Sam,

I made an assumption you were going to do a survey of the existing EAP
methods and  compare them against a set of criteria that the document has
outlined.

As an example:  outer EAP methods should
1) have channel binding, 2) should talk about TLS certificate naming, 3)
setup for mixing key material

Inner EAP methods need to produce MSKs or EMSKs and maybe do other things.

This gives a quick overview for selection by people of which methods you
believe will deal with the problems outlined in this document and which do
not and why.

Jim


> -----Original Message-----
> From: emu-boun...@ietf.org [mailto:emu-boun...@ietf.org] On Behalf Of
> Sam Hartman
> Sent: Friday, February 22, 2013 3:19 PM
> To: emu@ietf.org; draft-ietf-emu-crypto-bind...@tools.ietf.org
> Subject: [Emu] crypto binding: why did I want a survey of methods
> 
> 
> So, the current crypto binding draft has empty sections for a survey of
tunnel
> methods and a survey of inner methods.
> 
> Does anyone have an idea what was going to go in those sections?  I'm
> guessing I put those section headers there, but I cannot remember what I
> was going to survey for.
> 
> If there's something we want to collect about methods I'm happy to do it.
> Otherwise, though, I'd prefer to drop the sections.
> _______________________________________________
> Emu mailing list
> Emu@ietf.org
> https://www.ietf.org/mailman/listinfo/emu

_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to