Sam,

I think it would be useful to do a partial survey and just say that it is a
partial survey.  In part I think this would be useful just so that the
points that you feel are important for the CB are highlighted.  I would be
perfectly  willing for such a survey to cover only a couple of the most
recent EAP methods with a statement that it is a partial survey and stating
why.

However I can also understand why you would not want to do this because I
would be afraid that the IESG would want to know why it is not a more
complete survey.

Jim


> -----Original Message-----
> From: Sam Hartman [mailto:hartmans-i...@mit.edu]
> Sent: Sunday, February 24, 2013 10:56 AM
> To: Jim Schaad
> Cc: 'Sam Hartman'; emu@ietf.org; draft-ietf-emu-crypto-
> bind...@tools.ietf.org
> Subject: Re: [Emu] crypto binding: why did I want a survey of methods
> 
> Hi.  I've included a survey of tunnel methods that have made it to RFC and
> TEAP.  It's quite possible that people want to cover more tunnel methods
in
> the summary (LEAP, PEAP, EAP-TTLS v1).
> People who want to supply text are welcome to do so.
> 
> After looking at it, I don't feel comfortable volunteering to do the inner
> method summary.  For the more modern methods the answer tends to
> always be "yeah, nothing wrong there."  Now, the method itself may be
> weaker than you'd like, but the mutual authentication and key handling
> tends not to be of particular note.  At least that seems to be true for
the
> PAKE methods, for GPSK and for revised AKA.  Note that is an initial
guess, I
> don't have enough confidence in that statement to go write it down in the
> draft, and I'm not convinced it's all that useful.
> 
> As you get into older methods, say EAP-SIM and EAP-MSCHAPV2, it gets
> more complex. EAP-SIM has some significant challenges with mutual
> authentication and I think with key generation. Being able to summary more
> than what is in the eap-sim security considerations section would involve
a
> lot more operational knowledge than I have.
> 
> I don't even know where to find documentation for EAP-MSCHAPv2. I'm
> strongly suspecting it's got problems, given its age and attachment to
> md4 and rc4. However, the mschapv2 PPP extensions got away with a one
> sentence security considerations section, so it's definitely not just
> summarizing already current security analysis.
> 
> So, I don't think what I could do with inner method surveys is going to be
> helpful enough to write up.
> 
> I'm dropping that section but if text emerges within the WG I'd be happy
to
> include it.
> I think though that we're doing a good enough job with security
> considerations sections for post-RFC 3748 EAp inner methods that we don't
> need such a summary.

_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to