Re: [Emu] Liaison Statement on ITU-T Recommendation X.1034

2008-08-12 Thread Stefan Winter
Hi, That table has a few more flaws. EAP-MD5 -- - MD5 and Resistance to dictionary attacks. RFC3748 states "No", the ITU document states "Yes". - MD5 and replay protection. Ditto. Further to these: - why is Protection against the server compromise-based dictionary attack marke

Re: [Emu] Liaison Statement on ITU-T Recommendation X.1034

2008-08-11 Thread Stefan Winter
Hi, - EAP-MD5: they claim it provides mutual authentication That table has a few more flaws. EAP-MD5 -- - MD5 and Resistance to dictionary attacks. RFC3748 states "No", the ITU document states "Yes". - MD5 and replay protection. Ditto. EAP-TLS - - they quote RFC2716

Re: [Emu] Liaison Statement on ITU-T Recommendation X.1034

2008-08-08 Thread Klaas Wierenga
Joseph Salowey (jsalowey) wrote: Please send comments no later than 8/27 so we have time to prepare a response. quick first glance comments: - The EAP-methods they evaluate are not very much in line with what I think are the most widespread ones (is that because the other ones are only dra

Re: [Emu] Liaison Statement on ITU-T Recommendation X.1034

2008-08-08 Thread Joseph Salowey (jsalowey)
: [EMAIL PROTECTED] > Subject: [Emu] Liaison Statement on ITU-T Recommendation X.1034 > > The liaison statement from ITU-T SG 17 on X.1034 ("Guideline > on extensible authentication protocol based authentication > and key management in a data communication network"), whi

Re: [Emu] Liaison Statement on ITU-T Recommendation X.1034

2008-08-07 Thread Tschofenig, Hannes (NSN - FI/Espoo)
the following master thesis by Thomas Otto: http://www-public.tu-bs.de:8080/~y0013790/thesis-otto-eapmethods.pdf >-Original Message- >From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On >Behalf Of ext [EMAIL PROTECTED] >Sent: 07 August, 2008 09:57 >To: emu@ietf.org >Cc: [EMA

[Emu] Liaison Statement on ITU-T Recommendation X.1034

2008-08-06 Thread Pasi.Eronen
The liaison statement from ITU-T SG 17 on X.1034 ("Guideline on extensible authentication protocol based authentication and key management in a data communication network"), which was briefly discussed in SAAG and EMU meetings, is now available here: https://datatracker.ietf.org/liaison/466/ Joe