[Emu] Re: I-D Action: draft-ietf-emu-eap-ppt-00.txt

2025-07-23 Thread Alexander Clouter
Hello, On Wed, 23 Jul 2025, at 16:00, Alan DeKok wrote: > > The device will generally be using the same Calling-Station-Id for > multiple sessions to the same SSID. That puts a strong limit on how > much privacy is available. The issue is this method requires machinery to deal with bad actors

[Emu] Re: new TEAP option draft-lear-teap-config-options

2025-07-23 Thread Alexander Clouter
Hello, On Wed, 23 Jul 2025, at 15:53, Alan DeKok wrote: > >> This would then no longer be limited to TEAP, you could maybe even retrofit >> it to EAP-(T)TLS. > > TTLS would need to define a TTLS-specific attribute but sure. No, it would be coupled to EAP-TLS and the exporter there, no changes

[Emu] Re: I-D Action: draft-ietf-emu-eap-ppt-00.txt

2025-07-23 Thread Alexander Clouter
Hello, On Mon, 7 Jul 2025, at 13:26, internet-dra...@ietf.org wrote: > Internet-Draft draft-ietf-emu-eap-ppt-00.txt is now available. It is a work > item of the EAP Method Update (EMU) WG of the IETF. > >Title: Extensible Authentication Protocol (EAP) Using Privacy Pass Token >Authors: P

[Emu] Re: new TEAP option draft-lear-teap-config-options

2025-07-23 Thread Alexander Clouter
Hello, On Wed, 9 Jul 2025, at 13:01, Eliot Lear wrote: > > Alan and I thrown together a bit of a draft that would carry DHCP > option information in a TEAP TLV. The purpose of this is that there > are a number of configuration elements in DHCP that really are not at > all linked to topology or

[Emu] Re: TEAP, the gift that keeps on giving.

2025-07-23 Thread Alexander Clouter
On Wed, 23 Jul 2025, at 08:51, Alan DeKok wrote: > I'm not sure what it's used for. If it's just a random field, why > have this text: > > The nonce in a request MUST have its least significant bit > set to zero (0), and the nonce in a response MUST have the same > value as the request no

[Emu] Re: WGLC for draft-ietf-emu-eap-edhoc

2025-07-14 Thread Alexander Clouter
Hello, On Mon, 14 Jul 2025, at 10:28, FRANCISCO LOPEZ GOMEZ wrote: > Our implementation (University of Murcia) is available and can be > tested at: https://gitlab.com/franciscolopezg/eap-edhoc-testbed.git. > This repository includes some proof-of-concept implementations of the > EAP-EDHOC metho

[Emu] Re: [EXTERNAL] 7170bis news (was Re: IETF 122 EMU agenda)

2025-03-06 Thread Alexander Clouter
Hello, On Thu, 6 Mar 2025, at 20:48, Sam Yun wrote: > > Is there a reason y'all are using an emulated smart card (which > apparently doesn't work)? Why not install a TLS cert on the Windows > client and update the profile to use that cert(s)? We knew Windows would only utilise the MSK and did

[Emu] Re: 7170bis news (was Re: IETF 122 EMU agenda)

2025-03-06 Thread Alexander Clouter
On Thu, 6 Mar 2025, at 18:19, Michael Richardson wrote: >> That decision is informed by the additional knowledge that there's >> really only one shipping / production supplicant for TEAP: MSFT. TEAP >> is in hostap / wpa_supplicant, but hasn't been used in production >> environments. Other suppli

[Emu] TEAP interop results

2025-02-19 Thread Alexander Clouter
Hello, I managed to get the interop testing between FreeRADIUS and Windows 10 and 11 completed, the findings may be found at: https://github.com/emu-wg/rfc7170bis/wiki/Interop-Testing I do plan to add other combinations to the list over time, but it may be a few weeks before I find the motivat

[Emu] Re: I-D Action: draft-ietf-emu-rfc7170bis-19.txt

2024-06-13 Thread Alexander Clouter
On Fri, 7 Jun 2024, at 13:15, internet-dra...@ietf.org wrote: > Internet-Draft draft-ietf-emu-rfc7170bis-19.txt is now available. It is a work > item of the EAP Method Update (EMU) WG of the IETF. > >Title: Tunnel Extensible Authentication Protocol (TEAP) Version 1 >Author: Alan DeKok >

Re: [Emu] Adoption call for eap.arpa

2024-03-12 Thread Alexander Clouter
On Tue, 12 Mar 2024, at 14:45, Jan-Frederik Rieckers wrote: > On 12.03.24 13:45, Alexander Clouter wrote: >> On Tue, 12 Mar 2024, at 12:37, Yanlei(Ray) wrote: >>> My understanding here is that the EAP server and client will not >>> authenticate each other in EAP-TLS,

Re: [Emu] Adoption call for eap.arpa

2024-03-12 Thread Alexander Clouter
On Tue, 12 Mar 2024, at 12:37, Yanlei(Ray) wrote: > My understanding here is that the EAP server and client will not > authenticate each other in EAP-TLS, and all the authentication will be > done in the " captive portal ". So why recommend EAP-TLS as a > provisioning method? Just send the ident

Re: [Emu] Adoption call for eap.arpa

2024-03-12 Thread Alexander Clouter
On Thu, 7 Mar 2024, at 22:38, Peter Yee wrote: > The deadline for feedback is March 21st. Yes, that's during IETF > 119 but after the EMU time slot, so hopefully you will have > formed an opinion by then, if not sooner. We hope to hear > from lots of you! > > 1) https://datatracker.ietf.org/doc/dr

Re: [Emu] New Version Notification for draft-janfred-eap-fido-02.txt

2024-03-05 Thread Alexander Clouter
On Mon, 4 Mar 2024, at 19:11, Alan DeKok wrote: > The downside is that CBOR is likely more expressive than TLVs, and > perhaps what people should be moving towards. There's no reason to > stick with TLVs simply because we've been using them for years. It's > 2024, new technologies exist. Th

Re: [Emu] New Version Notification for draft-janfred-eap-fido-02.txt

2024-03-04 Thread Alexander Clouter
On Mon, 4 Mar 2024, at 10:06, Alexander Clouter wrote: > On Fri, 1 Mar 2024, at 21:08, Jan-Frederik Rieckers wrote: >> I just posted a new version of the EAP-FIDO draft. >> >> [snipped] >> >> Comments are welcome, as always. > > Trying to understand the n

Re: [Emu] New Version Notification for draft-janfred-eap-fido-02.txt

2024-03-04 Thread Alexander Clouter
On Fri, 1 Mar 2024, at 21:08, Jan-Frederik Rieckers wrote: > I just posted a new version of the EAP-FIDO draft. > > [snipped] > > Comments are welcome, as always. Trying to understand the need for 'Credentials IDs (PKIDs) in the authentication request. My thinking here is "I miss my EAP Identity

Re: [Emu] Secdir last call review of draft-ietf-emu-rfc7170bis-15

2024-03-04 Thread Alexander Clouter
On Sun, 3 Mar 2024, at 23:02, Alan DeKok wrote: >> My proposal would be to just use a dummy (marked optional) Outer-TLV that >> would be ignored by the other end to avoid this problem; sort of like >> GREASE...but to fix an insecurity instead. > > I think that changes existing implementations.

Re: [Emu] Secdir last call review of draft-ietf-emu-rfc7170bis-15

2024-03-03 Thread Alexander Clouter
On Sun, 3 Mar 2024, at 15:52, Alan DeKok wrote: >> If not, then in theory a MITM might be able to remove the last >> server-to-peer outer TLV and prepend it to the peer-to-server TLVs, or vice >> versa, and the MAC would be the same. However, each side knows which outer >> TLVs >> it sent before t

Re: [Emu] Secdir last call review of draft-ietf-emu-rfc7170bis-15

2024-03-03 Thread Alexander Clouter
On Sat, 2 Mar 2024, at 18:20, David Mandelberg wrote: >> Maybe a TEAPv2 could use ALPN for the TLS jacket to avoid this..erk, I think >> I may have suggested something that could be retro fitted here without >> impacting existing implementations; assuming they would just ignore the ALPN. > > ALPN

Re: [Emu] New Version Notification for draft-janfred-eap-fido-02.txt

2024-03-03 Thread Alexander Clouter
On Fri, 1 Mar 2024, at 21:08, Jan-Frederik Rieckers wrote: > Comments are welcome, as always. Section 4.1.2 - It just popped up as an idea in my reply to the the SEC review of TEAP but... EAP-TLS sub-methods have been copying the version bits since forever. Maybe it is time to break

Re: [Emu] Secdir last call review of draft-ietf-emu-rfc7170bis-15

2024-03-02 Thread Alexander Clouter
On Sat, 2 Mar 2024, at 03:21, David Mandelberg via Datatracker wrote: > > (nit) If I understand the TEAP version negotiation and Crypto-Binding > correctly, the negotiated version is not cryptographically verified until > either (1) after the first inner method is completed or (2) just before the >

Re: [Emu] FW: New Version Notification for draft-ingles-eap-edhoc-05.txt

2023-11-07 Thread Alexander Clouter
Hello, On Thu, 28 Sep 2023, at 15:47, John Mattsson wrote: > > EDHOC is high level very similar to the TLS 1.3 handshake but has much > smaller message sizes and is therefore useful in IoT. EAP-EDHOC is just > EDHOC over EAP using the EAP-TLS request and response packet formats. To help get me

Re: [Emu] Patch: revert some IMSK derivation changes

2023-08-28 Thread Alexander Clouter
On Mon, 28 Aug 2023, at 15:43, Heikki Vatiainen wrote: > >> If an inner method supports export of an Extended Master Session Key >> (EMSK), then the IMSK SHOULD be derived from the EMSK as defined in >> [RFC5295]. > > Why the SHOULD? If something else is done, how could it work with other > impleme

Re: [Emu] Patch: revert some IMSK derivation changes

2023-08-28 Thread Alexander Clouter
On Sun, 27 Aug 2023, at 18:16, Heikki Vatiainen wrote: > RFC 7170 and the current draft have diverged in how IMSK is calculated. > > In short: > 1. RFC 7170 pass EMSK to TLS-PRF whereas the draft passes both EMSK and MSK > to TLS-PRF. > 2. While RFC 7170 adjusts only MSK to 32 octet length, the dra

Re: [Emu] WGLC on draft-ietf-emu-rfc7170bis-11

2023-08-27 Thread Alexander Clouter
On Sun, 27 Aug 2023, at 10:57, Heikki Vatiainen wrote: > Weren't the observed differences against RFC 7170 one the main > reasons why the draft was needed? Exactly. In particular it was the use of the EAP-FAST-MSCHAPv2 key derivative (reversed upper/lower bits) that triggered this and the fun aro

Re: [Emu] I-D Action: draft-ietf-emu-rfc7170bis-13.txt

2023-08-26 Thread Alexander Clouter
On Tue, 22 Aug 2023, at 15:57, internet-dra...@ietf.org wrote: > A New Internet-Draft is available from the on-line Internet-Drafts > directories. This Internet-Draft is a work item of the EAP Method Update (EMU) > WG of the IETF. > >Title : Tunnel Extensible Authentication Protocol (

Re: [Emu] WGLC on draft-ietf-emu-rfc7170bis-11

2023-08-25 Thread Alexander Clouter
On Fri, 25 Aug 2023, at 19:10, Heikki Vatiainen wrote: > When the outer TLS-based EAP is processed by a different EAP server than the > inner EAP-TLS, then the why inner EAP-TLS resumption shouldn't be simply a > matter of the EAP peer and the inner EAP server? In this case the outer EAP > serve

Re: [Emu] WGLC on draft-ietf-emu-rfc7170bis-11

2023-08-20 Thread Alexander Clouter
On Fri, 18 Aug 2023, at 01:01, Michael Richardson wrote: > I'm not sure it's sane to use EAP-TLS for Inner method myself. If you mean in the general sense, I can imagine placing the user credential on a hardware key whilst the machine credential is either a regular software keychain or even more

Re: [Emu] WGLC on draft-ietf-emu-rfc7170bis-11

2023-08-20 Thread Alexander Clouter
On Thu, 17 Aug 2023, at 23:33, Alan DeKok wrote: >> If I did run EAP-TLS as an Inner method (whether once or twice), could I use >> resumption? > > Uh... why didn't anyone mention this before? TEAP is a near-endless > source of surprises and corner cases. In fairness I think you could have th

Re: [Emu] Housekeeping functionality (Was: Re: I-D Action: draft-ietf-emu-rfc7170bis-09.txt)

2023-08-02 Thread Alexander Clouter
On Wed, 2 Aug 2023, at 18:49, Eliot Lear wrote: > Keep this in mind: end devices should be presumed to be pressed for > resources, and anything requiring additional unnecessary authentications > should be avoided in that case. I could imagine a realtime video streaming device that during a repro

Re: [Emu] [Ace] [suspect] Re: Iotdir early review of draft-ietf-ace-wg-coap-eap-08

2023-07-28 Thread Alexander Clouter
On Fri, 28 Jul 2023, at 10:30, josh.howl...@gmail.com wrote: > The fragmentation issue that Heikki mentions is specific to EAP over RADIUS, > where RADIUS is using UDP transport. It isn’t a property of EAP itself, and > so I don’t follow why this makes EAP impractical for IoT. As the underlying

Re: [Emu] Working group Last Call for RFC 7170bis

2023-03-25 Thread Alexander Clouter
On Sat, 25 Mar 2023, at 12:03, Eliot Lear wrote: > I ask that as you consider this thread, you think beyond Basic-Auth to the > PKCS operations. > I definitely am not qualified to think on this, I would be a fool to not yield to those using those attributes! Other than your group, is anyone a

Re: [Emu] Working group Last Call for RFC 7170bis

2023-03-25 Thread Alexander Clouter
On Sat, 25 Mar 2023, at 01:08, Heikki Vatiainen wrote: >>> If you are using eapol_test prior to a few TEAP patches (reversed EAP-FAST >>> MSK calculation and ordering of the Cryptobinding processing) then it >>> should just work out the box. > I think the case in question where the inner methods

Re: [Emu] Working group Last Call for RFC 7170bis

2023-03-24 Thread Alexander Clouter
On Fri, 24 Mar 2023, at 18:41, Alexander Clouter wrote: > On Fri, 24 Mar 2023, at 17:51, Heikki Vatiainen wrote: >> The implementation was done based on the RFC and the draft but required >> tailoring to make it interoperable with wpa_supplicant's eapol_test with >> c

Re: [Emu] Working group Last Call for RFC 7170bis

2023-03-24 Thread Alexander Clouter
On Fri, 24 Mar 2023, at 17:51, Heikki Vatiainen wrote: > My colleague has been working on a TEAP implementation. "A new contestant has entered the arena..." > The implementation was done based on the RFC and the draft but required > tailoring to make it interoperable with wpa_supplicant's eapol_

Re: [Emu] IMCK derivation for PKCS ops still not clear (Re: Working group Last Call for RFC 7170bis)

2023-03-10 Thread Alexander Clouter
On Fri, 10 Mar 2023, at 16:17, Eliot Lear wrote: > In Section 4.2.9, the beginning text reads: > >> The Request-Action TLV MAY be sent by both the peer and the server in >> response to a successful or failed Result TLV. > > I believe this text is overly restrictive, and should be relaxed to say: >

Re: [Emu] I-D Action: draft-ietf-emu-rfc7170bis-04.txt

2023-03-09 Thread Alexander Clouter
On Tue, 7 Mar 2023, at 01:26, internet-dra...@ietf.org wrote: > A New Internet-Draft is available from the on-line Internet-Drafts > directories. > This Internet-Draft is a work item of the EAP Method Update WG of the IETF. > > Title : Tunnel Extensible Authentication Protocol (TEAP) Version 1 >

Re: [Emu] Call for EMU agenda items for IETF 116

2023-02-28 Thread Alexander Clouter
On Wed, 1 Mar 2023, at 01:44, Meiling Chen wrote: > I would like to discuss EAP-TLS-IBS this time, Since last adoption process, > we are still waiting for more people to be interested. I thought the hold up was OpenSSL does not support RFC7250 without patching? https://github.com/openssl/openssl

Re: [Emu] RFC7170bis and lack of identities

2023-02-03 Thread Alexander Clouter
On Sat, 4 Feb 2023, at 01:40, Alan DeKok wrote: >> Should we state somewhere that the client can "effectively rollback the >> entire inner state machine" so Result TLV is not final for the whole session? >> >> Should the client be able to do this multiple times? > > I would say "no". I really

Re: [Emu] RFC7170bis and lack of identities

2023-02-03 Thread Alexander Clouter
On Thu, 2 Feb 2023, at 19:16, Alan DeKok wrote: >> The documentation does not but I did see Appendix C.9 lets the client state >> what it wants to do: >> >> https://datatracker.ietf.org/doc/html/draft-ietf-emu-rfc7170bis-03#name-c9-peer-requests-inner-meth > > i.e. the client authenticates in p

Re: [Emu] RFC7170bis and lack of identities

2023-02-02 Thread Alexander Clouter
On Thu, 2 Feb 2023, at 18:31, Alan DeKok wrote: > On Feb 2, 2023, at 2:22 AM, Eliot Lear wrote: >> I am wondering if we should close this issue. At the end of the day, if the >> client knows it's doing something like 2FA that requires an EAP method, it >> can initiate. > > I'm not clear how t

Re: [Emu] Question about rfc7170bis && PAC

2023-01-23 Thread Alexander Clouter
On Mon, 23 Jan 2023, at 14:05, Heikki Vatiainen wrote: > On Tue, 17 Jan 2023 at 16:24, Alan DeKok > wrote: >> >> On Jan 16, 2023, at 8:00 PM, Joseph Salowey wrote: >> > [Joe] Speaking as a contributor, I would rather see the text deleted if >> > no-one plans on implementing it. This would make

Re: [Emu] Question about rfc7170bis && PAC

2023-01-16 Thread Alexander Clouter
On Mon, 16 Jan 2023, at 13:54, Alan DeKok wrote: > And as a related note, if the PAC goes away, so does the Authority-ID > TLV, and related things like A-ID. I was wondering what to do with A-ID[1] (and everything around PAC-Info) but starting to figure that as you can stuff anything you want in

Re: [Emu] I-D Action: draft-ietf-emu-tls-eap-types-10.txt

2023-01-14 Thread Alexander Clouter
On Fri, 13 Jan 2023, at 19:06, internet-dra...@ietf.org wrote: > Title : TLS-based EAP types and TLS 1.3 > Author : Alan DeKok > Filename: draft-ietf-emu-tls-eap-types-10.txt > Pages : 22 > Date: 2023-01-13 The TEAP section will need a lig

Re: [Emu] I-D Action: draft-ietf-emu-rfc7170bis-02.txt

2023-01-10 Thread Alexander Clouter
On Mon, 9 Jan 2023, at 22:36, Alan DeKok wrote: >> Section 3.3.1 - EAP Sequences >> >> * "Upon completion of each EAP method in the tunnel, the server MUST send an >> Intermediate-Result TLV indicating the result of the inner EAP method. The >> peer MUST respond to the Intermediate-Result TLV in

Re: [Emu] I-D Action: draft-ietf-emu-rfc7170bis-02.txt

2023-01-10 Thread Alexander Clouter
On Mon, 9 Jan 2023, at 22:17, Heikki Vatiainen wrote: > I'd say this is a major change because EAP-FAST-MSCHAPV2 can be directly > integrated with Windows AD but EAP-pwd and EAP-EKE can not. This is not to > bring back EAP-FAST-MSCHAPv2 but simply a note that Server Unauthenticated > Provisionin

Re: [Emu] Resolution for TEAP Errata 5128

2023-01-09 Thread Alexander Clouter
On Mon, 9 Jan 2023, at 14:11, Heikki Vatiainen wrote: >> On a related note, whilst we are here, it does raise the question on how we >> got: >> >> "...the length is 64 octets..." and "First 32 octets of TLS-PRF(...)" >> >> The '0x00 || 0x40' (64 network order 16bit length concatenation) looks >

Re: [Emu] I-D Action: draft-ietf-emu-rfc7170bis-02.txt

2023-01-09 Thread Alexander Clouter
On Thu, 5 Jan 2023, at 20:13, internet-dra...@ietf.org wrote: > Title : Tunnel Extensible Authentication Protocol (TEAP) Version 1 > Filename: draft-ietf-emu-rfc7170bis-02.txt > Pages : 101 <-- "now available over the counter to deal with > insomnia..." > Date

Re: [Emu] Meta Issue (Re: I-D Action: draft-ietf-emu-rfc7170bis-02.txt)

2023-01-09 Thread Alexander Clouter
On Mon, 9 Jan 2023, at 07:53, Eliot Lear wrote: > My suggestion is that this draft not be moved to WGLC until we have > working code in hostap for it.  Even better if FR and ISE also match and > can test against MSFT. FreeRADIUS interops with Win10/11 and hostapd (wpa_supplicant/eapol_test) hos

Re: [Emu] Resolution for TEAP Errata 5128

2023-01-09 Thread Alexander Clouter
On Mon, 9 Jan 2023, at 03:34, Joseph Salowey wrote: > The definition of the TLS-PRF is given in 5246 as: > > PRF(secret, label, seed) = P_(secret, label | seed) > > This construction only defines 3 parameters and does not define a length. I > don't think current implementations include the leng

Re: [Emu] I-D Action: draft-ietf-emu-rfc7170bis-02.txt

2023-01-08 Thread Alexander Clouter
On Thu, 5 Jan 2023, at 20:13, internet-dra...@ietf.org wrote: > Title : Tunnel Extensible Authentication Protocol (TEAP) Version 1 > Filename: draft-ietf-emu-rfc7170bis-02.txt > Pages : 101 > Date: 2023-01-05 Abstract: obseletes -> obsoletes Sectio

Re: [Emu] Fwd: New Version Notification for draft-dekok-emu-rfc7170bis-00.txt

2023-01-07 Thread Alexander Clouter
On Wed, 7 Dec 2022, at 13:48, Alan DeKok wrote: > * perhaps mentioning TLS 1.3? As the PEAP and EAP-TTLS RFCs do not there probably is no need to. At some stage draft-ietf-emu-tls-eap-types will brand an 'Updated by ...' onto those RFCs including RFC7170bis. One question though is can an 'Updat

Re: [Emu] I-D Action: draft-ietf-emu-tls-eap-types-09.txt

2023-01-04 Thread Alexander Clouter
On Wed, 4 Jan 2023, at 09:17, Alexander Clouter wrote: > > For TEAP (and similarly for FAST) we need to do more than just state > "PACs are dead use NewSessionTicket"[1]. Looks like I jumped at this too quickly, there is some text from the original RFC7170: https://datat

Re: [Emu] I-D Action: draft-ietf-emu-tls-eap-types-09.txt

2023-01-04 Thread Alexander Clouter
On Tue, 27 Sep 2022, at 13:25, internet-dra...@ietf.org wrote: > A New Internet-Draft is available from the on-line Internet-Drafts > directories. > This draft is a work item of the EAP Method Update WG of the IETF. > > Title : TLS-based EAP types and TLS 1.3 > Author : Alan

Re: [Emu] Reminder EMU WG Virtual Interim 2023-01-04

2023-01-03 Thread Alexander Clouter
On Tue, 3 Jan 2023, at 21:34, Alan DeKok wrote: > I've pushed back all of the fixes I know about based on discussion on > the mailing list. There is also some gold[1] to be found in https://github.com/emu-wg/teap-errata that I am working through porting over. I will blend this into my draft ema

Re: [Emu] TEAP erratum 5775

2023-01-03 Thread Alexander Clouter
On Tue, 3 Jan 2023, at 14:16, Eliot Lear wrote: >> My expectation is that you use the EMSK from the outer-TLS authentication to >> do this calculation. >> >> However, I now understand your point about the *value* of doing this. >> Generating a Cryptobinding on the outer-TLS authentication does n

Re: [Emu] TEAP erratum 5775

2023-01-03 Thread Alexander Clouter
On Tue, 3 Jan 2023, at 08:20, Eliot Lear wrote: > My use case is IOT. I'm interested in two states: > > * Nominal: everything looks very similar to EAP-TLS. > * Exceptional: a new certificate or a new trust anchor or something else is > needed. In which case, I would expect the server to push

Re: [Emu] draft-ietf-emu-rfc7170bis-00.txt Review

2023-01-03 Thread Alexander Clouter
On Mon, 2 Jan 2023, at 21:20, Alan DeKok wrote: >> It shows it for the *first* method but not subsequent methods. > > Ah. > > And it doesn't show the inner EAP authentication method finishing with > EAP Success or EAP Failure. ...and should continue to *not* show EAP Success/Failure for each i

Re: [Emu] I-D Action: draft-ietf-emu-tls-eap-types-09.txt

2023-01-03 Thread Alexander Clouter
On Tue, 27 Sep 2022, at 13:25, internet-dra...@ietf.org wrote: > A New Internet-Draft is available from the on-line Internet-Drafts > directories. > This draft is a work item of the EAP Method Update WG of the IETF. > > Title : TLS-based EAP types and TLS 1.3 > Author : Alan

Re: [Emu] draft-ietf-emu-rfc7170bis-00.txt Review

2023-01-02 Thread Alexander Clouter
On Mon, 2 Jan 2023, at 20:15, Alan DeKok wrote: >> Appendix C.6 (Sequence of EAP Methods) will need to be updated to show this >> too. > > The text has this, which seems sufficient: > > <- EAP-Request/ > EAP-Type=TEAP, V=1 >

Re: [Emu] TEAP erratum 5775

2023-01-02 Thread Alexander Clouter
On Thu, 1 Dec 2022, at 13:44, Eliot Lear wrote: > Th proposed change is as follows: > > > >> 4.2.13. Crypto-Binding TLV >> >> The Crypto-Binding TLV is used to prove that both the peer and server >> participated in the tunnel establishment and sequence of authentications. It >> also provides

Re: [Emu] draft-ietf-emu-rfc7170bis-00.txt Review

2023-01-02 Thread Alexander Clouter
On Sat, 31 Dec 2022, at 17:14, Oleg Pekar wrote: > Few initial comments: > > [snipped EAP sequences scene setting] > > Thus we considered in one of the previous discussions to say in Section 3.3.1 > of TEAP "Upon completion of each EAP __authentication__ method in the tunnel, > the server MUST

Re: [Emu] [EXTERNAL] Re: More TEAP issues

2022-12-02 Thread Alexander Clouter
On Thu, 1 Dec 2022, at 05:41, Eliot Lear wrote: > No, but I would ask that we still have an interim to close the errata. > It was that Errata (stalled effort on GitHub) that helped me over the line in implementing TEAP, so this definitely gets my nod of approval._

Re: [Emu] More TEAP issues

2022-11-30 Thread Alexander Clouter
Hello, On Tue, 29 Nov 2022, at 22:34, Alan DeKok wrote: > Based on interoperability testing, it looks like implementations > followed EAP-FAST for derivation of the MS-MPPE keys, and not RFC 7170: > > http://lists.infradead.org/pipermail/hostap/2022-July/040639.html > > http://lists.infradead.org

Re: [Emu] WG last call for draft-ietf-emu-tls-eap-types ?

2022-09-22 Thread Alexander Clouter
Hello, On Tue, 20 Sep 2022, at 20:50, Alan DeKok wrote: > >> Section 2.2 - TEAP >> -- >> I do not think changing the language for the definition of the MAC used for >> the Compound MAC was necessary. > > I don't see if changing the definition that much, There's just a > refere

Re: [Emu] WG last call for draft-ietf-emu-tls-eap-types ?

2022-09-10 Thread Alexander Clouter
Hello, On Fri, Sep 09, 2022 at 05:35:26PM -0400, Alan DeKok wrote: I guess the argument is that those are the labels that are used in TEAP (without exporter) and the same labels are used by EAP-FAST (with different method ID). My main concern is that they labels are somewhat generic (sessio

Re: [Emu] WG last call for draft-ietf-emu-tls-eap-types ?

2022-09-10 Thread Alexander Clouter
Hello, On Tue, Sep 06, 2022 at 09:57:02PM -0700, Joseph Salowey wrote: I think we need to have some review of the EAP-FAST and TEAP sections before publication. If we can't get the review then maybe we should remove those sections. Is someone willing to step up and review these sections of the