On Sat, Oct 24, 2020 at 4:29 PM Oleg Pekar <oleg.pekar.2...@gmail.com>
wrote:

> > 2  The EAP Type sent by the other party in the first TEAP message. This
> is a single octet encoded as (0x37)
>
> Shouldn't we clarify the motivation for placing the octet with TEAP type
> 0x37 into the BUFFER? Joe, I remember you explained that it is for
> protection against cross protocol attacks if Crypto-Binding TLV was reused
> (e.g. from PEAP).
>

[Joe]  That's more of an editorial comment that we would hold for a
document revision.  I think we should try to keep the revision text at a
minimum, but we certainly can include this information in the errata
notes.


> On Sun, Oct 25, 2020 at 12:45 AM Joseph Salowey <j...@salowey.net> wrote:
>
>> Errata 5768:  https://www.rfc-editor.org/errata/eid5768
>> Proposed State: Verified
>> Revision:
>>
>> Section 4.2.13. Says:
>>
>> Length
>>
>>     76
>>
>> It should say:
>>
>> Length
>>
>>      36 plus the length of the 2 MAC fields
>>
>> Section 4.2.13. Says:
>>
>>    EMSK Compound MAC
>>
>>       The EMSK Compound MAC field is 20 octets.  This can be the Server
>>       MAC (B1_MAC) or the Client MAC (B2_MAC).  The computation of the
>>       MAC is described in Section 5.3.
>>
>>    MSK Compound MAC
>>
>>       The MSK Compound MAC field is 20 octets.  This can be the Server
>>       MAC (B1_MAC) or the Client MAC (B2_MAC).  The computation of the
>>       MAC is described in Section 5.3.
>>
>> It Should Say:
>>
>>    EMSK Compound MAC
>>
>>       The computation of the MAC is described in Section 5.3.  This can
>> be
>>       the Server MAC (B1_MAC) or the Client MAC (B2_MAC).
>>
>>    MSK Compound MAC
>>
>>       The computation of the MAC is described in Section 5.3.  This can
>> be
>>       the Server MAC (B1_MAC) or the Client MAC (B2_MAC).
>>
>> Section 5.3 Says:
>>
>>  The Compound MAC computation is as follows:
>>
>>       CMK = CMK[j]
>>       Compound-MAC = MAC( CMK, BUFFER )
>>
>>    where j is the number of the last successfully executed inner EAP
>>    method, MAC is the MAC function negotiated in TLS 1.2 [RFC5246], and
>>    BUFFER is created after concatenating these fields in the following
>>    order:
>>
>>    1  The entire Crypto-Binding TLV attribute with both the EMSK and MSK
>>       Compound MAC fields zeroed out.
>>
>>    2  The EAP Type sent by the other party in the first TEAP message.
>>
>> It Should say:
>>
>>  The Compound MAC computation is as follows:
>>
>>       CMK = CMK[j]
>>       Compound-MAC = MAC( CMK, BUFFER )
>>
>>    where j is the number of the last successfully executed inner EAP
>>    method, MAC is HMAC [RFC2104] using the hash function negotiated in
>>    TLS [RFC5246].  The output length is the length of the output of the
>> HMAC
>>    function.  The BUFFER is created after concatenating these fields in
>>    the following order:
>>
>>    1  The entire Crypto-Binding TLV attribute with both the EMSK and MSK
>>       Compound MAC fields zeroed out.
>>
>>    2  The EAP Type sent by the other party in the first TEAP message. This
>>        is a single octet encoded as (0x37)
>>
>> Notes:
>>
>> This corrects the problem that the MAC output will vary depending upon
>> the TLS hash function. It clarifies that HMAC is used with the hash
>> function negotiated in TLS.   It also clarifies that the  EAP Type used in
>> the TLS message is the TEAP EAP type encoded as a single byte.
>>
>
_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to