On Mon, 9 Jan 2023, at 22:17, Heikki Vatiainen wrote:
> I'd say this is a major change because EAP-FAST-MSCHAPV2 can be directly 
> integrated with Windows AD but EAP-pwd and EAP-EKE can not. This is not to 
> bring back EAP-FAST-MSCHAPv2 but simply a note that Server Unauthenticated 
> Provisioning Mode is not as easy to use than in EAP-FAST.

With enough string and glue I think strapping EAP-pwd directly into AD is 
*technically* possible (leaning on RFC5931, Section 2.7.2 and PasswordHashHash).

The harder problem may be the absence of EAP-{pwd,EKE} methods in the drop down 
menu in Win10/11. I suspect most vendors do not have the appetite to do battle 
with EAPhost[1] to extend it with another EAP method.

>> In practice, as anyone seen anything other than EAP-FAST-MSCHAPv2 actually 
>> be used for this? Win10/11 does not; and EAP-AKA/EAP-SIM is not exactly 
>> available to non-telcos, right? The other methods supported you would have 
>> the server (inner) identity available (ie. EAP-TLS) which opens the question 
>> why you would not also know the outer server identity.
> 
> Can't comment on what's used with TEAP but this is likely a surprise to those 
> who think they can quicly port EAP-FAST's Server Unauthenticated Provisioning 
> Mode to TEAP. 

It was a surprise to me.

I like your suggestion of flagging this in Appendix B as a major departure from 
EAP-FAST.

I wonder if it should be highlighted also in the 'Unauthenticated Provisioning' 
section too?

>> No idea what to do here.
> 
> Is it known how widely Unauthenticated mode is used? Can this be left as it 
> is for this round of TEAP update?

I would get behind leaving the section as is. With the "sorry folks, you cannot 
use EAP-FAST-MSCHAPv2 as you did in your EAP-FAST implementation" I think this 
will be fine.

Thanks

[1] https://learn.microsoft.com/en-us/windows/win32/eaphost/portal
_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to