[HOKEY] Last Call: <draft-ietf-hokey-erp-aak-07.txt> (EAP Re-authentication Protocol Extensions for Authenticated Anticipatory Keying (ERP/AAK)) to Proposed Standard
The IESG <iesg-secretary@ietf.org> Tue, 24 January 2012 14:44 UTC
Return-Path: <iesg-secretary@ietf.org>
X-Original-To: hokey@ietfa.amsl.com
Delivered-To: hokey@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0510121F8591; Tue, 24 Jan 2012 06:44:05 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level:
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hEoIuSg6TBza; Tue, 24 Jan 2012 06:44:04 -0800 (PST)
Received: from ietfa.amsl.com (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 865CA21F8518; Tue, 24 Jan 2012 06:44:04 -0800 (PST)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce <ietf-announce@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 3.64p1
Message-ID: <20120124144404.29850.62472.idtracker@ietfa.amsl.com>
Date: Tue, 24 Jan 2012 06:44:04 -0800
Cc: hokey@ietf.org
Subject: [HOKEY] Last Call: <draft-ietf-hokey-erp-aak-07.txt> (EAP Re-authentication Protocol Extensions for Authenticated Anticipatory Keying (ERP/AAK)) to Proposed Standard
X-BeenThere: hokey@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: ietf@ietf.org
List-Id: HOKEY WG Mailing List <hokey.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hokey>, <mailto:hokey-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/hokey>
List-Post: <mailto:hokey@ietf.org>
List-Help: <mailto:hokey-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hokey>, <mailto:hokey-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 24 Jan 2012 14:44:05 -0000
The IESG has received a request from the Handover Keying WG (hokey) to consider the following document: - 'EAP Re-authentication Protocol Extensions for Authenticated Anticipatory Keying (ERP/AAK)' <draft-ietf-hokey-erp-aak-07.txt> as a Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2012-02-07. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract The Extensible Authentication Protocol (EAP) is a generic framework supporting multiple types of authentication methods. The EAP Re-authentication Protocol (ERP) specifies extensions to EAP and the EAP keying hierarchy to support an EAP method-independent protocol for efficient re-authentication between the peer and an EAP re-authentication server through any authenticator. Authenticated Anticipatory Keying (AAK) is a method by which cryptographic keying material may be established upon one or more candidate attachment points (CAPs) prior to handover. AAK uses the AAA infrastructure for key transport. This document specifies the extensions necessary to enable AAK support in ERP. The file can be obtained via http://datatracker.ietf.org/doc/draft-ietf-hokey-erp-aak/ IESG discussion can be tracked via http://datatracker.ietf.org/doc/draft-ietf-hokey-erp-aak/ The following IPR Declarations may be related to this I-D: http://datatracker.ietf.org/ipr/1450/