On Tue, Oct 27, 2020 at 12:23 AM Eliot Lear wrote:
> Hi,
>
> >
> > [Joe] Yes I think it is fine to say EAP authentication method. I have
> been convinced that the spec requires crypto-binding with the basic
> password authentication. I'll need to add this in.
> >
>
> Keep in mind that there m
Hi,
>
> [Joe] Yes I think it is fine to say EAP authentication method. I have been
> convinced that the spec requires crypto-binding with the basic password
> authentication. I'll need to add this in.
>
Keep in mind that there might not even be basic auth. One case is that one
just us
On Mon, Oct 26, 2020 at 12:51 PM Jorge Vergara
wrote:
> This is a detailed one so I’ve tried to go over it carefully. Most of it
> looks good but I’m unsure about this part:
>
>
>
> > If an inner method fails or MAC verification
>
> fails then S-IMCK is not used in further calculation.
>
>
>
> It
This is a detailed one so I’ve tried to go over it carefully. Most of it looks
good but I’m unsure about this part:
> If an inner method fails or MAC verification
fails then S-IMCK is not used in further calculation.
It is a valid scenario that multiple authentication methods run and some fail,