[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

EAP Handling in IKEv2



Dear all,



in Section 2.16 you mention the mechanism for protecting against
man-in-the-middle attacks:

" For EAP methods that create a shared key as a side effect of

authentication, that shared key MUST be used by both the Initiator

and Responder to generate an AUTH payload using the syntax for shared

secrets specified in section 2.15. This shared key MUST NOT be used

for any other purpose.

"

This covers the case where the EAP method establishes a session key.

Which procedure do you suggest for cases where EAP methods do not create a
session key such as the One-Time Password (OTP)?



Ciao

Hannes