20 jul 2012 kl. 16:24 skrev "Sam Hartman" <[email protected]>:

> So, I'm really hoping that from a process standpoint we can not look to
> hard at this.  I absolutely agree with Bernard that we need to implement
> things that meet the 4962 requirements.
> 
> The implementation I have the most experience with (Moonshot) does
> implement RFC 4962.  We use radsec as the key confidentiality method
> between AAA server and client.
> 
> We basically require EAP-TTLS because that's all we're currently
> implementing channel binding for.
> 
> The problem is that if we get too picky about IETF process, none of this
> works.  In terms of standardized EAP methods with security, we have
> EAP-GPSK and EAP-TLS.
> EAP-TLS doesn't support channel binding and adding it would be
> difficult.
> EAP-GPSK probably is something we could use. However, it's the wrong fit
> for a lot of deployments.
> 
> RADSEC is a good fit for what we want. Except it's not standards track.
> 
> Long term, TEAP will be a standards-track method we can move to.
> Long term,  either diameter will catch on, or we'll decide that RADSEC
> or some other form of security is appropriate for a normative reference
> from a standards-track spec.
> 
> I don't think publishing ABFAB is experimental is the right approach.
> I don't think blocking ABFAB until EAP and RADEXT get done coming up
> with standards-track mechanisms is the right fix.
> 
> So, I'm left concluding that  being a bit liberal in our process and
> doing something reasonable with the implementations is the right
> approach here.
> 
> So, I think that the right fix for the applicability statement is simply
> to refer to section 1.2 of RFC 4962 and note that is
> mandatory-to-implement.



> _______________________________________________
> abfab mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/abfab

_______________________________________________
abfab mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/abfab

Reply via email to