Hi,

That table has a few more flaws.

EAP-MD5
--------------
- MD5 and Resistance to dictionary attacks. RFC3748 states "No", the ITU document states "Yes".
- MD5 and replay protection. Ditto.

Further to these:

- why is Protection against the server compromise-based dictionary attack marked as "not applicable" for EAP-MD5? To perform MD5 auth, the server must be in possession of the user's clear text credential. If the server is compromised, an attacker can gain access to the backend password information. It seems to me that this criterion is very much applicable, and should be a No.

Greetings,

Stefan Winter

--
Stefan WINTER
Ingenieur de Recherche
Fondation RESTENA - Réseau Téléinformatique de l'Education Nationale et de la 
Recherche
6, rue Richard Coudenhove-Kalergi
L-1359 Luxembourg

Tel: +352 424409 1
Fax: +352 422473

_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to