Alan:

I don't think we have a cryptographic binding WG work item, but a
channel binding one. However, the crypto-binding requirement is captured
in the Tunnel method requirement draft, as it is required to run a
single tunneled EAP method or chained ones.

> -----Original Message-----
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On 
> Behalf Of Alan DeKok
> Sent: Thursday, June 05, 2008 11:24 AM
> To: Josh Howlett
> Cc: emu@ietf.org
> Subject: Re: [Emu] Tunnel Method (Current WG Work item status)
> 
> Josh Howlett wrote:
> > Am I correct in understanding that section 3.3 ('Chained 
> EAP Methods') 
> > is not a violation of RFC3748 because it only applies to methods run
> > *within* the tunnel method itself, and not to other methods 
> that might 
> > precede or follow the tunnel method? In other words, this is not an 
> > attempt to change the behaviour stipulated in RFC3748?
> 
>   That would be my understanding.  Section 2.1 of RFC 3748 also says:
> 
>    Multiple authentication methods within an EAP conversation are not
>    supported due to their vulnerability to man-in-the-middle attacks
>    (see Section 7.4) and incompatibility with existing 
> implementations.
> 
>   And Section 7.4 says:
> 
>    As noted in Section 2.1, EAP does not permit untunneled 
> sequences of
>    authentication methods.
> 
>   Due to MITM attacks, which may be mitigated by:
> 
>    [b] Requiring cryptographic binding between the EAP tunneling
>        protocol and the tunneled EAP methods.
> 
>   Hence the current WG work items on cryptographic binding.
> 
>   Alan DeKok.
> _______________________________________________
> Emu mailing list
> Emu@ietf.org
> https://www.ietf.org/mailman/listinfo/emu
> 
_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to