Dan,
I am not sure I am able to clearly understand the end result you seek.
It seems there is a clear consensus for a tunneled method. Are you
pushing for the addition of a tunneled method? 

Ok... I am easily baited. What would you like to see to achieve more
than a snail race? I am assuming we both believe the term "snail race"
is a pejorative. Thus I ask you, how do we do better?

I clearly hear your comment that there have been a paucity of comments,
if nothing else, simply to affirm we are on track. I agree with the
proposed charter. I am open to a discussion to add a non-tunneled method
if there is sufficient demand. A non-tunneled method does not seem to
promise enough features for the use cases that interest me.

Gene

------------------------------------------------------------------------
----
Eugene Chang (genchang)
Cisco Systems
Office:   603-559-2978
Mobile:  781-799-0233
Skype:  gene02421
 
 
 

> -----Original Message-----
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
Dan
> Harkins
> Sent: Monday, April 28, 2008 2:12 AM
> To: Stephen Hanna
> Cc: emu@ietf.org
> Subject: Re: [Emu] EMU charter revision
> 
> 
>   That's true. One person's opinion does not negate consensus,
> even if that one person is the only one who is able to opine
> in the alloted time given for opinions (twice now). But so what?
> If someone asks then I'll give an honest opinion, especially
> since no one else seems to be able to.
> 
>   But maybe you're right. Any additional work taken on by this
> group would distract from the fantastic progress we've made in the
> past 9 months on the tunneled method. It would be a shame to lose
> all that. Yes, let's just focus on the snail race....
> 
>   Dan.
> 
> On Sun, April 27, 2008 6:10 pm, Stephen Hanna wrote:
> > I apologize for my tardy response. I have been on vacation.
> >
> > I agree with and support the proposed charter below. As for
> > Dan's suggestion that we not require the password based
> > method to be based on the tunnel method, the WG already
> > went through a long discussion and consensus check last
> > fall on this matter. There was clear consensus that we
> > should NOT work on a new password based method designed
> > to function without the tunnel method. One person's
> > opinion to the contrary does not negate that consensus.
> > I think that the reason we are not seeing much email on
> > this charter is that the issues and language have been
> > hashed through many times.
> >
> > Thanks,
> >
> > Steve
> >
> > -----Original Message-----
> > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf
Of
> > Dan Harkins
> > Sent: Friday, April 25, 2008 5:43 PM
> > To: Joseph Salowey (jsalowey)
> > Cc: emu@ietf.org
> > Subject: Re: [Emu] EMU charter revision
> >
> >
> >   Hi Joe,
> >
> >   Once again, a call for comments and I'm the only one to comment.
> >
> >   Whether removing that line achieves "my goals" or not I still
think
> > it should be removed. And that really seems to be the only comment
> > on the charter you get when you ask.
> >
> >   regards,
> >
> >   Dan.
> >
> > On Fri, April 11, 2008 2:49 pm, Joseph Salowey (jsalowey) wrote:
> >>
> >>
> >>> -----Original Message-----
> >>> From: Dan Harkins [mailto:[EMAIL PROTECTED]
> >>> Sent: Friday, April 11, 2008 10:38 AM
> >>> To: Joseph Salowey (jsalowey)
> >>> Cc: emu@ietf.org
> >>> Subject: Re: [Emu] EMU charter revision
> >>>
> >>>
> >>>   Hi Joe,
> >>>
> >>>   Thank you for giving me the opportunity to object, once
> >>> again, to the last sentence in the last item in the charter.
> >>> If you were to run the following sed filter on the charter I
> >>> would approve:
> >>>
> >>>   s/This item will be based on the above tunnel method.//
> >>>
> >>
> >> [Joe] I do not think that removing this line would achieve the goal
> > you
> >> wish.  With this line removed EAP-PWD is still out of scope of the
> >> charter as it does not meet the requirements of supporting legacy
> >> password databases.  The message from the ADs in the last meeting
was
> >> pretty clear in that EAP-PWD style mechanisms is not something for
the
> >> group to take on right now.  This does not mean that we cannot take
on
> >> an EAP-PWD style mechanism once we have made progress on the
current
> >> charter items.
> >>
> >>>   What is the process here? This looks the same as the
> >>> charter revision you made a consensus call on back in
> >>> January. I was the only one to opine before your cutoff last
> >>> time and my comment was the same as above. Now we're doing this
> > again.
> >>>
> >> [Joe] There have been several revisions posted to the list and
> > feedback
> >> from several working group members that have been worked into the
new
> >> proposal along with input from the discussion in the last meeting.
If
> >> enough people respond positively, such that we have rough
consensus,
> >> then we can move forward.
> >>
> >>
> >>>   Dan.
> >>>
> >>> On Thu, April 10, 2008 7:26 pm, Joseph Salowey (jsalowey) wrote:
> >>> > Below is a revision to the EMU charter that is intended to
> >>> reflect the
> >>> > discussions in the Philadelphia meeting.  Please respond to
> >>> the list
> >>> > if you approve of the charter or if you have any comments
> >>> on the charter.
> >>> > I would like to have responses by 4/24.
> >>> >
> >>> > Thanks,
> >>> >f
> >>> > Joe
> >>> >
> >>> > Description of Working Group:
> >>> > The Extensible Authentication Protocol (EAP) [RFC 3748] is
> >>> a network
> >>> > access authentication framework used in the PPP, 802.11,
> >>> 802.16, VPN,
> >>> > PANA, and in some functions in 3G networks. EAP itself is a
simple
> >>> > protocol and actual authentication happens in EAP methods.
> >>> >
> >>> > Over 40 different EAP methods exist. Most of these methods are
> >>> > proprietary methods, but some are documented in
> >>> informational RFCs. In
> >>> > the past the lack of documented, open specifications has been a
> >>> > deployment and interoperability problem. There are
> >>> currently only two
> >>> > EAP methods in the standards track that implement features
> >>> such as key
> >>> > derivation that are required for many modern applications.
> >>> > Authentication types and credentials continue to evolve as do
> >>> > requirements for EAP methods.
> >>> >
> >>> > This group is chartered to work on the following types of
> >>> mechanisms
> >>> > to meet RFC 3748, RFC 4017, RFC 4962 and EAP Keying
requirements:
> >>> >
> >>> > - An update to RFC 2716 to bring EAP-TLS into standards
> >>> track, clarify
> >>> > specification, interoperability, and implementation issues
gathered
> >>> > over the years, and update the document to meet the requirements
of
> >>> > RFC 3748, RFC 4017, and EAP keying framework documents.
Backwards
> >>> > compatibility with RFC 2716 is a requirement.
> >>> >
> >>> > - A mechanism based on strong shared secrets. This mechanism
should
> >>> > strive to be simple and compact for implementation in resource
> >>> > constrained environments.
> >>> >
> >>> > - A document that defines EAP channel bindings and provides
> >>> guidance
> >>> > for establishing EAP channel bindings within EAP methods.
> >>> >
> >>> > - A mechanism to support extensible communication within a TLS
> >>> > protected tunnel. This mechanism must support channel bindings
in
> >>> > order to meet RFC 4962 requirements. This mechanism will support
> >>> > meeting the requirements of an enhanced TLS mechanism, a
password
> >>> > based authentication mechanism, and additional inner
authentication
> >>> > mechanisms.
> >>> >
> >>> > - Enable a TLS-based EAP method to support channel
> >>> bindings. This item
> >>> > will not generate a new method, rather it will extend
> >>> EAP-TLS and/or
> >>> > the above tunnel method.
> >>> >
> >>> > - A mechanism that makes use of existing password databases such
as
> >>> > AAA databases.  This item will be based on the above tunnel
method.
> >>> >
> >>> > Goals and Milestones:
> >>> > Done            Form design team to work on strong shared secret
> >>> > mechanism
> >>> > Done            Submit 2716bis I-D
> >>> > Done            Submit first draft of shared secret
> >>> mechanism I-D
> >>> > Done            Form password based mechanism design team
> >>> > Done            Submit 2716bis draft to IESG for
> >>> Proposed Standard
> >>> > Apr 2008        Submit Strong Shared Secret Mechanism to IESG
> >>> > May 2008        Submit Tunnel and Password Method requirements
first
> >>> > Draft
> >>> > Sep 2008        Submit EAP Channel Bindings First Draft
> >>> > Sep 2008        Submit Tunnel Method first draft
> >>> > Oct 2008        Submit TLS based method channel binding first
draft
> >>> > Oct 2008        Submit Password Method first draft
> >>> > Jan 2009        Send EAP Channel Bindings to IESG
> >>> > Mar 2009        Send Tunnel Method to IESG
> >>> > Apr 2009        Send TLS based method channel binding to IESG
> >>> > Apr 2009        Send Password based method to IESG
> >>> > _______________________________________________
> >>> > Emu mailing list
> >>> > Emu@ietf.org
> >>> > https://www.ietf.org/mailman/listinfo/emu
> >>> >
> >>>
> >>>
> >>>
> >>
> >
> >
> > _______________________________________________
> > Emu mailing list
> > Emu@ietf.org
> > https://www.ietf.org/mailman/listinfo/emu
> >
> 
> 
> _______________________________________________
> Emu mailing list
> Emu@ietf.org
> https://www.ietf.org/mailman/listinfo/emu
_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to