Bernard,

c. EAP negotiation issues.  Neither the IESG note nor the
text explicitly states what is wrong with using an EAP Type Code for incompatible versions of an EAP method that does not
support version negotiation.

They should state this.

Indeed, it would appear that some
members of the IESG think that method overloading is required
by EAP tunneling methods desiring to incorporate support for
cryptographic binding.
Not sure who you are referring to, but for the record I at least do not believe that. Cryptographic binding can clearly be achieved without overloading or re-definition of behaviour of existing components.

Saying that this "might be difficult
in some software environments" isn't a good characterization. Would the IESG use the same words to describe the reuse of
IP protocol numbers within an IP tunnel?  I doubt it.

I guess this referred to the difficulty of implementing the remedy where EAP within a tunnel is different from EAP outside the tunnel. In some cases this would be possible, in some other cases not... depending on what the software architecture, APIs, etc are. But in all cases it is painful, which is why this is a bad approach and should not be done by future methods.

Jari

_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to