We'd like to get the final two documents into last call before the
next meeting. Therefore, we're looking for reviewers:
https://datatracker.ietf.org/doc/draft-ietf-emu-crypto-bind/
https://datatracker.ietf.org/doc/draft-ietf-emu-eap-tunnel-method/
Please post reviews to the list. If all g
Alan DeKok writes:
> https://datatracker.ietf.org/doc/draft-ietf-emu-eap-tunnel-method/
Section 5.3:
The Compound MAC computation is as follows:
CMK = CMK[j]
Compound-MAC = HMAC-HASH( CMK, BUFFER )
where j is the number of the last successfully executed inner EAP
method, H
Simon:
Thanks for the review. Good catch on both. We will fix both of them.
On 9/25/12 2:02 PM, "Simon Josefsson" wrote:
>Alan DeKok writes:
>
>> https://datatracker.ietf.org/doc/draft-ietf-emu-eap-tunnel-method/
>
>Section 5.3:
>
> The Compound MAC computation is as follows:
>
> CMK = C
Version 0 of the document is not ready for a last call as security
considerations are missing.
Other comments
1. I think in figure #1, there would be improved clarity if the line for
Pear initiates connection to a service would have the following under the
attacker line "-->|<--" to indicate t