Hi Alan,

thanks for the answers... aligned with what I thought and they do make sense... :D Further considerations inline...

On 2/12/19 11:26 AM, Alan DeKok wrote:
On Feb 12, 2019, at 12:36 PM, Dr. Pala <direc...@openca.org> wrote:
[...]
This, led me to my first question: is there a de-facto "standard" way to add 
Fragmentation support we can just use (without having to re-invent the wheel all the 
time) ?
   No.
Too bad... :(
If we had such a mechanism, then we could just say "implement the mechanism as 
defined in ... ". This would definitely help developers that could safely re-use 
code/libraries. The other approach would be to modify EAP to add Fragmentation support 
there.
   I suspect that it's difficult to "modify EAP".  However, adding a standard 
fragmentation method would be definitely useful.

I agree that (a) it would be useful and (b) it would be difficult to modify EAP :D It seems to me that EAP made a too simple header... :D

[ ... ]

   If it's an EAP type that only appears inside of a TLS tunnel, then don't 
worry too much about fragmentation.

   If the data you're sending will be larger than 64K, you *will* need to provide your 
own fragmentation support.  But that's only because the EAP header has a 16-bit 
"Length" field.

Yep, that is why the AVP/TLVs use the internal 'L' bit and the 32bits length field to address that. I think that to keep the method simple, we will require that the method is executed as an internal method of a Tunneled method that provides (a) authentication of the server (and optionally of the client), and (b) secrecy of the transferred data.

This allows us to:

 * Remove the support for Fragmentation (but we need to require that
   the data is appropriately handled by the encapsulating method)
 * Do not have to implement crypto-parameters negotiation for the outer
   tunnel

The draft will require a well-written security section to make sure that deployments do not use the method without proper security around it.

Looking forward to some great guidance and advice :D Also, if you would like to 
collaborate/contribute, please let me know!
   I've been known to have opinions.  :)  Plus, it's useful to have credential 
provisioning methods.

... and I've been known to have ears and eyes to listen and read :D That works perfectly!

Thanks for the feedback!

Cheers,

--
Best Regards,
Massimiliano Pala, Ph.D.
OpenCA Labs Director
OpenCA Logo
_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to