[Emu] 7170bis news (was Re: IETF 122 EMU agenda)

2025-03-06 Thread Alan DeKok
On Mar 6, 2025, at 6:19 AM, Peter Yee wrote: > We still have some time available in our time slot, so if you want to present > something that I've missed, please let me know. And for those of you already > on the agenda, let me know if I did not get the duration of your presentation > right.

[Emu] Re: 7170bis news (was Re: IETF 122 EMU agenda)

2025-03-06 Thread Alexander Clouter
On Thu, 6 Mar 2025, at 18:19, Michael Richardson wrote: >> That decision is informed by the additional knowledge that there's >> really only one shipping / production supplicant for TEAP: MSFT. TEAP >> is in hostap / wpa_supplicant, but hasn't been used in production >> environments. Other suppli

[Emu] Re: [EXTERNAL] 7170bis news (was Re: IETF 122 EMU agenda)

2025-03-06 Thread Sam Yun
Question for y'all, looking at the matrix: Windows + hostapd + FreeRADIUS + tls[machine],tls[user] - note says "Supplicant only supports MSK for EAP-TLS, User authentication fails as QEMU unable to emulate usable Smartcard (Supplicant popup awaiting suitable user Smartcard credential); Supplica

[Emu] Re: [EXTERNAL] 7170bis news (was Re: IETF 122 EMU agenda)

2025-03-06 Thread Alan DeKok
On Mar 6, 2025, at 3:48 PM, Sam Yun wrote: > Question for y'all, looking at the matrix: > > Windows + hostapd + FreeRADIUS + tls[machine],tls[user] - note says > "Supplicant only supports MSK for EAP-TLS, User authentication fails as QEMU > unable to emulate usable Smartcard (Supplicant popup a

[Emu] Re: [EXTERNAL] 7170bis news (was Re: IETF 122 EMU agenda)

2025-03-06 Thread Alexander Clouter
Hello, On Thu, 6 Mar 2025, at 20:48, Sam Yun wrote: > > Is there a reason y'all are using an emulated smart card (which > apparently doesn't work)? Why not install a TLS cert on the Windows > client and update the profile to use that cert(s)? We knew Windows would only utilise the MSK and did

[Emu] Re: 7170bis news (was Re: IETF 122 EMU agenda)

2025-03-06 Thread Michael Richardson
Alan DeKok wrote: > In short, for inner methods, the following combinations work for all implementations: > * EAP-MSCHAPv2 > * EAP-MSCHAPv2 followed by EAP-MSCHAPv2 > That's it. > If the suppliant doesn't include the EMSK Compound-MAC in the > Crypto-Binding TLV, then