Internet DRAFT - draft-zhou-emu-ch-tunnel
draft-zhou-emu-ch-tunnel
EAP Method Update S. Zhou
Internet-Draft ZTE Corporation
Intended status: Standards Track July 6, 2012
Expires: January 7, 2013
Combination of Channel Binding and Tunnel Method
draft-zhou-emu-ch-tunnel-00
Abstract
This document proposes to incorporate channel binding as defined in
[I-D.ietf-emu-chbind ] into EAP tunnel method as soon as possible.
Status of this Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on January 7, 2013.
Copyright Notice
Copyright (c) 2012 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Zhou Expires January 7, 2013 [Page 1]
Internet-Draft draft-zhou-emu-ch-tunnel-00 July 2012
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1. Terminology . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Channel Binding after Tunnel Establishment . . . . . . . . . . 3
3. Channel Binding after the First Inner Method . . . . . . . . . 4
4. IANA Considerations . . . . . . . . . . . . . . . . . . . . . . 4
5. Security Considerations . . . . . . . . . . . . . . . . . . . . 4
6. Normative References . . . . . . . . . . . . . . . . . . . . . 4
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 5
Zhou Expires January 7, 2013 [Page 2]
Internet-Draft draft-zhou-emu-ch-tunnel-00 July 2012
1. Introduction
Channel binding as define in [I-D.ietf-emu-chbind] is used to
imitigate lying authenticator , and is implemented as part of the
ongoing EAP method, because the assertion transported from the EAP
server to EAP peer is authenticated by the resluting key (TEK, to be
more specific) derived from the EAP method. Although it is a bit
late to know the contacting authenticator is a liar after the peer
has completed the EAP method, it is a rather reasonable compromise to
the legacy EAP methods.
EAP Tunnel methods, e.g., defined in
[RFC4851][RFC5281][I-D.ietf-emu-eap-tunnel-method], are used to
protect weak EAP methods, especially some legacy EAP methods. When
it comes to using channel binding in tunnel methods, it is more
complex. To maximise the compatibility , channel binding may still
be carried out with the inner EAP method, using the inner TEK, or
some key derived from tunnel key (output from tunnel method) and
inner EAP method key, which has not been specified. This way, a peer
is assured of the honesty of the contacting authenticator only after
both the tunnel establishement and the completement of the inner EAP
method.
Since tunnel methods are used to protect the inner method, it might
be desirebale to provide channel binding simultaneously with or right
after the tunnel establishment.
1.1. Terminology
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119].
2. Channel Binding after Tunnel Establishment
When there is no inner EAP method after the tunnel
establishement,which is not ruled out in the current tunnel method
specification, or the inner method does not output key, channel
binding is carried out immediately after the tunnel establishment
according to the procedure defined in [I-D.ietf-emu-chbind], the key
used to authenticate the CB_Success or CB-Failure is derived from the
tunnel key TK and some shared secret (TEK) between EAP server and the
peer. TEK could be NULL if no shared secret can be provided at this
time.
In this case, when TEK is NULL, the certificate verification of the
EAP server (i.e., the tunnel server) is crucial, as pointed out in
Zhou Expires January 7, 2013 [Page 3]
Internet-Draft draft-zhou-emu-ch-tunnel-00 July 2012
[I-D.ietf-emu-crypto-bind].
3. Channel Binding after the First Inner Method
When some inner methods are carried out after the tunnel
establishment, and the first inner method outputs key, channel
binding is executed along with the first inner method, as defined in
[I-D.ietf-emu-chbind],the key used to authenticate the CB-Success or
CB_Failure is derived from the tunnel key TK and one of the outputs
of the first inner method , i.e., TEK.
4. IANA Considerations
This document includes no request to IANA.
5. Security Considerations
This document proposes to carry out channel binding as soon as
possible, in the case of EAP tunnel method is involved, to detect
rogueauthenticator as early as possible.
6. Normative References
[I-D.ietf-emu-chbind]
Hartman, S., Clancy, T., and K. Hoeper, "Channel Binding
Support for EAP Methods", draft-ietf-emu-chbind-16 (work
in progress), May 2012.
[I-D.ietf-emu-crypto-bind]
Hartman, S., Wasserman, M., and D. Zhang, "EAP Mutual
Cryptographic Binding", draft-ietf-emu-crypto-bind-00
(work in progress), June 2012.
[I-D.ietf-emu-eap-tunnel-method]
Zhou, H., Cam-Winget, N., Salowey, J., and S. Hanna,
"Tunnel EAP Method (TEAP) Version 1",
draft-ietf-emu-eap-tunnel-method-03 (work in progress),
June 2012.
[I-D.josefsson-pppext-eap-tls-eap]
Josefsson, S., Palekar, A., Simon, D., and G. Zorn,
"Protected EAP Protocol (PEAP) Version 2",
draft-josefsson-pppext-eap-tls-eap-10 (work in progress),
October 2004.
Zhou Expires January 7, 2013 [Page 4]
Internet-Draft draft-zhou-emu-ch-tunnel-00 July 2012
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC4851] Cam-Winget, N., McGrew, D., Salowey, J., and H. Zhou, "The
Flexible Authentication via Secure Tunneling Extensible
Authentication Protocol Method (EAP-FAST)", RFC 4851,
May 2007.
[RFC5281] Funk, P. and S. Blake-Wilson, "Extensible Authentication
Protocol Tunneled Transport Layer Security Authenticated
Protocol Version 0 (EAP-TTLSv0)", RFC 5281, August 2008.
Author's Address
Sujing Zhou
ZTE Corporation
No.68 Zijinghua Rd. Yuhuatai District
Nanjing, Jiang Su 210012
R.R.China
Email: zhou.sujing@zte.com.cn
Zhou Expires January 7, 2013 [Page 5]