[Emu] Looking for reviewers

2012-09-25 Thread Alan DeKok
We'd like to get the final two documents into last call before the next meeting. Therefore, we're looking for reviewers: https://datatracker.ietf.org/doc/draft-ietf-emu-crypto-bind/ https://datatracker.ietf.org/doc/draft-ietf-emu-eap-tunnel-method/ Please post reviews to the list. If all g

Re: [Emu] Looking for reviewers

2012-09-25 Thread Simon Josefsson
Alan DeKok writes: > https://datatracker.ietf.org/doc/draft-ietf-emu-eap-tunnel-method/ Section 5.3: The Compound MAC computation is as follows: CMK = CMK[j] Compound-MAC = HMAC-HASH( CMK, BUFFER ) where j is the number of the last successfully executed inner EAP method, H

Re: [Emu] Looking for reviewers

2012-09-25 Thread Hao Zhou (hzhou)
Simon: Thanks for the review. Good catch on both. We will fix both of them. On 9/25/12 2:02 PM, "Simon Josefsson" wrote: >Alan DeKok writes: > >> https://datatracker.ietf.org/doc/draft-ietf-emu-eap-tunnel-method/ > >Section 5.3: > > The Compound MAC computation is as follows: > > CMK = C

[Emu] Review - draft-ietf-emu-eap-tunnel-method-00

2012-09-25 Thread Jim Schaad
Version 0 of the document is not ready for a last call as security considerations are missing. Other comments 1. I think in figure #1, there would be improved clarity if the line for Pear initiates connection to a service would have the following under the attacker line "-->|<--" to indicate t