I'd be glad to add a reference.

On 9/1/10 7:40 AM, "Hoeper Katrin-QWKN37" <khoe...@motorola.com> wrote:

> I agree. That's why I was thinking that adding a reference that makes
> implementers aware of this problem would be a good idea. Then they can
> make an educated decision about whether they want to implement
> additional mitigation techniques (i.e. enforce policies) or to not use
> password-based inner methods.
> 
> 
>> -----Original Message-----
>> From: Alan DeKok [mailto:al...@deployingradius.com]
>> Sent: Wednesday, September 01, 2010 9:34 AM
>> To: Hoeper Katrin-QWKN37
>> Cc: Glen Zorn; Bernard Aboba; emu@ietf.org
>> Subject: Re: [Emu] security paper on tunneled authentication
>> 
>> Hoeper Katrin-QWKN37 wrote:
>>> I will check the current draft for conflicts and, if necessary,
> propose
>>> changes.
>> 
>>   I think that the main issue with the draft is that it requires
>> tunneled methods to allow for password authentication.  Your analysis
>> paper says that password methods cannot be made resistant to these
> attacks.
>> 
>>   If that is right, then I don't think there is anything to do in the
>> draft.
>> 
>>   Alan DeKok.
> _______________________________________________
> Emu mailing list
> Emu@ietf.org
> https://www.ietf.org/mailman/listinfo/emu

_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to