70 likes | 87 Views
EAP State Machines (draft-ietf-eap-statemachine-04). John Vollbrecht, Pasi Eronen, Nick Petroni, Yoshihiro Ohba. Status. 2nd WGLC ended on March 8th Minor changes incorporated in -03 IETF last call ended on May 13th Approved as informational by IESG on June 1st. Status, part 2.
E N D
EAP State Machines(draft-ietf-eap-statemachine-04) John Vollbrecht, Pasi Eronen, Nick Petroni, Yoshihiro Ohba EAP WG, IETF 60
Status • 2nd WGLC ended on March 8th • Minor changes incorporated in -03 • IETF last call ended on May 13th • Approved as informational by IESG on June 1st EAP WG, IETF 60
Status, part 2 • Since then, several issues contributed by Florent Bersani • 247 and 251: Editorial comments • Handled in –04 • 250: Technical comments and requests for clarification • Some things clarified in –04 • Comment #12 included in 251 • 251: next slide… EAP WG, IETF 60
Issue 251 part 1: 1X-REV • 1X-REV sends canned success/failure if port status is administratively changed • These are not really part of an EAP conversation, but use 802.1X EAPOL frames • Perhaps using eapolLogoff would have been better, but too late to change now • Conclusion: no action required? EAP WG, IETF 60
Issue 251 part 2: peer • Success and Failure following EAP Identity Request/Response exchange are allowed in RFC3748 • And even mentioned explicitly in an example about guest access • The peer can, of course, have a policy requiring authentication of the server • The state machine allows this • Conclusion: no changes required? EAP WG, IETF 60
Issue 251 part 3: authenticator • Authenticator state machine does not explicitly prohibit canned messages. • Proposed change: “Policy.getDecision MUST comply with RFC3748 restrictions about canned Success and Failure messages.” • There’s similar text at Policy.getNextMethod about method sequences • This could be viewed as a minor clarification that can be done at AUTH48 EAP WG, IETF 60
Next steps • Publish this as RFC • PostScript/PDF version requires some work by the authors EAP WG, IETF 60