Haiguang: Do you need to see end-user data on the server side?
Janfred: On the server we need to have PKID access, like WebAUTHN.

MCR: Eliot, did you want it to say EAP-BANANA? Or just EAP-FIDO-XXXX?
Eliot: EAP-FIDO-XXXX, which is the subtype of FIDO usage.

Joe: Can I use the same token with multiple services?
Janfred: The intent is to use the same token as for multiple uses, with
some concern about cross-system systems.

Janfred: Should EMU work on this?
Eliot: When we do these sorts of cross-organizational things, what is
important is the experts that work on FIDO authenticators are involved
in testing and writing. We need to let FIDO know about this. Are there
people to who want to join this party? We just need to make sure that
the work will be completed, and that it will get used.
Janfred: I received some feedback from the WebAuthn WG, and they sent
some comments directly.
Eliot: And they are on the EMU list, and they will review it?
Deb: Do you care about revocation?
MCR: Isn't that EAP-DIE?
Janfred: As with passwords, you just delete the account.
Stefan Winter: These tokens are always scoped to the specific domain, so
when you delete one, it is only for a specific usage.
Janfred: For discoverable credentials, then deleting locally has an
issue, but for non-discoverable credentials the server is secured

Eliot: There are a suite of FIDO standards that can be used for
authentication (github, vs. ?) Are these the same standards, or?
Stefan: The CTAPv2 wraps up this various options. "It's the banana".

ACTION: Chairs will take action to talk to FIDO.