Jim: Sorry for the late response. Will address all of them in the new draft. Individual comments inline below. Thanks.
From: Jim Schaad <i...@augustcellars.com<mailto:i...@augustcellars.com>> Date: Wednesday, November 14, 2012 10:25 PM To: Cisco Employee <hz...@cisco.com<mailto:hz...@cisco.com>> Cc: "emu@ietf.org<mailto:emu@ietf.org>" <emu@ietf.org<mailto:emu@ietf.org>> Subject: RE: [Emu] Review of draft-ietf-emu-eap-tunnel-method-00 From: Hao Zhou (hzhou) [mailto:hz...@cisco.com] Sent: Thursday, October 04, 2012 10:39 AM To: Jim Schaad Cc: emu@ietf.org<mailto:emu@ietf.org> Subject: Re: [Emu] Review of draft-ietf-emu-eap-tunnel-method-00 Jim: Thanks very much for your detailed review. Please see the comments below. We will respond to your other emails shortly. On 9/28/12 9:18 PM, "Jim Schaad" <i...@augustcellars.com<mailto:i...@augustcellars.com>> wrote: 1. In section 3.2.3, it says that a new PAC can be requested after a full TLS handshake. Can one be requested following an abbreviated handshake? Or do you just re-use the existing PAC? [HZ] RFC5077 does not specify that client can request a new ticket after sending the TLS ticket, if the client is resuming a session using the session ticket, then it cannot request a new session ticket based on resumed session. We will add some language to clarify that it is not allowed. [JLS] I am not currently seeing this text. [HZ] Sorry, we missed that. Will add to Draft 05. 3. Section 3.4 - Is it possible to have multiple server ids after the authentication - one from the tunnel and others from the inner EAP methods. I realize that most EAP methods don't send a sender id, but some (IBAKE for example) currently do. Also, the client might have an idea of what the sender id is from configuration. If so, do these all need to get exported as server-id values? [HZ] Good catch. We will add a sentence similar to peer-ID, where multiple server IDs need to be exported. [JLS] The text for this is potentially confusing. Identity types are currently only defined for peer identities and not for server identities. [HZ] Good catch again, Will fix it. 5. In section 3.6.1 - Is the restart only an issue for fatal alerts, or is it a problem for all alerts? [HZ] Restart is only allowed for non-fatal alerts, per TLS RFC. "Upon transmission or receipt of a fatal alert message, both parties immediately close the connection.", so restart is not desired in this case. We will clarify that restart is only allowed in non-fatal alert cases. [JLS] I don’t currently see this text modification. [HZ] Will add that now. 8. In section 3.8 - I have the following questions a) In the text "The request MAY be issued", I don't understand the MAY at this point. Is it supposed to say that the request can be issued either before or after the authentication has finished, or is it saying that the peer has the option of issuing or not issuing the request, but must wait until the authentication level has been reached? [HZ] It's the later. How about add "only" in front "after the peer has determined that..."? [JLS] yes this deals with the main problem. I would suggest that the sentence this is included in be review for grammar. [HZ] Ok, will remove "if an inner EAP authentication occurs to ensure that the TLS tunnel's integrity is Intact" from the sentence to make it parses better and more accurate. 15. Section 4.2.3 - I assume that there should only be one Identity-Type TLV in a TEAP packet. Should a request for authentication be present in the packet as well? If multiple are allowed then information about how to treat this should be included. What should the peer respond with if it does have an identity of the type? This is not explicitly stated. [HZ] That's correct, only one Identity-Type TLV is allowed.The requested Identity type MUST comes with an EAP request or Basic-Password-Auth-Req. If the peer has the requested identity type, it should send back the same identity type TLV in the response. We missed this and will add this clarification. [JLS] I don’t know that text exists to say that the MUST in the second sentence is true. [HZ] Will add that sentence now. 18. Section 4.2.8 - Do we need to talk about the question of having some Vender TLVs be marked as mandatory and others not. Are we using the same TLV structure with the same rules for mandatoriness. If the mandatory bit is set, does that mean that I need to recognize the vendor-id or all combinations of vender-id/Vender-TLV type? [HZ] Yes. If the mandatory bit is set on the Vendor-Speific TLV, then the peer need to recognize the vendor ID and all combination of the vendor TLVs. The Vendor TLV format is up to the vendor to define, as specified by the current draft. [JLS] After looking at this I think that I disagree. If a Venter TLV is marked as mandatory, then the vender ID needs to be recognized and you need understand how to deal with it. The vender should specify it’s own mandatory requirements internally. So top level bit would not cover all combinations of the vendor TLVs. [HZ] Sounds reasonable. Will change.
_______________________________________________ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu