Hi Again, > -----Original Message----- > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On > Behalf Of Stefan Winter > Sent: Tuesday, August 12, 2008 6:45 AM > To: emu@ietf.org > Subject: [Emu] Review of emu-eaptunnel-req-00, chunk 2 of 2 > > (continuing from 4.2.2 on) > > 4.3 Tunnel payload reqs > ---------------------------------- > > The criteria in this section seem to make it impossible to > use the described tunnel method as an inner payload itself > (i.e. prevents stacking of the method defined in this > document above each other). I'm not sure if there's a use > case for doing so, but seems like it's restricting where it > wouldn't need to be. > [Joe] I'm not sure this would be desirable.
> 4.5 Carrying U-N and PWs > -------------------------------------- > > It is true that legacy dbs need the clear text password. They > don't always need to have it transmitted from the client > though (if they have it stored clear-text in the db, they can > do with a one-way hash from the client). The half-sentence > "hence they require the peer to send the clear text user name > and password to the EAP server" is wrong. The para reads as > if there is no way around sending the password in clear from > EAP peer to server. > [Joe] So yes in some systems you either know what hash to send or ok can send a message telling the client that you need to salt with X and hash with y. However, there are systems where you only have access to a verifier which takes the password as input and gives you a result. This includes some OTP systems, but also includes systems based on static passwords. So in these systems there is no way around it. > 4.5.1 Security > ------------------- > Since the precondition in 4.5 above isn't true, the > introductory para needs to be re-worded. Maybe "Due to the > fact that some legacy password databases require the EAP peer > to send clear text passwords to enable the EAP server to > authenticate them, " > [Joe] I disagree, this is true. However, I agree that database may not be the right word here an may be the source of the issue. We can change this to verifier. > 4.5.1.2 Auth of server > ------------------------------ > section 3.5 specifies that the tunnel method MAY allow for a > bypass of server authentication. 4.5.1.2 forbids this bypass, > meaning the use case in 3.5 is badly catered by the tunnel > method specified in this document, if this tunnel method is > used in conjunction with legacy password databases. Maybe > this is worth mentioning? > [Joe] Interesting, This needs to be discussed. > 4.5.2 i18n > -------------- > The MUST/SHOULD pair in the last sentence is already > specified as a tunnel payload req in general in 4.3.6 and > doesn't need to be repeated here. > [Joe] I wouldn't assume that just because the tunnel supports i18n that the inner method does. I think it would be worthwhile to keep this here. > 4.5.3 + 4.6.5 Meta-Data > -------------------------------- > Meta-data is MUST in both of these sections (i.e. for > password-based auth and EAP auth), identical wording. To > avoid duplication, it might make sense to move this statement > into the general requirement section for tunneled payload (4.3). > [Joe] Maybe, the meta data needs to be associated with the methods though... Need to think about this. > 6.1 Ciphersuite selection > ----------------------------------- > The last para is a nice recitation on why mutually anonymous > tunnels are bad. It does not state the relation of this fact > to the requirements document though. Adding a sentence that > this risk has been taken care of by requiring server auth > would tie the paragraph into the document. > [Joe]OK > 6.3 Outer EAP Method Header > ------------------------------------------- > This section has good arguments why to protect the header of > the message exchange. Still, this is only a SHOULD in the > document. The para here suggests that it might better be a > MUST. What are the reasons for the SHOULD? > [Joe] Yes some of this was discussed on a separate thread, I think we should add text that is a MUST for data external to the tunnel that gives an attacker an advantage if they can modify it, this may not be the entire header. > Greetings, > > Stefan Winter > > -- > Stefan WINTER > Ingenieur de Recherche > Fondation RESTENA - Réseau Téléinformatique de l'Education > Nationale et de la Recherche 6, rue Richard Coudenhove-Kalergi > L-1359 Luxembourg > > Tel: +352 424409 1 > Fax: +352 422473 > > _______________________________________________ > Emu mailing list > Emu@ietf.org > https://www.ietf.org/mailman/listinfo/emu > _______________________________________________ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu