As was pointed out to me, the subject message on the message had the wrong
draft name (even if the version number was right).

I am re-posting so that searches on the subject will find the correct
document for comments.

Jim


> -----Original Message-----
> From: emu-boun...@ietf.org [mailto:emu-boun...@ietf.org] On Behalf Of
> Jim Schaad
> Sent: Tuesday, September 25, 2012 9:11 PM
> To: emu@ietf.org
> Subject: [Emu] Review - draft-ietf-emu-eap-tunnel-method-00
> 
> Version 0 of the document is not ready for a last call as security
> considerations are missing.
> 
> Other comments
> 
> 
> 1.  I think in figure #1, there would be improved clarity if the line for
Pear
> initiates connection to a service would have the following under the
attacker
> line  "-->|<--" to indicate that the attacker is intercepting the traffic
at this
> point and forwarding it.
> 
> 2.  The last paragraph in section 1 need to be re-organized.
> a) It says there are several strategies, but I can only see two that are
outlined
> here
> b) It is not clear where the second strategy starts.  That is "is the
technical
> solution part of the security solution". (yes I know that it is
> not)
> c) It is unclear if the cryptographic binding is unable to make the proof
to the
> peer, or if this is just not done because the peer has traditionally not
cared
> that it was so.
> 
> 3.  In section 2 I have a problem with the sentence "Channel bindings are
> used to tell the peer which application service is being connected to."  I
don't
> know that this is a good characterization of what is happening with
channel
> bindings esp with the updated RFC in process.  The issue I have is that
not all
> of the information about the service is communicated to the peer, and the
> peer is told information about the service, but still might not know what
> service it is connected to.  I think a better characterization might be
"Channel
> bindings are used to provide the peer with information about the
application
> service it is connecting to."
> 
> 4.  I would add an introductory sentence to paragraph #2 in section 2 to
say
> this is the start of an example.
> 
> 5.  In section 3.2.2 - Item #1 seems to be a hardship to get implemented
and
> get right.  There is an easy argument that servers can have a policy
> configured about what inner methods can be used, but imposing it on the
> peer and making the configuration be server based can be problematic.  I
> think that this issue probably deserves more text.  How is the
configuration
> updated and transferred to the peer.
> 
> 6.  In section 3.2.4 - "then condition 3" need to tell me where condition
3 is -
> what section?
> 
> 7.  Missing paran " (see Section 3.3. insert"
> 
> 8.  In section 3.3 - can the intended intermediary be on the other side -
that is
> between the NAS and the authenticator rather than the peer and the NAS?
> This is not clear from the text
> 
> 9.  In section 4.2 - there may be another piece of state tracking that
should be
> added.  It is not enough to know that mutual authentication has occurred,
it
> might also be important to know who it has occurred with.  Thus having
> performed mutual auth with a user is different than performing mutual auth
> with a machine and the operations that are allowed to take place may be
> different.
> 
> 10.  Section 5, 6 and 7 appear to be completely absent in the current
draft.
> 
> Jim
> 
> 
> _______________________________________________
> Emu mailing list
> Emu@ietf.org
> https://www.ietf.org/mailman/listinfo/emu

_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to