Overview of proposed EAP methods, credential types, and uses Pasi Eronen IETF64 EMU BoF November 10...

17
Overview of proposed EAP methods, credential types, and uses Pasi Eronen IETF64 EMU BoF November 10 th , 2005

Transcript of Overview of proposed EAP methods, credential types, and uses Pasi Eronen IETF64 EMU BoF November 10...

Page 1: Overview of proposed EAP methods, credential types, and uses Pasi Eronen IETF64 EMU BoF November 10 th, 2005.

Overview of proposed EAP methods, credential types, and uses

Pasi Eronen

IETF64 EMU BoFNovember 10th, 2005

Page 2: Overview of proposed EAP methods, credential types, and uses Pasi Eronen IETF64 EMU BoF November 10 th, 2005.

Introduction

• If you have <some kind of existing credentials and related infrastructure>, what EAP methods could you use?

• Focus on methods documented in internet-drafts (really old ones omitted)– Only EAP-TLS is an RFC

Page 3: Overview of proposed EAP methods, credential types, and uses Pasi Eronen IETF64 EMU BoF November 10 th, 2005.

X.509 PKI

• EAP-TLS

• EAP-IKEv2

• Private keys could be in software or hardware tokens (7816, USB, …)

Page 4: Overview of proposed EAP methods, credential types, and uses Pasi Eronen IETF64 EMU BoF November 10 th, 2005.

Shared secrets

• EAP-IKEv2• EAP-PAX• EAP-SKL• EAP-PSK• EAP-MAKE• EAP-Double-TLS• EAP-TLS with TLS-PSK• + some that I probably forgot (sorry!)• + several expired drafts

Page 5: Overview of proposed EAP methods, credential types, and uses Pasi Eronen IETF64 EMU BoF November 10 th, 2005.

Passwords

• My definition– Shared secret methods require the EAP

server to have the shared secret– Password methods work with existing

user/password databases (the EAP server does not necessarily have the password)

• You don’t have to agree with this definition!

Page 6: Overview of proposed EAP methods, credential types, and uses Pasi Eronen IETF64 EMU BoF November 10 th, 2005.

Passwords (cont.)

• Tunneled methods: EAP-FAST, EAP-TTLSv0, EAP-TTLSv1, PEAP v0, PEAP v1, PEAP v2

• Inside tunnel:– PAP/GTC (=just send the password)– CHAP/MD5– MS-CHAP– MS-CHAP-v2

• EAP server authenticated using certificates

Page 7: Overview of proposed EAP methods, credential types, and uses Pasi Eronen IETF64 EMU BoF November 10 th, 2005.

One-time passwords/tokens

• Tunneled methods + inside tunnel:– PAP/GTC (=just send the password)– OTP– EAP-POTP

Page 8: Overview of proposed EAP methods, credential types, and uses Pasi Eronen IETF64 EMU BoF November 10 th, 2005.

Cellular infrastructure

• EAP-SIM

• EAP-AKA

Page 9: Overview of proposed EAP methods, credential types, and uses Pasi Eronen IETF64 EMU BoF November 10 th, 2005.

Kerberos

• No currently active methods?– EAP-GSS expired– Some password methods might be able to

use Kerberos back-end

Page 10: Overview of proposed EAP methods, credential types, and uses Pasi Eronen IETF64 EMU BoF November 10 th, 2005.

Other ways EAP is used

• Provisioning/enrollment– Provisioning certificates (instead of existing

certificate management protocols)– Enrolling strong credential from weak

single-use credential – draft-mahy-eap-enrollment, EAP-FAST, PEAP

• Client integrity checks• Two-factor / two-entity (device and user)

authentication (sequences)• + Other things I don’t even want to mention…

Page 11: Overview of proposed EAP methods, credential types, and uses Pasi Eronen IETF64 EMU BoF November 10 th, 2005.

Summary structure

• Status– What’s the situation, both in standardization

and deployment

• Need for new work– Problems not yet solved?– Real demand for solving them?

• Chances of success– How likely that WG could achieve rough

consensus on the problem and solution(s)?– How likely that the solutions would have impact?

• Note: These are just my opinions. They will change. You don’t have to agree.

Page 12: Overview of proposed EAP methods, credential types, and uses Pasi Eronen IETF64 EMU BoF November 10 th, 2005.

Summary (1/5)

• X.509 PKI– Status: EAP-TLS.– Need for new work: Some. EAP-TLS works, but

the spec would benefit from updates.– Chances of success: Good.

• Shared secrets– Status: No standardized methods.– Need for new work: Yes.– Chances of success: Good — but requires draft

author interest in standardization

Page 13: Overview of proposed EAP methods, credential types, and uses Pasi Eronen IETF64 EMU BoF November 10 th, 2005.

Summary (2/5)

• Passwords– Status: Proprietary methods widely used.– Need for new work: Standardized method would

be “nicer”, but…– Chances of success: …depends?

• Are the existing vendors interested?• Difficult to get consensus about anything related

to passwords in IETF

• One-time passwords/tokens– See “Passwords” (or is POTP different case?)

Page 14: Overview of proposed EAP methods, credential types, and uses Pasi Eronen IETF64 EMU BoF November 10 th, 2005.

Summary (3/5)

• Cellular infrastructure– Status: 3GPP has EAP-SIM/EAP-AKA,

3GPP2 has something, too– Need for new work: No

• Kerberos– Status: No methods– Need for new work: Not much demand?

Page 15: Overview of proposed EAP methods, credential types, and uses Pasi Eronen IETF64 EMU BoF November 10 th, 2005.

Summary (4/5)

• Other types of infrastructure or credentials? – Credit card payment?– Biometrics?– Chances of success: unclear.

Page 16: Overview of proposed EAP methods, credential types, and uses Pasi Eronen IETF64 EMU BoF November 10 th, 2005.

Summary (5/5)

• Provisioning/enrollment– Status: Unclear.– Need for new work: Unclear.

• Client integrity checks– Status: Proprietary things exist, TNC working

on standardizing some parts– Need for new work: Depends on what

TNC and vendors want.• Two-factor authentication / sequences

– Status: Supported by tunnel methods, but not widely used?

– Need for new work: Unclear.

Page 17: Overview of proposed EAP methods, credential types, and uses Pasi Eronen IETF64 EMU BoF November 10 th, 2005.

Other possible WG work items

• Channel bindings– Status: Proposals exist.– Need for new work: Some?– Chances of success: Moderate.