Hi Alan,

Thanks for bringing this up. I agree that we should take this 
opportunity to fix other EAP methods which rely on TLS for the outer 
tunnel. I think that these updates merit a separate document. But I am 
not certain why the two documents need to be published simultaneously?

--Mohit

On 1/28/19 7:24 PM, Alan DeKok wrote:
> On Jan 28, 2019, at 12:10 PM, John Mattsson <john.matts...@ericsson.com> 
> wrote:
>>> Sure.  The question then becomes one of encoding.  For types < 256, 1 octet 
>>> is >enough.  For others, it should be a 32-bit number in network byte order.
>> Maybe we can state that it is the EAP Method Type value in network byte 
>> order with any leading bytes of value zero removed? Then 13 is encoded as 
>> "0D", 256 is encoded as "0100", and 4294967295 is encoded as "FFFFFFFF".
>    Hmm... I think 8/32-bit numbers would be simpler.
>
>>> Thanks.  My only remaining nit here is that there should really be a 
>>> sentence >alluding to other TLS-based EAP methods.  So we don't have to rev 
>>> all of those >documents, too.  I'm not sure that this document is the best 
>>> place to do it, but it's >only 1-2 sentences.
>> That is doable but maybe not completely trivial as:
>>
>> - draft-ietf-emu-eap-tls13 should then probably formally update the RFCs for 
>> the other methods, e.g. EAP-TTLS (RFC 5281).
>    Maybe... that's up to the ADs,
>
>> - I assume the other methods should use the same labels (e.g. 
>> "EXPORTER_EAP_TLS_Key_Material") as EAP-TLS
>    Yes.
>
>> - EAP-FAST (RFC 4851) derives a 112 byte long key_block and TEAP (RFC 7170) 
>> derives an 40 byte long session_key_seed instead of the 128 byte long 
>> key_material in EAP-TLS.
>    <shrug>  Truncating 128 bytes to 112 or 40 bytes would be fine.  The goal 
> is to have *something* that people can use.
>
>> - PAEP is widely deployed but not an RFC
>    Some guidance would still be useful.
>
>    My $0.02 is that the worst thing we could do is to publish EAP-TLS for TLS 
> 1.3, and to give no guidance for other TLS-based EAP methods.  I have a 
> strong preference that *all* TLS-based EAP methods be capable of working with 
> TLS 1.3.
>
>    Maybe this document isn't the place for these updates.  But IMHO, any 
> updates to TTLS, FAST, etc. MUST be published simultaneously with this spec.  
> Otherwise implementors will have no guidelines, and TTLS / FAST / PEAP / TEAP 
> will be broken for *years*.
>
>    Alan DeKok.
>
> _______________________________________________
> Emu mailing list
> Emu@ietf.org
> https://www.ietf.org/mailman/listinfo/emu
_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to