Josh Howlett wrote:
> Am I correct in understanding that section 3.3 ('Chained EAP Methods')
> is not a violation of RFC3748 because it only applies to methods run
> *within* the tunnel method itself, and not to other methods that might
> precede or follow the tunnel method? In other words, this is not an
> attempt to change the behaviour stipulated in RFC3748?

  That would be my understanding.  Section 2.1 of RFC 3748 also says:

   Multiple authentication methods within an EAP conversation are not
   supported due to their vulnerability to man-in-the-middle attacks
   (see Section 7.4) and incompatibility with existing implementations.

  And Section 7.4 says:

   As noted in Section 2.1, EAP does not permit untunneled sequences of
   authentication methods.

  Due to MITM attacks, which may be mitigated by:

   [b] Requiring cryptographic binding between the EAP tunneling
       protocol and the tunneled EAP methods.

  Hence the current WG work items on cryptographic binding.

  Alan DeKok.
_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to