Hi,
That table has a few more flaws.
EAP-MD5
--
- MD5 and Resistance to dictionary attacks. RFC3748 states "No", the
ITU document states "Yes".
- MD5 and replay protection. Ditto.
Further to these:
- why is Protection against the server compromise-based dictionary
attack marke
Hi,
- EAP-MD5: they claim it provides mutual authentication
That table has a few more flaws.
EAP-MD5
--
- MD5 and Resistance to dictionary attacks. RFC3748 states "No", the ITU
document states "Yes".
- MD5 and replay protection. Ditto.
EAP-TLS
-
- they quote RFC2716
Joseph Salowey (jsalowey) wrote:
Please send comments no later than 8/27 so we have time to prepare a
response.
quick first glance comments:
- The EAP-methods they evaluate are not very much in line with what I
think are the most widespread ones (is that because the other ones are
only dra
: [EMAIL PROTECTED]
> Subject: [Emu] Liaison Statement on ITU-T Recommendation X.1034
>
> The liaison statement from ITU-T SG 17 on X.1034 ("Guideline
> on extensible authentication protocol based authentication
> and key management in a data communication network"), whi
the
following master thesis by Thomas Otto:
http://www-public.tu-bs.de:8080/~y0013790/thesis-otto-eapmethods.pdf
>-Original Message-
>From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
>Behalf Of ext [EMAIL PROTECTED]
>Sent: 07 August, 2008 09:57
>To: emu@ietf.org
>Cc: [EMA
The liaison statement from ITU-T SG 17 on X.1034 ("Guideline on
extensible authentication protocol based authentication and key
management in a data communication network"), which was briefly
discussed in SAAG and EMU meetings, is now available here:
https://datatracker.ietf.org/liaison/466/
Joe