Hi Alan,

Thanks for raising this issue. I am trying to understand the problem of large certificates and longer certificate chains a bit better.

From your deployment experience, is the problem equally bad for authentication in both directions (i.e. both client and server certificates are large with long certificate chains)? And is the problem only the number of EAP messages/packets, or also the duration of a single authentication run (i.e. AP implementations drop EAP session if not completed within x seconds/minutes)?

--Mohit


On 12/21/2017 04:01 PM, Alan DeKok wrote:
On Dec 21, 2017, at 8:40 AM, Jari Arkko <jari.ar...@piuha.net> wrote:
I’ve been thinking of what to do with the EAP work that got discussed both in 
the SAAG meeting last time (my drafts), as well on the list. The latter was 
more on the EAP-TLS side, and it seems that the discussion has converged to a 
reasonable direction recently.

Wondering how we could get the work moving forward. The first thought that came 
to my mind was to start a small working group. Thoughts?  A very drafty idea of 
what it would do is below. Comments appreciated.
   The Session ID also needs to be defined for SIM and AKA, as per Jouni's 
comments.  That doesn't fit in with AKA' changes.

   It may also be worth re-examining EAP-TLS.  Modern certificates are getting 
large, and people are using longer certificate chains.  The result can be that 
initial EAP-TLS authentication takes many packets.  This has issues not just 
for latency, but also access point implementations.  Most implementations will 
drop an EAP session if it hasn't finished after 40-50 packets.

   I've seen people run into this issue with large certificates and long 
certificate chains.  It would be good to find a way to allow this use-case.

   Alan DeKok.

_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu


_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to