Chris Hessing wrote:

> 1. EAP-FAST feeds the client and server random in to the TLS PRF in
> the opposite order that TTLS and PEAP do.  I can't think of a good
> reason to do this.  Is there some security advantage to doing this?
> If not, why require implementations to handle this case for no real
> gain?

This is something where TLS itself uses both orderings: when
calculating the master secret from the pre-master secret, client
random is first; when calculating the key block from master secret,
server random is first. (I have no idea why, but it's been this way
since the -00 draft from 1996.)

Since EAP-FAST's "session_key_seed" comes from the end of the key
block, it does not change the order (so server random is first,
like in TLS).

Best regards,
Pasi
_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to