summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc4764.txt
diff options
context:
space:
mode:
authorThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
committerThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
commit4bfd864f10b68b71482b35c818559068ef8d5797 (patch)
treee3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc4764.txt
parentea76e11061bda059ae9f9ad130a9895cc85607db (diff)
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc4764.txt')
-rw-r--r--doc/rfc/rfc4764.txt3587
1 files changed, 3587 insertions, 0 deletions
diff --git a/doc/rfc/rfc4764.txt b/doc/rfc/rfc4764.txt
new file mode 100644
index 0000000..21cbff7
--- /dev/null
+++ b/doc/rfc/rfc4764.txt
@@ -0,0 +1,3587 @@
+
+
+
+
+
+
+Network Working Group F. Bersani
+Request for Comments: 4764 France Telecom R&D
+Category: Experimental H. Tschofenig
+ Siemens Networks GmbH & Co KG
+ January 2007
+
+
+ The EAP-PSK Protocol:
+ A Pre-Shared Key Extensible Authentication Protocol (EAP) Method
+
+Status of This Memo
+
+ This memo defines an Experimental Protocol for the Internet
+ community. It does not specify an Internet standard of any kind.
+ Discussion and suggestions for improvement are requested.
+ Distribution of this memo is unlimited.
+
+Copyright Notice
+
+ Copyright (C) The IETF Trust (2007).
+
+IESG Note
+
+ This RFC is not a candidate for any level of Internet Standard. The
+ IETF disclaims any knowledge of the fitness of this RFC for any
+ purpose and in particular notes that the decision to publish is not
+ based on IETF review for such things as security, congestion control,
+ or inappropriate interaction with deployed protocols. The RFC Editor
+ has chosen to publish this document at its discretion. Readers of
+ this document should exercise caution in evaluating its value for
+ implementation and deployment. See RFC 3932 for more information.
+
+ The IESG thinks that this work is related to IETF work done in WGs
+ EMU and EAP, but this does not prevent publishing.
+
+Abstract
+
+ This document specifies EAP-PSK, an Extensible Authentication
+ Protocol (EAP) method for mutual authentication and session key
+ derivation using a Pre-Shared Key (PSK). EAP-PSK provides a
+ protected communication channel when mutual authentication is
+ successful for both parties to communicate over. This document
+ describes the use of this channel only for protected exchange of
+ result indications, but future EAP-PSK extensions may use the channel
+ for other purposes. EAP-PSK is designed for authentication over
+ insecure networks such as IEEE 802.11.
+
+
+
+
+
+Bersani & Tschofenig Experimental [Page 1]
+
+RFC 4764 EAP-PSK January 2007
+
+
+Table of Contents
+
+ 1. Introduction ....................................................4
+ 1.1. Design Goals for EAP-PSK ...................................4
+ 1.1.1. Simplicity ..........................................4
+ 1.1.2. Wide Applicability ..................................5
+ 1.1.3. Security ............................................5
+ 1.1.4. Extensibility .......................................5
+ 1.2. Terminology ................................................5
+ 1.3. Conventions ................................................8
+ 1.4. Related Work ...............................................9
+ 2. Protocol Overview ..............................................12
+ 2.1. EAP-PSK Key Hierarchy .....................................13
+ 2.1.1. The PSK ............................................13
+ 2.1.2. AK .................................................14
+ 2.1.3. KDK ................................................14
+ 2.2. The TEK ...................................................15
+ 2.3. The MSK ...................................................15
+ 2.4. The EMSK ..................................................15
+ 2.5. The IV ....................................................15
+ 3. Cryptographic Design of EAP-PSK ................................15
+ 3.1. The Key Setup .............................................16
+ 3.2. The Authenticated Key Exchange ............................19
+ 3.3. The Protected Channel .....................................23
+ 4. EAP-PSK Message Flows ..........................................25
+ 4.1. EAP-PSK Standard Authentication ...........................26
+ 4.2. EAP-PSK Extended Authentication ...........................28
+ 5. EAP-PSK Message Format .........................................31
+ 5.1. EAP-PSK First Message .....................................32
+ 5.2. EAP-PSK Second Message ....................................34
+ 5.3. EAP-PSK Third Message .....................................36
+ 5.4. EAP-PSK Fourth Message ....................................39
+ 6. Rules of Operation for the EAP-PSK Protected Channel ...........41
+ 6.1. Protected Result Indications ..............................41
+ 6.1.1. CONT ...............................................42
+ 6.1.2. DONE_SUCCESS .......................................43
+ 6.1.3. DONE_FAILURE .......................................43
+ 6.2. Extended Authentication ...................................43
+ 7. IANA Considerations ............................................45
+ 7.1. Allocation of an EAP-Request/Response Type for EAP-PSK ....45
+ 7.2. Allocation of EXT Type Numbers ............................45
+ 8. Security Considerations ........................................46
+ 8.1. Mutual Authentication .....................................46
+ 8.2. Protected Result Indications ..............................47
+ 8.3. Integrity Protection ......................................48
+ 8.4. Replay Protection .........................................48
+ 8.5. Reflection Attacks ........................................48
+ 8.6. Dictionary Attacks ........................................49
+
+
+
+Bersani & Tschofenig Experimental [Page 2]
+
+RFC 4764 EAP-PSK January 2007
+
+
+ 8.7. Key Derivation ............................................49
+ 8.8. Denial-of-Service Resistance ..............................51
+ 8.9. Session Independence ......................................51
+ 8.10. Exposition of the PSK ....................................52
+ 8.11. Fragmentation ............................................52
+ 8.12. Channel Binding ..........................................53
+ 8.13. Fast Reconnect ...........................................53
+ 8.14. Identity Protection ......................................53
+ 8.15. Protected Ciphersuite Negotiation ........................55
+ 8.16. Confidentiality ..........................................55
+ 8.17. Cryptographic Binding ....................................55
+ 8.18. Implementation of EAP-PSK ................................55
+ 9. Security Claims ................................................56
+ 10. Acknowledgments ...............................................57
+ 11. References ....................................................57
+ 11.1. Normative References .....................................57
+ 11.2. Informative References ...................................58
+ Appendix A. Generation of the PSK from a Password - Discouraged ...62
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Bersani & Tschofenig Experimental [Page 3]
+
+RFC 4764 EAP-PSK January 2007
+
+
+1. Introduction
+
+1.1. Design Goals for EAP-PSK
+
+ The Extensible Authentication Protocol (EAP) [3] provides an
+ authentication framework that supports multiple authentication
+ methods.
+
+ This document specifies an EAP method, called EAP-PSK, that uses a
+ Pre-Shared Key (PSK).
+
+ EAP-PSK was developed at France Telecom R&D in 2003-2004. It is
+ published as an RFC for the general information of the Internet
+ community and to allow independent implementations.
+
+ Because PSKs are of frequent use in security protocols, other
+ protocols may also refer to a PSK or contain this word in their name.
+ For instance, Wi-Fi Protected Access (WPA) [48] specifies an
+ authentication mode called "WPA-PSK". EAP-PSK is distinct from these
+ protocols and should not be confused with them.
+
+ Design goals for EAP-PSK were:
+
+ o Simplicity: EAP-PSK should be easy to implement and deploy without
+ any pre-existing infrastructure. It should be available quickly
+ because recently-released protocols, such as IEEE 802.11i [27],
+ employ EAP in a different threat model than PPP [44] and thus
+ require "modern" EAP methods.
+
+ o Wide applicability: EAP-PSK should be suitable to authenticate
+ over any network, and in particular over IEEE 802.11 [28] wireless
+ LANs.
+
+ o Security: EAP-PSK should be conservative in its cryptographic
+ design.
+
+ o Extensibility: EAP-PSK should be easily extensible.
+
+1.1.1. Simplicity
+
+ For the sake of simplicity, EAP-PSK relies on a single cryptographic
+ primitive, AES-128 [7].
+
+ Restriction to such a primitive, and in particular, not using
+ asymmetric cryptography like Diffie-Hellman key exchange, makes EAP-
+ PSK:
+
+
+
+
+
+Bersani & Tschofenig Experimental [Page 4]
+
+RFC 4764 EAP-PSK January 2007
+
+
+ o Easy to understand and implement while avoiding cryptographic
+ negotiations.
+
+ o Lightweight and well suited for any type of device, especially
+ those with little processing power and memory.
+
+ However, as further discussed in Section 8, this prevents EAP-PSK
+ from offering advanced features such as identity protection, password
+ support, or Perfect Forward Secrecy (PFS). This choice has been
+ deliberately made as a trade-off between simplicity and security.
+
+ For the sake of simplicity, EAP-PSK has also chosen a fixed message
+ format and not a Type-Length-Value (TLV) design.
+
+1.1.2. Wide Applicability
+
+ EAP-PSK has been designed in a threat model where the attacker has
+ full control over the communication channel. This is the EAP threat
+ model that is presented in Section 7.1 of [3].
+
+1.1.3. Security
+
+ Since the design of authenticated key exchange is notoriously known
+ to be hard and error prone, EAP-PSK tries to avoid inventing any new
+ cryptographic mechanism. It attempts instead to build on existing
+ primitives and protocols that have been reviewed by the cryptographic
+ community.
+
+1.1.4. Extensibility
+
+ EAP-PSK explicitly provides a mechanism to allow future extensions
+ within its protected channel (see Section 3.3). Thanks to this
+ mechanism, EAP-PSK will be able to provide more sophisticated
+ services as the need to do so arises.
+
+1.2. Terminology
+
+ Authentication, Authorization, and Accounting (AAA)
+ Please refer to [10] for more details.
+
+ AES-128 A block cipher specified in the Advanced Encryption
+ Standard [7].
+
+ Authentication Key (AK)
+ A 16-byte key derived from the PSK that the EAP peer and
+ server use to mutually authenticate.
+
+
+
+
+
+Bersani & Tschofenig Experimental [Page 5]
+
+RFC 4764 EAP-PSK January 2007
+
+
+ AKEP2 An authenticated key exchange protocol; please refer to
+ [14] for more details.
+
+ Backend Authentication Server
+ An entity that provides an authentication service to an
+ Authenticator. When used, this server typically executes
+ EAP methods for the Authenticator. (This terminology is
+ also used in [26], and has the same meaning in this
+ document.)
+
+ CMAC Cipher-based Message Authentication Code. It is the
+ authentication mode of operation of AES recommended by NIST
+ in [8].
+
+ Extensible Authentication Protocol (EAP)
+ Defined in [3].
+
+ EAP Authenticator (or simply Authenticator)
+ The end of the EAP link initiating the EAP authentication
+ methods. (This terminology is also used in [26], and has
+ the same meaning in this document.)
+
+ EAP peer (or simply peer)
+ The end of the EAP link that responds to the Authenticator.
+ (In [26], this end is known as the Supplicant.)
+
+ EAP server (or simply server)
+ The entity that terminates the EAP authentication with the
+ peer. When there is no Backend Authentication Server, this
+ term refers to the EAP Authenticator. Where the EAP
+ Authenticator operates in pass-through mode, it refers to
+ the Backend Authentication Server.
+
+ EAX An authenticated-encryption with associated data mode of
+ operation for block ciphers [4].
+
+ Extended Master Session Key (EMSK)
+ Additional keying material derived between the EAP peer and
+ server that is exported by the EAP method. The EMSK is
+ reserved for future uses that are not defined yet and is
+ not provided to a third party. Please refer to [9] for
+ more details.
+ EAP-PSK generates a 64-byte EMSK.
+
+ Initialization Vector (IV)
+ A quantity of at least 64 bytes, suitable for use in an
+ initialization vector field, that is derived between the
+ peer and EAP server. Since the IV is a known value in
+
+
+
+Bersani & Tschofenig Experimental [Page 6]
+
+RFC 4764 EAP-PSK January 2007
+
+
+ methods such as EAP-TLS [11], it cannot be used by itself
+ for computation of any quantity that needs to remain
+ secret. As a result, its use has been deprecated and EAP
+ methods are not required to generate it. Please refer to
+ [9] for more details.
+ EAP-PSK does not generate an IV.
+
+ Key-Derivation Key (KDK)
+ A 16-byte key derived from the PSK that the EAP peer and
+ server use to derive session keys (namely, the TEK, MSK,
+ and EMSK).
+
+ Message Authentication Code (MAC)
+ Informally, the purpose of a MAC is to provide assurances
+ regarding both the source of a message and its integrity
+ [40]. IEEE 802.11i uses the acronym MIC (Message Integrity
+ Check) to avoid confusion with the other meaning of the
+ acronym MAC (Medium Access Control).
+
+ Master Session Key (MSK)
+ Keying material that is derived between the EAP peer and
+ server and exported by the EAP method. In existing
+ implementations, a AAA server acting as an EAP server
+ transports the MSK to the Authenticator [9].
+ EAP-PSK generates a 64-byte MSK.
+
+ Network Access Identifier (NAI)
+ Identifier used to identify the communicating parties [2].
+
+ One Key CBC-MAC 1 (OMAC1)
+ A method to generate a Message Authentication Code [29].
+ CMAC is the name under which NIST has standardized OMAC1.
+
+ Perfect Forward Secrecy (PFS)
+ The confidence that the compromise of a long-term private
+ key does not compromise any earlier session keys. In other
+ words, once an EAP dialog is finished and its corresponding
+ keys are forgotten, even someone who has recorded all of
+ the data from the connection and gets access to all of the
+ long-term keys of the peer and the server cannot
+ reconstruct the keys used to protect the conversation
+ without doing a brute-force search of the session key
+ space.
+
+ EAP-PSK does not have this property.
+
+
+
+
+
+
+Bersani & Tschofenig Experimental [Page 7]
+
+RFC 4764 EAP-PSK January 2007
+
+
+ Pre-Shared Key (PSK)
+ A Pre-Shared Key simply means a key in symmetric
+ cryptography. This key is derived by some prior mechanism
+ and shared between the parties before the protocol using it
+ takes place. It is merely a bit sequence of given length,
+ each bit of which has been chosen at random uniformly and
+ independently. For EAP-PSK, the PSK is the long-term 16-
+ byte credential shared by the EAP peer and server.
+
+ Protected Result Indication
+ Please refer to Section 7.16 of [3] for a definition of
+ this term. This feature has been introduced because EAP-
+ Success/Failure packets are unidirectional and are not
+ protected.
+
+ Transient EAP Key (TEK)
+ A session key that is used to establish a protected channel
+ between the EAP peer and server during the EAP
+ authentication exchange. The TEK is appropriate for use
+ with the ciphersuite negotiated between the EAP peer and
+ server to protect the EAP conversation. Note that the
+ ciphersuite used to set up the protected channel between
+ the EAP peer and server during EAP authentication is
+ unrelated to the ciphersuite used to subsequently protect
+ data sent between the EAP peer and Authenticator [9].
+ EAP-PSK uses a 16-byte TEK for its protected channel, which
+ is the only ciphersuite available between the EAP peer and
+ server to protect the EAP conversation. This ciphersuite
+ uses AES-128 in the EAX mode of operation.
+
+1.3. Conventions
+
+ All numbers presented in this document are considered in network-byte
+ order.
+
+ || denotes concatenation of strings (and not the logical OR).
+
+ MAC(K, String) denotes the MAC of String under the key K (the
+ algorithm used in this document to compute the MACs is CMAC with AES-
+ 128; see Section 3.2).
+
+ [String] denotes the concatenation of String with the MAC of String
+ calculated as specified by the context. Hence, we have, with K
+ specified by the context: [String]=String||MAC(K,String)
+
+ ** denotes integer exponentiation.
+
+
+
+
+
+Bersani & Tschofenig Experimental [Page 8]
+
+RFC 4764 EAP-PSK January 2007
+
+
+ "i" denotes the unsigned binary representation on 16 bytes of the
+ integer i in network byte order. Therefore, this notation only makes
+ sense when i is between 0 and 2**128-1.
+
+ <i> denotes the unsigned binary representation on 4 bytes of the
+ integer i in network byte order. Therefore, this notation only makes
+ sense when i is between 0 and 2**32-1.
+
+ The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
+ "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
+ document are to be interpreted as described in [1].
+
+1.4. Related Work
+
+ At the time this document is written, only three EAP methods are
+ standards track EAP methods per IETF terminology (see [17]), namely:
+
+ o MD5-Challenge (EAP-Request/Response type 4), defined in [3], which
+ uses a MD5 challenge similar to [45].
+
+ o OTP (EAP-Request/Response type 5), defined in [3], which aims at
+ providing One-Time Password support similar to [22] and [39].
+
+ o GTC (EAP-Request/Response type 6), defined in [3], which aims at
+ providing Generic Token Card Support.
+
+ Unfortunately, all three methods are deprecated for security reasons
+ that are explained in part in [3].
+
+ Myriads of EAP methods have, however, been otherwise proposed:
+
+ o One as an experimental RFC (EAP-TLS [11]), which therefore is not
+ a standard (see [25]).
+
+ o Some as individual Internet-Draft submissions (e.g., [42] or this
+ document).
+
+ o And some even undocumented (e.g., Rob EAP, which has EAP-Request/
+ Response type 31).
+
+ However, no secure and mature Pre-Shared Key EAP method is yet easily
+ and widely available, which is all the more regrettable because Pre-
+ Shared Key methods are the most basic ones!
+
+ The existing proposals for a future Pre-Shared Key EAP method are
+ briefly reviewed hereafter (please refer to [16] for a more thorough
+ synthesis of EAP methods).
+
+
+
+
+Bersani & Tschofenig Experimental [Page 9]
+
+RFC 4764 EAP-PSK January 2007
+
+
+ Among these proposals, there are some that:
+
+ o Are broken from a security point of view, e.g.:
+
+ * LEAP, which is specified in [38] and whose vulnerabilities are
+ discussed in [49].
+
+ * EAP-MSCHAPv2, which is specified in [34] and whose
+ vulnerabilities are indirectly discussed in [43].
+
+ o Essentially require additional infrastructure, e.g., EAP-SIM [24],
+ EAP-AKA [12], or OTP/token card methods like [31].
+
+ o Are not shared key methods but are often confused with them,
+ namely, the password methods, e.g., EAP-SRP [18] or SPEKE [30],
+ whose wide adoption very unfortunately seems to be hindered by
+ Intellectual Property Rights issues.
+
+ o Are generic tunneling methods, which do not essentially rely on
+ Pre-Shared Keys as they require a public-key certificate for the
+ server and allow the peer to authenticate with whatever EAP method
+ or even other non-EAP authentication mechanisms, namely, [32] and
+ [21].
+
+ o Are abandoned but have provided the basis for EAP-PSK, namely,
+ EAP-Archie [47].
+
+ o Are possible alternatives to EAP-PSK (i.e., claimed to be secure
+ and subject of active work):
+
+ * EAP-FAST [42].
+
+ * EAP-IKEv2 [46].
+
+ * EAP-TLS (when shared key/password support is added to TLS; see
+ [50]).
+
+ EAP-PSK differs from the aforementioned methods on the following
+ points:
+
+ o No attacks on EAP-PSK within its threat model have yet been found.
+
+ o EAP-PSK was not designed to leverage a pre-existing
+ infrastructure. Thus, it does not inherit potential limitations
+ of such an infrastructure and it should be easier to deploy "from
+ scratch".
+
+ o EAP-PSK wished to avoid IPR blockages.
+
+
+
+Bersani & Tschofenig Experimental [Page 10]
+
+RFC 4764 EAP-PSK January 2007
+
+
+ o EAP-PSK does not have any dependencies on protocols other than
+ EAP.
+
+ o EAP-PSK was restricted to simply proposing a Pre-Shared Key method
+ with symmetric cryptography
+
+ * To remain simple to understand and implement
+
+ * To avoid potentially complex configurations and negotiations
+
+ o EAP-PSK was designed with efficiency in mind.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Bersani & Tschofenig Experimental [Page 11]
+
+RFC 4764 EAP-PSK January 2007
+
+
+2. Protocol Overview
+
+ Figure 1 presents an overview of the EAP-PSK key hierarchy.
+
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++ ---+
+ | | ^
+ | EAP-PSK Protocol: a Pre-Shared Key EAP Method | |
+ | | |
+ | +----------+ | |
+ | | PSK | | |
+ | |(16 bytes)| | |
+ | +----------+ | |
+ | | | |
+ | v | |
+ | *********************** | |
+ | *Modified Counter Mode* | |
+ | *********************** | |
+ | | | | |
+ | v v | |
+ | +----------+ +----------+ +----------------+ | |
+ | | AK | | KDK | | RAND_P | | |
+ | |(16 bytes)| |(16 bytes)| | (16 bytes) | | |
+ | +----------+ +----------+ +----------------+ | |
+ | | | | |
+ | | | | |
+ | +-----------+ | | | |
+ | +--------+|Plain Text | | | | |
+ |+-------+|Header H||Var.Length | | | | |
+ ||Nonce N||22 bytes|+-----------+ v v Local |
+ ||4 bytes|+--------+ | *********************** to EAP |
+ |+-------+ | +--------+ +------*Modified Counter Mode* Method |
+ | | v v v *********************** | |
+ | | ******* +--------+ |64 |64 | |
+ | | * EAX *-------|TEK | |bytes |bytes | |
+ | +-->******* |16 bytes| | | | |
+ | | +--------+ | | | |
+ | +-----+----+ | | | |
+ | v v | | | |
+ |+--------+ +-------------------+ | | | |
+ ||Tag | |Cipher Text Payload| | | | |
+ ||16 bytes| | Variable length L | | | | |
+ |+--------+ +-------------------+ | | | V
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++ ---+
+ | | ^
+ +-+-+-+-+-++ +-+-+-+-+-++ |
+ |MSK | |EMSK | |
+ | | | | Exported |
+ +-+-+-+-+-++ +-+-+-+-+-++ by EAP |
+
+
+
+Bersani & Tschofenig Experimental [Page 12]
+
+RFC 4764 EAP-PSK January 2007
+
+
+ | | Method |
+ | | |
+ V V |
+ ************************* V
+ * AAA Key Derivation * ---+
+ * Naming & Binding *
+ *************************
+
+ Figure 1: EAP-PSK Key Hierarchy Overview
+
+2.1. EAP-PSK Key Hierarchy
+
+ This section presents the key hierarchy used by EAP-PSK. This
+ hierarchy is inspired by the EAP key hierarchy described in [9].
+
+2.1.1. The PSK
+
+ The PSK is shared between the EAP peer and the EAP server.
+
+ EAP-PSK assumes that the PSK is known only to the EAP peer and EAP
+ server. The security properties of the protocol are compromised if
+ it has wider distribution. Please note that EAP-PSK shares this
+ property with all other symmetric key methods (including all
+ password-based methods).
+
+ EAP-PSK also assumes the EAP server and EAP peer identify the correct
+ PSK to use with each other thanks to their respective NAIs. This
+ means that there MUST only be at most one PSK shared between an EAP
+ server using a given server NAI and an EAP peer using a given peer
+ NAI.
+
+ This PSK is used, as shown in Figure 2, to derive two 16-byte static
+ long-lived subkeys, respectively called the Authentication Key (AK)
+ and the Key-Derivation Key (KDK). This derivation should only be
+ done once: it is called the key setup. See Section 3.1 for an
+ explanation of why PSK is not used as a static long-lived key, but
+ only as the initial keying material for deriving the static long-
+ lived keys, AK and KDK, which are actually used by the protocol EAP-
+ PSK.
+
+
+
+
+
+
+
+
+
+
+
+
+Bersani & Tschofenig Experimental [Page 13]
+
+RFC 4764 EAP-PSK January 2007
+
+
+ +---------------------------+
+ | PSK |
+ | (16 bytes) |
+ +---------------------------+
+ | |
+ v v
+ +---------------------------+ +---------------------------+
+ | AK | | KDK |
+ | (16 bytes) | | (16 bytes) |
+ +---------------------------+ +---------------------------+
+
+ Figure 2: Derivation of AK and KDK from the PSK
+
+2.1.2. AK
+
+ EAP-PSK uses AK to mutually authenticate the EAP peer and the EAP
+ server.
+
+ AK is a static long-lived key derived from the PSK; see Section 3.1.
+ AK is not a session key.
+
+ The EAP server and EAP peer identify the correct AK to use with each
+ other thanks to their respective NAIs. This means that there MUST
+ only be at most one AK shared between an EAP server using a given
+ server NAI and an EAP peer using a given peer NAI. This is the case
+ when there is at most one PSK shared between an EAP server using a
+ given server NAI and an EAP peer using a given peer NAI; see
+ Section 2.1.1.
+
+ The EAP peer chooses the AK to use based on the EAP server NAI that
+ has been sent by the EAP server in the first EAP-PSK message (namely,
+ ID_S; see Section 4.1) and the EAP peer NAI it chooses to include in
+ the second EAP-PSK message (namely, ID_P; see Section 4.1).
+
+2.1.3. KDK
+
+ EAP-PSK uses KDK to derive session keys shared by the EAP peer and
+ the EAP server (namely, the TEK, MSK, and EMSK).
+
+ KDK is a static long-lived key derived from the PSK; see Section 3.1.
+ KDK is not a session key.
+
+ The EAP server and EAP peer identify the correct AK to use with each
+ other thanks to their respective NAIs. This means that there MUST
+ only be at most one AK shared between an EAP server using a given
+ server NAI and an EAP peer using a given peer NAI. This is the case
+
+
+
+
+
+Bersani & Tschofenig Experimental [Page 14]
+
+RFC 4764 EAP-PSK January 2007
+
+
+ when there is at most one PSK shared between an EAP server using a
+ given server NAI and an EAP peer using a given peer NAI; see
+ Section 2.1.1.
+
+ The EAP peer chooses the AK to use based on the EAP server NAI that
+ has been sent by the EAP server in the first EAP-PSK message (namely,
+ ID_S; see Section 4.1) and the EAP peer NAI it chooses to include in
+ the second EAP-PSK message (namely, ID_P; see Section 4.1).
+
+2.2. The TEK
+
+ EAP-PSK derives a 16-byte TEK thanks to a random number exchanged
+ during authentication (RAND_P; see Section 5.1) and KDK.
+
+ This TEK is used to implement a protected channel for both mutually
+ authenticated parties to communicate over securely.
+
+2.3. The MSK
+
+ EAP-PSK derives a MSK thanks to a random number exchanged during
+ authentication (RAND_P; see Section 5.1) and the KDK.
+
+ The MSK is 64 bytes long, which complies with [3].
+
+2.4. The EMSK
+
+ EAP-PSK derives an EMSK thanks to a random number exchanged during
+ authentication (RAND_P; see Section 5.1) and the KDK.
+
+ The EMSK is 64 bytes long, which complies with [3].
+
+2.5. The IV
+
+ EAP-PSK does not derive any IV, which complies with [9].
+
+3. Cryptographic Design of EAP-PSK
+
+ EAP-PSK relies on a single cryptographic primitive, a block cipher,
+ which is instantiated with AES-128. AES-128 takes a 16-byte Pre-
+ Shared Key and a 16-byte Plain Text block as inputs. It outputs a
+ 16-byte Cipher Text block. For a detailed description of AES-128,
+ please refer to [7].
+
+ AES-128 has been chosen because:
+
+ o It is standardized and implementations are widely available.
+
+
+
+
+
+Bersani & Tschofenig Experimental [Page 15]
+
+RFC 4764 EAP-PSK January 2007
+
+
+ o It has been carefully reviewed by the cryptographic community and
+ is believed to be secure.
+
+ Other block ciphers could easily be proposed for EAP-PSK, as EAP-PSK
+ does not intrinsically depend on AES-128. The only parameters of
+ AES-128 that EAP-PSK depends on are the AES-128 block and key size
+ (16 bytes). For the sake of simplicity, EAP-PSK has, however, been
+ chosen to restrict to a single mandatory block cipher and not allow
+ the negotiation of other block ciphers. In the case that AES-128 is
+ deprecated for security reasons, EAP-PSK should also be deprecated
+ and a cut-and-paste EAP-PSK' should be defined with another block
+ cipher. This EAP-PSK' should not be backward compatible with EAP-PSK
+ because of the security issues with AES-128. EAP-PSK' should
+ therefore use a different EAP-Request/Response Type number. With the
+ EAP-Request/Response Type number space structure defined in [3], this
+ should not be a problem. The use of a different EAP-Request/Response
+ Type number for EAP-PSK' will prevent this new method from being
+ vulnerable to chosen protocol attacks.
+
+ EAP-PSK uses three cryptographic parts:
+
+ o A key setup to derive AK and KDK from the PSK.
+
+ o An authenticated key exchange protocol to mutually authenticate
+ the communicating parties and derive session keys.
+
+ o A protected channel protocol for both mutually authenticated
+ parties to communicate over.
+
+ Each part is discussed in more detail in the subsequent paragraphs.
+
+3.1. The Key Setup
+
+ EAP-PSK needs two cryptographically separated 16-byte subkeys for
+ mutual authentication and session key derivation. Indeed, it is a
+ rule of thumb in cryptography to use different keys for different
+ applications.
+
+ It could have implemented these two subkeys either by specifying a
+ 32-byte PSK that would then be split in two 16-byte subkeys, or by
+ specifying a 16-byte PSK that would then be cryptographically
+ expanded to two 16-byte subkeys.
+
+ Because provisioning a 32-byte long-term credential is more
+ cumbersome than a 16-byte one, and the strength of the derived
+ session keys is 16 bytes either way, the latter option was chosen.
+
+
+
+
+
+Bersani & Tschofenig Experimental [Page 16]
+
+RFC 4764 EAP-PSK January 2007
+
+
+ Hence, the PSK is only used by EAP-PSK to derive AK and KDK. This
+ derivation should be done only once, immediately after the PSK has
+ been provisioned. As soon as AK and KDK have been derived, the PSK
+ should be deleted. If the PSK is deleted, it should be done so
+ securely (see, for instance, [19] for guidance on secure deletion of
+ the PSK).
+
+ Derivation of AK and KDK from the PSK is called the key setup:
+
+ o The input to the key setup is the PSK.
+
+ o The outputs of the key setup are AK and KDK.
+
+ AK and KDK are derived from the PSK using the modified counter mode
+ of operation of AES-128. The modified counter mode is a length
+ increasing function, i.e., it expands one AES-128 input block into a
+ longer t-block output, where t>=2. This mode was chosen for the key
+ setup because it had already been chosen for the derivation of the
+ session keys (see Section 3.2).
+
+ The details of the derivation of AK and KDK from the PSK are shown in
+ Figure 3.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Bersani & Tschofenig Experimental [Page 17]
+
+RFC 4764 EAP-PSK January 2007
+
+
+ +--------------------------+
+ | "0" |
+ | Input Block (16 bytes) |
+ +--------------------------+
+ |
+ v
+ +----------------+
+ | |
+ | AES-128(PSK,.) |
+ | |
+ +----------------+
+ |
+ |
+ +----------------------------+
+ | |
+ v v
+ +--------+ +---+ +--------+ +---+
+ | c1="1" |->|XOR| | c2="2" |->|XOR|
+ |16 bytes| +---+ |16 bytes| +---+
+ +--------+ | +--------+ |
+ | |
+ +----------------+ +----------------+
+ | | | |
+ | AES-128(PSK,.) | | AES-128(PSK,.) |
+ | | | |
+ +----------------+ +----------------+
+ | |
+ | |
+ v v
+ +------------------------+ +------------------------+
+ | AK | | KDK |
+ | (16 bytes) | | (16 bytes) |
+ +------------------------+ +------------------------+
+
+ Figure 3: Derivation of AK and KDK from the PSK in Details
+
+ The input block is "0". For the sake of simplicity, this input block
+ has been chosen constant: it could have been set to a value depending
+ on the peer and the server (for instance, the XOR of their respective
+ NAIs appropriately truncated or zero-padded), but this did not seem
+ to add much security to the scheme, whereas it added complexity. Any
+ 16-byte constant could have been chosen, as the security is not
+ supposed to depend on the particular value taken by the constant. "0"
+ was arbitrarily chosen.
+
+
+
+
+
+
+
+Bersani & Tschofenig Experimental [Page 18]
+
+RFC 4764 EAP-PSK January 2007
+
+
+3.2. The Authenticated Key Exchange
+
+ The authentication protocol used by EAP-PSK is inspired by AKEP2,
+ which is described in [14].
+
+ AKEP2 consists of a one-and-a-half round-trip exchange, as shown in
+ Figure 4, which is inspired by Figure 5 of [14].
+
+ Bob Alice
+ | RA |
+ |<---------------------------------------------------------|
+ | |
+ | [B||A||RA||RB] |
+ |--------------------------------------------------------->|
+ | |
+ | [A||RB] |
+ |<---------------------------------------------------------|
+
+ Figure 4: Overview of AKEP2
+
+ It is also worth noting that [14] focuses on cryptography and not on
+ designing a real-life protocol. Thus, as noted in subsection "Out-
+ Of-Band-Data" of [14], Alice has to send A, its identity, to Bob so
+ that Bob may select the appropriate credential for the sequel to the
+ conversation. This leads to a slightly complemented version of AKEP2
+ for EAP-PSK as depicted in Figure 5.
+
+ Bob Alice
+ | A||RA |
+ |<---------------------------------------------------------|
+ | |
+ | [B||A||RA||RB] |
+ |--------------------------------------------------------->|
+ | |
+ | [A||RB] |
+ |<---------------------------------------------------------|
+
+ Figure 5: Overview of AKEP2
+
+ In AKEP2,
+
+ o RA and RB are random numbers chosen respectively by Alice and Bob.
+
+ o A and B are Alice's and Bob's respective identities. They allow
+ Alice and Bob to retrieve the key that they have to use to run an
+ authenticated key exchange between each other. They are also
+ included in the protocol for cryptographic reasons.
+
+
+
+
+Bersani & Tschofenig Experimental [Page 19]
+
+RFC 4764 EAP-PSK January 2007
+
+
+ o The MACs (see Section 1.3 for the notation "[]") are calculated
+ using a dedicated key.
+
+ EAP-PSK instantiates this protocol with:
+
+ o The server as Alice and the peer as Bob.
+
+ o RA and RB as 16-byte random numbers, using Section 4.1 notations;
+ this means RA=RAND_S and RB=RAND_P.
+
+ o A and B as Alice's and Bob's respective NAIs, using Section 4.1
+ notations; this means A=ID_S and B=ID_P.
+
+ o The MAC algorithm as CMAC with AES-128 using AK and producing a
+ tag length of 16 bytes.
+
+ o The modified counter mode of operation of AES-128 using KDK, to
+ derive session keys as a result of this exchange.
+
+ CMAC was chosen as the MAC algorithm because it is capable of
+ handling arbitrary length messages, and its design is simple. It
+ also enjoys up-to-date review by the cryptographic community,
+ especially using provable security concepts. It has been recommended
+ by the NIST. For a detailed description of CMAC, please refer to
+ [8].
+
+ In AKEP2, the key exchange is "implicit": the session keys are
+ derived from RB. In EAP-PSK, the session keys are thus derived from
+ RAND_P by using KDK and the modified counter mode of operation of
+ AES-128 described in [5]. This mode was chosen because it is a
+ simple key derivation scheme that relies on a block cipher and has a
+ proof of its security. It is a length increasing function, i.e., it
+ expands one AES-128 input block into a longer t-block output, where
+ t>=2. The derivation of the session keys is shown in Figure 6.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Bersani & Tschofenig Experimental [Page 20]
+
+RFC 4764 EAP-PSK January 2007
+
+
+ +--------------------------+ +-------------------------------+
+ | RAND_P | | KDK |
+ | Input Block (16 bytes) | | Key Derivation Key (16 bytes) |
+ +--------------------------+ +-------------------------------+
+ | |
+ v v
+ +-----------------------------------------------------------------+
+ | |
+ | Modified Counter Mode |
+ | |
+ +-----------------------------------------------------------------+
+ | | |
+ v v v
+ +------------+ +----------------------+ +----------------------+
+ | TEK | | MSK | | EMSK |
+ | (16 bytes) | | (64 bytes) | | (64 bytes) |
+ +------------+ +----------------------+ +----------------------+
+
+ Figure 6: Derivation of the Session Keys
+
+ The input to the derivation of the session keys is RAND_P.
+
+ The outputs of the derivation of the session keys are:
+
+ o The 16-byte TEK (the first output block).
+
+ o The 64-byte MSK (the concatenation of the second to fifth output
+ blocks).
+
+ o The 64-byte EMSK (the concatenation of the sixth to ninth output
+ blocks).
+
+ The details of the derivation of the session keys are shown in
+ Figure 7.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Bersani & Tschofenig Experimental [Page 21]
+
+RFC 4764 EAP-PSK January 2007
+
+
+ +--------------------------+
+ | RAND_P |
+ | Input Block (16 bytes) |
+ +--------------------------+
+ |
+ v
+ +----------------+
+ | |
+ | AES-128(KDK,.) |
+ | |
+ +----------------+
+ |
+ |
+ +---------------------+-- - - - - - - - - - --+
+ | | |
+ v v v
+ +--------+ +---+ +--------+ +---+ +--------+ +---+
+ | c1="1" |->|XOR| | c2="2" |->|XOR|.......| c9="9" |->|XOR|
+ |16 bytes| +---+ |16 bytes| +---+ |16 bytes| +---+
+ +--------+ | +--------+ | +--------+ |
+ | | |
+ +----------------+ +----------------+ +----------------+
+ | | | | | |
+ | AES-128(KDK,.) | | AES-128(KDK,.) |......| AES-128(KDK,.) |
+ | | | | | |
+ +----------------+ +----------------+ +----------------+
+ | | |
+ | | |
+ v v v
+ +-----------------+ +-----------------+ +------------------+
+ | Output Block #1 | | Output Block #2 | | Output Block #9 |
+ | (16 bytes) | | (16 bytes) |.....| (16 bytes) |
+ | TEK | | MSK (block 1/4) | | EMSK (block 4/4) |
+ +-----------------+ +-----------------+ +------------------+
+
+ Figure 7: Derivation of the Session Keys in Details
+
+ The counter values are set respectively to the first t integers (that
+ is, ci="i", with i=1 to 9).
+
+ Keying material is sensitive information and should be handled
+ accordingly (see Section 8.10 for further discussion).
+
+
+
+
+
+
+
+
+
+Bersani & Tschofenig Experimental [Page 22]
+
+RFC 4764 EAP-PSK January 2007
+
+
+3.3. The Protected Channel
+
+ EAP-PSK provides a protected channel for both parties to communicate
+ over, in case of a successful authentication. This protected channel
+ is currently used to exchange protected result indications and may be
+ used in the future to implement extensions.
+
+ EAP-PSK uses the EAX mode of operation to provide this protected
+ channel. For a detailed description of EAX, please refer to [4].
+ Figure 8 shows how EAX is used to implement EAP-PSK protected
+ channel.
+
+ +-----------+ +----------------+ +---------------------+ +----------+
+ | Nonce N | | Header H | | Plain Text Payload | | TEK |
+ | 4 bytes | | 22 bytes | | Variable length L | | 16 bytes |
+ +-----------+ +----------------+ +---------------------+ +----------+
+ | | | |
+ v v v v
+ +-------------------------------------------------------------------+
+ | |
+ | EAX |
+ | |
+ +-------------------------------------------------------------------+
+ | |
+ v v
+ +---------------------+ +----------+
+ | Cipher Text Payload | | Tag |
+ | Variable length L | | 16 bytes |
+ +---------------------+ +----------+
+
+ Figure 8: The Protected Channel
+
+ This protected channel:
+
+ o Provides replay protection.
+
+ o Encrypts and authenticates a Plain Text Payload that becomes an
+ Encrypted Payload. The Plain Text Payload must not exceed 960
+ bytes; see Sections 5.3, 5.4, and 8.11.
+
+ o Only authenticates a Header that is thus sent in clear.
+
+ EAX is instantiated with AES-128 as the underlying block cipher.
+
+ AES-128 is keyed with the TEK.
+
+
+
+
+
+
+Bersani & Tschofenig Experimental [Page 23]
+
+RFC 4764 EAP-PSK January 2007
+
+
+ The nonce N is used to provide cryptographic security to the
+ encryption and data origin authentication as well as protection
+ replay. Indeed, N is a 4-byte sequence number starting from <0> that
+ is monotonically incremented at each EAP-PSK message within one EAP-
+ PSK dialog, except retransmissions, of course.
+
+ N was taken to be 4 bytes to avoid 16-byte arithmetic. Since EAX
+ uses a 16-byte nonce, N is padded with 96 zero bits for its high-
+ order bits.
+
+ For cryptographic reasons, N is not allowed to wrap around. In the
+ unlikely, yet possible, event of the server sending an EAP-PSK
+ message with N set to <2**32-2>, it must not send any further message
+ on this protected channel, which would cause to reusing the value 0.
+ Either the conversation is finished after the server receives the
+ EAP-PSK answer from the peer with N set to <2**32-1> and the server
+ proceeds (typically by sending an EAP-Success or Failure), or the
+ conversation is not finished and must then be aborted (a new EAP-PSK
+ dialog may subsequently be started to try again to authenticate).
+ Thus, the maximum number of messages that can be exchanged over the
+ same protected channel is 2**32 (which should not be a limitation in
+ practice, as this is approximately equal to 4 billion).
+
+ The Header H consists of the first 22 bytes of the EAP Request or
+ Response packet (i.e., the EAP Code, Identifier, Length, and Type
+ fields followed by the EAP-PSK Flags and RAND_S fields). Although it
+ may appear unorthodox that an upper layer (EAP-PSK) protects some
+ information of the lower layer (EAP), this was chosen to comply with
+ EAP recommendation (see Section 7.5. of [3]) and seems to be existing
+ practice at IETF (see, for instance, [35]).
+
+ The Plain Text Payload is the payload that is to be encrypted and
+ integrity protected. The Cipher Text Payload is the result of the
+ encryption of the Plain Text.
+
+ The Tag is a MAC that protects both the Header and the Plain Text
+ Payload. The verification of the Tag must only be done after a
+ successful verification of the Nonce for replay protection. If the
+ verification of the Tag succeeds, then the Encrypted Payload is
+ decrypted to recover the Plain Text Payload. If the verification of
+ the Tag fails, then no decryption is performed and this MAC failure
+ should be logged. The tag length is chosen to be 16 bytes for EAX
+ within EAP-PSK. This length is considered appropriate by the
+ cryptographic community.
+
+
+
+
+
+
+
+Bersani & Tschofenig Experimental [Page 24]
+
+RFC 4764 EAP-PSK January 2007
+
+
+ EAX was mainly chosen because:
+
+ o It strongly relies on OMAC in its design and OMAC1, a variant of
+ OMAC, had already been chosen in EAP-PSK for the authentication
+ part (please remember that OMAC1 and CMAC are analogous).
+
+ o Its design is simple.
+
+ o It enjoys a security proof.
+
+ o It is free of any Intellectual Property Rights claims.
+
+4. EAP-PSK Message Flows
+
+ EAP-PSK may consist of two different types of message flows:
+
+ o The "standard authentication", which is:
+
+ * Mandatory to implement.
+
+ * Fully specified in this document.
+
+ * The simpler type of message flow, which is expected to be used
+ most frequently.
+
+ o The "extended authentication", which is:
+
+ * Optional to implement (i.e., there are no mandatory
+ extensions).
+
+ * Partly specified in this document since it depends on
+ extensions and none are currently specified, let alone in this
+ document.
+
+ * The type of message flow that should be used when extensions of
+ EAP-PSK are needed by more sophisticated usage scenarios and
+ are available.
+
+ EAP-PSK introduces the concept of a session to facilitate its
+ analysis and provide a cleaner interface to other layers. A session
+ is a particular instance of an EAP-PSK dialog between two parties.
+ This session is identified by a session identifier.
+
+ In the first EAP-PSK message, the EAP server asserts its identity.
+ Given that the EAP-Request/Identity and EAP-Response/Identity may not
+ be assumed to have occurred prior to this sending and that the
+ response included in EAP-Response/Identity (if this EAP Identity
+ exchange takes place) may not contain the actual NAI the peer shall
+
+
+
+Bersani & Tschofenig Experimental [Page 25]
+
+RFC 4764 EAP-PSK January 2007
+
+
+ use with EAP-PSK, this means that an EAP server implementing EAP-PSK
+ must use the same EAP server NAI for all EAP-PSK dialogs with any EAP
+ peer implementing EAP-PSK.
+
+4.1. EAP-PSK Standard Authentication
+
+ EAP-PSK standard authentication is comprised of four messages, i.e.,
+ two round-trips; see Figure 9.
+
+ peer server
+ | Flags||RAND_S||ID_S |
+ |<---------------------------------------------------------|
+ | |
+ | Flags||RAND_S||RAND_P||MAC_P||ID_P |
+ |--------------------------------------------------------->|
+ | |
+ | Flags||RAND_S||MAC_S||PCHANNEL_S_0 |
+ |<---------------------------------------------------------|
+ | |
+ | Flags||RAND_S||PCHANNEL_P_1 |
+ |--------------------------------------------------------->|
+ | |
+
+ Figure 9: EAP-PSK Standard Authentication
+
+ o The first message is sent by the server to the peer to:
+
+ * Send a 16-byte random challenge (RAND_S). RAND_S was called RA
+ in Section 3.2
+
+ * State its identity (ID_S). ID_S was denoted by A in
+ Section 3.2.
+
+ o The second message is sent by the peer to the server to:
+
+ * Send another 16-byte random challenge (RAND_P). RAND_P was
+ called RB in Section 3.2
+
+ * State its identity (ID_P). ID_P was denoted by B in
+ Section 3.2.
+
+ * Authenticate to the server by proving that it is able to
+ compute a particular MAC (MAC_P), which is a function of the
+ two challenges and AK:
+ MAC_P = CMAC-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P)
+
+
+
+
+
+
+Bersani & Tschofenig Experimental [Page 26]
+
+RFC 4764 EAP-PSK January 2007
+
+
+ o The third message is sent by the server to the peer to:
+
+ * Authenticate to the peer by proving that it is able to compute
+ another MAC (MAC_S), which is a function of the peer's
+ challenge and AK:
+ MAC_S = CMAC-AES-128(AK, ID_S||RAND_P)
+
+ * Set up the protected channel (P_CHANNEL_S_0) to:
+
+ + Confirm that it has derived session keys (at least the TEK).
+
+ + Give a protected result indication of the authentication.
+
+ o The fourth message is sent by the peer to the server to finish the
+ setup of the protected channel (P_CHANNEL_P_1) to:
+
+ * Confirm that it has derived session keys (at least the TEK).
+
+ * Give a protected result indication of the authentication.
+
+ The PCHANNEL_S_0 and PCHANNEL_P_1 fields of the third and fourth EAP-
+ PSK messages contain a MAC-computed thanks to TEK that protects the
+ integrity of the messages. For a detailed list of the fields of the
+ messages that are integrity protected, please refer to Section 3.3.
+
+ All EAP-PSK messages include a sort of header, which is comprised of
+ two fields:
+
+ o Flags, a 1-byte field that is currently only used to number EAP-
+ PSK messages.
+
+ o RAND_S, a 16-byte challenge sent by the server that is used as a
+ session identifier.
+
+ This standard message flow could be comprised of only three messages,
+ like AKEP2, were it not the request/response nature of EAP that
+ prevents the third message to be the last one. Since the fourth
+ message is mandatory, EAP-PSK chose to take advantage of this and set
+ up a protected channel.
+
+ The standard message flow also includes a statement by the peer of
+ its identity, in addition to the EAP-Response/Identity it may have
+ sent. This behavior follows Section 5.1 of [3], which recommends
+ that the EAP-Response/Identity be used primarily for routing purposes
+ and selecting which EAP method to use, and therefore that EAP methods
+ include a method-specific mechanism for obtaining the identity, so
+ that they do not have to rely on the Identity Response.
+
+
+
+
+Bersani & Tschofenig Experimental [Page 27]
+
+RFC 4764 EAP-PSK January 2007
+
+
+ When a party receives an EAP-PSK message, it checks that the message
+ is syntactically valid in accordance with the message formats defined
+ in Section 5. If the message is syntactically incorrect, then it is
+ silently discarded. Then it checks the cryptographic validity of
+ this message, i.e., it checks the MAC(s) as follows:
+
+ o If the received message is the first EAP-PSK message, there is no
+ MAC to check as none is included in message 1.
+
+ o If the received message is the second EAP-PSK message, the
+ validity of MAC_P is checked.
+
+ o If the received message is the third EAP-PSK message, the validity
+ of MAC_S is checked and then the validity of the Tag included in
+ P_CHANNEL_S_0 is checked. The validity checks must be done in
+ this order to avoid unnecessarily deriving TEK, MSK, and EMSK in
+ case MAC_S is invalid, meaning that mutual authentication has
+ failed. Indeed, TEK is used to verify the validity of the Tag
+ included in P_CHANNEL_S_0.
+
+ o If the received message is the fourth EAP-PSK message, the
+ validity of the Tag included in P_CHANNEL_P_1 is checked.
+
+ If a validity check fails, the message is silently discarded. There
+ can be a counter to track the number of silently discarded messages
+ Section 8.8. If there is an encrypted payload in the message
+ (namely, in the PCHANNEL attribute), then the encrypted payload is
+ decrypted. Then, if the decrypted payload is syntactically
+ incorrect, the message is silently discarded.
+
+4.2. EAP-PSK Extended Authentication
+
+ To remain simple and yet be extensible to meet future requirements,
+ EAP-PSK provides an extension mechanism within its protected channel:
+ the payload of the protected channel may contain an optional
+ extension field (EXT).
+
+ Figure 10 presents the message sequence for EAP-PSK extended
+ authentication.
+
+ Extended authentication MUST be supported, i.e., any EAP-PSK
+ implementation MUST support sending and reception of an EXT attribute
+ according to rules of operation described in Section 6. Yet,
+ although support of the EXT field is mandatory, there is no mandatory
+ extension type to support. This means that if a server engages in
+ EAP-PSK extended authentication, as only the server can start
+ extended authentication per Section 6, a peer will recognize the
+ attempt to start extended authentication through its EXT support. If
+
+
+
+Bersani & Tschofenig Experimental [Page 28]
+
+RFC 4764 EAP-PSK January 2007
+
+
+ the peer does not support the particular extension type used by the
+ server, the peer will still be able to conclude the EAP-PSK dialog.
+
+ The mandatory support of the EXT field is dictated:
+
+ o To guarantee a robust behavior in the future where some peers
+ might support some extensions and others not. All peers will thus
+ be able to understand that an extended authentication is being
+ attempted and indicate whether or not they support the extension
+ that is tried.
+
+ o To ensure that all implementations will indeed be extensible.
+
+ No extension is currently defined.
+
+ At most, one extension may be run within a single EAP-PSK dialog:
+ there can neither be sequences of extensions nor interleaved
+ extensions. However, extensions may take a variable number of round-
+ trips to complete.
+
+ Only the server can start an extension and, if it does so, it must
+ start it in the first payload it sends over the protected channel.
+
+ peer server
+ | Flags||RAND_S||ID_S |
+ |<---------------------------------------------------------|
+ | |
+ | Flags||RAND_S||RAND_P||MAC_P||ID_P |
+ |--------------------------------------------------------->|
+ | |
+ | Flags||RAND_S||MAC_S||PCHANNEL_S_0(EXT) |
+ |<---------------------------------------------------------|
+ | |
+ | Flags||RAND_S||PCHANNEL_P_1(EXT) |
+ |--------------------------------------------------------->|
+ | |
+ . .
+ . .
+ . .
+ | Flags||RAND_S||PCHANNEL_S_2i(EXT) |
+ |<---------------------------------------------------------|
+ | |
+ | Flags||RAND_S||PCHANNEL_P_2i+1(EXT) |
+ |--------------------------------------------------------->|
+ | |
+
+ Figure 10: EAP-PSK Extended Authentication
+
+
+
+
+Bersani & Tschofenig Experimental [Page 29]
+
+RFC 4764 EAP-PSK January 2007
+
+
+ Please refer to Section 6 for more details on how extended
+ authentication works.
+
+ The PCHANNEL_S_2j and PCHANNEL_P_2j+1 fields of the EAP-PSK messages
+ (where j varies from 0 to i) contain a MAC-computed thanks to TEK
+ that protects the integrity of the messages. For a detailed list of
+ the fields of the messages that are integrity protected, please refer
+ to Section 3.3.
+
+ When a party receives an EAP-PSK message, it checks that the message
+ is syntactically valid in accordance with the message formats defined
+ in Section 5. If the message is syntactically incorrect, then it is
+ silently discarded. Then it checks the cryptographic validity of
+ this message, i.e., it checks the MAC(s) as follows:
+
+ o If the received message is the first EAP-PSK message, there is no
+ MAC to check as none is included in message 1.
+
+ o If the received message is the second EAP-PSK message, the
+ validity of MAC_P is checked.
+
+ o If the received message is the third EAP-PSK message, the validity
+ of MAC_S is checked and then the validity of the Tag included in
+ P_CHANNEL_S_0 is checked. The validity checks must be done in
+ this order to avoid unnecessarily deriving TEK, MSK, and EMSK in
+ case MAC_S is invalid, meaning that mutual authentication has
+ failed. Indeed, TEK is used to verify the validity of the Tag
+ included in P_CHANNEL_S_0.
+
+ o If the received message is the fourth EAP-PSK message, the
+ validity of the Tag included in P_CHANNEL_P_1 is checked.
+
+ o If the received message is an EAP-PSK message different from the
+ first four ones, then validity of the Tag included in P_CHANNEL is
+ checked.
+
+ If a validity check fails, the message is silently discarded. There
+ can be a counter to track the number of silently discarded messages
+ Section 8.8. If there is an encrypted payload in the message (namely
+ in the PCHANNEL attribute), then the encrypted payload is decrypted.
+ Then, if the decrypted payload is syntactically incorrect, the
+ message is silently discarded.
+
+
+
+
+
+
+
+
+
+Bersani & Tschofenig Experimental [Page 30]
+
+RFC 4764 EAP-PSK January 2007
+
+
+5. EAP-PSK Message Format
+
+ For the sake of simplicity, EAP-PSK uses a fixed message format.
+ There are four different types of EAP-PSK messages:
+
+ o The first EAP-PSK message, which is sent by the server to the
+ peer.
+
+ o The second EAP-PSK message, which is sent by the peer to the
+ server.
+
+ o The third EAP-PSK message, which is sent by the server to the
+ peer.
+
+ o The fourth EAP-PSK message, which is sent by the peer to the
+ server. This is also the type of message that the peer further
+ sends to the server in case of an extended authentication. This
+ is also essentially the type of message that the server further
+ sends to the peer in case of an extended authentication: the only
+ slight modification that occurs in this last case is the setting
+ of the EAP Code to 1 instead of 2 in the other cases.
+
+ For the sake of clarity, the whole EAP packet that encapsulates the
+ EAP-PSK message (i.e., the EAP-PSK message plus its EAP headers) is
+ depicted in Figures 11, 13, 14, and 18.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Bersani & Tschofenig Experimental [Page 31]
+
+RFC 4764 EAP-PSK January 2007
+
+
+5.1. EAP-PSK First Message
+
+ The first EAP-PSK message is sent by the server to the peer. It has
+ the format presented in Figure 11.
+
+ 0 1 2 3
+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Code=1 | Identifier | Length |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Type EAP-PSK | Flags | |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +
+ | |
+ + +
+ | RAND_S |
+ + +
+ | |
+ + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | | |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +
+ : :
+ : ID_S :
+ : :
+ + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+
+ Figure 11: EAP-PSK First Message
+
+ Since IANA has allocated EAP method type 47 for EAP-PSK, Type EAP-PSK
+ for the first EAP-PSK message as well as any other EAP-PSK message
+ MUST be 47.
+
+ The first EAP-PSK message consists of:
+
+ o A 1-byte Flags field
+
+ o A 16-byte random number: RAND_S
+
+ o A variable length field that conveys the server's NAI: ID_S. The
+ length of this field is deduced from the EAP length field. The
+ length of this NAI must not exceed 966 bytes. This restriction
+ aims at avoiding fragmentation issues (see Section 8.11).
+
+ The Flags field has the format presented in Figure 12.
+
+
+
+
+
+
+Bersani & Tschofenig Experimental [Page 32]
+
+RFC 4764 EAP-PSK January 2007
+
+
+ 0
+ 0 1 2 3 4 5 6 7 8
+ +-+-+-+-+-+-+-+-+
+ | T | Reserved |
+ +-+-+-+-+-+-+-+-+
+
+ Figure 12: EAP-PSK Flags Field
+
+ The Flags field is comprised of two subfields:
+
+ o A 2-bit T subfield, which indicates the type of EAP-PSK message:
+
+ * T=0 for the first EAP-PSK message presented in Section 5.1.
+
+ * T=1 for the second EAP-PSK message presented in Section 5.2.
+
+ * T=2 for the third EAP-PSK message presented in Section 5.3.
+
+ * T=3 for the fourth EAP-PSK message presented in Section 5.4 and
+ the subsequent EAP-PSK messages that may be exchanged during
+ extended authentication.
+
+ o A 6-bit Reserved subfield that is set to zero on transmission and
+ ignored on reception.
+
+ The PCHANNEL Nonce field N (see Section 5.3) is used to distinguish
+ between the different EAP-PSK messages that may be exchanged during
+ extended authentication that all have T set to 3, i.e., the fourth
+ EAP-PSK message and possibly the next ones.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Bersani & Tschofenig Experimental [Page 33]
+
+RFC 4764 EAP-PSK January 2007
+
+
+5.2. EAP-PSK Second Message
+
+ The second EAP-PSK message is sent by the peer to the server. It has
+ the format presented in Figure 13.
+
+ 0 1 2 3
+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Code=2 | Identifier | Length |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Type EAP-PSK | Flags | |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +
+ | |
+ + +
+ | RAND_S |
+ + +
+ | |
+ + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | | |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +
+ | |
+ + +
+ | RAND_P |
+ + +
+ | |
+ + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | | |
+ +-+-+-+-+-+-+-+-+ +
+ | |
+ + +
+ | MAC_P |
+ + +
+ | |
+ + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | | |
+ +-+-+-+-+-+-+-+-+ +
+ : ID_P :
+ : :
+ + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+
+ Figure 13: EAP-PSK Second Message
+
+
+
+
+
+
+
+
+Bersani & Tschofenig Experimental [Page 34]
+
+RFC 4764 EAP-PSK January 2007
+
+
+ It consists of:
+
+ o A 1-byte Flags field
+
+ o The 16-byte random number sent by the server in the first EAP-PSK
+ message (RAND_S) that serves as a session identifier
+
+ o A 16-byte random number: RAND_P
+
+ o A 16-byte MAC: MAC_P
+
+ o A variable length field that conveys the peer's NAI: ID_P. The
+ length of this field is deduced from the EAP length field. The
+ length of this NAI must not exceed 966 bytes. This restriction
+ aims at avoiding fragmentation issues (see Section 8.11).
+
+ The Flags field format is presented in Figure 12.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Bersani & Tschofenig Experimental [Page 35]
+
+RFC 4764 EAP-PSK January 2007
+
+
+5.3. EAP-PSK Third Message
+
+ The third EAP-PSK message is sent by the server to the peer. It has
+ the format presented in Figure 14.
+
+ 0 1 2 3
+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Code=1 | Identifier | Length |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Type EAP-PSK | Flags | |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +
+ | |
+ + +
+ | RAND_S |
+ + +
+ | |
+ + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | | |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +
+ | |
+ + +
+ | MAC_S |
+ + +
+ | |
+ + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | | |
+ +-+-+-+-+-+-+-+-+ +
+ : PCHANNEL :
+ : :
+ : :
+ + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+
+ Figure 14: EAP-PSK Third Message
+
+ It consists of:
+
+ o A 1-byte Flags field
+
+ o The 16-byte random number sent by the server in the first EAP-PSK
+ message (RAND_S) that is used as a session identifier
+
+ o A 16-byte MAC: MAC_S
+
+ o A variable length field that constitutes the protected channel:
+ PCHANNEL
+
+
+
+Bersani & Tschofenig Experimental [Page 36]
+
+RFC 4764 EAP-PSK January 2007
+
+
+ The Flags field format is presented in Figure 12.
+
+ If there is no extension, i.e., if the authentication is standard,
+ the PCHANNEL field consists of:
+
+ o A 4-byte Nonce N (see Section 3.3).
+
+ o A 16-byte Tag (see Section 3.3).
+
+ o A 2-bit result indication flag R.
+
+ o A 1-bit extension flag E, which is set to 0.
+
+ o A 5-bit Reserved field, which is set to zero on emission and
+ ignored on reception.
+
+ R, E, and Reserved are sent encrypted by the protected channel (see
+ Section 3.3).
+
+ If there is no extension, PCHANNEL has the format presented in
+ Figure 15 (where R, E, and Reserved are presented in the clear for
+ the sake of clarity, although in reality they are sent encrypted).
+
+ 0 1 2 3
+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Nonce |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | |
+ + +
+ | Tag |
+ + +
+ | |
+ + +
+ | |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | R |0| Reserved|
+ +-+-+-+-+-+-+-+-+
+
+ Figure 15: The PCHANNEL Field with E=0
+
+ If there is an extension, i.e., if the authentication is extended,
+ the PCHANNEL field consists of:
+
+ o A 4-byte Nonce N (see Section 3.3).
+
+ o A 16-byte Tag (see Section 3.3).
+
+
+
+
+Bersani & Tschofenig Experimental [Page 37]
+
+RFC 4764 EAP-PSK January 2007
+
+
+ o A 2-bit result indication flag R.
+
+ o A 1-bit extension flag E, which is set to 1.
+
+ o A 5-bit Reserved field, which is set to zero on emission and
+ ignored on reception.
+
+ o A variable length EXT field.
+
+ R, E, Reserved, and EXT are sent encrypted by the protected channel
+ (see Section 3.3).
+
+ If there is an extension, PCHANNEL has the format presented in
+ Figure 16 where R, E, Reserved and EXT are presented in the clear for
+ the sake of clarity, although in reality they are sent encrypted).
+
+ 0 1 2 3
+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Nonce |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | |
+ + +
+ | Tag |
+ + +
+ | |
+ + +
+ | |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | R |1| Reserved| |
+ +-+-+-+-+-+-+-+-+ +
+ : EXT :
+ : :
+ + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+
+ Figure 16: The PCHANNEL Field with E=1
+
+ This EXT field is split in two subfields:
+
+ o The EXT_Type subfield, which indicates the type of the extension
+
+ o The EXT_Payload subfield, which consists of the payload of the
+ extension. The EXT_Payload length is derived from the EAP Length
+ field. EXT_Payload must have a bit length that is a multiple of 8
+ bits and must not exceed 960 bytes. The latter restriction aims
+
+
+
+
+Bersani & Tschofenig Experimental [Page 38]
+
+RFC 4764 EAP-PSK January 2007
+
+
+ at avoiding fragmentation issues (see Section 8.11), whereas the
+ former comes from the EAP length being specified in bytes.
+
+ The format of the EXT field is presented in Figure 17.
+
+ 0 1 2 3
+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | EXT_Type | |
+ +-+-+-+-+-+-+-+-+ +
+ : EXT_Payload :
+ : :
+ + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+
+ Figure 17: The EXT Field
+
+5.4. EAP-PSK Fourth Message
+
+ The fourth EAP-PSK message is sent by the peer to the server. It has
+ the format presented in Figure 18.
+
+ 0 1 2 3
+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Code=2 | Identifier | Length |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Type EAP-PSK | Flags | |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +
+ | |
+ + +
+ | RAND_S |
+ + +
+ | |
+ + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | | |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +
+ : :
+ : PCHANNEL :
+ : :
+ : :
+ + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+
+ Figure 18: EAP-PSK Fourth Message
+
+
+
+
+Bersani & Tschofenig Experimental [Page 39]
+
+RFC 4764 EAP-PSK January 2007
+
+
+ It consists of:
+
+ o A 1-byte Flags field
+
+ o The 16-byte random number sent by the server in the first EAP-PSK
+ message (RAND_S) that is used as a session identifier
+
+ o A variable length field that constitutes the protected channel:
+ PCHANNEL
+
+ The Flags field format is presented in Figure 12.
+
+ The PCHANNEL field has the following structure, which was already
+ described in Section 5.3.
+
+ If there is no extension, i.e., if the authentication is standard,
+ the PCHANNEL field consists of:
+
+ o A 4-byte Nonce N (see Section 3.3).
+
+ o A 16-byte Tag (see Section 3.3).
+
+ o A 2-bit result indication flag R.
+
+ o A 1-bit extension flag E, which is set to 0.
+
+ o A 5-bit Reserved field, which is set to zero on emission and
+ ignored on reception.
+
+ R, E, and Reserved are sent encrypted by the protected channel (see
+ Section 3.3).
+
+ If there is no extension, PCHANNEL has the format presented in
+ Figure 15.
+
+ If there is an extension, i.e., if the authentication is extended,
+ the PCHANNEL field consists of:
+
+ o A 4-byte Nonce N (see Section 3.3).
+
+ o A 16-byte Tag (see Section 3.3).
+
+ o A 2-bit result indication flag R.
+
+ o A 1-bit extension flag E, which is set to 1.
+
+ o A 5-bit Reserved field, which is set to zero on emission and
+ ignored on reception.
+
+
+
+Bersani & Tschofenig Experimental [Page 40]
+
+RFC 4764 EAP-PSK January 2007
+
+
+ o A variable length EXT field.
+
+ R, E, Reserved, and EXT are sent encrypted by the protected channel
+ (see Section 3.3).
+
+ If there is an extension, PCHANNEL has the format presented in
+ Figure 16.
+
+ This EXT field is split in two subfields:
+
+ o The EXT_Type subfield, which indicates the type of the extension
+
+ o The EXT_Payload subfield, which consists of the payload of the
+ extension. The EXT_Payload length is derived from the EAP Length
+ field. EXT_Payload must have a bit length that is a multiple of 8
+ bits and must not exceed 960 bytes. The latter restriction aims
+ at avoiding fragmentation issues (see Section 8.11).
+
+ The format of the EXT field is presented in Figure 17.
+
+6. Rules of Operation for the EAP-PSK Protected Channel
+
+ In this section, the rules of operation of the EAP-PSK protected
+ channel are presented:
+
+ o How protected result indications are implemented.
+
+ o How an extended authentication works in details.
+
+6.1. Protected Result Indications
+
+ The R flag of the PCHANNEL field in the third and fourth types of
+ EAP-PSK messages is used to provide result indications.
+
+ Since this 2-bit flag is communicated over the protected channel, it
+ is:
+
+ o Encrypted so that only the peer and the server can know its value.
+
+ o Integrity-protected so that it cannot be modified by an attacker
+ without the peer or the server detecting this modification.
+
+ o Protected against replays.
+
+ This 2-bit R flag can take the following values:
+
+ o 01 to mean CONT
+
+
+
+
+Bersani & Tschofenig Experimental [Page 41]
+
+RFC 4764 EAP-PSK January 2007
+
+
+ o 10 to mean DONE_SUCCESS
+
+ o 11 to mean DONE_FAILURE
+
+ The peer and the server each remember some information about both the
+ values of R that they have sent and the values of R they have
+ received. It is the conjunction of both sent and received R values
+ that indicate the success or the failure of the EAP-PSK dialog.
+
+ In the case of a standard authentication, the following values of R
+ should be exchanged:
+
+ o Either the server sends a DONE_SUCCESS in the PCHANNEL of the
+ third EAP-PSK message, to which the peer replies with a
+ DONE_SUCCESS in the PCHANNEL of the fourth EAP-PSK message, which
+ successfully ends the EAP-PSK dialog.
+
+ o Or the server sends a DONE_FAILURE in the PCHANNEL of the third
+ EAP-PSK message, to which the peer replies with a DONE_FAILURE in
+ the PCHANNEL of the fourth EAP-PSK message, which unsuccessfully
+ ends the EAP-PSK dialog.
+
+ In the case of an extended authentication, more complex exchanges may
+ occur, which is why the CONT value was introduced.
+
+ The rules of operation for each value that R may take are detailed
+ below.
+
+6.1.1. CONT
+
+ The server and the peer each initialize the values of R they intend
+ to send and receive as CONT.
+
+ Here CONT stands for "Continue". It indicates that the EAP-PSK
+ dialog is not yet successful and that the party sending it wants to
+ continue the dialog to try and reach success.
+
+ Indeed, although the peer and the server must have successfully
+ authenticated each other, thanks to MAC_P and MAC_S, before they
+ start communicating over the protected channel, the EAP-PSK dialog
+ may not yet be deemed successful after this mutual authentication
+ because of authorization issues. For instance, a prepaid customer of
+ a wireless Hot-Spot might have successfully authenticated but has to
+ refill its account, e.g., with a credit card transaction over the
+ protected channel, before it is authorized.
+
+
+
+
+
+
+Bersani & Tschofenig Experimental [Page 42]
+
+RFC 4764 EAP-PSK January 2007
+
+
+6.1.2. DONE_SUCCESS
+
+ DONE_SUCCESS indicates that the party that sent it deems the EAP-PSK
+ dialog successful and therefore proposes to end this dialog.
+
+ Once the server has sent a DONE_SUCCESS, it must keep sending this
+ value for R.
+
+ The peer must first receive a DONE_SUCCESS from the server before it
+ is allowed to send a DONE_SUCCESS.
+
+ After the peer has received a DONE_SUCCESS from the server, it may:
+
+ o Send a CONT to the server if it has not reached success on its
+ side. The server that receives a CONT should continue the EAP-PSK
+ dialog (see Section 8.2 for some discussion on the security
+ implications of this).
+
+ o Send a DONE_SUCCESS to the server, which will end the EAP-PSK
+ dialog with success.
+
+ o Send a DONE_FAILURE to the server, which will end the EAP-PSK
+ dialog with failure.
+
+6.1.3. DONE_FAILURE
+
+ DONE_FAILURE indicates that the party that sent it deems the EAP-PSK
+ dialog unsuccessful and proposes to end this dialog because nothing
+ will make it change its mind.
+
+ If the server is the first to send a DONE_FAILURE, then the peer that
+ receives this DONE_FAILURE must reply with a DONE_FAILURE and fail,
+ which ends the EAP-PSK dialog.
+
+ If the peer is the first to send a DONE_FAILURE, then the server that
+ receives this DONE_FAILURE must immediately end this EAP-PSK dialog
+ without sending any further EAP-PSK message, and fail.
+
+6.2. Extended Authentication
+
+ An extended authentication can only be started by the server.
+
+ Exactly one extension (identified by the EXT_Type subfield of the EXT
+ field) must be run during an EAP-PSK extended authentication dialog.
+
+ The extension is run over the protected channel: it can assume
+ confidentiality, integrity, and replay protection.
+
+
+
+
+Bersani & Tschofenig Experimental [Page 43]
+
+RFC 4764 EAP-PSK January 2007
+
+
+ To start an extended authentication, the server sets the PCHANNEL E
+ flag to 1 and includes the EXT_Payload of the extension it has
+ chosen.
+
+ Since EAP-PSK does not provide fragmentation, the extension must not
+ send an EXT_Payload larger than 960 bytes, which corresponds to the
+ 1020-byte EAP MTU that may minimally be assumed (see [3]).
+
+ Moreover, an extension must not send an empty EXT_Payload (because
+ this has a particular meaning for EAP-PSK; see below).
+
+ When the peer receives the third EAP-PSK message with the E flag set
+ to 1, it checks whether it is able to process the proposed extension.
+
+ If the peer is not able to process the proposed extension, i.e., it
+ does not recognize the EXT_Type of the proposed extension, it sets
+ E=1 in its reply (the fourth EAP-PSK message) and include an EXT
+ field of the same EXT_Type but with an empty EXT_Payload.
+
+ Depending on the values taken by the R flags, the EAP-PSK dialog may:
+
+ o End
+
+ * If the peer's policy mandates that it fails in the case of an
+ unrecognized extension, it sends a DONE_FAILURE in the fourth
+ EAP-PSK message.
+
+ * If the server has sent a DONE_SUCCESS in the third EAP-PSK
+ message, and the peer's policy authorizes it to succeed even if
+ the extension is not recognized, the peer sends a DONE_SUCCESS.
+
+ o Continue for exactly one round-trip; namely, in case the server
+ has sent a CONT in the third EAP-PSK message and the peer's policy
+ authorizes it to succeed even if the extension is not recognized,
+ the peer replies with a CONT in the fourth EAP-PSK message. The
+ server must then, depending on its policy, send either a
+ DONE_SUCCESS or a DONE_FAILURE to the peer in the fifth EAP-PSK
+ message. If the server sent a DONE_SUCCESS in the fifth EAP-PSK
+ message, the peer must send a DONE_SUCCESS in the sixth EAP-PSK
+ message. All these messages must have the E flag set to 1 with an
+ EXT field with the EXT_Type of the extension that was proposed and
+ an empty EXT_Payload (this behavior was chosen to simplify
+ implementations).
+
+ If the peer is able to process the proposed extension, then it does
+ so. In this case, the extension must be aware of the R values sent
+ and received and able to propose to update them. All the subsequent
+ messages exchanged between the peer and the server must have the E
+
+
+
+Bersani & Tschofenig Experimental [Page 44]
+
+RFC 4764 EAP-PSK January 2007
+
+
+ flag set to 1 with an EXT field of the EXT_Type of the extension that
+ was proposed and a non-empty EXT_Payload.
+
+7. IANA Considerations
+
+ This section provides guidance to the IANA regarding registration of
+ values related to the EAP-PSK protocol, in accordance with [6].
+
+ The following terms are used here with the meanings defined in [6]:
+ "name space" and "registration".
+
+ The following policies are used here with the meanings defined in
+ [6]: "Expert Review" and "Specification Required".
+
+ This document introduces one new Internet Assigned Numbers Authority
+ (IANA) consideration: there is one name space in EAP-PSK that
+ requires registration: the EXT_Type values (see Section 5.3 and
+ Section 5.4).
+
+ For registration requests where a Designated Expert should be
+ consulted, the responsible IETF Area Director should appoint the
+ Designated Expert. The intention is that any allocation will be
+ accompanied by a published RFC. But in order to allow for the
+ allocation of values prior to the RFC being approved for publication,
+ the Designated Expert can approve allocations once it seems clear
+ that an RFC will be published. The Designated Expert will post a
+ request to the EAP WG mailing list (or a successor designated by the
+ Area Director) for comment and review, including an Internet-Draft.
+ Before a period of 30 days has passed, the Designated Expert will
+ either approve or deny the registration request and publish a notice
+ of the decision to the EAP WG mailing list or its successor, as well
+ as informing IANA. A denial notice must be justified by an
+ explanation and, in the cases where it is possible, concrete
+ suggestions on how the request can be modified so as to become
+ acceptable.
+
+7.1. Allocation of an EAP-Request/Response Type for EAP-PSK
+
+ IANA allocated a new EAP Type for EAP-PSK.
+
+7.2. Allocation of EXT Type Numbers
+
+ EAP-PSK is not intended as a general-purpose protocol, and
+ allocations of EXT_Type should not be made for purposes unrelated to
+ authentication, authorization, and accounting.
+
+ EXT_Type numbers have a range from 1 to 255.
+
+
+
+
+Bersani & Tschofenig Experimental [Page 45]
+
+RFC 4764 EAP-PSK January 2007
+
+
+ EXT_Type 255 has been allocated for Experimental use.
+
+ EXT_Type 1-254 may be allocated on the advice of a Designated Expert,
+ with Specification Required.
+
+8. Security Considerations
+
+ [3] highlights several attacks that are possible against EAP, as EAP
+ does not provide any robust security mechanism.
+
+ This section discusses the claimed security properties of EAP-PSK as
+ well as vulnerabilities and security recommendations in the threat
+ model of [3].
+
+8.1. Mutual Authentication
+
+ EAP-PSK provides mutual authentication.
+
+ The server believes that the peer is authentic because it can
+ calculate a valid MAC and the peer believes that the server is
+ authentic because it can calculate another valid MAC.
+
+ The authentication protocol that inspired EAP-PSK, AKEP2, enjoys a
+ security proof in the provable security paradigm; see [14].
+
+ The MAC algorithm used in the instantiation of AKEP2 within EAP-PSK,
+ CMAC, also enjoys a security proof in the provable security paradigm;
+ see [29]. A tag length of 16 bytes for CMAC is currently deemed
+ appropriate by the cryptographic community for entity authentication.
+
+ The underlying block cipher used, AES-128, is widely believed to be a
+ secure block cipher.
+
+ Finally, the key used for mutual authentication, AK, is only used for
+ that purpose, which makes this part cryptographically independent of
+ the other parts of the protocol.
+
+ EAP-PSK provides mutual authentication if it is based on a pairwise
+ PSK of sufficient strength. If the PSK is not pairwise or not
+ sufficiently strong, then it does not provide authentication. In
+ this way, EAP-PSK is no different than other authentication protocols
+ based on Pre-Shared Keys.
+
+
+
+
+
+
+
+
+
+Bersani & Tschofenig Experimental [Page 46]
+
+RFC 4764 EAP-PSK January 2007
+
+
+8.2. Protected Result Indications
+
+ EAP-PSK provides protected result indications thanks to its 2-bit R
+ flag (see Section 6.1). This 2-bit R flag is protected because it is
+ encrypted and integrity protected by the EAX mode of operation; see
+ Section 3.3.
+
+ Care may be taken against Byzantine failures, that is to say, for
+ instance, when a peer tries to force a server to engage in a never-
+ ending conversation. This could, for example, be done by a peer that
+ keeps sending a CONT after it has received a DONE_SUCCESS from the
+ server. A policy may limit the number of rounds in an EAP-PSK
+ extended authentication to mitigate this threat, which is outside our
+ threat model.
+
+ It should also be noted that the cryptographic protection of the
+ result indications does not prevent message deletion.
+
+ For instance, let us consider a scenario in which:
+
+ o A server sends a DONE_SUCCESS to a peer.
+
+ o The peer replies with a DONE_SUCCESS.
+
+ In the case that the last message from the peer is intercepted, and
+ an EAP Success is sent to the peer before any retransmission from the
+ server reaches it, or the retransmissions from the server are also
+ deleted, the peer will believe that it has successfully authenticated
+ to the server while the server will fail.
+
+ This behavior is well known (see, e.g., [23]) and in a sense
+ unavoidable. There is a trade-off between efficiency and the "level"
+ of information sharing that is attainable. EAP-PSK specified a
+ single round-trip of DONE_SUCCESS because it is believed that:
+
+ o If there is an adversary capable of disrupting the communication
+ channel, it can do so whenever it wants (be it after 1 or 10
+ round-trips or even during data communication).
+
+ o Other layers/applications will generally start by doing a specific
+ key exchange and confirmation procedure using the keys derived by
+ EAP-PSK. This is typically done by IEEE 802.11i "four-way
+ handshake". In case the error is not detected by EAP-PSK, it
+ should be detected then (please note, however, that it is bad
+ practice to rely on an external mechanism to ensure
+ synchronization, unless this is an explicit property of the
+ external mechanism).
+
+
+
+
+Bersani & Tschofenig Experimental [Page 47]
+
+RFC 4764 EAP-PSK January 2007
+
+
+8.3. Integrity Protection
+
+ EAP-PSK provides integrity protection thanks to the Tag of its
+ protected channel (see Section 3.3).
+
+ EAP-PSK provides integrity protection if it is based on a pairwise
+ PSK of sufficient strength. If the PSK is not pairwise or not
+ sufficiently strong, then it does not provide authentication. In
+ this way, it is no different than other authentication protocols
+ based on Pre-Shared Keys.
+
+8.4. Replay Protection
+
+ EAP-PSK provides replay protection of its mutual authentication part
+ thanks to the use of random numbers RAND_S and RAND_P. Since RAND_S
+ is 128 bits long, one expects to have to record 2**64 (i.e.,
+ approximately 1.84*10**19) EAP-PSK successful authentications before
+ an authentication can be replayed. Hence, EAP-PSK provides replay
+ protection of its mutual authentication part as long as RAND_S and
+ RAND_P are chosen at random; randomness is critical for security.
+
+ EAP-PSK provides replay protection during the conversation of the
+ protected channel thanks to the Nonce N of its protected channel (see
+ Section 3.3). This nonce is initialized to 0 by the server and
+ monotonically incremented by one by the party that receives a valid
+ EAP-PSK message. For instance, after receiving from the server a
+ valid EAP-PSK message with Nonce set to x, the peer will answer with
+ an EAP-PSK message with Nonce set to x+1 and wait for an EAP-PSK
+ message with Nonce set to x+2. A retransmission of the server's
+ message with Nonce set to x would cause the peer EAP layer to resend
+ the message in which Nonce was set to x+1, which would be transparent
+ to the EAP-PSK layer.
+
+ The EAP peer must check that the Nonce is indeed initialized to 0 by
+ the server.
+
+8.5. Reflection Attacks
+
+ EAP-PSK provides protection against reflection attacks in case of an
+ extended authentication because:
+
+ o It integrity protects the EAP header (which contains the
+ indication Request/Response.
+
+ o It includes two separate spaces for the Nonces: the EAP server
+ only receives messages with odd nonces, whereas the EAP peer only
+ receives messages with even nonces.
+
+
+
+
+Bersani & Tschofenig Experimental [Page 48]
+
+RFC 4764 EAP-PSK January 2007
+
+
+8.6. Dictionary Attacks
+
+ Because EAP-PSK is not a password protocol, it is not vulnerable to
+ dictionary attacks.
+
+ Indeed, the PSK used by EAP-PSK must not be derived from a password.
+ Derivation of the PSK from a password may lead to dictionary attacks.
+
+ However, using a 16-byte PSK has:
+
+ o Ergonomic impacts: some people may find it cumbersome to manually
+ provision a 16-byte PSK.
+
+ o Deployment impacts: some people may want to reuse existing
+ credential databases that contain passwords and not PSKs.
+
+ Because people will probably not heed the warning not to use
+ passwords, guidance to derive a PSK from a password is provided in
+ Appendix A. The method proposed in Appendix A only tries to make
+ dictionary attacks harder. It does not eliminate them.
+
+ However, it does not cause a fatal error if passwords are used
+ instead of PSKs: people rarely use password-derived certificates, so
+ why should they do so for shared keys?
+
+8.7. Key Derivation
+
+ EAP-PSK supports key derivation.
+
+ The key hierarchy is specified in Section 2.1.
+
+ The mechanism used for key derivation is the modified counter mode.
+
+ The instantiation of the modified counter in EAP-PSK complies with
+ the conditions stated in [5] so that the security proof for this mode
+ holds.
+
+ The underlying block cipher used, AES-128, is widely believed to be a
+ secure block cipher.
+
+ A first key derivation occurs to calculate AK and KDK from the PSK:
+ it is called the key setup (see Section 3.1). It uses the PSK as the
+ key to the modified counter mode. Thus, AK and KDK are believed to
+ be cryptographically separated and computable only to those who have
+ knowledge of the PSK.
+
+
+
+
+
+
+Bersani & Tschofenig Experimental [Page 49]
+
+RFC 4764 EAP-PSK January 2007
+
+
+ A second key derivation occurs to derive session keys, namely, the
+ TEK, MSK, and EMSK (see Section 3.2). It uses KDK as the key to the
+ modified counter mode.
+
+ The protocol design explicitly assumes that neither AK nor KDK are
+ shared beyond the two parties utilizing them. AK loses its efficacy
+ to mutually authenticate the peer and server with each other when it
+ is shared. Similarly, the derived TEK, MSK, and EMSK lose their
+ value when KDK is shared with a third party.
+
+ It should be emphasized that the peer has control of the session keys
+ derived by EAP-PSK. In particular, it can easily choose the random
+ number it sends in EAP-PSK so that one of the nine derived 16-byte
+ key blocks (see Section 2.1) takes a pre-specified value.
+
+ It was chosen not to prevent this control of the session keys by the
+ peer because:
+
+ o Preventing it would have added some complexity to the protocol
+ (typically, the inclusion of a one-way mode of operation of AES in
+ the key derivation part).
+
+ o It is believed that the peer won't try to force the server to use
+ some pre-specified value for the session keys. Such an attack is
+ outside the threat model and seems to have little value compared
+ to a peer sharing its PSK.
+
+ However, this is not the behavior recommended by EAP in Section 7.10
+ of [3].
+
+ Since deriving the session keys requires some cryptographic
+ computations, it is recommended that the session keys be derived only
+ once authentication has succeeded (i.e., once the server has
+ successfully verified MAC_P for the server side, and once the peer
+ has successfully verified MAC_S for the peer side).
+
+ It is recommended to take great care in implementations, so that
+ derived keys are not made available if the EAP-PSK dialog fails
+ (e.g., ends with DONE_FAILURE).
+
+ The TEK must not be made available to anyone except to the current
+ EAP-PSK dialog.
+
+
+
+
+
+
+
+
+
+Bersani & Tschofenig Experimental [Page 50]
+
+RFC 4764 EAP-PSK January 2007
+
+
+8.8. Denial-of-Service Resistance
+
+ Denial of Service (DoS) resistance has not been a design goal for
+ EAP-PSK.
+
+ It is, however, believed that EAP-PSK does not provide any obvious
+ and avoidable venue for such attacks.
+
+ It is worth noting that the server has to do a cryptographic
+ calculation and maintain some state when it engages in an EAP-PSK
+ conversation, namely, generate and remember the 16-byte RAND_S.
+ However, this should not lead to resource exhaustion as this state
+ and the associated computation are fairly lightweight.
+
+ Please note that both the peer and the server must commit to their
+ RAND_S and RAND_P to protect their partners from flooding attacks.
+
+ It is recommended that EAP-PSK not allow EAP notifications to be
+ interleaved in its dialog to prevent potential DoS attacks. Indeed,
+ since EAP notifications are not integrity protected, they can easily
+ be spoofed by an attacker. Such an attacker could force a peer that
+ allows EAP notifications to engage in a discussion that would delay
+ his or her authentication or result in the peer taking unexpected
+ actions (e.g., in case a notification is used to prompt the peer to
+ do some "bad" action).
+
+ It is up to the implementation of EAP-PSK or to the peer and the
+ server to specify the maximum number of failed cryptographic checks
+ that are allowed. For instance, does the reception of a bogus MAC_P
+ in the second EAP-PSK message cause a fatal error or is it discarded
+ to continue waiting for the valid response of the valid peer? There
+ is a trade-off between possibly allowing multiple tentative forgeries
+ and allowing a direct DoS (in case the first error is fatal).
+
+ For the sake of simplicity and denial-of-service resilience, EAP-PSK
+ has chosen not to include any error messages. Hence, an "invalid"
+ EAP-PSK message is silently discarded. Although this makes
+ interoperability testing and debugging harder, this leads to simpler
+ implementations and does not open any venue for denial-of-service
+ attacks.
+
+8.9. Session Independence
+
+ Thanks to its key derivation mechanisms, EAP-PSK provides session
+ independence: passive attacks (such as capture of the EAP
+ conversation) or active attacks (including compromise of the MSK or
+ EMSK) do not enable compromise of subsequent or prior MSKs or EMSKs.
+
+
+
+
+Bersani & Tschofenig Experimental [Page 51]
+
+RFC 4764 EAP-PSK January 2007
+
+
+ The assumption that RAND_P and RAND_S are random is central for the
+ security of EAP-PSK in general and session independence in
+ particular.
+
+8.10. Exposition of the PSK
+
+ EAP-PSK does not provide Perfect Forward Secrecy. Compromise of the
+ PSK leads to compromise of recorded past sessions.
+
+ Compromise of the PSK enables the attacker to impersonate the peer
+ and the server: compromise of the PSK leads to "full" compromise of
+ future sessions.
+
+ EAP-PSK provides no protection against a legitimate peer sharing its
+ PSK with a third party. Such protection may be provided by
+ appropriate repositories for the PSK, whose choice is outside the
+ scope of this document. The PSK used by EAP-PSK must only be shared
+ between two parties: the peer and the server. In particular, this
+ PSK must not be shared by a group of peers communicating with the
+ same server.
+
+ The PSK used by EAP-PSK must be cryptographically separated from keys
+ used by other protocols, otherwise the security of EAP-PSK may be
+ compromised. It is a rule of thumb in cryptography to use different
+ keys for different applications.
+
+8.11. Fragmentation
+
+ EAP-PSK does not support fragmentation and reassembly.
+
+ Indeed, the largest EAP-PSK frame is at most 1015 bytes long,
+ because:
+
+ o The maximum length for the peer NAI identity used in EAP-PSK is
+ 966 bytes (see Section 5.2). This should not be a limitation in
+ practice (see Section 2.2 of [2] for more considerations on NAI
+ length).
+
+ o The maximum length for the EXT_Payload field used in EAP-PSK is
+ 960 bytes (see Section 5.3 and Section 5.4).
+
+ Per Section 3.1 of [3], the lower layers over which EAP may be run
+ are assumed to have an EAP MTU of 1020 bytes or greater. Since the
+ EAP header is 5 bytes long, supporting fragmentation for EAP-PSK is
+ unnecessary.
+
+ Extensions that require sending a payload larger than 960 bytes
+ should provide their own fragmentation and reassembly mechanism.
+
+
+
+Bersani & Tschofenig Experimental [Page 52]
+
+RFC 4764 EAP-PSK January 2007
+
+
+8.12. Channel Binding
+
+ EAP-PSK does not provide channel binding as this feature is still
+ very much a work in progress (see [13]).
+
+ However, it should be easy to add it to EAP-PSK as an extension (see
+ Section 4.2).
+
+8.13. Fast Reconnect
+
+ EAP-PSK does not provide any fast reconnect capability.
+
+ Indeed, as noted, for instance, in [15], mutual authentication
+ (without counters or timestamps) requires three exchanges, thus four
+ exchanges in EAP since any EAP-Request must be answered to by an EAP-
+ Response.
+
+ Since this minimum bound is already reached in EAP-PSK standard
+ authentication, there is no way the number of round-trips used within
+ EAP-PSK can be reduced without using timestamps or counters.
+ Timestamps and counters were deliberately avoided for the sake of
+ simplicity and security (e.g., synchronization issues).
+
+8.14. Identity Protection
+
+ Since it was chosen to restrict to a single cryptographic primitive
+ from symmetric cryptography, namely, the block cipher AES-128, it
+ appears that it is not possible to provide "reasonable" identity
+ protection without failing to meet the simplicity goal.
+
+ Hereafter is an informal discussion of what is meant by identity
+ protection and the rationale behind the requirement of identity
+ protection. For some complementary discussion, refer to [37].
+
+ Identity protection basically means preventing the disclosure of the
+ identities of the communicating parties over the network, which is
+ quite contradictory to authentication. There are two levels of
+ identity protection: protection against passive attackers and
+ protection against active eavesdroppers.
+
+ As explained in [37], "a common example [for identity protection] is
+ the case of mobile devices wishing to prevent an attacker from
+ correlating their (changing) location with the logical identity of
+ the device (or user)".
+
+ If only symmetric cryptography is used, only a weak form of identity
+ protection may be offered, namely, pseudonym management. In other
+ words, the peer and the server agree on pseudonyms that they use to
+
+
+
+Bersani & Tschofenig Experimental [Page 53]
+
+RFC 4764 EAP-PSK January 2007
+
+
+ identify each other and usually change them periodically, possibly in
+ a protected way so that an attacker cannot learn new pseudonyms
+ before they are used.
+
+ With pseudonym management, there is a trade-off between allowing for
+ pseudonym resynchronization (thanks to a permanent identity) and
+ being vulnerable to active attacks (in which the attacker forges
+ messages simulating a pseudonym desynchronization).
+
+ Indeed, a protocol using time-varying pseudonyms may want to
+ anticipate "desynchronization" situations such as, for instance, when
+ the peer believes that its current pseudonym is "pseudo1@bigco.com"
+ whereas the server believes this peer will use the pseudonym
+ "pseudo2@bigco.com" (which is the pseudonym the server has sent to
+ update "pseudo1@bigco.com").
+
+ Because pseudonym management adds complexity to the protocol and
+ implies this unsatisfactory trade-off, it was decided not to include
+ this feature in EAP-PSK.
+
+ However, EAP-PSK may trivially provide some protection when the
+ concern is to avoid the "real-life" identity of the user being
+ "discovered". For instance, let us take the example of user John Doe
+ that roams and connects to a Hot-Spot owned and operated by Wireless
+ Internet Service Provider (WISP) BAD. Suppose this user
+ authenticates to his home WISP (WISP GOOD) with an EAP method under
+ an identity (e.g., "john.doe@wispgood.com") that allows WISP BAD (or
+ an attacker) to recover his "real-life" identity, i.e., John Doe. An
+ example drawback of this is when a competitor of John Doe's WISP
+ wants to win John Doe as a new customer by sending him some special
+ targeted advertisement.
+
+ EAP-PSK can very simply thwart this attack, merely by avoiding to
+ provide John Doe with an NAI that allows easy recovery of his real-
+ life identity. It is believed that when an NAI that is not
+ correlated to a real-life identity is used, no valuable information
+ leaks because of the EAP method.
+
+ Indeed, the identity of the WISP used by a peer has to be disclosed
+ anyway in the realm portion of its NAI to allow AAA routing.
+ Moreover, the Medium Access Control Address of the peer's Network
+ Interface Card can generally be used to track the peer as efficiently
+ as a fixed NAI.
+
+
+
+
+
+
+
+
+Bersani & Tschofenig Experimental [Page 54]
+
+RFC 4764 EAP-PSK January 2007
+
+
+ It is worth noting that the server systematically discloses its
+ identity, which may allow probing attacks. This may not be a problem
+ as the identity of the server is not supposed to remain secret. On
+ the contrary, users tend to want to know to whom they will be talking
+ in order to choose the right network to attach to.
+
+8.15. Protected Ciphersuite Negotiation
+
+ EAP-PSK does not allow negotiating ciphersuites. Hence, it is not
+ vulnerable to negotiation attacks and does not implement protected
+ ciphersuite negotiation.
+
+8.16. Confidentiality
+
+ Although EAP-PSK provides confidentiality in its protected channel,
+ it cannot claim to do so as per Section 7.2.1 of [3]: "A method
+ making this claim must support identity protection".
+
+8.17. Cryptographic Binding
+
+ Since EAP-PSK is not intended to be tunneled within another protocol
+ that omits peer authentication, it does not implement cryptographic
+ binding.
+
+8.18. Implementation of EAP-PSK
+
+ To really provide security, not only must a protocol be well thought-
+ out and correctly specified, but its implementation must take special
+ care.
+
+ For instance, implementing cryptographic algorithms requires special
+ skills since cryptographic software is vulnerable not only to
+ classical attacks (e.g., buffer overflow or missing checks) but also
+ to some special cryptographic attacks (e.g., side channels attacks
+ like timing ones; see [36]). In particular, care must be taken to
+ avoid such attacks in EAX implementation; please refer to [4] for a
+ note on this point.
+
+ An EAP-PSK implementation should use a good source of randomness to
+ generate the random numbers required in the protocol. Please refer
+ to [20] for more information on generating random numbers for
+ security applications.
+
+ Handling sensitive material (namely, keying material such as the PSK,
+ AK, KDK, etc.) should be done in a secure way (see, for instance,
+ [19] for guidance on secure deletion).
+
+
+
+
+
+Bersani & Tschofenig Experimental [Page 55]
+
+RFC 4764 EAP-PSK January 2007
+
+
+ The specification of a repository for the PSK that EAP-PSK uses is
+ outside the scope of this document. In particular, nothing prevents
+ one from storing this PSK on a tamper-resistant device such as a
+ smart card rather than having it memorized or written down on a sheet
+ of paper. The choice of the PSK repository may have important
+ security impacts.
+
+9. Security Claims
+
+ This section provides the security claims required by [3].
+
+ [a] Mechanism. EAP-PSK is based on symmetric cryptography (AES-128)
+ and uses a 16-byte Pre-Shared Key (PSK).
+
+ [b] Security claims. EAP-PSK provides:
+
+ * Mutual authentication (see Section 8.1)
+
+ * Integrity protection (see Section 8.3)
+
+ * Replay protection (see Section 8.4)
+
+ * Key derivation (see Section 8.7)
+
+ * Dictionary attack resistance (see Section 8.6)
+
+ * Session independence (see Section 8.9)
+
+ [c] Key strength. EAP-PSK provides a 16-byte effective key
+ strength.
+
+ [d] Description of key hierarchy. Please see Section 2.1.
+
+ [e] Indication of vulnerabilities. EAP-PSK does not provide:
+
+ * Identity protection (see Section 8.14)
+
+ * Confidentiality (see Section 8.16)
+
+ * Fast reconnect (see Section 8.13)
+
+ * Fragmentation (see Section 8.11)
+
+ * Cryptographic binding (see Section 8.17)
+
+ * Protected ciphersuite negotiation (see Section 8.15)
+
+ * Perfect Forward Secrecy (see Section 8.10)
+
+
+
+Bersani & Tschofenig Experimental [Page 56]
+
+RFC 4764 EAP-PSK January 2007
+
+
+ * Key agreement: the session key is chosen by the peer (see
+ Section 8.7)
+
+ * Channel binding (see Section 8.12)
+
+10. Acknowledgments
+
+ This EAP method has been inspired by EAP-Archie and EAP-SIM. Many
+ thanks to their respective authors: Jesse Walker (extra thanks to
+ Jesse Walker for his thorough and challenging expert review of EAP-
+ PSK), Russ Housley, Henry Haverinen, and Joseph Salowey.
+
+ Thanks to
+
+ o Henri Gilbert for some interesting discussions on the
+ cryptographic parts of EAP-PSK.
+
+ o Aurelien Magniez for his valuable feedback on network aspects of
+ EAP-PSK, his curiosity and rigor that led to numerous
+ improvements, and his help in the first implementation of EAP-PSK
+ under Microsoft Windows and Freeradius.
+
+ o Thomas Otto for his valuable feedback on EAP-PSK and the
+ implementation of the first version of EAP-PSK under Xsupplicant.
+
+ o Nancy Cam-Winget for some exchanges on EAP-PSK.
+
+ o Jari Arkko and Bernard Aboba, the beloved EAP WG chairs, for the
+ work they stimulate.
+
+ Finally, thanks to Vir Z., who has brought a permanent and
+ outstanding though discreet contribution to this protocol.
+
+11. References
+
+11.1. Normative References
+
+ [1] Bradner, S., "Key words for use in RFCs to Indicate Requirement
+ Levels", BCP 14, RFC 2119, March 1997.
+
+ [2] Aboba, B., Beadles, M., Arkko, J., and P. Eronen, "The Network
+ Access Identifier", RFC 4282, December 2005.
+
+ [3] Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., and H.
+ Levkowetz, "Extensible Authentication Protocol (EAP)",
+ RFC 3748, June 2004.
+
+
+
+
+
+Bersani & Tschofenig Experimental [Page 57]
+
+RFC 4764 EAP-PSK January 2007
+
+
+ [4] Bellare, M., Rogaway, P., and D. Wagner, "The EAX mode of
+ operation", FSE 04, Springer-Verlag LNCS 3017, 2004.
+
+ [5] Gilbert, H., "The Security of One-Block-to-Many Modes of
+ Operation", FSE 03, Springer-Verlag LNCS 2287, 2003.
+
+ [6] Narten, T. and H. Alvestrand, "Guidelines for Writing an IANA
+ Considerations Section in RFCs", BCP 26, RFC 2434,
+ October 1998.
+
+ [7] National Institute of Standards and Technology, "Specification
+ for the Advanced Encryption Standard (AES)", Federal
+ Information Processing Standards (FIPS) 197, November 2001.
+
+ [8] National Institute of Standards and Technology, "Recommendation
+ for Block Cipher Modes of Operation: The CMAC Mode for
+ Authentication", Special Publication (SP) 800-38B, May 2005.
+
+11.2. Informative References
+
+ [9] Aboba, B., Simon, D., Eronen, P., and H. Levkowetz,"Extensible
+ Authentication Protocol (EAP) Key Management Framework", Work
+ in Progress, October 2006.
+
+ [10] Aboba, B., Calhoun, P., Glass, S., Hiller, T., McCann, P.,
+ Shiino, H., Zorn, G., Dommety, G., Perkins, C., Patil, B.,
+ Mitton, D., Manning, S., Beadles, M., Walsh, P., Chen, X.,
+ Sivalingham, S., Hameed, A., Munson, M., Jacobs, S., Lim, B.,
+ Hirschman, B., Hsu, R., Xu, Y., Campell, E., Baba, S., and E.
+ Jaques, "Criteria for Evaluating AAA Protocols for work
+ Access", RFC 2989, November 2000.
+
+ [11] Aboba, B. and D. Simon, "PPP EAP TLS Authentication Protocol",
+ RFC 2716, October 1999.
+
+ [12] Arkko, J. and H. Haverinen, "Extensible Authentication Protocol
+ Method for 3rd Generation Authentication and Key Agreement
+ (EAP-AKA)", RFC 4187, January 2006.
+
+ [13] Arkko, J. and P. Eronen, "Authenticated Service Information for
+ the Extensible Authentication Protocol (EAP)", Work in
+ Progress, October 2005.
+
+ [14] Bellare, M. and P. Rogaway, "Entity Authentication and Key
+ Distribution", CRYPTO 93, Springer-Verlag LNCS 773, 1994.
+
+
+
+
+
+
+Bersani & Tschofenig Experimental [Page 58]
+
+RFC 4764 EAP-PSK January 2007
+
+
+ [15] Bellare, M., Pointcheval, D., and P. Rogaway, "Authenticated
+ Key Exchange Secure Against Dictionary attacks", EUROCRYPT 00,
+ Springer-Verlag LNCS 1807, 2000.
+
+ [16] Bersani, F., "EAP shared key methods: a tentative synthesis of
+ those proposed so far", Work in Progress, April 2004.
+
+ [17] Bradner, S., "The Internet Standards Process -- Revision 3",
+ BCP 9, RFC 2026, October 1996.
+
+ [18] Carlson, J., Aboba, B., and H. Haverinen, "EAP SRP-SHA1
+ Authentication Protocol", Work in Progress, July 2001.
+
+ [19] Department of Defense of the United States, "National
+ Industrial Security Program Operating Manual", DoD 5220-22M,
+ January 1995.
+
+ [20] Eastlake, D., Schiller, J., and S. Crocker, "Randomness
+ Requirements for Security", BCP 106, RFC 4086, June 2005.
+
+ [21] Funk, P. and S. Blake-Wilson, "EAP Tunneled TLS Authentication
+ Protocol (EAP-TTLS)", Work in Progress, July 2004.
+
+ [22] Haller, N., Metz, C., Nesser, P., and M. Straw, "A One-Time
+ Password System", RFC 2289, February 1998.
+
+ [23] Halpern, J. and Y. Moses, "Knowledge and common knowledge in a
+ distributed environment", Journal of the ACM 37:3, 1990.
+
+ [24] Haverinen, H. and J. Salowey, "Extensible Authentication
+ Protocol Method for Global System for Mobile Communications
+ (GSM) Subscriber Identity Modules (EAP-SIM)", RFC 4186,
+ January 2006.
+
+ [25] Huitema, C., Postel, J., and S. Crocker, "Not All RFCs are
+ Standards", RFC 1796, April 1995.
+
+ [26] Institute of Electrical and Electronics Engineers, "Local and
+ Metropolitan Area Networks: Port-Based Network Access Control",
+ IEEE Standard 802.1X, September 2001.
+
+ [27] Institute of Electrical and Electronics Engineers, "Approved
+ Draft Supplement to Standard for Telecommunications and
+ Information Exchange Between Systems-LAN/MAN Specific
+ Requirements - Part 11: Wireless LAN Medium Access Control
+ (MAC) and Physical Layer (PHY) Specifications: Specification
+ for Enhanced Security", IEEE 802.11i-2004, 2004.
+
+
+
+
+Bersani & Tschofenig Experimental [Page 59]
+
+RFC 4764 EAP-PSK January 2007
+
+
+ [28] Institute of Electrical and Electronics Engineers, "Standard
+ for Telecommunications and Information Exchange Between Systems
+ - LAN/MAN Specific Requirements - Part 11: Wireless LAN Medium
+ Access Control (MAC) and Physical Layer (PHY) Specifications",
+ IEEE Standard 802.11, 1999.
+
+ [29] Iwata, T. and K. Kurosawa, "OMAC: One-Key CBC MAC", FSE 03,
+ Springer-Verlag LNCS 2887, 2003.
+
+ [30] Jablon, D., "The SPEKE Password-Based Key Agreement Methods",
+ Work in Progress, November 2002.
+
+ [31] Josefsson, S., "The EAP SecurID(r) Mechanism", Work in
+ Progress, February 2002.
+
+ [32] Josefsson, S., Palekar, A., Simon, D., and G. Zorn, "Protected
+ EAP Protocol (PEAP) Version 2", Work in Progress, October 2004.
+
+ [33] Kaliski, B., "PKCS #5: Password-Based Cryptography
+ Specification Version 2.0", RFC 2898, September 2000.
+
+ [34] Kamath, V. and A. Palekar, "Microsoft EAP CHAP Extensions",
+ Work in Progress, April 2004.
+
+ [35] Kent, S., "IP Authentication Header", RFC 4302, December 2005
+
+ [36] Kocher, P., "Timing Attacks on Implementations of Diffie-
+ Hellman, RSA, DSS, and Other Systems", CRYPTO 96, Springer-
+ Verlag LNCS 1109, 1996.
+
+ [37] Krawczyk, H., "SIGMA: the `SIGn-and-MAc' Approach to
+ Authenticated Diffie-Hellman and its Use in the IKE Protocols",
+ CRYPTO 03, Springer-Verlag LNCS 2729, June 2003.
+
+ [38] MacNally, C., "Cisco LEAP protocol description",
+ September 2001, available from
+ <http://www.missl.cs.umd.edu/wireless/ethereal/leap.txt>.
+
+ [39] Metz, C., "OTP Extended Responses", RFC 2243, November 1997.
+
+ [40] Menezes, A., van Oorschot, P., and S. Vanstone, "Handbook of
+ Applied Cryptography", CRC Press , 1996.
+
+ [41] National Institute of Standards and Technology, "Password
+ Usage", Federal Information Processing Standards (FIPS) 112,
+ May 1985.
+
+
+
+
+
+Bersani & Tschofenig Experimental [Page 60]
+
+RFC 4764 EAP-PSK January 2007
+
+
+ [42] Cam-Winget, N., McGrew, D., Salowey, J., and H. Zhou, "The
+ Flexible Authentication via Secure Tunneling Extensible
+ Authentication Protocol Method (EAP-FAST)", Work in Progress,
+ October 2006.
+
+ [43] Schneier, B., Mudge, and D. Wagner, "Cryptanalysis of
+ Microsoft's PPTP Authentication Extensions (MS-CHAPv2)",
+ CQRE 99, Springer-Verlag LNCS 1740, October 1999.
+
+ [44] Simpson, W., "The Point-to-Point Protocol (PPP)", STD 51,
+ RFC 1661, July 1994.
+
+ [45] Simpson, W., "PPP Challenge Handshake Authentication Protocol
+ (CHAP)", RFC 1994, August 1996.
+
+ [46] Tschofenig, H., Kroeselberg, D., Pashalidis, A., Ohba, Y., and
+ F. Bersani, "EAP IKEv2 Method", Work in Progress, October 2006.
+
+ [47] Walker, J. and R. Housley, "The EAP Archie Protocol", Work in
+ Progress, June 2003.
+
+ [48] Wi-Fi Alliance, "Wi-Fi Protected Access, version 2.0",
+ April 2003.
+
+ [49] Wright, J., "Weaknesses in LEAP Challenge/Response", Defcon 03,
+ August 2003.
+
+ [50] Eronen, P. and H. Tschofenig, "Pre-Shared Key Ciphersuites for
+ Transport Layer Security (TLS)", RFC 4279, December 2005.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Bersani & Tschofenig Experimental [Page 61]
+
+RFC 4764 EAP-PSK January 2007
+
+
+Appendix A. Generation of the PSK from a Password - Discouraged
+
+ It is formally discouraged to use a password to generate the PSK,
+ since this opens the door to exhaustive search or dictionary attacks,
+ two attacks that would not otherwise be possible.
+
+ EAP-PSK only provides a 16-byte key strength when a 16-byte PSK is
+ drawn at random from the set of all possible 16-byte strings.
+
+ However, as people will probably do this anyway, guidance is provided
+ hereafter to generate the PSK from a password.
+
+ For some hints on how passwords should be selected, please refer to
+ [41].
+
+ The technique presented herein is drawn from [33]. It is intended to
+ try to mitigate the risks associated with password usage in
+ cryptography, typically dictionary attacks.
+
+ If the binary representation of the password is strictly fewer than
+ 16 bytes long (which by the way means that the chosen password is
+ probably weak because it is too short), then it is padded to 16 bytes
+ with zeroes as its high-order bits.
+
+ If the binary representation of the password is strictly more than 16
+ bytes long, then it is hashed down to exactly 16 bytes using the
+ Matyas-Meyer-Oseas hash (please refer to [40] for a description of
+ this hash. Using the notation of Figure 9.3 of [40], g is the
+ identity function and E is AES-128 in our construction.) with
+ IV=0x0123456789ABCDEFFEDCBA9876543210 (this value has been
+ arbitrarily selected).
+
+ We now assume that we have a 16-byte number derived from the initial
+ password (that can be the password itself if its binary
+ representation is exactly 16 bytes long). We shall call this number
+ P16.
+
+ Following the notations used in [33], the PSK is derived thanks to
+ PBKDF2 instantiated with:
+
+ o P16 as P
+
+ o The first 96 bits of the XOR of the peer and server NAIs as Salt
+ (zero-padded in the high-order bits if necessary).
+
+ o 5000 as c
+
+ o 16 as dkLen
+
+
+
+Bersani & Tschofenig Experimental [Page 62]
+
+RFC 4764 EAP-PSK January 2007
+
+
+ Although this gives better protection than nothing, this derivation
+ does not stricto sensu protect against dictionary attacks. It only
+ makes dictionary precomputation harder.
+
+Authors' Addresses
+
+ Florent Bersani
+ France Telecom R&D
+ 38, rue du General Leclerc
+ Issy-Les-Moulineaux 92794 Cedex 9
+ FR
+
+ EMail: bersani_florent@yahoo.fr
+
+
+ Hannes Tschofenig
+ Siemens Networks GmbH & Co KG
+ Otto-Hahn-Ring 6
+ Munich 81739
+ GE
+
+ EMail: Hannes.Tschofenig@siemens.com
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Bersani & Tschofenig Experimental [Page 63]
+
+RFC 4764 EAP-PSK January 2007
+
+
+Full Copyright Statement
+
+ Copyright (C) The IETF Trust (2007).
+
+ This document is subject to the rights, licenses and restrictions
+ contained in BCP 78 and at www.rfc-editor.org/copyright.html, and
+ except as set forth therein, the authors retain all their rights.
+
+ This document and the information contained herein are provided on an
+ "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
+ OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
+ THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
+ OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
+ THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
+ WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
+
+Intellectual Property
+
+ The IETF takes no position regarding the validity or scope of any
+ Intellectual Property Rights or other rights that might be claimed to
+ pertain to the implementation or use of the technology described in
+ this document or the extent to which any license under such rights
+ might or might not be available; nor does it represent that it has
+ made any independent effort to identify any such rights. Information
+ on the procedures with respect to rights in RFC documents can be
+ found in BCP 78 and BCP 79.
+
+ Copies of IPR disclosures made to the IETF Secretariat and any
+ assurances of licenses to be made available, or the result of an
+ attempt made to obtain a general license or permission for the use of
+ such proprietary rights by implementers or users of this
+ specification can be obtained from the IETF on-line IPR repository at
+ http://www.ietf.org/ipr.
+
+ The IETF invites any interested party to bring to its attention any
+ copyrights, patents or patent applications, or other proprietary
+ rights that may cover technology that may be required to implement
+ this standard. Please address the information to the IETF at
+ ietf-ipr@ietf.org.
+
+Acknowledgement
+
+ Funding for the RFC Editor function is currently provided by the
+ Internet Society.
+
+
+
+
+
+
+
+Bersani & Tschofenig Experimental [Page 64]
+