Hi Heikki

Ok, so *I* let it soak for a few days ;-) and I'm comfortable with the wording.

Eliot

On 27.08.23 16:42, Heikki Vatiainen wrote:
On Fri, 25 Aug 2023 at 22:30, Eliot Lear <l...@lear.ch> wrote:

    I agree with the sentiment, but I think it would be good for the
    words
    to soak a bit, since the paragraphs are a little involved. There
    may be
    a simpler way to say the same thing.


The diff between RFC 7170 and the current draft may help with the proposed change. I just noticed that 'EAP' was used more in the RFC than in the draft:

https://author-tools.ietf.org/diff?doc_1=RFC7170&doc_2=draft-ietf-emu-rfc7170bis%2F <https://author-tools.ietf.org/diff?doc_1=RFC7170&doc_2=draft-ietf-emu-rfc7170bis%2F>

If one looks at section 5.2, 'EAP method' is simplified in the draft to just 'method'. Then later in section 5.2 and in section 5.3. there's new text that says 'If no inner EAP authentication method is run then no EMSK or MSK will be generated ...'. Since, for example, vendor specific (authentication?) methods are required to support "calculation of the Crypto-Binding TLV (section 3.6)", it seems it's incorrect to state only EAP can generate EMSK or MSK.

I've also just pushed a one-line update to git to update the first paragraph of section 5.3 "Computing the Compound MAC" which currently says this:

     After each successful inner EAP authentication, EAP EMSK and/or
    MSKs are cryptographically combined ...


The update simply drops the both instances of 'EAP '. I'd say this is in-line with the text already present in the draft sections 5.2 and 5.3 which talk about how all inner methods need to updated the compound values.

I've only updated sections 5.2 and 5.3 to complete the s/EAP// changes that were already partially done in the earlier draft versions.

Related to this, a closer look at the draft shows that at least the following terms are used in interchangeable manner:
- EAP authentication method
- EAP method
- authentication method
- method
- inner method
- Phase 2 authentications
- authentication
- conversation (Sequence C.6. with chained EAPs)

In terminology section only 'Inner method' is defined and it seems to me that in many cases 'Inner method' would suffice when some of the term is used. There are of course cases when a specific term, such as 'EAP method', is needed.

Heikki


    Eliot

    On 25.08.23 21:27, Alan DeKok wrote:
    > On Aug 25, 2023, at 10:07 AM, Heikki Vatiainen
    <h...@radiatorsoftware.com> wrote:
    >> I have one small suggestion.
    >> ...
    >> I've created a pull request that updates the 'EAP
    authentication' part to say 'inner authentication' so that in case
    there's an inner method (perhaps provisioning?) that's not EAP but
    that can provide keying material, the text won't be too restrictive.
    >>
    >> https://github.com/emu-wg/rfc7170bis/pull/26
    >    I think that's reasonable.  Unless there are objections, I'll
    pull it in.
    >
    >    Alan DeKok.
    >
    > _______________________________________________
    > Emu mailing list
    > Emu@ietf.org
    > https://www.ietf.org/mailman/listinfo/emu
    >



--
Heikki Vatiainen
h...@radiatorsoftware.com

_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu
_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to