> -----Original Message-----
> From: Alan DeKok [mailto:[EMAIL PROTECTED]
> Sent: Wednesday, August 22, 2007 5:56 AM
> To: Hao Zhou (hzhou)
> Cc: Sam Hartman; emu@ietf.org
> Subject: Re: [Emu] Crypto-binding in TTLS-v0
> 
> Hao Zhou (hzhou) wrote:
> > I think publishing a "widely" deployed EAP method is orthogonal to
> > publishing a new method meeting EMU charter. I agree publishing the
> > existing method as deployed is something needs to be done quickly. I
am
> > still doubtful that adding the extra stuff required to meet the
charter
> > (crypto-binding, crypto-agility, synchronized result indication,
> > internationalization),
> 
>   I'm not sure why internationalization is an issue.  This came up in
> RADEXT a while ago.  The consensus at the time was that RFC 4282
> discusses internationalization of the NAI, and that passwords don't
need
> to be internationalized.
> 
>   Internationalization matters for *display* to end users.
> Internationalization is about *languages*.  Passwords aren't
displayed,
> and they aren't words in any language.  They're opaque tokens that
users
> have memorized, and can repeat on demand to demonstrate secret
knowledge.

- Passwords aren't just a random number.
- Users often need mnemonic aids to accurately reproduce their
passwords. This is why often passwords are related to words or phrases.
- It is also important that these passwords are normalized between the
user system and the backend systems as the strings generated by the
user's system may be handled differently from the backend.
- There may be more variety for users that use multiple systems or speak
multiple languages or for backend systems that support a community that
use more than one language.

Gene Chang

> 
> > to the existing method can be done without
> > breaking backward compatibility.  If indeed breaks it, then the
argument
> > of TTLS is widely deployed doesn't stand anymore. The new method or
new
> > version of the old method still needs to be implemented and
deployed.
> 
>   One of the suggestions at IETF 69 was that TTLS was at least safely
> backwards compatible with any new feature.  i.e. The new features
would
> require changes to the content of the TLS tunnel, and not much else.
> Those changes could be done via AVP's with the "M" bit set.  Existing
> clients would know enough to fail when they saw an "M" bit set on an
AVP
> that they didn't understand.
> 
>   Do you expect that crypto-binding/agility features would require
> changes that are not compatible with existing TTLS deployments?  If
so,
> can you provide examples?
> 
>   Alan DeKok.
> 
> _______________________________________________
> Emu mailing list
> Emu@ietf.org
> https://www1.ietf.org/mailman/listinfo/emu

_______________________________________________
Emu mailing list
Emu@ietf.org
https://www1.ietf.org/mailman/listinfo/emu

Reply via email to