[Ace] I-D Action: draft-ietf-ace-wg-coap-eap-03.txt

internet-drafts@ietf.org Mon, 26 July 2021 08:02 UTC

Return-Path: <internet-drafts@ietf.org>
X-Original-To: ace@ietf.org
Delivered-To: ace@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id C99563A200B; Mon, 26 Jul 2021 01:02:23 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: ace@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 7.35.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: ace@ietf.org
Message-ID: <162728654375.9525.17516602446192021203@ietfa.amsl.com>
Date: Mon, 26 Jul 2021 01:02:23 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/ace/HcJzXimMSTFNOI8yzki4IEAyA0k>
Subject: [Ace] I-D Action: draft-ietf-ace-wg-coap-eap-03.txt
X-BeenThere: ace@ietf.org
X-Mailman-Version: 2.1.29
List-Id: "Authentication and Authorization for Constrained Environments \(ace\)" <ace.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ace>, <mailto:ace-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ace/>
List-Post: <mailto:ace@ietf.org>
List-Help: <mailto:ace-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ace>, <mailto:ace-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 26 Jul 2021 08:02:24 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Authentication and Authorization for Constrained Environments WG of the IETF.

        Title           : EAP-based Authentication Service for CoAP
        Authors         : Rafa Marin-Lopez
                          Dan Garcia-Carrillo
	Filename        : draft-ietf-ace-wg-coap-eap-03.txt
	Pages           : 27
	Date            : 2021-07-26

   This document specifies an authentication service that uses the
   Extensible Authentication Protocol (EAP) transported employing
   Constrained Application Protocol (CoAP) messages.  As such, it
   defines an EAP lower-layer based on CoAP called CoAP-EAP.  One of the
   primer goals is to authenticate a CoAP-enabled device (EAP peer) that
   intends to join a security domain managed by a domain Controller (EAP
   authenticator).  Secondly, it allows deriving key material to protect
   CoAP messages exchanged between them based on Object Security for
   Constrained RESTful Environments (OSCORE), enabling the establishment
   of a security association between them.  This document also provides
   guidelines on how to generate key material for other types of
   security associations.

The IETF datatracker status page for this draft is:

There is also an htmlized version available at:

A diff from the previous version is available at:

Internet-Drafts are also available by anonymous FTP at: