[HOKEY] Document Action: 'Handover Keying (HOKEY) Architecture Design' to Informational RFC (draft-ietf-hokey-arch-design-11.txt)
The IESG <iesg-secretary@ietf.org> Fri, 13 January 2012 15:33 UTC
Return-Path: <iesg-secretary@ietf.org>
X-Original-To: hokey@ietfa.amsl.com
Delivered-To: hokey@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0F62C21F85A5; Fri, 13 Jan 2012 07:33:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.507
X-Spam-Level:
X-Spam-Status: No, score=-102.507 tagged_above=-999 required=5 tests=[AWL=0.092, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HsXTslHxxH19; Fri, 13 Jan 2012 07:33:06 -0800 (PST)
Received: from ietfa.amsl.com (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 53BF821F85A8; Fri, 13 Jan 2012 07:33:06 -0800 (PST)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce <ietf-announce@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 3.64p1
Message-ID: <20120113153306.6041.70944.idtracker@ietfa.amsl.com>
Date: Fri, 13 Jan 2012 07:33:06 -0800
Cc: hokey chair <hokey-chairs@tools.ietf.org>, hokey mailing list <hokey@ietf.org>, RFC Editor <rfc-editor@rfc-editor.org>
Subject: [HOKEY] Document Action: 'Handover Keying (HOKEY) Architecture Design' to Informational RFC (draft-ietf-hokey-arch-design-11.txt)
X-BeenThere: hokey@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: HOKEY WG Mailing List <hokey.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hokey>, <mailto:hokey-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/hokey>
List-Post: <mailto:hokey@ietf.org>
List-Help: <mailto:hokey-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hokey>, <mailto:hokey-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 13 Jan 2012 15:33:07 -0000
The IESG has approved the following document: - 'Handover Keying (HOKEY) Architecture Design' (draft-ietf-hokey-arch-design-11.txt) as an Informational RFC This document is the product of the Handover Keying Working Group. The IESG contact persons are Stephen Farrell and Sean Turner. A URL of this Internet Draft is: http://datatracker.ietf.org/doc/draft-ietf-hokey-arch-design/ Technical Summary The Handover Keying (HOKEY) Working Group seeks to minimize handover delay due to authentication when a peer moves from one point of attachment to another. Work has been progressed on two different approaches to reduce handover delay: early authentication (so that authentication does not need to be performed during handover), and reuse of cryptographic material generated during an initial authentication to save time during re-authentication. A starting assumption is that the mobile host or "peer" is initially authenticated using the Extensible Authentication Protocol (EAP), executed between the peer and an EAP server as defined in RFC 3748. This document specifies the HOKEY architecture. Specifically, it describes design objectives, the functional environment within which handover keying operates, the functions to be performed by the HOKEY architecture itself, and the assignment of those functions to architectural components. It goes on to illustrate the operation of the architecture within various deployment scenarios that are described more fully in other documents produced by the HOKEY Working Group. Working Group Summary The document is a product of the Hokey working group. The document has working group consensus. Document Quality The document provides the guideline for implementors to use different functions, components and protocol summarized in this document to adapt to different usage scenarios and situations and is therefore not subject to implementation. Also this document has gotten sufficient review from people with both OPS and Security background. The quality of the document is good. Personnel Tina Tsou is the document shepherd Stephen Farrell is the responsible AD.