Hi Joe,

  I do NOT approve of the current charter revision, specifically the
change that says the password-based method can only be via the
tunneled method. I do approve of the inclusion of tunneled methods
in the charter though and would be willing to contribute as a
reviewer.

  regards,

  Dan.

On Tue, February 19, 2008 11:14 am, Joseph Salowey (jsalowey) wrote:
> The response to the charter revision has been underwhelming.  I am a bit
> concerned that we do not have enough participation to complete the
> tunnel method work (most of the recent discussion has been about other
> methods).
>
> I would like to get an idea of the number working group members that
> approve of working on the tunnel method items and are able to
> participate in the development of requirements and specifications as
> contributors and/or reviewers.
>
> Please respond to this message and state whether you approve of the
> current charter revision and what capacity you would be willing to
> contribute towards tunneled method development: contributor, reviewer or
> not able to contribute.
>
> I have submitted an internet draft attempt at an outline of requirements
> for tunneled methods
> (http://www.ietf.org/internet-drafts/draft-salowey-emu-eaptunnel-req-00.
> txt) that I hope can provided a starting point for discussions on the
> list and in the Philadelphia meeting.
>
> Thanks,
>
> Joe
>
>> -----Original Message-----
>> From: Joseph Salowey (jsalowey)
>> Sent: Monday, February 04, 2008 9:13 PM
>> To: emu@ietf.org
>> Subject: EMU charter revision
>>
>> Below is a revised charter update based on the discussion on
>> the list.  I have left the password based method item as a
>> tunnel method because this represents the consensus the
>> working group has reached.  I also believe the working group
>> will have to focus on the tunnel method related items for the
>> near term to make progress.  This does not mean that we
>> cannot work on additional methods as working group items in
>> the future.
>>
>> Please review the charter update and post any issues you have
>> with the carter.  Please also indicate if you have reviewed
>> the proposed charter and have no issues.  It is difficult to
>> judge working group consensus unless there are sufficient responses.
>>
>> Thanks,
>>
>> Joe
>>
>> Description of Working Group:
>> The Extensible Authentication Protocol (EAP) [RFC 3748] is a
>> network access authentication framework used in the PPP,
>> 802.11, 802.16, VPN, PANA, and in some functions in 3G
>> networks. EAP itself is a simple protocol and actual
>> authentication happens in EAP methods.
>>
>> Over 40 different EAP methods exist. Most of these methods
>> are proprietary methods and only a few methods are documented
>> in RFCs. The lack of documented, open specifications is a
>> deployment and interoperability problem. In addition, none of
>> the EAP methods in the standards track implement features
>> such as key derivation that are required for many modern
>> applications. This poses a problem for, among other things,
>> the selection of a mandatory to implement EAP method in new
>> network access technologies. For example, no standards track
>> methods meet new requirements such as those posed in RFC
>> 4017, which documents IEEE 802.11 requirements for EAP methods.
>>
>> This group is chartered to work on the following types of
>> mechanisms to meet RFC 3748 and RFC 4017 requirements:
>>
>> - An update to RFC 2716 to bring EAP-TLS into standards
>> track, clarify specification, interoperability, and
>> implementation issues gathered over the years, and update the
>> document to meet the requirements of RFC 3748, RFC 4017, and
>> EAP keying framework documents. Backwards compatibility with
>> RFC 2716 is a requirement.
>>
>> - A mechanism based on strong shared secrets that meets RFC
>> 3748 and RFC 4017 requirements. This mechanism should strive
>> to be simple and compact for implementation in resource
>> constrained environments.
>>
>> - A mechanism to support extensible communication within a
>> TLS protected tunnel that meets RFC 3748 and RFC 4017
>> requirements. This mechanism must support channel bindings in
>> order to meet RFC 4962 requirements and it must provide
>> cryptographic algorithm agility. This mechanism will support
>> meeting the requirements of an enhanced TLS mechanism, a
>> password based authentication mechanism, and additional inner
>> authentication mechanisms.
>>
>> - Enable a TLS-based EAP method to support channel bindings.
>> So as to enable RFC 2716bis to focus solely on clarifications
>> to the existing protocol, this effort will be handled in a
>> separate document.  This item will not generate a new method,
>> rather it will enhance EAP-TLS or the TLS based tunnel method
>> work item.
>>
>> - A mechanism meeting RFC 3748 and RFC 4017 requirements that
>> makes use of existing password databases such as AAA
>> databases.  This item will be based on the tunnel method work item.
>>
>> Goals and Milestones:
>> Done         Form design team to work on strong shared
>> secret mechanism
>> Done         Submit 2716bis I-D
>> Done         Submit first draft of shared secret mechanism I-D
>> Done         Form password based mechanism design team
>> Done         Submit 2716bis draft to IESG for Proposed Standard
>> Done         Submit Strong Shared Secret Mechanism to IESG
>> Apr 2008     Submit Tunnel and Password Method requirements
>> first draft
>> Jul 2008     Send Tunnel and Password Method requirements to IESG
>> Oct 2008     Submit Tunnel Method first draft
>> Nov 2008    Submit TLS based method channel binding first draft
>> Nov 2008     Submit Password Method first draft
>> Feb 2009     Send Tunnel Method to IESG
>> Apr 2009     Send TLS based method channel binding to IESG
>> Apr 2009     Send Password based method to IESG
>>
>>
>>
>>
> _______________________________________________
> Emu mailing list
> Emu@ietf.org
> http://www.ietf.org/mailman/listinfo/emu
>


_______________________________________________
Emu mailing list
Emu@ietf.org
http://www.ietf.org/mailman/listinfo/emu

Reply via email to