1 | These notes do not attempt to duplicate the content of the slides.
|
---|
2 | Instead, they summarize the material presented, and focus on comments
|
---|
3 | and discussion.
|
---|
4 |
|
---|
5 |
|
---|
6 | Agenda
|
---|
7 | ======
|
---|
8 |
|
---|
9 | Date: Thursday, Jan 28, 2010
|
---|
10 | Time: 0800-1000 PST / 1600-1800 GMT
|
---|
11 | WG Charter: http://www.ietf.org/html.charters/nea-charter.html
|
---|
12 | WG Tools: http://tools.ietf.org/wg/nea
|
---|
13 | WG email: nea@ietf.org
|
---|
14 |
|
---|
15 | 0800 Administrivia
|
---|
16 | Blue Sheets
|
---|
17 | Jabber & Minute scribes
|
---|
18 | Agenda bashing
|
---|
19 | 0805 WG Status, Meeting Goal and Consensus Check Process
|
---|
20 | 0810 Review PT submissions: TLS
|
---|
21 | http://www.ietf.org/id/draft-sangster-nea-pt-tls-00.txt
|
---|
22 | 0830 Review PT submissions: EAP
|
---|
23 | http://www.ietf.org/internet-drafts/draft-hanna-nea-pt-eap-00.txt
|
---|
24 | http://www.ietf.org/id/draft-cam-winget-eap-nea-tlv-00.txt
|
---|
25 | http://www.ietf.org/id/draft-cam-winget-eap-tlv-00.txt
|
---|
26 | 0930 Plan for developing WG I-Ds
|
---|
27 | 0950 Next Steps
|
---|
28 | 1000 Adjourn
|
---|
29 |
|
---|
30 |
|
---|
31 | Minute Scribes
|
---|
32 | ==============
|
---|
33 | Brian Ford and Steve Hanna volunteered to take minutes.
|
---|
34 |
|
---|
35 | Agenda Bashing
|
---|
36 | ==============
|
---|
37 | Susan Thomson reviewed the proposed agenda. No changes were needed.
|
---|
38 |
|
---|
39 | WG Status
|
---|
40 | =========
|
---|
41 | Susan Thomson reviewed WG status.
|
---|
42 |
|
---|
43 | The PA-TNC and PB-TNC I-Ds are in the RFC Editor Queue. They are going
|
---|
44 | through the final editing process and will hopefully be published soon.
|
---|
45 |
|
---|
46 | Call for submissions for PT protocols ended Jan 4, 2010. One TLS proposal
|
---|
47 | and two EAP proposals were submitted.
|
---|
48 |
|
---|
49 | Meeting Goal
|
---|
50 | ============
|
---|
51 | The aim of this interim meeting is to review the PT proposals and propose
|
---|
52 | the path forward for developing WG drafts.
|
---|
53 |
|
---|
54 | Consensus Check Questions:
|
---|
55 |
|
---|
56 | Susan previewed the consensus check questions that would be asked at the
|
---|
57 | end of the call for the purpose of determining the path forward for WG
|
---|
58 | drafts of the PT protocols.
|
---|
59 |
|
---|
60 | For the TLS-based PT, there will be 2 questions:
|
---|
61 |
|
---|
62 | 1. Is there an interest in working on a TLS-based PT in general? Possible
|
---|
63 | answers are:
|
---|
64 | - Yes
|
---|
65 | - No
|
---|
66 | - Defer (decision pending some other action taking place)
|
---|
67 |
|
---|
68 | 2. Is there support for adopting the PT-TLS proposal, in particular, as a
|
---|
69 | -00 WG draft:
|
---|
70 | - Yes
|
---|
71 | - No
|
---|
72 | - Defer (decision pending some other action taking place)
|
---|
73 |
|
---|
74 |
|
---|
75 | Similarly, for the EAP-based PT, there will be two questions:
|
---|
76 | 3. Is there an interest in working on a EAP-based PT in general? Possible
|
---|
77 | answers are:
|
---|
78 | - Yes
|
---|
79 | - No
|
---|
80 | - Defer (decision pending some other action taking place)
|
---|
81 |
|
---|
82 | 4. What should we adopt as a -00 WG I-D?
|
---|
83 | - PT-EAP
|
---|
84 | - NEA-TLV
|
---|
85 | - Other / Defer
|
---|
86 |
|
---|
87 | For answers of no/defer/other, we would like to understand why, so that
|
---|
88 | we can figure out how to make progress.
|
---|
89 |
|
---|
90 | Review of PT-TLS
|
---|
91 | =================
|
---|
92 | Paul Sangster reviewed the PT-TLS proposal and described how the proposal
|
---|
93 | meets the PT requirements laid out in RFC 5209 and the PB-TNC I-D.
|
---|
94 |
|
---|
95 | PT-TLS is a TCG specification published last year. It has the same IPR
|
---|
96 | grants as PA-TNC and PB-TNC.
|
---|
97 |
|
---|
98 | PT-TLS supports posture assessment over TLS as an application. No changes
|
---|
99 | to TLS are required.
|
---|
100 |
|
---|
101 | PT-TLS addresses the PT requirements for a L3 transport. Use cases
|
---|
102 | include posture re-assessment, application services and non-802.1x-
|
---|
103 | enabled networks.
|
---|
104 |
|
---|
105 | PT-TLS consists of 3 phases:
|
---|
106 | 1. TLS Handshake (unchanged)
|
---|
107 | 2. Pre-Negotiation
|
---|
108 | - version negotiation
|
---|
109 | - optional client authentication
|
---|
110 | 3. Data Transport
|
---|
111 | - NEA Assessment
|
---|
112 |
|
---|
113 | PT-TLS supports client authentication during the TLS handshake. It also
|
---|
114 | provides the ability for the NEA Server to request that the client
|
---|
115 | authenticate after the handshake. PT-TLS defines a basic authentication
|
---|
116 | mechanism similar to that for the web. The proposal provides a framework
|
---|
117 | for adding other authentication types later.
|
---|
118 |
|
---|
119 | The data transport phase carries PB-TNC messages and supports error
|
---|
120 | handling.
|
---|
121 |
|
---|
122 | The PT-TLS message format is similar to that of PA-TNC and PB-TNC
|
---|
123 | containing a message type scoped by vendor-id. Like PA-TNC, a message
|
---|
124 | identifier is used to aid in error processing.
|
---|
125 |
|
---|
126 | Paul said that the pros of PT-TLS are that it runs over an established,
|
---|
127 | secure, reliable, full duplex protocol, capable of carrying large amounts
|
---|
128 | of data. PT-TLS has been designed to be extensible.
|
---|
129 |
|
---|
130 | One con of PT-TLS is that more work is needed on client authentication.
|
---|
131 | Only a basic authentication mechanism is defined, but more authentication
|
---|
132 | types are likely needed. Another con is that, since PT-TLS is not part
|
---|
133 | of the TLS handshake, it is not independent of the application. On the
|
---|
134 | other hand, it eases adoption.
|
---|
135 |
|
---|
136 | Paul then opened up the floor to questions.
|
---|
137 |
|
---|
138 | Joe Salowey said that PT-TLS defines a new framework for client
|
---|
139 | authentication and that he feels it would be better to use an existing
|
---|
140 | one like SASL.
|
---|
141 |
|
---|
142 | Paul agreed that this would be interesting to look at and that EAP is a
|
---|
143 | possible candidate as well. He considers this area one of the areas that
|
---|
144 | needs more work.
|
---|
145 |
|
---|
146 | Joe said that the draft does not provide sufficient detail on certificate
|
---|
147 | processing during the TLS handshake, not only on the client, but also on
|
---|
148 | the server. More specificity will help interoperability, e.g. proof of
|
---|
149 | possession of private key, and making sure that the identity of the
|
---|
150 | server the client is connecting to, is authorized to service the request.
|
---|
151 |
|
---|
152 | Paul said that this sounds like best current practices that could be
|
---|
153 | added even though the protocol being defined is running on top of TLS.
|
---|
154 |
|
---|
155 | Joe added that the HTTP specification has included recommendations along
|
---|
156 | these lines and so this would be a good baseline to look at.
|
---|
157 |
|
---|
158 | Kaushik reiterated the point made by Joe re SASL. He also said some text
|
---|
159 | regarding state management and performance implications would be useful.
|
---|
160 |
|
---|
161 | Paul said that there is a section on supporting reassessment which
|
---|
162 | mentions state management, but more could be said regarding scaling
|
---|
163 | implications.
|
---|
164 |
|
---|
165 | Nancy said that the document was inconsistent in its use of TLS versions.
|
---|
166 | Nancy recommended that there be a requirement for TLS 1.2.
|
---|
167 |
|
---|
168 | Paul said that there was text in the document regarding use of TLS 1.1
|
---|
169 | (must) and 1.2 (should). A mandatory requirement for TLS 1.2 could be
|
---|
170 | considered.
|
---|
171 |
|
---|
172 | Joe added there was mention of TLS 1.0 in the document which needed to be
|
---|
173 | cleaned up.
|
---|
174 |
|
---|
175 | Review of PT-EAP
|
---|
176 | =================
|
---|
177 | Steve Hanna reviewed the PT-EAP proposal and described how the proposal
|
---|
178 | meets the PT requirements laid out in RFC 5209 and the PB-TNC I-D.
|
---|
179 |
|
---|
180 | The PT-EAP proposal is a TCG standard and was published around 5 years
|
---|
181 | ago.
|
---|
182 |
|
---|
183 | PT-EAP supports an NEA assessment over an EAP tunnel method. Supported
|
---|
184 | tunnel methods include PEAP, EAP-FAST and TTLS. No changes are required
|
---|
185 | to the EAP tunnel method.
|
---|
186 |
|
---|
187 | The use case for PT-EAP is to provide the ability to perform posture
|
---|
188 | assessment in networks deploying access control such as 802.1x and IKEv2.
|
---|
189 |
|
---|
190 | PT-EAP runs as an inner EAP method. PT-EAP has the following properties:
|
---|
191 | - can be chained with other EAP methods used for authentication
|
---|
192 | - supports key derivation allowing inner method to be bound to tunnel
|
---|
193 | - supports fragmentation
|
---|
194 |
|
---|
195 | Due to EAP limitations, the protocol is lock-step, allowing only one
|
---|
196 | packet in flight at a time. Large data transfers are therefore not
|
---|
197 | recommended.
|
---|
198 |
|
---|
199 | PT-EAP supports 3 phases:
|
---|
200 | 1. Optional Diffie-Hellman pre-negotiation
|
---|
201 | - derives key
|
---|
202 | 2. PB-TNC exchange
|
---|
203 | - NEA Assessments
|
---|
204 | - Hashed into eventual key
|
---|
205 | 3. Optional key derivation and export
|
---|
206 |
|
---|
207 | Steve stated that the pros of PT-EAP include the fact that it works with
|
---|
208 | any EAP tunnel method, and that there are no changes to the EAP state
|
---|
209 | machine and supplicant implementations (assuming they support adding EAP
|
---|
210 | methods). It provides for protection against lying endpoints when used
|
---|
211 | with TPM. The protocol has undergone security reviews, and it has no
|
---|
212 | dependencies on other working groups.
|
---|
213 |
|
---|
214 | The cons are that key derivation and export adds complexity to the
|
---|
215 | protocol, but its use is optional. A client need not support it.
|
---|
216 |
|
---|
217 | Steve then opened up the floor for questions.
|
---|
218 |
|
---|
219 | Nancy questioned the assertion that there is no external dependency. She
|
---|
220 | said there is a dependency on a standard EAP tunnel method for
|
---|
221 | interoperability.
|
---|
222 |
|
---|
223 | Steve said there are a lot of EAP methods that are best run in tunnel
|
---|
224 | methods. The IESG has not held up standardizing these methods. So he does
|
---|
225 | not believe there is a dependency on defining a standard EAP tunnel
|
---|
226 | method.
|
---|
227 |
|
---|
228 | Joe said that one difference between PT-EAP and other EAP methods is that
|
---|
229 | it requires that it be run in a tunnel method, whereas other EAP methods
|
---|
230 | do not require it.
|
---|
231 |
|
---|
232 | Steve said that it would be possible to add security measures to run
|
---|
233 | without a tunnel method.
|
---|
234 |
|
---|
235 | Nancy says it is still not clear to her what the threat is that is being
|
---|
236 | countered with the key derivation and export, and why that same threat
|
---|
237 | does not need to be addressed in the PT-TLS proposal.
|
---|
238 |
|
---|
239 | Steve says that he thinks that the WG might decide that it needs to be
|
---|
240 | addressed in a TLS-based protocol as well. The threat is a man-in-the-
|
---|
241 | middle attack against a EAP tunnel method, where an attacker injects an
|
---|
242 | EAP exchange in the tunnel from another endpoint. This allows a
|
---|
243 | compromised endpoint to claim to have the posture of a clean endpoint and
|
---|
244 | not be detected. By binding the inner EAP method to the tunnel, this
|
---|
245 | ensures that the tunnel and the inner EAP method terminate on the same
|
---|
246 | device.
|
---|
247 |
|
---|
248 | Nancy asked how the Diffie-Hellman is being authenticated.
|
---|
249 |
|
---|
250 | Steve says it is through a PA-TNC message over PT-EAP. He said this is
|
---|
251 | not specified in the draft, but is described in full in the TCG
|
---|
252 | specification. He tried to summarize it in the draft, but it may have
|
---|
253 | been too brief.
|
---|
254 |
|
---|
255 |
|
---|
256 | Paul says this is specified in Section 3.5.3 of the draft, but it may
|
---|
257 | need to be clarified.
|
---|
258 |
|
---|
259 | Joe said that without this critical piece, it is incomplete.
|
---|
260 |
|
---|
261 | Steve says it may be useful to write an Info RFC on the PA-TNC exchange
|
---|
262 | to explain how this works. He does not believe it is normative.
|
---|
263 |
|
---|
264 | Kaushik asked whether the channel binding work being discussed in EMU WG
|
---|
265 | would make the Diffie-Hellman redundant.
|
---|
266 |
|
---|
267 | Steve did not think channel binding would ensure that the posture check
|
---|
268 | terminated on the same device as the tunnel.
|
---|
269 |
|
---|
270 | Kaushik said that there seemed to have been a change in the trust model
|
---|
271 | and questioned why the threat was protected against in PT-EAP and not PT-
|
---|
272 | TLS.
|
---|
273 |
|
---|
274 | Steve said that the WG could look at different options that solve the
|
---|
275 | problem for both posture transports.
|
---|
276 |
|
---|
277 | Paul said it is plausible to carry the D-H pre-negotiation in PT-TLS.
|
---|
278 |
|
---|
279 | Nancy said it would be good to get a good understanding of the trust
|
---|
280 | relationships and the problem statement.
|
---|
281 |
|
---|
282 | Steve suggested that people read Section 4.2.5 and the TCG spec (which
|
---|
283 | has pictures).
|
---|
284 |
|
---|
285 | Review of NEA TLV
|
---|
286 | ==================
|
---|
287 | Nancy Cam-Winget reviewed the NEA TLV proposal and described how the
|
---|
288 | proposal meets the PT requirements laid out in RFC 5209 and the PB-TNC I-
|
---|
289 | D.
|
---|
290 |
|
---|
291 | This proposal defines a general EAP-TLV container, and the NEA-specific
|
---|
292 | TLV that is carried inside the general container.
|
---|
293 |
|
---|
294 | The general EAP-TLV container facilitates the exchange of arbitrary data
|
---|
295 | in tunnel methods that do not need to generate keys. The EMU WG has
|
---|
296 | discussed various uses for such a container such as channel and crypto
|
---|
297 | binding. NEA assessment is another usage.
|
---|
298 |
|
---|
299 | The use cases for an EAP-based transport are similar to those described
|
---|
300 | in PT-EAP above. Also, the same EAP protocol limitations apply.
|
---|
301 |
|
---|
302 | The protocol flow consists of:
|
---|
303 | 1. EAP tunnel method set up (no change)
|
---|
304 | 2. Inner EAP method for optional user/machine authentication (no change)
|
---|
305 | 3. NEA Assessment exchange using NEA-TLV
|
---|
306 |
|
---|
307 | Nancy said that the pros of the protocol are that it is simple and
|
---|
308 | extensible, and can be carried inside of existing EAP tunnel methods. The
|
---|
309 | NEA-TLV format could be used in the TLS-based protocol as well.
|
---|
310 |
|
---|
311 | The cons are that this approach assumes that key derivation is not
|
---|
312 | required. It also depends on the EAP-TLV format being defined.
|
---|
313 |
|
---|
314 | Nancy then opened up the floor to questions.
|
---|
315 |
|
---|
316 | Steve asked how requirement C-5 which states that the selection process
|
---|
317 | must prefer open standards is met.
|
---|
318 |
|
---|
319 | Nancy argued that the EAP-TLV container is open in the sense that it is
|
---|
320 | already used in existing tunnel methods.
|
---|
321 |
|
---|
322 | Steve disagreed but said that we should let the WG decide.
|
---|
323 |
|
---|
324 | Steve also asked about C-7 and support for large data transfers.
|
---|
325 |
|
---|
326 | Nancy says fragmentation is assumed to be supported in the EAP tunnel
|
---|
327 | method.
|
---|
328 |
|
---|
329 | Steve agreed with this, but TLVs larger than 2**16-1 would not be
|
---|
330 | supported.
|
---|
331 |
|
---|
332 | Nancy says the current proposal could be extended to support
|
---|
333 | fragmentation into EAP_TLVs, if needed.
|
---|
334 |
|
---|
335 | Steve agreed that this could be done.
|
---|
336 |
|
---|
337 | Paul asked for a clarification on whether EAP-TLV I-D would be specified
|
---|
338 | in EMU WG and NEA-TLV in the NEA WG.
|
---|
339 |
|
---|
340 | Nancy said that this was correct.
|
---|
341 |
|
---|
342 | Paul said that the implication of this was that progress in the NEA WG
|
---|
343 | was tied to that of the EMU WG. It was unlikely that the NEA-TLV I-D
|
---|
344 | could be published as an RFC prior to the EMU WG completing the EAP-TLV
|
---|
345 | specification.
|
---|
346 |
|
---|
347 | Kaushik said the relationship exists already because of the need for a
|
---|
348 | tunnel method to be standardized.
|
---|
349 |
|
---|
350 | Paul argued that this was not the case for the PT-EAP proposal. Even if
|
---|
351 | the IESG decided not to publish the RFC as Proposed Standard straight
|
---|
352 | away, the NEA WG could complete the work independently of progress in the
|
---|
353 | EMU WG.
|
---|
354 |
|
---|
355 | Steve asked whether EAP-TLV required changes to the EAP state machine.
|
---|
356 |
|
---|
357 | Nancy said that it did not require changes to the state machine.
|
---|
358 |
|
---|
359 | Steve asked how existing supplicants that provide support for adding new
|
---|
360 | EAP methods would support the NEA-TLV without requiring changes to
|
---|
361 | implementations.
|
---|
362 |
|
---|
363 | Hao Zhou said a mechanism that would be needed to support NEA-TLV is
|
---|
364 | required anyway, e.g. for returning final results and to support crypto-
|
---|
365 | binding. Several implementations support this.
|
---|
366 |
|
---|
367 | Steve said that supplicants supporting multiple inner EAP methods can
|
---|
368 | support PT-EAP without change.
|
---|
369 |
|
---|
370 | Joe countered that not all supplicant implementations support this. Some
|
---|
371 | support TLVs.
|
---|
372 |
|
---|
373 | Consensus Check
|
---|
374 | ===============
|
---|
375 | Susan asked the WG for their feedback on the consensus check questions:
|
---|
376 |
|
---|
377 | Regarding the TLS-based PT:
|
---|
378 | -----------------------------
|
---|
379 | 1. Is there an interest in working on a TLS-based PT in general?
|
---|
380 |
|
---|
381 | The response was unanimous in favor of working on a TLS-based PT.
|
---|
382 | Prior to the next consensus question being asked, Nancy expressed the
|
---|
383 | concern that she could not support PT-TLS without a better understanding
|
---|
384 | of the trust model, especially with respect to the authentication.
|
---|
385 |
|
---|
386 | Paul said that D-H pre-negotiation could be added to the specification
|
---|
387 | without a problem. Adding SASL may be a bigger change. But it is doable.
|
---|
388 |
|
---|
389 | Susan then asked the second consensus question.
|
---|
390 |
|
---|
391 | 2. Is there support for adopting the PT-TLS proposal as a -00 WG draft?
|
---|
392 |
|
---|
393 | The response (hum) was in favor of the yes responses, over the defer
|
---|
394 | responses, with no-one humming no, but there was no clear consensus.
|
---|
395 |
|
---|
396 |
|
---|
397 | Regarding EAP-based PT:
|
---|
398 | -----------------------
|
---|
399 | Susan asked consensus check questions on the EAP-based proposals.
|
---|
400 |
|
---|
401 | 3. Is there an interest in working on a EAP-based PT in general?
|
---|
402 |
|
---|
403 | The response was unanimous in favor of working on an EAP-based PT.
|
---|
404 |
|
---|
405 |
|
---|
406 | 4. What should we adopt as a -00 WG I-D?
|
---|
407 | - PT-EAP
|
---|
408 | - NEA-TLV
|
---|
409 | - Other/Defer
|
---|
410 |
|
---|
411 | Responses were roughly equal in favor of PT-EAP and NEA-TLV with one
|
---|
412 | response indicating a preference to defer.
|
---|
413 |
|
---|
414 | Next Steps:
|
---|
415 | ===========
|
---|
416 | Given the lack of consensus on moving forward with any of the proposals
|
---|
417 | as -00 WG drafts at this time, the working group identified topics that
|
---|
418 | need to be discussed on the mailing list, prior to making a decision.
|
---|
419 |
|
---|
420 | Susan suggested that getting agreement on the trust model would help move
|
---|
421 | things forward.
|
---|
422 |
|
---|
423 | Paul suggested that the WG chairs discuss with the AD questions around
|
---|
424 | the process for publishing the EAP-based PT as a Proposed Standard.
|
---|
425 | First, can a EAP PT progress without there being a standard EAP tunnel
|
---|
426 | method? Second, is it OK to stop work until EAP-TLV is standardized?
|
---|
427 |
|
---|
428 | Brian Ford mentioned that the impact of the EAP proposals on supplicants
|
---|
429 | be a factor taken into consideration.
|
---|
430 |
|
---|
431 | Steve said another topic for discussion would be a description of the
|
---|
432 | MITM attack and the D-H PN counter-measure.
|
---|
433 |
|
---|
434 | Joe agreed on the need for a discussion of the threat model, and the need
|
---|
435 | for a binding to the tunnel.
|
---|
436 |
|
---|
437 | Steve would like to see a discussion of how the EAP protocols stack up
|
---|
438 | against the requirements because there are specific cases where there was
|
---|
439 | no agreement.
|
---|
440 |
|
---|
441 |
|
---|
442 | Actions:
|
---|
443 | - Steve and Paul to send description of the MITM attack and the D-H PN
|
---|
444 | countermeasure.
|
---|
445 | - Steve and Nancy to describe how proposals meet PT requirements on
|
---|
446 | mailing list
|
---|
447 | - Impact on existing supplicants. (Juniper-Steve, Cisco-Nancy, Microsoft-
|
---|
448 | Steve, Apple-Nancy/Steve, open source-Paul)
|
---|
449 | - Susan and Steve to consult with our AD on process for moving forward on
|
---|
450 | standardizing an EAP-based PT.
|
---|