> > RFC 5216 describes the relationship between the MSK and the receive
> > and send keys (which was how the MSK was originally defined
> > in RFC 2716):
> >
> > Enc-RECV-Key = MSK(0,31) = Peer to Authenticator Encryption Key
> > (MS-MPPE-Recv-Key in [RFC2548]). Also known as the
> > PMK in [IEEE-802.11].
> > Enc-SEND-Key = MSK(32,63) = Authenticator to Peer Encryption Key
> > (MS-MPPE-Send-Key in [RFC2548]
> 
> Right, but this formula assumes that MS-MPPE-Recv-Key and -Send-Key
> are 32 bytes (256 bits). The keys produced by RFC 3079 Section 3.3
> are only 128 bits, so concatenating any two of them (in any order)
> doesn't produce an EAP MSK (which is at least 64 octets).


Does the following more accurately describe what you are seeing?

 

At the end of successful authentication, EAP-MSCHAPv2 derives two 16-byte

MPPE keys as specified in [RFC3079] Section 3.3.  The Master Session Key 
([RFC3748])

is derived from the two MPPE keys as follows:

 

MSK = 16-byte MPPE-Send-Key + 16 bytes zeroes (padding) + 16-byte 
MPPE-Receive-Key + 16 bytes zeroes (padding)
_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to