Michael, Thanks for your comments.
A couple of responses: with regards to deployment, there’s some amount of EAP SIM/AKA deployment, but until now it hasn’t been for the primary mobile network access. It was only used for Wireless LANs when you have a SIM card. Nevertheless, both protocols are very widely implemented and very likely available on your phone. Future usage is a guess, of course. 5G has two mandatory-to-implement authentication approaches for mobile networks: the traditional, native AKA and EAP (which defaults to EAP-AKA’). That is a much bigger potential for usage. An optimistic future is where the use of EAP in this context grows, and we use it to evolve the authentication so that improvements can be more easily and frequently added. A less optimistic future is one where we don’t really change the protocols to defend against new attacks, e.g., pervasive monitoring. I don’t know which future will actually happen but I’m willing to work towards the better one :-) With regards to IMSI catchers, John already responded. And about the difficult-to-read sentences… I can work on that. Thanks for the feedback. With regards to the AT_KDF text that you quoted, that’s not new, it was part of RFC 5448, but can surely be improved. But the basic idea is that if the server proposes KDFs A, B, and C, then if A is acceptable to the peer, it will just do it. If A wants something else then it needs to propose it by responding to the server by sending the AT_KDF attribute back. If it sends A then obviously something is wrong, that should not happen and the server will refuse to do that. The peer needs to send either B or C, and then the server will use the chosen one in the next round of messages. With regards to new versions and putting things in one or multiple documents, my opinion is that 5448 clarifications deserve to be done separately from significant new functionality such as the PFS. If we do complete the PFS work and the IETF feels like stating it is required to implement, we can state that at that time. But, I think now is too early. With regards to AT_BIDDING, it is on purpose there only to prevent bidding down from EAP-AKA’ to EAP-AKA. And again unchanged from RFC 5448 (the diffs are here btw: http://www.arkko.com/ietf/eap/draft-ietf-emu-rfc5448bis-from-rfc5448.diff.html <http://www.arkko.com/ietf/eap/draft-ietf-emu-rfc5448bis-from-rfc5448.diff..html>). It is true that one could (probably) design a more general facility to protect against bidding down attacks in EAP more generally. Again, that feels like a separate and fairly significant piece of work. The specific EAP-AKA/EAP-AKA’ case solves an important subclass of the general problem, though, and has been around for a long time. Jari
_______________________________________________ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu