Hi Dan, you are asking me which EAP methods support weak passwords?
If so, here are a few examples: * TTLS * PEAP * EAP-PAX * EAP-FAST * EAP-IKEv2 Please note that I am not against doing the work; I would just like to understand what the main motivation is. Ciao Hannes Dan Harkins wrote: > Hi Hannes, > > What are these methods? And is their security completely based > on an assumption that the one deploying this method is following > some strict regime (e.g. no weak passwords)? > > regards, > > Dan. > > On Fri, February 22, 2008 6:34 am, Tschofenig, Hannes (NSN - FI/Espoo) wrote: > >> Hi Bernard, >> >> a question your excitment regarding strong password based EAP method. >> >> Why do you think they are useful? There are other ways (and they are >> deployed already) that can accomplish the same result without going >> along the SRP & co track. >> Is it because you expect performance improvements or because the >> crypto-mechanisms look nicer? >> >> I cannot quite understand the motivation. >> >> Ciao >> Hannes >> >> ________________________________ >> >> Von: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Im >> Auftrag von ext Bernard Aboba >> Gesendet: Donnerstag, 21. Februar 2008 21:54 >> An: emu@ietf.org >> Betreff: Re: [Emu] EMU Charter revision >> >> >> I also do NOT approve of the current charter revision, for >> several reasons: >> >> a. The Charter text contains statements that are no longer >> true. For example: >> >> "Most of these methods are proprietary methods and only a few >> methods >> are documented in RFCs." >> >> The following EAP methods are now documented in RFCs: >> >> EAP-TLS (RFC 2716) >> EAP-SIM (RFC 4186) >> EAP-AKA (RFC 4187) >> EAP-PAX (RFC 4746) >> EAP-SAKE (RFC 4763) >> EAP-PSK (RFC 4764) >> EAP-POTP (RFC 4793) >> EAP-FAST (RFC 4851) >> EAP-IKEv2 (RFC 5106) >> >> >> 9 methods claiming to satify RFC 4017 critieria is more than a >> "few". >> >> b. The Charter requires support for Channel Bindings without >> doing the >> preparatory work to define how Channel Bindings works. Either >> the >> requirement should be removed, or a work item should be added to >> >> better define the approach to Channel Bindings. >> >> c. The text on tunnel methods does not provide enough guidance >> to avoid >> potentially fruitless arguments. So far, the EMU WG has not >> been able >> to come to consensus on selection of one of the existing >> tunneling >> protocols, and efforts to design "yet another" tunneling >> protocol >> haven't gotten very far either. I'd like to see more specific >> language that would make it clear that work on improving >> existing >> tunneling protocols is within scope, and also that the EMU WG, >> if it cannot come to consensus on a single protocol, can proceed >> to >> work on one or more protocols with significant support. >> >> d. Password-based methods. While I can understand the desire to >> limit the >> number of charter items, I do agree with Dan that work on >> weak-password >> methods is important. With some of the IPR obstacles likely to >> fall by >> the wayside in coming years, it is time for the IETF to re-visit >> its policy >> on inclusion of "zero knowledge" algorithms within standards >> track documents. >> Dan Harkins said: >> >> " Hi Joe, >> >> >> I do NOT approve of the current charter revision, specifically >> the >> change that says the password-based method can only be via the >> tunneled method. I do approve of the inclusion of tunneled >> methods >> in the charter though and would be willing to contribute as a >> reviewer. >> >> regards, >> >> Dan." >> On Tue, February 19, 2008 11:14 am, Joseph Salowey (jsalowey) >> wrote: >> > The response to the charter revision has been underwhelming. >> I am a bit >> > concerned that we do not have enough participation to complete >> the >> > tunnel method work (most of the recent discussion has been >> about other >> > methods). >> > >> > I would like to get an idea of the number working group >> members that >> > approve of working on the tunnel method items and are able to >> > participate in the development of requirements and >> specifications as >> > contributors and/or reviewers. >> > >> > Please respond to this message and state whether you approve >> of the >> > current charter revision and what capacity you would be >> willing to >> > contribute towards tunneled method development: contributor, >> reviewer or >> > not able to contribute. >> > >> > I have submitted an internet draft attempt at an outline of >> requirements >> > for tunneled methods >> > >> (http://www.ietf.org/internet-drafts/draft-salowey-emu-eaptunnel-req-00. >> > txt) that I hope can provided a starting point for discussions >> on the >> > list and in the Philadelphia meeting. >> > >> > Thanks, >> > >> > Joe >> >> >> _______________________________________________ >> Emu mailing list >> Emu@ietf.org >> http://www.ietf.org/mailman/listinfo/emu >> >> > > > _______________________________________________ > Emu mailing list > Emu@ietf.org > http://www.ietf.org/mailman/listinfo/emu > _______________________________________________ Emu mailing list Emu@ietf.org http://www.ietf.org/mailman/listinfo/emu