Hi Alan,

On Thu, June 24, 2010 5:20 am, Alan DeKok wrote:
> Glen Zorn wrote:
>> Alan DeKok [mailto:al...@deployingradius.com] writes:
>>>   The requirement to keep authentication credentials private, which is
>>> one of the reasons for choosing a TLS-based method in the first place.
>>
>> Are you confused?  We're talking about being able to authenticate the
>> visited network, not tunnel method requirements...
>
>   Your proposal authenticates the visited network, at the cost of
> exposing the users authentication credentials to the visited network,
> and to everyone else in the proxy chain.  This fails the privacy
> requirements of any TLS-based EAP method, and has nothing at all to do
> with the tunnel method requirements.

  I may be missing something but the key shared by the client and the NAS
is going to be known by the proxies in that chain so what sort of problem
is being solved by applying these privacy requirements to proxies?

  There are man-in-the-middle attacks and dictionary attacks possible
by an attacker between the client and the NAS and these tunneled EAP
methods address that. But if you think that it's a problem for a proxy
between the TTLS server and the AAA server to see the client's
credentials then don't you think it's a (bigger) problem that this proxy
will have access to the client's key?

  Dan.



_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to