#7: Password Authentication

 > Section 3.1 Password Authentication
 >
 > "  Many legacy systems only support user authentication with  >
passwords.
 >    Some of these systems require transport of the actual username and
 >    password to the authentication server.  The tunnel method
 > MUST support
 >    this use case."
 >
 > As currently worded, this statement is somewhat vague.
 > Is this statement implying that a tunnel method must support  >
password-only authentication (e.g. no certificates)?  If so,  > is there
a requiremnent to support weak passwords or just  > pre-shared keys?

 [Joe] Perhaps this can be clarified by saying:

 "The tunnel method MUST support transporting username and password to
the  authentication server."

 > Would a tunnel method utilizing a server certificate to  > create a
tunnel, and doing password authentication within the  > tunnel meet this
requirement?  What about a tunnel method  > utilizing a pre-shared key
ciphersuite?
 >
 [Joe] If the tunnel method can transport the username and password to
the  authentication server securely it would meet the requirement,
however if  you already have a pre-shared key that is sufficient to
establish the  tunnel it is not clear why you would need to do password
authentication.

 > "  However, it MUST NOT expose the username and password to parties
in
 >    the communication path between the peer and the EAP Server and it
 >    MUST provide protection against man-in-the-middle and dictionary
 >    attacks."
 >
 > Does this requirement apply to provisioning or just to  > ongoing
password authentication?
 >
 [Joe] This section is talking about ongoing password authentication.

--
Ticket URL: <http://trac.tools.ietf.org/wg/emu/trac/ticket/7>
emu <http://tools.ietf.org/wg/emu/>

_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to