%% You should probably cite rfc7029 instead of this I-D. @techreport{ietf-emu-crypto-bind-04, number = {draft-ietf-emu-crypto-bind-04}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-ietf-emu-crypto-bind/04/}, author = {Sam Hartman and Margaret Cullen and Dacheng Zhang}, title = {{Extensible Authentication Protocol (EAP) Mutual Cryptographic Binding}}, pagetotal = 19, year = 2013, month = jul, day = 10, abstract = {As the Extensible Authentication Protocol (EAP) evolves, EAP peers rely increasingly on information received from the EAP server. EAP extensions such as channel binding or network posture information are often carried in tunnel methods; peers are likely to rely on this information. Cryptographic binding is a facility described in RFC 3748 that protects tunnel methods against man-in-the-middle attacks. However, cryptographic binding focuses on protecting the server rather than the peer. This memo explores attacks possible when the peer is not protected from man-in-the-middle attacks and recommends cryptographic binding based on an Extended Master Session Key, a new form of cryptographic binding that protects both peer and server along with other mitigations.}, }