> "Jim" == Jim Schaad writes:
Jim> Sam et al,
Jim> 1. In section 1 after the Classic Tunnel Attack figure, I believe
there are
Jim> three methods listed as possible mitigation strategies, however I don't
Jim> understand how the second one - a sufficiently strong inner method
Regards~~~
-Sujing Zhou
Sam Hartman 写于 2012-06-29 02:06:00:
> > "zhou" == zhou sujing writes:
>
> zhou> To my understanding, right prior to finishing tunnel
> establishement, EAP peer
> zhou> and EAP Server(print server in the server insertion attack
> case) should have
> zho
How does EMSK break intermediate AAA servers?
Regards~~~
-Sujing Zhou
emu-boun...@ietf.org 写于 2012-06-29 02:25:44:
> > "Hao" == Hao Zhou writes:
>
> Hao> Sam:
> Hao> This is a well thought and well written draft, it covers a
> lot of background
> Hao> and aspect of the attack
Regards~~~
-Sujing Zhou
"Zhangdacheng (Dacheng)" 写于 2012-07-03
11:41:49:
> I think you try to ask why ESMK can be used to detect the attackers
> who try to impersonate other honest servers.
>
> Unlike MSK, EMSK will never be transported over the network and then
> cannot be accessed by attac