Hi.  I've included a survey of tunnel methods that have made it to RFC
and TEAP.  It's quite possible that people want to cover more tunnel
methods in the summary (LEAP, PEAP, EAP-TTLS v1).
People who want to supply text are welcome to do so.

After looking at it, I don't feel comfortable volunteering to do the
inner method summary.  For the more modern methods the answer tends to
always be "yeah, nothing wrong there."  Now, the method itself may be
weaker than you'd like, but the mutual authentication and key handling
tends not to be of particular note.  At least that seems to be true for
the PAKE methods, for GPSK and for revised AKA.  Note that is an initial
guess, I don't have enough confidence in that statement to go write it
down in the draft, and I'm not convinced it's all that useful.

As you get into older methods, say EAP-SIM and EAP-MSCHAPV2, it gets
more complex. EAP-SIM has some significant challenges with mutual
authentication and I think with key generation. Being able to summary
more than what is in the eap-sim security considerations section would
involve a lot more operational knowledge than I have.

I don't even know where to find documentation for EAP-MSCHAPv2. I'm
strongly suspecting it's got problems, given its age and attachment to
md4 and rc4. However, the mschapv2 PPP extensions got away with a one
sentence security considerations section, so it's definitely not just
summarizing already current security analysis.

So, I don't think what I could do with inner method surveys is going to
be helpful enough to write up.

I'm dropping that section but if text emerges within the WG I'd be happy
to include it.
I think though that we're doing a good enough job with security
considerations sections for post-RFC 3748 EAp inner methods that we
don't need such a summary.
_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to