I apologize for my tardy response. I have been on vacation.

I agree with and support the proposed charter below. As for
Dan's suggestion that we not require the password based
method to be based on the tunnel method, the WG already
went through a long discussion and consensus check last
fall on this matter. There was clear consensus that we
should NOT work on a new password based method designed
to function without the tunnel method. One person's
opinion to the contrary does not negate that consensus.
I think that the reason we are not seeing much email on
this charter is that the issues and language have been
hashed through many times.

Thanks,

Steve

-----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
Dan Harkins
Sent: Friday, April 25, 2008 5:43 PM
To: Joseph Salowey (jsalowey)
Cc: [email protected]
Subject: Re: [Emu] EMU charter revision


  Hi Joe,

  Once again, a call for comments and I'm the only one to comment.

  Whether removing that line achieves "my goals" or not I still think
it should be removed. And that really seems to be the only comment
on the charter you get when you ask.

  regards,

  Dan.

On Fri, April 11, 2008 2:49 pm, Joseph Salowey (jsalowey) wrote:
>
>
>> -----Original Message-----
>> From: Dan Harkins [mailto:[EMAIL PROTECTED]
>> Sent: Friday, April 11, 2008 10:38 AM
>> To: Joseph Salowey (jsalowey)
>> Cc: [email protected]
>> Subject: Re: [Emu] EMU charter revision
>>
>>
>>   Hi Joe,
>>
>>   Thank you for giving me the opportunity to object, once
>> again, to the last sentence in the last item in the charter.
>> If you were to run the following sed filter on the charter I
>> would approve:
>>
>>   s/This item will be based on the above tunnel method.//
>>
>
> [Joe] I do not think that removing this line would achieve the goal
you
> wish.  With this line removed EAP-PWD is still out of scope of the
> charter as it does not meet the requirements of supporting legacy
> password databases.  The message from the ADs in the last meeting was
> pretty clear in that EAP-PWD style mechanisms is not something for the
> group to take on right now.  This does not mean that we cannot take on
> an EAP-PWD style mechanism once we have made progress on the current
> charter items.
>
>>   What is the process here? This looks the same as the
>> charter revision you made a consensus call on back in
>> January. I was the only one to opine before your cutoff last
>> time and my comment was the same as above. Now we're doing this
again.
>>
> [Joe] There have been several revisions posted to the list and
feedback
> from several working group members that have been worked into the new
> proposal along with input from the discussion in the last meeting.  If
> enough people respond positively, such that we have rough consensus,
> then we can move forward.
>
>
>>   Dan.
>>
>> On Thu, April 10, 2008 7:26 pm, Joseph Salowey (jsalowey) wrote:
>> > Below is a revision to the EMU charter that is intended to
>> reflect the
>> > discussions in the Philadelphia meeting.  Please respond to
>> the list
>> > if you approve of the charter or if you have any comments
>> on the charter.
>> > I would like to have responses by 4/24.
>> >
>> > Thanks,
>> >f
>> > Joe
>> >
>> > Description of Working Group:
>> > The Extensible Authentication Protocol (EAP) [RFC 3748] is
>> a network
>> > access authentication framework used in the PPP, 802.11,
>> 802.16, VPN,
>> > PANA, and in some functions in 3G networks. EAP itself is a simple
>> > protocol and actual authentication happens in EAP methods.
>> >
>> > Over 40 different EAP methods exist. Most of these methods are
>> > proprietary methods, but some are documented in
>> informational RFCs. In
>> > the past the lack of documented, open specifications has been a
>> > deployment and interoperability problem. There are
>> currently only two
>> > EAP methods in the standards track that implement features
>> such as key
>> > derivation that are required for many modern applications.
>> > Authentication types and credentials continue to evolve as do
>> > requirements for EAP methods.
>> >
>> > This group is chartered to work on the following types of
>> mechanisms
>> > to meet RFC 3748, RFC 4017, RFC 4962 and EAP Keying requirements:
>> >
>> > - An update to RFC 2716 to bring EAP-TLS into standards
>> track, clarify
>> > specification, interoperability, and implementation issues gathered
>> > over the years, and update the document to meet the requirements of
>> > RFC 3748, RFC 4017, and EAP keying framework documents. Backwards
>> > compatibility with RFC 2716 is a requirement.
>> >
>> > - A mechanism based on strong shared secrets. This mechanism should
>> > strive to be simple and compact for implementation in resource
>> > constrained environments.
>> >
>> > - A document that defines EAP channel bindings and provides
>> guidance
>> > for establishing EAP channel bindings within EAP methods.
>> >
>> > - A mechanism to support extensible communication within a TLS
>> > protected tunnel. This mechanism must support channel bindings in
>> > order to meet RFC 4962 requirements. This mechanism will support
>> > meeting the requirements of an enhanced TLS mechanism, a password
>> > based authentication mechanism, and additional inner authentication
>> > mechanisms.
>> >
>> > - Enable a TLS-based EAP method to support channel
>> bindings. This item
>> > will not generate a new method, rather it will extend
>> EAP-TLS and/or
>> > the above tunnel method.
>> >
>> > - A mechanism that makes use of existing password databases such as
>> > AAA databases.  This item will be based on the above tunnel method.
>> >
>> > Goals and Milestones:
>> > Done               Form design team to work on strong shared secret
>> > mechanism
>> > Done               Submit 2716bis I-D
>> > Done               Submit first draft of shared secret
>> mechanism I-D
>> > Done               Form password based mechanism design team
>> > Done               Submit 2716bis draft to IESG for
>> Proposed Standard
>> > Apr 2008   Submit Strong Shared Secret Mechanism to IESG
>> > May 2008   Submit Tunnel and Password Method requirements first
>> > Draft
>> > Sep 2008   Submit EAP Channel Bindings First Draft
>> > Sep 2008   Submit Tunnel Method first draft
>> > Oct 2008   Submit TLS based method channel binding first draft
>> > Oct 2008   Submit Password Method first draft
>> > Jan 2009   Send EAP Channel Bindings to IESG
>> > Mar 2009   Send Tunnel Method to IESG
>> > Apr 2009   Send TLS based method channel binding to IESG
>> > Apr 2009   Send Password based method to IESG
>> > _______________________________________________
>> > Emu mailing list
>> > [email protected]
>> > https://www.ietf.org/mailman/listinfo/emu
>> >
>>
>>
>>
>


_______________________________________________
Emu mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/emu
_______________________________________________
Emu mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/emu

Reply via email to