Here are a few random review comments. Section 3.2: Terminology
The definition of PFS does not correspond to the crypto literature. Here is the definition from the Handbook of applied cryptography: " 12.16 Definition A protocol is said to have perfect forward secrecy if compromise of long-term keys does not compromise past session keys. ", see http://www.cacr.math.uwaterloo.ca/hac/about/chap12.pdf " Finally, in the key management phase, the authenticator exchanges random numbers with the supplicant to obtain a fresh cryptographic key; thus resulting in perfect forward secrecy. " Fresh keys are not sufficient to fulfill the criteria for PFS. I am not so sure about the "server-compromised attack" and the "server compromise-based dictionary attack". If the AAA server is compromised then there is a big problem. You could delete all the subscribes and create new onces, etc. Editorial: s/DIAMETER/Diameter Figure 1: Editorial s/TDP/TCP s/SCP/SCTP s/UDP or IP/UDP over IP When the topic was briefly discussed at the IETF meeting I was hoping to see a long list of EAP methods being analysed. Now, I find only 4 EAP methods being described, namely * EAP MD5 * EAP TLS * EAP AKA * EAP SRP (RFC 2945 http://www.ietf.org/rfc/rfc2945.txt is referenced but this is not an EAP method. There was a proposal on the table a long time ago, namely http://tools.ietf.org/id/draft-ietf-pppext-eap-srp-03.txt, but as I far as I can tell it never went anywhere. There are a couple of other ways to accomplish the same results but the details would very likely vary and the reference to the appropriate document would certainly help in the analysis.). The introductory words say: " Most well-known EAP methods are found to be noncompliant with the criteria in Table I.1. If some applications require the high-level EAP method, then new EAP methods should be developed in the future. " There are EAP methods that provide additional properties but they are not listed in the table. Regarding Table 1.1: * Putting EAP-MD5 into the table isn't really so useful given that it does not derive session keys. As such, it is pretty unsuitable for everything you discuss in the document. It would be more appropriate to investigate EAP-GPSK since it is meant to be a replacement for EAP-MD5. * If I recall the discussions correctly then providing completely synchronized state between the peer and the eap server is not possible. * Resistance to dictionary attacks: EAP-MD5 -- only when the password / key that is being used is randomly chosen. * "Confidentiality of Master Key" is not a good evaluation criteria for an EAP method given that it is accomplished using mechanisms outside the protocol. The same is true for "Seamless compatibility" as there is no EAP method available that would not work with RADIUS or Diameter --- otherwise it would probably not be an EAP method. * EAP-AKA provides some form of user identity confidentiality. * EAP-TLS provides fragmentation support * Every EAP method can be updated to provide channel bindings; currently no method provides it.... * Resistance to dictionary attacks: This is only applicable for methods that use passwords. EAP-TLS and EAP-AKA do not use passwords and hence it is more appropriate to say that this issue is not applicable. After reading through the document I was wondering what ITU-T is going todo next? Analysing more EAP methods? Developing EAP methods? Ciao Hannes PS: A more detailed EAP method investigation can be found in the following master thesis by Thomas Otto: http://www-public.tu-bs.de:8080/~y0013790/thesis-otto-eapmethods.pdf >-----Original Message----- >From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On >Behalf Of ext [EMAIL PROTECTED] >Sent: 07 August, 2008 09:57 >To: emu@ietf.org >Cc: [EMAIL PROTECTED] >Subject: [Emu] Liaison Statement on ITU-T Recommendation X.1034 > >The liaison statement from ITU-T SG 17 on X.1034 ("Guideline >on extensible authentication protocol based authentication and >key management in a data communication network"), which was >briefly discussed in SAAG and EMU meetings, is now available here: > >https://datatracker.ietf.org/liaison/466/ > >Joe and Alan: if the EMU WG members have comments about the >specification, a liaison statement reply from EMU WG to ITU-T >SG 17 would probably be a good idea; please coordinate making >such reply. > >Best regards, >Pasi >_______________________________________________ >Emu mailing list >Emu@ietf.org >https://www.ietf.org/mailman/listinfo/emu > _______________________________________________ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu