[HOKEY] Document Action: 'Handover Keying (HOKEY) Architecture Design' to Informational RFC (draft-ietf-hokey-arch-design-11.txt)

The IESG <iesg-secretary@ietf.org> Fri, 13 January 2012 15:33 UTC

Return-Path: <iesg-secretary@ietf.org>
X-Original-To: hokey@ietfa.amsl.com
Delivered-To: hokey@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0F62C21F85A5; Fri, 13 Jan 2012 07:33:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.507
X-Spam-Level:
X-Spam-Status: No, score=-102.507 tagged_above=-999 required=5 tests=[AWL=0.092, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HsXTslHxxH19; Fri, 13 Jan 2012 07:33:06 -0800 (PST)
Received: from ietfa.amsl.com (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 53BF821F85A8; Fri, 13 Jan 2012 07:33:06 -0800 (PST)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce <ietf-announce@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 3.64p1
Message-ID: <20120113153306.6041.70944.idtracker@ietfa.amsl.com>
Date: Fri, 13 Jan 2012 07:33:06 -0800
Cc: hokey chair <hokey-chairs@tools.ietf.org>, hokey mailing list <hokey@ietf.org>, RFC Editor <rfc-editor@rfc-editor.org>
Subject: [HOKEY] Document Action: 'Handover Keying (HOKEY) Architecture Design' to Informational RFC (draft-ietf-hokey-arch-design-11.txt)
X-BeenThere: hokey@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: HOKEY WG Mailing List <hokey.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hokey>, <mailto:hokey-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/hokey>
List-Post: <mailto:hokey@ietf.org>
List-Help: <mailto:hokey-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hokey>, <mailto:hokey-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 13 Jan 2012 15:33:07 -0000

The IESG has approved the following document:
- 'Handover Keying (HOKEY) Architecture Design'
  (draft-ietf-hokey-arch-design-11.txt) as an Informational RFC

This document is the product of the Handover Keying Working Group.

The IESG contact persons are Stephen Farrell and Sean Turner.

A URL of this Internet Draft is:
http://datatracker.ietf.org/doc/draft-ietf-hokey-arch-design/




Technical Summary

   The Handover Keying (HOKEY) Working Group seeks to minimize handover
   delay due to authentication when a peer moves from one point of
   attachment to another.  Work has been progressed on two different
   approaches to reduce handover delay: early authentication (so that
   authentication does not need to be performed during handover), and
   reuse of cryptographic material generated during an initial
   authentication to save time during re-authentication.  A starting
   assumption is that the mobile host or "peer" is initially
   authenticated using the Extensible Authentication Protocol (EAP),
   executed between the peer and an EAP server as defined in RFC 3748.

   This document specifies the HOKEY architecture.  Specifically, it
   describes design objectives, the functional environment within which
   handover keying operates, the functions to be performed by the HOKEY
   architecture itself, and the assignment of those functions to
   architectural components.  It goes on to illustrate the operation of
   the architecture within various deployment scenarios that are
   described more fully in other documents produced by the HOKEY Working
   Group.

Working Group Summary

     The document is a product of the Hokey working group. The document has 
      working group consensus.

Document Quality
       The document provides the guideline for implementors to use different functions, components and protocol
       summarized in this document to adapt to different usage scenarios 
       and situations and is therefore not subject to implementation.
       Also this document has gotten sufficient review from people with both
       OPS and Security background. The quality of the document is good.

Personnel

     Tina Tsou is the document shepherd
     Stephen Farrell is the responsible AD.