[Emu] ID Tracker State Update Notice:

2013-08-19 Thread IETF Secretariat
IANA action state changed to No IC
ID Tracker URL: http://datatracker.ietf.org/doc/draft-ietf-emu-crypto-bind/

___
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu


[Emu] ID Tracker State Update Notice:

2013-08-19 Thread IETF Secretariat
IANA action state changed to In Progress
ID Tracker URL: http://datatracker.ietf.org/doc/draft-ietf-emu-crypto-bind/

___
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu


[Emu] ID Tracker State Update Notice:

2013-08-19 Thread IETF Secretariat
IANA action state changed to No IC
ID Tracker URL: http://datatracker.ietf.org/doc/draft-ietf-emu-crypto-bind/

___
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu


[Emu] ID Tracker State Update Notice:

2013-08-19 Thread IETF Secretariat
IANA action state changed to In Progress
ID Tracker URL: http://datatracker.ietf.org/doc/draft-ietf-emu-crypto-bind/

___
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu


[Emu] ID Tracker State Update Notice:

2013-08-19 Thread IETF Secretariat
State changed to RFC Ed Queue from Approved-announcement sent
ID Tracker URL: http://datatracker.ietf.org/doc/draft-ietf-emu-crypto-bind/

___
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu


[Emu] ID Tracker State Update Notice:

2013-08-19 Thread IETF Secretariat
IESG has approved the document and state has been changed to 
Approved-announcement sent
ID Tracker URL: http://datatracker.ietf.org/doc/draft-ietf-emu-crypto-bind/

___
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu


[Emu] Document Action: 'EAP Mutual Cryptographic Binding' to Informational RFC (draft-ietf-emu-crypto-bind-04.txt)

2013-08-19 Thread The IESG
The IESG has approved the following document:
- 'EAP Mutual Cryptographic Binding'
  (draft-ietf-emu-crypto-bind-04.txt) as Informational RFC

This document is the product of the EAP Method Update Working Group.

The IESG contact persons are Sean Turner and Stephen Farrell.

A URL of this Internet Draft is:
http://datatracker.ietf.org/doc/draft-ietf-emu-crypto-bind/




Technical Summary

EAP tunneled methods require that EAP peers rely on information from
the EAP server. Various security related information is carried
inside of the tunnel, and are used by the peers. Methods exist to
protect the peers against MITM attacks. The document discusses
attacks on the tunneled data, and recommends mutual cryptographic
binding to protect both parties.

Working Group Summary

The docuemnt records the consensus of the WG as developed over the
last year. Any controversy about the contents has been resolved by
updates to the document, and WG consensus was not rough.

Document Quality

The document provides a clear description of the attacks and
recommended solutions. There are no protocol changes in the
document, so no implementations are required.

Personnel

Alan DeKok is the doc shepherd.
Sean Turner is the responsible AD.

RFC Editor Note

Please make the following modifications in section 3.2.3:

OLD:

First, the server and peer prove to each other knowledge of
the inner MSK.  Then, the inner MSK is combined into some outer key
material to form the tunnel's keys.

NEW:

First, the server and peer prove to each other knowledge of
the inner MSK.  Then, the inner MSK is combined with some outer key
material to form the tunnel's EAP keys. 

___
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu


Re: [Emu] Some proposed error conditions for draft-ietf-emu-eap-tunnel-method

2013-08-19 Thread Stefan Winter
Hi,

> Stefan> This limits the scope of the error conditions to cases where
> Stefan> TEAP has "all in its own hands" - which I believe is limited
> Stefan> to the "Optional Password Authentication" of chapter 3.3.2.
> 
> DIsagreed.
> AAA servers don't signal all of these up, but AAA servers often signal a
> number of these.
> For example in Freeradius I could actually figure out a number of these
> even across an inner tunnel and could easily expand the server to do
> better than that.
> However if you have nothing else then  you are left with inner method
> error.

Yes, it occured to me afer sending that my mind model was maybe a bit
too strict: there is no /protocol/ way for things to transpire from
inner to outer; but there may be be other means (like shared memory in
the server process) *if* inner and outer terminate at the same server.
If the inner method is proxied elsewhere, then we're out of luck in
terms of getting specific error conditions from the inner method;
"proper" protocol-based signaling would then be required but doesn't exist.

I guess it comes down to wordsmithing to express this correctly; like
"will work for TEAP's simple password auth, and *may* work for inner
EAP, if inner and outer termination point are co-located, or otherwise
have an unspecified out-of-band protocol of their own for signalling
error conditions between inner and outer termination point."

Greetings,

Stefan Winter

-- 
Stefan WINTER
Ingenieur de Recherche
Fondation RESTENA - Réseau Téléinformatique de l'Education Nationale et
de la Recherche
6, rue Richard Coudenhove-Kalergi
L-1359 Luxembourg

Tel: +352 424409 1
Fax: +352 422473



signature.asc
Description: OpenPGP digital signature
___
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu