RE: Last Call: draft-harkins-emu-eap-pwd (EAP Authentication UsingOnly A Password) to Informational RFC

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



  Hi Joe,

  As I mentioned in the EMU meeting at IETF-71 I have not patented this
exchange, my employer has not patented this exchange, Glen has not
patented this exchange, and neither has his employer. I am unaware of
any patents on this exchange by others and I believe no existing patents
apply. Of course, reasonable people can disagree on whether other known
patents apply (and trolls may pop up making claims to hold relevant IPR)
but I don't know why that would have an impact on it being published as
a Proposed Standard.

  Let's see how the subject of IPR is being handled _right now_ with
other drafts:

     - TLS extractors: I know you know about this draft because you're
       the document shepherd. This draft is the subject of an IPR
       disclosure and is still on the Standards Track in Last Call.
       EAP-pwd is NOT the subject of any IPR disclosure.

     - draft-green-secsh-ecc: this specifies how to implement a patented
       key exchange (ECMQV) in SSH and it is on the Standards Track
       in Last Call.

If specification of patented algorithms and drafts subject to IPR
disclosure is not enough to knock a draft of the Standards Track then
I don't know why FUD about a possible patent _maybe_ existing that
_might_ apply is. I guess I don't understand your logic. Can you explain
it in a way that justifies the different treatment for these drafts?

  Regarding the flaws, yes the -00 version of this draft had a flaw.
But then, so did draft-sheffer-emu-eap-eke-00. So if the fact that a
flaw was found and fixed is enough to cause you to spoil on a draft
then why do you think draft-sheffer-emu-eap-eke is "an alternative to
consider"? Again, I don't understand your logic.

  EAP-EKE has the additional drawback that it must define its own groups
to use because using the standard Diffie-Hellman groups from the IANA
registry for IKE or TLS gives an attacker a significant advantage
in guessing the password by simply passively observing an exchange.
EAP-pwd does not suffer from this and can use groups that have received
extensive use and review. Forcing people to use new groups that have not
received scrutiny is a recipe for trouble.

  Furthermore, I do not think that EAP-EKE satisfies its security
claims when used with an elliptic curve group. Specifically, I believe
it is subject to passive dictionary attack when using an ECC group.
Small memory- and processor-constrained devices may not be able to
efficiently do operations in a multiplicative field of 3072 bits (to
get a suitably strong AES key) while it may in one of 256 bits. Forcing
them to use weaker groups is not appropriate.

  The relevant AD handling advancement of this draft received a private
request asking that it be Informational "like other EAP methods." He has
asked this individual to take the request public but that has not
happened. Let me take this opportunity to address that individual in
the hopes that he or she speaks up.

  There is no known policy of which EAP methods get advanced how. It seems
very bizarre that an EAP method for authentication using a shared secret
that is subject to PASSIVE OFF-LINE DICTIONARY ATTACK is a Proposed
Standard (EAP-GPSK) but an EAP method for authentication using a shared
secret that is resistant to passive, active and all forms of off-line
dictionary attack should be Informational. If it's flawed it's Standards
Track, if it's not flawed it's Informational. That doesn't make sense
much sense to me.

  I respectfully request this draft to be published on the track it was
intended to be published on. Given that drafts with considerable IPR
considerations, both individual submissions and products of a WG, are
on the Standards Track, IPR FUD should not be used as a way to prevent
this draft from advancing as a Proposed Standard.  EAP-pwd is a general
purpose solution for the broader Internet community to do EAP
authentication using only a password; EAP-EKE is not. EAP-EKE is not
"an alternative to consider" because of it's limited use.

  There do not seem to be consistently applied policies regarding why a
draft has to be Informational so I think it is only fair to treat this
draft the way other drafts are being treated (see above): the way it
intends to be advanced, as a Proposed Standard.

  regards,

  Dan.

On Tue, July 21, 2009 3:19 pm, Joseph Salowey (jsalowey) wrote:
> I object to this document being published as a Proposed Standard.  When
> this document was discussed in the EMU meeting at IETF-71 there was much
> concern raised with respect to existing IPR in the area of secure
> password methods used by this draft.  Additionally, soon after its
> initial publication and announcement on the CFRG list, flaws were found
> with the draft.  The authors were very responsive in addressing the
> issues, but this points out that the algorithms used in this draft have
> had less review than other secure password mechanisms developed over the
> years.  Another approach to a secure password only EAP method, EAP-EKE,
> has been proposed in draft-sheffer-emu-eap-eke-02.  This method is based
> on EKE, which is already in use, has a long history of review, and has
> much better understood IPR considerations.  Given that there is an
> alternative to consider I do not support publishing EAP-PWD in the
> standards track.
>
> Joe
>
>> -----Original Message-----
>> From: ietf-bounces@xxxxxxxx [mailto:ietf-bounces@xxxxxxxx] On
>> Behalf Of Glen Zorn
>> Sent: Tuesday, July 21, 2009 7:01 AM
>> To: iesg-secretary@xxxxxxxx
>> Cc: iesg-secretary@xxxxxxxx; ietf@xxxxxxxx
>> Subject: RE: Last Call: draft-harkins-emu-eap-pwd (EAP
>> Authentication UsingOnly A Password) to Informational RFC
>>
>> It's come to my attention that there is an error in the above
>> referenced announcement
>> (http://www.ietf.org/ibin/c5i?mid=6&rid=49&gid=0&k1=934&k2=675
>> 9&tid=12481845
>> 60).  The announcement says "The IESG has received a request
>> from an individual submitter to consider the following
>> document: - 'EAP Authentication Using Only A Password ' as an
>> Informational RFC" but this statement is false: the IESG
>> received a request to publish the draft as a Proposed
>> Standard.  The intended status is clearly indicated in the
>> first page header (reproduced below).  Please correct this
>> error and issue the corrected announcement as soon as
>> possible.  Thank you.
>>
>> Network Working Group
>> D. Harkins
>> Internet-Draft
>> Aruba Networks
>> Intended status: Standards Track
>>    G. Zorn
>> Expires: December 31, 2009
>>    NetCube
>>
>> June 29, 2009
>>
>>
>>                 EAP Authentication Using Only A Password
>>                       draft-harkins-emu-eap-pwd-04
>>
>>
>>
>> _______________________________________________
>> Ietf mailing list
>> Ietf@xxxxxxxx
>> https://www.ietf.org/mailman/listinfo/ietf
>>
> _______________________________________________
> Ietf mailing list
> Ietf@xxxxxxxx
> https://www.ietf.org/mailman/listinfo/ietf
>


_______________________________________________

Ietf@xxxxxxxx
https://www.ietf.org/mailman/listinfo/ietf

[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Fedora Users]