Re: [Emu] Comments on draft-hartman-emu-mutual-crypto-bind

2012-07-02 Thread Sam Hartman
> "Jim" == Jim Schaad writes: Jim> Sam et al, Jim> 1. In section 1 after the Classic Tunnel Attack figure, I believe there are Jim> three methods listed as possible mitigation strategies, however I don't Jim> understand how the second one - a sufficiently strong inner method

[Emu] 答复: Re: on draft-hartman-emu-mutual-crypto-bind-00

2012-07-02 Thread zhou . sujing
Regards~~~ -Sujing Zhou Sam Hartman 写于 2012-06-29 02:06:00: > > "zhou" == zhou sujing writes: > > zhou> To my understanding, right prior to finishing tunnel > establishement, EAP peer > zhou> and EAP Server(print server in the server insertion attack > case) should have > zho

[Emu] 答复: Re: New draft on mutual crypto binding problem

2012-07-02 Thread zhou . sujing
How does EMSK break intermediate AAA servers? Regards~~~ -Sujing Zhou emu-boun...@ietf.org 写于 2012-06-29 02:25:44: > > "Hao" == Hao Zhou writes: > > Hao> Sam: > Hao> This is a well thought and well written draft, it covers a > lot of background > Hao> and aspect of the attack

[Emu] 答复: RE: Re: New draft on mutual crypto binding problem

2012-07-02 Thread zhou . sujing
Regards~~~ -Sujing Zhou "Zhangdacheng (Dacheng)" 写于 2012-07-03 11:41:49: > I think you try to ask why ESMK can be used to detect the attackers > who try to impersonate other honest servers. > > Unlike MSK, EMSK will never be transported over the network and then > cannot be accessed by attac