As you can tell, we submitted a new version to address the comments raised during the IESG review.
The diffs are here: https://author-tools.ietf.org/iddiff?url1=draft-ietf-emu-aka-pfs-11&url2=draft-ietf-emu-aka-pfs-12&difftype=--html And for your convenience the list of changes from Appendix A is: Update the draft track to Standards Track. Clarified the calculation of the Length field in the AT_ECDHE attribute, along with padding requirements. Avoided the use of keywords in operational recommendations, e.g., about deployment. Changed the definition of what "supported" means to focus on feature being implemented, but not require that it is usable during a protocol run, because configuration, new security information, etc. might imply that a particular feature is implemented but disabled for policy reasons. Changed the MITM terminology to be on-path attacks. Corrected a reference typo in the IANA considerations section. Shortened the abstract and introduction to the key aspects and removed duplication. Several editorial changes. Jari > internet-dra...@ietf.org kirjoitti 19.2.2024 kello 20.23: > > Internet-Draft draft-ietf-emu-aka-pfs-12.txt is now available. It is a work > item of the EAP Method Update (EMU) WG of the IETF. > > Title: Forward Secrecy for the Extensible Authentication Protocol Method > for Authentication and Key Agreement (EAP-AKA' FS) > Authors: Jari Arkko > Karl Norrman > John Preuß Mattsson > Name: draft-ietf-emu-aka-pfs-12.txt > Pages: 34 > Dates: 2024-02-19 > > Abstract: > > This document updates RFC 9048, the improved Extensible > Authentication Protocol Method for 3GPP Mobile Network Authentication > and Key Agreement (EAP-AKA'), with an optional extension providing > ephemeral key exchange. Similarly, this document also updates the > earlier version of the EAP-AKA' specification in RFC 5448. The > extension EAP-AKA' Forward Secrecy (EAP-AKA' FS), when negotiated, > provides forward secrecy for the session keys generated as a part of > the authentication run in EAP-AKA'. This prevents an attacker who > has gained access to the long-term key from obtaining session keys > established in the past, assuming these have been properly deleted. > In addition, EAP-AKA' FS mitigates passive attacks (e.g., large scale > pervasive monitoring) against future sessions. This forces attackers > to use active attacks instead. > > The IETF datatracker status page for this Internet-Draft is: > https://datatracker.ietf.org/doc/draft-ietf-emu-aka-pfs/ > > There is also an HTMLized version available at: > https://datatracker.ietf.org/doc/html/draft-ietf-emu-aka-pfs-12 > > A diff from the previous version is available at: > https://author-tools.ietf.org/iddiff?url2=draft-ietf-emu-aka-pfs-12 > > Internet-Drafts are also available by rsync at: > rsync.ietf.org::internet-drafts > > > _______________________________________________ > Emu mailing list > Emu@ietf.org > https://www.ietf.org/mailman/listinfo/emu
_______________________________________________ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu