Basic Password Exchange within the Flexible Authentication via Secure Tunneling Extensible Authentication Protocol (EAP-FAST)
RFC 5421
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2015-10-14
|
05 | (System) | Notify list changed from ncamwing@cisco.com, hzhou@cisco.com, draft-zhou-emu-fast-gtc@ietf.org to (None) |
2012-08-22
|
05 | (System) | post-migration administrative database adjustment to the No Objection position for Pasi Eronen |
2012-08-22
|
05 | (System) | post-migration administrative database adjustment to the Yes position for Jari Arkko |
2009-03-13
|
05 | Amy Vezza | State Changes to RFC Published from RFC Ed Queue by Amy Vezza |
2009-03-13
|
05 | Amy Vezza | [Note]: 'RFC 5421' added by Amy Vezza |
2009-03-12
|
05 | (System) | RFC published |
2008-12-16
|
05 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2008-12-12
|
05 | (System) | IANA Action state changed to Waiting on RFC Editor from In Progress |
2008-12-12
|
05 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2008-12-12
|
05 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2008-11-25
|
05 | (System) | IANA Action state changed to In Progress |
2008-11-19
|
05 | Cindy Morgan | State Changes to RFC Ed Queue from Approved-announcement sent by Cindy Morgan |
2008-11-18
|
05 | Amy Vezza | IESG state changed to Approved-announcement sent |
2008-11-18
|
05 | Amy Vezza | IESG has approved the document |
2008-11-18
|
05 | Amy Vezza | Closed "Approve" ballot |
2008-11-18
|
05 | Amy Vezza | State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Amy Vezza |
2008-11-18
|
05 | Pasi Eronen | [Ballot Position Update] Position for Pasi Eronen has been changed to No Objection from Discuss by Pasi Eronen |
2008-11-17
|
05 | Jari Arkko | [Ballot Position Update] Position for Jari Arkko has been changed to Yes from Discuss by Jari Arkko |
2008-11-07
|
05 | Jari Arkko | [Ballot discuss] I have cleared my original discuss, thanks for the great improvement in the new version! However, there is one remaining issue. My original … [Ballot discuss] I have cleared my original discuss, thanks for the great improvement in the new version! However, there is one remaining issue. My original discuss called for documenting the security properties for this method, as required by RFC 3748. This is now done in the new version, except that I do not think it is completely correct. Most of the security properties listed are really properties of FAST, not GTC, and you could argue how this should be presented. However, one of the items, cryptographic binding seems downright wrong given that GTC does not generate keys at all. Therefore prevention of attacks related to binding is left completely outside the method's technical means, and for deployment considerations (just using the credentials inside FAST/GTC and not elsewhere, for instance). In the interest of a speedy resolution, I'm sending here a suggested revision of Section 3.1. I believe this could be put in via an RFC Editor's note so that the draft can be approved. Comments and edits from the authors and Pasi would of course be needed first: This section provides the needed security claim requirement for EAP [RFC3748]. Auth. mechanism: Password based. Ciphersuite negotiation: No. However, such negotiation is provided by EAP-FAST for the outer authentication. Mutual authentication: No. However, EAP-FAST provides server side authentication. Integrity protection: No. However, any method executed within the EAP-FAST tunnel is protected. Replay protection: See above. Confidentiality: See above. Key derivation: Keys are not generated, see Section 2. However, when used inside EAP-FAST, the outer method will provide keys. See [RFC4851] for the properties of those keys. Key strength: See above. Dictionary attack prot.: No. However, when used inside the EAP-FAST tunnel, the protection provided by the TLS tunnel prevents an off-line dictionary attack. Fast reconnect: No. However, EAP-FAST provides a fast reconnect capability which allows reusing an earlier session authenticated by EAP-FAST-GTC. Cryptographic binding: No. Given that no keys are generated, EAP-FAST-GTC or its use within EAP-FAST can not provide a cryptographic assurance that no binding attack has occurred. EAP-FAST-GTC is required to only run within a protected tunnel, but even the use of the same credentials in some other, unprotected context might lead to a vulnerability. As a result, credentials used in EAP-FAST-GTC SHOULD NOT be used in other authentication mechanisms. Session independence: No. However, EAP-FAST provides session independence. Fragmentation: No. However, EAP-FAST provides support for this. Key Hierarchy: Not applicable. Channel binding: No, though the outer method, EAP-FAST can be extended for this. |
2008-11-07
|
05 | Jari Arkko | [Ballot discuss] I have cleared my original discuss, but there is one remaining issue. My original discuss called for documenting the security properties for this … [Ballot discuss] I have cleared my original discuss, but there is one remaining issue. My original discuss called for documenting the security properties for this method, as required by RFC 3748. This is now done in the new version, except that I do not think it is completely correct. Most of the security properties listed are really properties of FAST, not GTC, and you could argue how this should be presented. However, one of the items, cryptographic binding seems downright wrong given that GTC does not generate keys at all. Therefore prevention of attacks related to binding is left completely outside the method's technical means, and for deployment considerations (just using the credentials inside FAST/GTC and not elsewhere, for instance). Here's a suggested revision of Section 3.1: This section provides the needed security claim requirement for EAP [RFC3748]. Auth. mechanism: Password based. Ciphersuite negotiation: No. However, such negotiation is provided by EAP-FAST for the outer authentication. Mutual authentication: No. However, EAP-FAST provides server side authentication. Integrity protection: No. However, any method executed within the EAP-FAST tunnel is protected. Replay protection: See above. Confidentiality: See above. Key derivation: Keys are not generated, see Section 2. However, when used inside EAP-FAST, the outer method will provide keys. See [RFC4851] for the properties of those keys. Key strength: See above. Dictionary attack prot.: No. However, when used inside the EAP-FAST tunnel, the protection provided by the TLS tunnel prevents an off-line dictionary attack. Fast reconnect: No. However, EAP-FAST provides a fast reconnect capability which allows reusing an earlier session authenticated by EAP-FAST-GTC. Cryptographic binding: No. Given that no keys are generated, EAP-FAST-GTC or its use within EAP-FAST can not provide a cryptographic assurance that no binding attack has occurred. EAP-FAST-GTC is required to only run within a protected tunnel, but even the use of the same credentials in some other, unprotected context might lead to a vulnerability. As a result, credentials used in EAP-FAST-GTC SHOULD NOT be used in other authentication mechanisms. Session independence: No. However, EAP-FAST provides session independence. Fragmentation: No. However, EAP-FAST provides support for this. Key Hierarchy: Not applicable. Channel binding: No, though the outer method, EAP-FAST can be extended for this. |
2008-11-07
|
05 | Jari Arkko | [Ballot discuss] I have cleared my original discuss, but there is one remaining issue. My original discuss called for documenting the security properties for this … [Ballot discuss] I have cleared my original discuss, but there is one remaining issue. My original discuss called for documenting the security properties for this method, as required by RFC 3748. This is now done in the new version, except that I do not think it is completely correct. Most of the security properties listed are really properties of FAST, not GTC, and you could argue how this should be presented. However, one of the items, cryptographic binding seems downright wrong given that GTC does not generate keys at all. Therefore prevention of attacks related to binding is left completely outside the method's technical means, and for deployment considerations (just using the credentials inside FAST/GTC and not elsewhere, for instance). Here's a suggested revision of Section 3.1: This section provides the needed security claim requirement for EAP [RFC3748]. Auth. mechanism: Password based. Ciphersuite negotiation: No. However, such negotiation is provided by EAP-FAST for the outer authentication. Mutual authentication: No. However, EAP-FAST provides server side authentication. Integrity protection: No. However, any method executed within the EAP-FAST tunnel is protected. Replay protection: See above. Confidentiality: See above. Key derivation: Keys are not generated, see Section 2. However, when used inside EAP-FAST, the outer method will provide keys. See [RFC4851] for the properties of those keys. Key strength: See above. Dictionary attack prot.: No. However, when used inside the EAP-FAST tunnel, the protection provided by the TLS tunnel prevents an off-line dictionary attack. Fast reconnect: No. However, EAP-FAST provides a fast reconnect capability which allows reusing an earlier session authenticated by EAP-FAST-GTC. Cryptographic binding: Yes. Provided by the EAP-FAST Tunnel. Session independence: No. However, EAP-FAST provides session independence. Fragmentation: No. However, EAP-FAST provides support for this. Key Hierarchy: Not applicable. Channel binding: No, though the outer method, EAP-FAST can be extended for this. |
2008-11-07
|
05 | Jari Arkko | [Ballot discuss] I have cleared my original discuss, but there is one remaining issue. My original discuss called for documenting the security properties for this … [Ballot discuss] I have cleared my original discuss, but there is one remaining issue. My original discuss called for documenting the security properties for this method, as required by RFC 3748. This is now done in the new version, except that I do not think it is completely correct. Most of the security properties listed are really properties of FAST, not GTC, and you could argue how this should be presented. However, one of the items, cryptographic binding seems downright wrong given that GTC does not generate keys at all. Therefore prevention of attacks related to binding is left completely outside the method's technical means, and for deployment considerations (just using the credentials inside FAST/GTC and not elsewhere, for instance). Here's a suggested revision of Section 3.1: This section provides the needed security claim requirement for EAP [RFC3748]. Auth. mechanism: Password based. Ciphersuite negotiation: No, but provided by EAP-FAST for the outer authentication. Mutual authentication: No. However, EAP-FAST provides server side authentication. Integrity protection: No. However, any method executed within the EAP-FAST tunnel is protected. Replay protection: See above. Confidentiality: See above. Key derivation: Keys are not generated, see Section 2. However, when used inside EAP-FAST, the outer method will provide keys. See [RFC4851] for the properties of those keys. Key strength: Not applicable. Dictionary attack prot.: Yes. Provided by the EAP-FAST Tunnel. Fast reconnect: Yes. Cryptographic binding: Yes. Provided by the EAP-FAST Tunnel. Session independence: Yes. Provided by the EAP-FAST Tunnel. Fragmentation: No. However, EAP-FAST provides support for this. Key Hierarchy: Not applicable. Channel binding: No, though the outer method, EAP-FAST can be extended for this. |
2008-11-02
|
05 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2008-11-02
|
05 | (System) | New version available: draft-zhou-emu-fast-gtc-05.txt |
2008-08-15
|
05 | (System) | Removed from agenda for telechat - 2008-08-14 |
2008-08-14
|
05 | Cindy Morgan | State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Cindy Morgan |
2008-08-14
|
05 | Ross Callon | [Ballot Position Update] New position, No Objection, has been recorded by Ross Callon |
2008-08-14
|
05 | Jari Arkko | [Ballot discuss] This method specification needs to be published.In general, I'm very supportive of documenting the EAP methods that are in use. And my understanding … [Ballot discuss] This method specification needs to be published.In general, I'm very supportive of documenting the EAP methods that are in use. And my understanding is that this particular method is in relatively wide use, and documenting how it works will improve interoperability and openness. However, I have a few concerns with the document as it is currently written. These are fixable, but require a new revision: 1. First, I agree with what Pasi's Discuss says about the type number. However, the issue is actually even more complicated. EAP-GTC was underspecified in RFC 2284. And what do EAP-FAST implementation use as a type number, and can this be changed? Further discussion of this point is needed before we can resolve Pasi's Discuss. 2. Section 2 reference to "additional exchanges" seems underspecified, and I do not understand what I would have to do in my implementation to support this. Please be more specific. 3. Section 2 says '... where Value is the server challenge, such as "please enter your password"' Can you clarify whether there is ever any action that the peer needs to take based on the challenge value, other than to display it to the user? I'm troubled by the use of the term "challenge" whereas your example contains simply a displayed, static message. Clarification on what is expected from the implementations would be welcome here. 4. Security considerations text that is provided is reasonable, but does not contain all parts that RFC 3748 requires from an EAP method definition: see Section 7.2.1 of RFC 3748 and please provide an explanation for each security property listed therein. I realize that the applicability of RFC 3784 rules in this case is somewhat unclear, given that one could argue we are defining a part of another method (EAP-FAST) or merely clarifying another method (EAP-GTC). However, I think the readers would be best served by following the same template as regular method definitions have. |
2008-08-14
|
05 | Jari Arkko | [Ballot discuss] This method specification needs to be published.In general, I'm very supportive of documenting the EAP methods that are use. And my understanding is … [Ballot discuss] This method specification needs to be published.In general, I'm very supportive of documenting the EAP methods that are use. And my understanding is that this particular method is in relatively wide use, and documenting how it works will improve interoperability and openness. However, I have a few concerns with the document as it is currently written. These are fixable, but require a new revision: 1. First, I agree with what Pasi's Discuss says about the type number. However, the issue is actually even more complicated. EAP-GTC was underspecified in RFC 2284. And what do EAP-FAST implementation use as a type number, and can this be changed? Further discussion of this point is needed before we can resolve Pasi's Discuss. 2. Section 2 reference to "additional exchanges" seems underspecified, and I do not understand what I would have to do in my implementation to support this. Please be more specific. 3. Section 2 says '... where Value is the server challenge, such as "please enter your password"' Can you clarify whether there is ever any action that the peer needs to take based on the challenge value, other than to display it to the user? I'm troubled by the use of the term "challenge" whereas your example contains simply a displayed, static message. Clarification on what is expected from the implementations would be welcome here. 4. Security considerations text that is provided is reasonable, but does not contain all parts that RFC 3748 requires from an EAP method definition: see Section 7.2.1 of RFC 3748 and please provide an explanation for each security property listed therein. I realize that the applicability of RFC 3784 rules in this case is somewhat unclear, given that one could argue we are defining a part of another method (EAP-FAST) or merely clarifying another method (EAP-GTC). However, I think the readers would be best served by following the same template as regular method definitions have. |
2008-08-14
|
05 | Jari Arkko | [Ballot Position Update] New position, Discuss, has been recorded by Jari Arkko |
2008-08-14
|
05 | Chris Newman | [Ballot Position Update] Position for Chris Newman has been changed to No Objection from Discuss by Chris Newman |
2008-08-14
|
05 | Chris Newman | [Ballot comment] I support Pasi's discuss. For the point about "appropriate language and charset", I recommend referencing RFC 5198. The same issue applies to … [Ballot comment] I support Pasi's discuss. For the point about "appropriate language and charset", I recommend referencing RFC 5198. The same issue applies to the CHALLENGE=. I'm a bit concerned about having a fixed list of error codes. This was a mistake for SMTP, and sites reject passwords for so many reasons, there's always a new one. However, there are four general classes of client behavior in response to an authentication failure here: 1. re-prompt for username/password. 2. give up, typically inviting user to make a support call 3. change password 4. notify user of temporary service outage, suggest they try again later The distinction between these three can have profound impact on the cost to operate a service. While I can identify (1) - 691, several cases of (2), and (3) - 648, I don't see an error code that means (4). While 646 is a specific sub-case of (4), you need the general case. |
2008-08-14
|
05 | Chris Newman | [Ballot Position Update] New position, Discuss, has been recorded by Chris Newman |
2008-08-13
|
05 | Cullen Jennings | [Ballot Position Update] New position, No Objection, has been recorded by Cullen Jennings |
2008-08-13
|
05 | Ron Bonica | [Ballot Position Update] New position, No Objection, has been recorded by Ron Bonica |
2008-08-12
|
05 | Dan Romascanu | [Ballot Position Update] New position, No Objection, has been recorded by Dan Romascanu |
2008-08-11
|
05 | Pasi Eronen | [Ballot discuss] I think this is a valuable document, as details of how to use EAP with legacy password databases (which everyone does) have so … [Ballot discuss] I think this is a valuable document, as details of how to use EAP with legacy password databases (which everyone does) have so far been documented only in expired internet-drafts and vendor documents. However, I have couple of concerns: This document basically defines a new EAP method, but uses the the EAP Type number for GTC (defined in RFC 3748). As the two methods won't interoperate, they should have different names (maybe "EAP-FAST-GTC"?) and use different numbers (BTW, this doesn't necessarily require IANA allocation; just use Cisco's enterprise code + any number). Section 2 says "The is human-readable text in the appropriate character set and language [RFC2484]" -- this might cover the PPP case (although it introduces a rather complex layer dependency), but doesn't tell what to do when EAP-FAST is used outside PPP (e.g. in 802.1X). In addition, there's couple of places that probably need fixing: The document needs to cite draft-cam-winget-eap-fast-provisioning when it e.g. talks about validating "the user identity with the I-ID in the PAC-Opaque" and "Server-Unauthenticated Provisioning Mode" etc. The packets use "LABEL=Value" format, and the recipient is expected to ignore unknown labels (for future extensibility, presumably). However, there's no text saying how the string is split to "LABEL=Value" pairs (the answer is more complex than "they're separated by spaces", since some of the values can contain spaces -- something like ABNF would be useful here). Should there be IANA Considerations for the Labels? Section 2, "The input should be processed...", upper-case "SHOULD"? Section 2, "the ISK used for crypto-binding for EAP-FAST will be filled with all zeros" -- Description of Crypto-Binding calculation in RFC 4851 (Sections 5.2 and 5.3) doesn't include anything called ISK -- should this say that the MSKi is set to zero? |
2008-08-11
|
05 | Pasi Eronen | [Ballot Position Update] New position, Discuss, has been recorded by Pasi Eronen |
2008-08-11
|
05 | Lars Eggert | [Ballot comment] The document writeup says "This is not the product of any working group. This is part of the ongoing effort to document existing … [Ballot comment] The document writeup says "This is not the product of any working group. This is part of the ongoing effort to document existing deployed EAP methods. The purpose of this document is to publish existing behavior." That doesn't come out in the document at all. I wonder if this should be explicitly called out in the abstract and/or introduction? |
2008-08-11
|
05 | Lars Eggert | [Ballot Position Update] New position, No Objection, has been recorded by Lars Eggert |
2008-07-30
|
05 | Tim Polk | Proto write-up for draft-zhou-emu-fast-gtc-03.txt ------------------------------------------------- (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the document … Proto write-up for draft-zhou-emu-fast-gtc-03.txt ------------------------------------------------- (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the document and, in particular, does he or she believe this version is ready for forwarding to the IESG for publication? I , Joseph Salowey, am the document shepherd for this document. I have reviewed it and I believe it is ready to be forwarded to the IESG for publishing. (1.b) Has the document had adequate review both from key members of the interested community and others? Does the Document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? The document's purpose is to describe existing implementations of the password exchange used within EAP-FAST. The document has been reviewed by various different implementers of the EAP-FAST protocol. Feedback from their review has been used to make clarifications in the document. (1.c) Does the Document Shepherd have concerns that the document needs more review from a particular or broader perspective, e.g., security, operational complexity, someone familiar with AAA, internationalization or XML? No. (1.d) Does the Document Shepherd have any specific concerns or issues with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the interested community has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. No (1.e) How solid is the consensus of the interested community behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the interested community as a whole understand and agree with it? There is interest in the community to document the password protocol used within EAP-FAST. A number of vendors have expressed interest in the publication of this document. In addition other standards organizations such as the WiFi Alliance are interested in referencing the document. (1.f) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is entered into the ID Tracker.) No (1.g) Has the Document Shepherd personally verified that the document satisfies all ID nits? (See http://www.ietf.org/ID-Checklist.html and http://tools.ietf.org/tools/idnits/). Boilerplate checks are not enough; this check needs to be thorough. Has the document met all formal review criteria it needs to, such as the MIB Doctor, media type and URI type reviews? Yes (1.h) Has the document split its references into normative and informative? Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the strategy for their completion? Are there normative references that are downward references, as described in [RFC3967]? If so, list these downward references to support the Area Director in the Last Call procedure for them [RFC3967]. The references are spit and conformant to RFC3967 (1.i) Has the Document Shepherd verified that the document IANA consideration section exists and is consistent with the body of the document? If the document specifies protocol extensions, are reservations requested in appropriate IANA registries? Are the IANA registries clearly identified? If the document creates a new registry, does it define the proposed initial contents of the registry and an allocation procedure for future registrations? Does it suggested a reasonable name for the new registry? See [I-D.narten-iana-considerations-rfc2434bis]. If the document describes an Expert Review process has Shepherd conferred with the Responsible Area Director so that the IESG can appoint the needed Expert during the IESG Evaluation? The IANA considerations section is consistent and complete. (1.j) Has the Document Shepherd verified that sections of the document that are written in a formal language, such as XML code, BNF rules, MIB definitions, etc., validate correctly in an automated checker? Not Applicable (1.k) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Writeup. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary The flexible authentication via secure tunneling EAP method (EAP-FAST) enables secure communication between a peer and a server by using Transport Layer Security (TLS) to establish a mutually authenticated tunnel. Within this tunnel a basic password exchange, based on the generic token card method (EAP-GTC), may be executed to authenticate the peer. Working Group Summary This is part of the ongoing effort to document existing deployed EAP methods. The purpose of this document is to publish existing behavior and it is therefore not part of a working group effort. Document Quality There are multiple implementations of EAP-FAST password exchange from different vendors that interoperate. A number of implementers have reviewed this specification. |
2008-07-30
|
05 | Tim Polk | [Ballot Position Update] New position, Yes, has been recorded for Tim Polk |
2008-07-30
|
05 | Tim Polk | Ballot has been issued by Tim Polk |
2008-07-30
|
05 | Tim Polk | Created "Approve" ballot |
2008-07-30
|
05 | Tim Polk | State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Tim Polk |
2008-07-30
|
05 | Tim Polk | Placed on agenda for telechat - 2008-08-14 by Tim Polk |
2008-07-30
|
04 | (System) | New version available: draft-zhou-emu-fast-gtc-04.txt |
2008-07-09
|
05 | Samuel Weiler | Request for Last Call review by SECDIR Completed. Reviewer: Phillip Hallam-Baker. |
2008-07-03
|
05 | (System) | State has been changed to Waiting for AD Go-Ahead from In Last Call by system |
2008-06-30
|
05 | Amanda Baber | IANA Last Call comments: Upon approval of this document, IANA will create the following registry at http://www.iana.org/assignments/TBD: Registry Name: EAP-GTC Error Codes Reference: [RFC-zhou-emu-fast-gtc-03] Registration … IANA Last Call comments: Upon approval of this document, IANA will create the following registry at http://www.iana.org/assignments/TBD: Registry Name: EAP-GTC Error Codes Reference: [RFC-zhou-emu-fast-gtc-03] Registration Procedure: Specification Required Registry: code | Error Name | Reference 0-645 |Unassigned 646 | ERROR_RESTRICTED_LOGON_HOURS | [RFC-zhou-emu-fast-gtc-03] 647 | ERROR_ACCT_DISABLED | [RFC-zhou-emu-fast-gtc-03] 648 | ERROR_PASSWD_EXPIRED | [RFC-zhou-emu-fast-gtc-03] 649 | ERROR_NO_DIALIN_PERMISSION | [RFC-zhou-emu-fast-gtc-03] 650-690 | Unassigned 691 | ERROR_AUTHENTICATION_FAILURE | [RFC-zhou-emu-fast-gtc-03] 692-708 | Unassigned 709 | ERROR_CHANGING_PASSWORD | [RFC-zhou-emu-fast-gtc-03] 710-754 | Unassigned 755 | ERROR_PAC_I-ID-NO_MATCH | [RFC-zhou-emu-fast-gtc-03] 756-999999999| Unassigned We understand the above to be the only IANA Actions for this document. |
2008-06-06
|
05 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Phillip Hallam-Baker |
2008-06-06
|
05 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Phillip Hallam-Baker |
2008-06-05
|
05 | Cindy Morgan | Last call sent |
2008-06-05
|
05 | Cindy Morgan | State Changes to In Last Call from Last Call Requested by Cindy Morgan |
2008-06-05
|
05 | Tim Polk | Last Call was requested by Tim Polk |
2008-06-05
|
05 | Tim Polk | State Changes to Last Call Requested from Publication Requested by Tim Polk |
2008-06-05
|
05 | (System) | Ballot writeup text was added |
2008-06-05
|
05 | (System) | Last call text was added |
2008-06-05
|
05 | (System) | Ballot approval text was added |
2008-04-08
|
05 | Cindy Morgan | State Changes to Publication Requested from AD is watching by Cindy Morgan |
2008-04-08
|
05 | Cindy Morgan | Proto write-up for draft-zhou-emu-fast-gtc-03.txt ------------------------------------------------- (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the document … Proto write-up for draft-zhou-emu-fast-gtc-03.txt ------------------------------------------------- (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the document and, in particular, does he or she believe this version is ready for forwarding to the IESG for publication? I , Joseph Salowey, am the document shepherd for this document. I have reviewed it and I believe it is ready to be forwarded to the IESG for publishing. (1.b) Has the document had adequate review both from key members of the interested community and others? Does the Document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? The document's purpose is to describe existing implementations of the password exchange used within EAP-FAST. The document has been reviewed by various different implementers of the EAP-FAST protocol. Feedback from their review has been used to make clarifications in the document. (1.c) Does the Document Shepherd have concerns that the document needs more review from a particular or broader perspective, e.g., security, operational complexity, someone familiar with AAA, internationalization or XML? No. (1.d) Does the Document Shepherd have any specific concerns or issues with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the interested community has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. No (1.e) How solid is the consensus of the interested community behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the interested community as a whole understand and agree with it? There is interest in the community to document the password protocol used within EAP-FAST. A number of vendors have expressed interest in the publication of this document. In addition other standards organizations such as the WiFi Alliance are interested in referencing the document. (1.f) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is entered into the ID Tracker.) No (1.g) Has the Document Shepherd personally verified that the document satisfies all ID nits? (See http://www.ietf.org/ID-Checklist.html and http://tools.ietf.org/tools/idnits/). Boilerplate checks are not enough; this check needs to be thorough. Has the document met all formal review criteria it needs to, such as the MIB Doctor, media type and URI type reviews? Yes (1.h) Has the document split its references into normative and informative? Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the strategy for their completion? Are there normative references that are downward references, as described in [RFC3967]? If so, list these downward references to support the Area Director in the Last Call procedure for them [RFC3967]. The references are spit and conformant to RFC3967 (1.i) Has the Document Shepherd verified that the document IANA consideration section exists and is consistent with the body of the document? If the document specifies protocol extensions, are reservations requested in appropriate IANA registries? Are the IANA registries clearly identified? If the document creates a new registry, does it define the proposed initial contents of the registry and an allocation procedure for future registrations? Does it suggested a reasonable name for the new registry? See [I-D.narten-iana-considerations-rfc2434bis]. If the document describes an Expert Review process has Shepherd conferred with the Responsible Area Director so that the IESG can appoint the needed Expert during the IESG Evaluation? The IANA considerations section is consistent and complete. (1.j) Has the Document Shepherd verified that sections of the document that are written in a formal language, such as XML code, BNF rules, MIB definitions, etc., validate correctly in an automated checker? Not Applicable (1.k) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Writeup. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary The flexible authentication via secure tunneling EAP method (EAP-FAST) enables secure communication between a peer and a server by using Transport Layer Security (TLS) to establish a mutually authenticated tunnel. Within this tunnel a basic password exchange, based on the generic token card method (EAP-GTC), may be executed to authenticate the peer. Working Group Summary This is part of the ongoing effort to document existing deployed EAP methods. The purpose of this document is to publish existing behavior and it is therefore not part of a working group effort. Document Quality There are multiple implementations of EAP-FAST password exchange from different vendors that interoperate. A number of implementers have reviewed this specification. |
2008-04-04
|
03 | (System) | New version available: draft-zhou-emu-fast-gtc-03.txt |
2008-03-24
|
02 | (System) | New version available: draft-zhou-emu-fast-gtc-02.txt |
2008-02-25
|
01 | (System) | New version available: draft-zhou-emu-fast-gtc-01.txt |
2007-12-06
|
05 | Tim Polk | State Changes to AD is watching from Publication Requested by Tim Polk |
2007-12-06
|
05 | Tim Polk | Draft Added by Tim Polk in state Publication Requested |
2007-08-28
|
00 | (System) | New version available: draft-zhou-emu-fast-gtc-00.txt |