Regards~~~ -Sujing Zhou
Sam Hartman <hartmans-i...@mit.edu> 写于 2012-06-29 02:06:00: > >>>>> "zhou" == zhou sujing <zhou.suj...@zte.com.cn> writes: > > zhou> To my understanding, right prior to finishing tunnel > establishement, EAP peer > zhou> and EAP Server(print server in the server insertion attack > case) should have > zhou> exchanged channel binding with integrity protection by key > only known to EAP > zhou> peer and EAP server (MSK in this case), > > well, I actually think this happens after tunnel establishment and after > the inner method. > So, after the print server learns the MSK. > As I read draft-ietf-emu-chbind nothing forbids this. Certainly the > existing implementations of channel binding I'm aware of work that way. > Since tunnel method is also an EAP method, and used for protecting the inner EAP method, why cann't put channel binding right after the tunnel method? So that adverse affects can be prevented more effectively. There is a paragraph in draft-ietf-emu-chbind " The channel binding protocol defined in this document must be transported after keying material has been derived between the EAP peer and server, and before the peer would suffer adverse affects from joining an adversarial network. "
_______________________________________________ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu