Re: [Emu] Potential re-establishment of the EMU working group

2018-03-19 Thread Alan DeKok
On Mar 17, 2018, at 5:22 PM, Mohit Sethi wrote: > In the morning, the client and server were always able to authentication each > other successfully. We added about 7 intermediate CAs in-between the client > end-entity certificate and the root-CA certificate. However, the client and > server we

Re: [Emu] Potential re-establishment of the EMU working group

2018-03-17 Thread Mohit Sethi
Hi Alan and Bernard, Darshak, Aleksi and I are currently running some experiments at the IETF hackathon to re-produce the problem of EAP-TLS authentication with large certificates and long chains. We have been generating root CA certificates, intermediate CA certificates, and end-entity cert

Re: [Emu] Potential re-establishment of the EMU working group

2018-02-05 Thread Alan DeKok
On Feb 5, 2018, at 4:03 AM, Mohit Sethi wrote: > Thanks for raising this issue. I am trying to understand the problem of large > certificates and longer certificate chains a bit better. > > From your deployment experience, is the problem equally bad for > authentication in both directions (i.e.

Re: [Emu] Potential re-establishment of the EMU working group

2018-02-05 Thread Mohit Sethi
Hi Alan, Thanks for raising this issue. I am trying to understand the problem of large certificates and longer certificate chains a bit better. From your deployment experience, is the problem equally bad for authentication in both directions (i.e. both client and server certificates are larg

Re: [Emu] Potential re-establishment of the EMU working group, version 2

2018-01-18 Thread Alan DeKok
> On Jan 18, 2018, at 9:25 AM, Jari Arkko wrote: > > Here’s a second spin of the potential WG charter. I will talk to the ADs and > see what we can do with this… would also appreciate any further comments or > expressions of support or objection from you all :-) That looks good to me. I th

Re: [Emu] Potential re-establishment of the EMU working group

2018-01-15 Thread Jari Arkko
Alan, John, > On Dec 22, 2017, at 1:12 PM, John Mattsson wrote: >> In TLS 1.3, ECC is mandatory to support. This drastically reduces the sizes >> of certificates and signatures (public key sizes from 384 bytes (RSA and >> DHE) to 32 bytes (ECDHE) and signatures from 384 bytes (RSA) to 64 bytes

Re: [Emu] Potential re-establishment of the EMU working group

2017-12-23 Thread Alan DeKok
On Dec 22, 2017, at 1:12 PM, John Mattsson wrote: > In TLS 1.3, ECC is mandatory to support. This drastically reduces the sizes > of certificates and signatures (public key sizes from 384 bytes (RSA and DHE) > to 32 bytes (ECDHE) and signatures from 384 bytes (RSA) to 64 bytes (ECDSA > and EdDS

Re: [Emu] Potential re-establishment of the EMU working group

2017-12-22 Thread John Mattsson
On Dec 21, 2017, Alan DeKok wrote: >The question I have is whether we can do anything to EAP-TLS to address the >issue. Answering that question >requires a deeper dive into TLS. In TLS 1.3, ECC is mandatory to support. This drastically reduces the sizes of certificates and signatures (public k

Re: [Emu] Potential re-establishment of the EMU working group

2017-12-21 Thread Alan DeKok
On Dec 21, 2017, at 9:07 AM, Jari Arkko wrote: > >> I've seen people run into this issue with large certificates and long >> certificate chains. It would be good to find a way to allow this use-case. > > That’s interesting. > > Do you have any suggestions on what to do about this issue, or we

Re: [Emu] Potential re-establishment of the EMU working group

2017-12-21 Thread Jari Arkko
> The Session ID also needs to be defined for SIM and AKA, as per Jouni's > comments. That doesn't fit in with AKA' changes. Yeah, I was thinking about that but didn’t go far enough. But you’re right. Maybe this needs to be a separate item for EAP-SIM. > It may also be worth re-examining EAP-

Re: [Emu] Potential re-establishment of the EMU working group

2017-12-21 Thread Alan DeKok
On Dec 21, 2017, at 8:40 AM, Jari Arkko wrote: > > I’ve been thinking of what to do with the EAP work that got discussed both in > the SAAG meeting last time (my drafts), as well on the list. The latter was > more on the EAP-TLS side, and it seems that the discussion has converged to a > reaso