Dan Harkins wrote:
>   "channel bindings" are supposed to solve the lying NAS problem*
> which is an issue of authentication (is this guy really who he claims
> to be?). What you want to do is use the EAP tunnel to transfer other
> kinds of data to do NEA posture checking. And, yes, we should determine
> whether it is permissible for EMU to work on such a thing. What we
> shouldn't do is say that it's really part of "authentication" or it's
> part of "channel binding" and just proceed.

  My question again is where do we draw the line?  What information is
permissible as authentication credentials, and what isn't permissible?

  And why?

  Some sites determine that username/password authentication is
sufficient.  Others also require that the MAC be known, too.  Is the MAC
part of the authentication credentials?  Or is the site doing "posture
checking" by requiring that the MAC be known?

  We need to achieve a common understanding before making any decisions.

>  *the example given, at the Philly IETF I think, was of a Russian
> mobile phone operator that made its cell towers broadcast out that
> they were actually from an Estonian mobile phone operator and then
> billed Estonians whose phones connected to them (even when they had
> manual network selection turned on to intentionally avoid accidentially
> connecting to the Russian network) as if they were roaming on the
> Russian network.

  That is largely an issue of fraud, and best *resolved* through legal
methods.  But channel bindings may permit the end user to *detect* the
fraud, at least.

  Alan DeKok.
_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to