<?xml version="1.0" encoding="UTF-8"?>
<reference anchor="I-D.puthenkulam-eap-binding" target="https://datatracker.ietf.org/doc/html/draft-puthenkulam-eap-binding-04">
   <front>
      <title>The Compound Authentication Binding Problem</title>
      <author initials="J." surname="Puthenkulam" fullname="Jose Puthenkulam">
         <organization>Intel Corporation</organization>
      </author>
      <date month="October" day="27" year="2003" />
      <abstract>
	 <t>There are several motivations for using compound authentication methods
using tunnels, but man-in-the-middle attacks have been found in these
protocols under certain circumstances. They occur when the inner 
methods used inside a tunnel method are also used outside it, without
cryptographically binding the methods together. At the time of writing 
this document, several protocols being proposed within the IETF were 
vulnerable to these attacks, including IKE with XAUTH, PIC, PANA over 
TLS, EAP TTLS and PEAP. This document studies the problems and suggests 
potential solutions to mitigate them. We also provide a reference 
solution for an EAP tunneling protocol like PEAP.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-puthenkulam-eap-binding-04" />
   
</reference>
