Hi,

Per the potential notes and given feedback thus far, we (the authors)
can address the relevant concerns with updates to the draft(s) as
follows:

1. Update the EAP-FAST provisioning draft to change EAP-MSCHAPv2 to
EAP-FAST-MSCHAPv2 throughout the document where the reference is to its
working inside the EAP-FAST tunnel during anonymous provisioning mode.
Also clarify the use of EAP-FAST-MSCHAPv2 during anonymous provisioning
in section 3.2.3

2. The following text could be added either in the introduction or IANA
considerations (or anywhere the IESG prefers):
"EAP-FAST has been implemented by many vendors and it is used in the
Internet.  Publication of this is intended to promote interoperability.
The reuse of EAP-MSCHAPv2/EAP-GTC EAP method IDs with different meaning
and behavior inside the tunnel method might cause problems in some
environments.  If EAP-FAST were to be designed today, these difficulties
could be avoided by the assignment of new EAP Type codes, which was more
difficult before RFC 3748 defined expanded EAP Types.  The reuse may
cause problems in implementations where the use of unaltered methods is
required.  It also can make implementations that use methods both within
and outside of the tunnel method more difficult, since this support
requires special case execution of these methods within a tunnel.  Given
these issues, assigned method types must not be re-used with different
meaning inside tunneled methods in the future."  

Thanks,
        Nancy.
  

-----Original Message-----
From: emu-boun...@ietf.org [mailto:emu-boun...@ietf.org] On Behalf Of
Jari Arkko
Sent: Thursday, February 05, 2009 1:01 AM
To: Bernard Aboba
Cc: emu@ietf.org
Subject: Re: [Emu] Potential Notes in EAP-FAST Documents

Bernard,

> c. EAP negotiation issues.  Neither the IESG note nor the text 
> explicitly states what is wrong with using an EAP Type Code for 
> incompatible versions of an EAP method that does not support version 
> negotiation.

They should state this.

> Indeed, it would appear that some
> members of the IESG think that method overloading is required by EAP 
> tunneling methods desiring to incorporate support for cryptographic 
> binding.
Not sure who you are referring to, but for the record I at least do not
believe that. Cryptographic binding can clearly be achieved without
overloading or re-definition of behaviour of existing components.

> Saying that this "might be difficult
> in some software environments" isn't a good characterization. 
> Would the IESG use the same words to describe the reuse of IP protocol

> numbers within an IP tunnel?  I doubt it.

I guess this referred to the difficulty of implementing the remedy where
EAP within a tunnel is different from EAP outside the tunnel. In some
cases this would be possible, in some other cases not... depending on
what the software architecture, APIs, etc are. But in all cases it is
painful, which is why this is a bad approach and should not be done by
future methods.

Jari

_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu
_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to