#8: Cryptographic Binding Text

 > Section 3.2
 >
 > "  In
 >    particular, when weak methods are used, security policies
enforcing
 >    that such methods can only be executed inside a tunnel but never
 >    outside one are required to mitigate the attack."
 >
 > The requirement that methods only be executed within a tunnel  > is
necessary  > even for strong methods, if crypto-binding isn't used.
 >
 > "  On the other hand,
 >    a technical solution (so-called cryptographic bindings) can be
used
 >    whenever the inner method is not susceptible to attacks outside a
 >    tunnel and derives keying material."
 >
 > Cryptographic binding can be used whenever the inner method  >
generates keys.  If this isn't used, then even methods not  >
susceptible to attack outside the tunnel should be prohibited  > from
use outside the tunnel, or else MiTM attacks would still  > be feasible.
 >

 How about changing the last paragraph to:

 "The tunnel method MUST support protection of weak EAP methods.
 Cryptographic protection from tunnel MitM attacks MUST be provided for
all  key generating methods.  In combination with an appropriate
security  policy this will thwart MitM attacks against inner methods."

--
Ticket URL: <http://trac.tools.ietf.org/wg/emu/trac/ticket/8>
emu <http://tools.ietf.org/wg/emu/>

_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to