This discussion started with the statement that channel bindings
are a form of authorization data. Our charter requires us to
support carrying channel bindings in the tunnel method.
Password change is another form of non-authentication data
that we need to support. Clearly there are several kinds of
non-authentication data that we must support carrying in EAP.
They are in our charter. I see no harm in also supporting
carrying NEA assessments in the tunnel method.

The only bizarre engineering here is Glen's suggestion
that because the A in EAP stands for Authentication, it
should not be allowed to carry anything other than
authentication protocols. By that logic, RADIUS should
be prohibited from carrying VLAN assignments and anything
other than authentication information. After all, the A
in RADIUS also stands for authentication. And RADIUS
should be restricted to Dial In access since that's
what the D and I stand for!

Glen, if you don't have any substantive arguments to
make, don't try to impress us with bluster.

Thanks,

Steve

> -----Original Message-----
> From: emu-boun...@ietf.org [mailto:emu-boun...@ietf.org] On 
> Behalf Of Glen Zorn
> Sent: Tuesday, August 11, 2009 4:22 PM
> To: 'Alan DeKok'
> Cc: emu@ietf.org
> Subject: Re: [Emu] EAP and authorization
> 
> Alan DeKok [mailto:al...@deployingradius.com] writes:
> 
> > Glen Zorn wrote:
> > > Alan DeKok [mailto://al...@deployingradius.com] writes:
> > ...
> > >>   Prior to authentication, EAP is the only 
> communications protocol
> > >> between a supplicant and *anywhere* on the network.  It 
> is therefore
> > >> natural to overload it as a general purpose transport protocol.
> > >
> 
> > 
> > >>   I believe that is what is happening: authorization 
> parameters are
> > >> being exchanged in EAP.  This should be made clearer in the
> > documents.
> > >
> > > Above you said ... by way of rationalizing
> > 
> >   "explaining"
> > 
> >   The two are very different.
> > 
> > > the use of EAP "as a general purpose transport protocol".  I could
> > have
> > > sworn that authorization _follows_ and is parameterized by
> > authentication.
> > 
> >   I agree.  I haven't seen any proposal that contradicts this.
> > 
> > > So, please tell me again why EAP should be (further) 
> bastardized for
> > this purpose.
> > 
> >   People are proposing it because they find it useful.  
> This isn't mean
> > it's a good idea, just that it's one that has real-world uses.
> > 
> >   My message about this topic was intended to foster discussion.  
> 
> Success!
> 
> > If
> > there is strong objection to the idea, we can refuse to "bastardize"
> > EAP.  If there is strong consensus that this is necessary, 
> it's best to
> > make it explicit in the documents.
> 
> More likely the creation of a new protocol, unless 
> "convenience" (a word that is used often in the draft as 
> (often the only) justification for bizarre additions to EAP) 
> has taken precedence over engineering in this WG.
> 
> > 
> >   Alan DeKok.
> 
> _______________________________________________
> Emu mailing list
> Emu@ietf.org
> https://www.ietf.org/mailman/listinfo/emu
> 
_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to