>  In my opinion, the document MUST give guidance for implementors and site 
> administrators:
> 
> * if resumption is used, the implementation MUST cache sufficient information 
> for the system to make appropriate policy decisions on resumption

Maybe something about not relying on the outer identity to apply any kind of 
autz policies?  Administrators may assume some kind of binding between the 
outer identity, the original session, and the resumed session, and assume it'll 
be consistent. In reality the user can provide any outer identity they like.

I know this is covered by the above point, but I feel it's worth documenting 
this case explicitly.

> * resumption MUST be rejected if no cached information is available, as we 
> have no idea what policies to apply

I'd argue if cached information is expected and non is available, resumption 
MUST be rejected.  For the majority of cases the security policies applied to 
the different TLS based EAP methods will be identical.

I agree with the rest of the points.

-Arran

Attachment: signature.asc
Description: Message signed with OpenPGP

_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to