On Feb 1, 2019, at 7:20 AM, John Mattsson <john.matts...@ericsson.com> wrote:
> If we cannot come up with a good reason to have the requirement, I think we 
> should consider removing it in draft-ietf-emu-eap-tls13. 
> draft-ietf-emu-eap-tls13 already has a whole paragraph just trying to 
> motivate why the use of an empty application data record does not violate 
> this RFC 5216 requirement, and as you say, it gives the idea that other 
> TLS-based EAP methods like TTLS / FAST / PEAP / TEAP is doing somebody bad.

  I agree, thanks.

>> I'll also note that RC 5216 Section 2.4 mentions mandatory to implement 
>> ciphers, and this draft doesn't.  It might be worth adding that, or adding a 
>> note referencing an appropriate section of RFC 8446.
> 
> draft-ietf-emu-eap-tls13-03 has the following paragraph in Section 2.4:
> 
> OLD:"When EAP-TLS is used with TLS version 1.3 or higher, the EAP-TLS
> peers and servers MUST comply with the requirements for the TLS
> version used.  For TLS 1.3 the compliance requirements are defined in
> Section 9 of [RFC8446]."
> 
> Section 9 of RFC8446 list mandatory-to-implement cipher suites, signature 
> algorithms, key exchange algorithms, and extensions. We could add some 
> additional text be added draft-ietf-emu-eap-tls13 to clarify that the 
> compliance requirements include cipher suites.
> 
> NEW: "When EAP-TLS is used with TLS version 1.3 or higher, the EAP-TLS peers 
> and servers MUST comply with the compliance requirements (cipher suites, 
> signature algorithms, key exchange algorithms, extensions, etc.) for the TLS 
> version used.  For TLS 1.3 the compliance requirements are defined in Section 
> 9 of [RFC8446]."

  Looks good, thanks.

  Alan DeKok.

_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to