[HOKEY] Last Call: <draft-ietf-hokey-erp-aak-07.txt> (EAP Re-authentication Protocol Extensions for Authenticated Anticipatory Keying (ERP/AAK)) to Proposed Standard

The IESG <iesg-secretary@ietf.org> Tue, 24 January 2012 14:44 UTC

Return-Path: <iesg-secretary@ietf.org>
X-Original-To: hokey@ietfa.amsl.com
Delivered-To: hokey@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0510121F8591; Tue, 24 Jan 2012 06:44:05 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level:
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hEoIuSg6TBza; Tue, 24 Jan 2012 06:44:04 -0800 (PST)
Received: from ietfa.amsl.com (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 865CA21F8518; Tue, 24 Jan 2012 06:44:04 -0800 (PST)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce <ietf-announce@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 3.64p1
Message-ID: <20120124144404.29850.62472.idtracker@ietfa.amsl.com>
Date: Tue, 24 Jan 2012 06:44:04 -0800
Cc: hokey@ietf.org
Subject: [HOKEY] Last Call: <draft-ietf-hokey-erp-aak-07.txt> (EAP Re-authentication Protocol Extensions for Authenticated Anticipatory Keying (ERP/AAK)) to Proposed Standard
X-BeenThere: hokey@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: ietf@ietf.org
List-Id: HOKEY WG Mailing List <hokey.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hokey>, <mailto:hokey-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/hokey>
List-Post: <mailto:hokey@ietf.org>
List-Help: <mailto:hokey-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hokey>, <mailto:hokey-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 24 Jan 2012 14:44:05 -0000

The IESG has received a request from the Handover Keying WG (hokey) to
consider the following document:
- 'EAP Re-authentication Protocol Extensions for Authenticated
   Anticipatory Keying (ERP/AAK)'
  <draft-ietf-hokey-erp-aak-07.txt> as a Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2012-02-07. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


   The Extensible Authentication Protocol (EAP) is a generic framework
   supporting multiple types of authentication methods.

   The EAP Re-authentication Protocol (ERP) specifies extensions to EAP
   and the EAP keying hierarchy to support an EAP method-independent
   protocol for efficient re-authentication between the peer and an EAP
   re-authentication server through any authenticator.

   Authenticated Anticipatory Keying (AAK) is a method by which
   cryptographic keying material may be established upon one or more
   candidate attachment points (CAPs) prior to handover.  AAK uses the
   AAA infrastructure for key transport.

   This document specifies the extensions necessary to enable AAK
   support in ERP.




The file can be obtained via
http://datatracker.ietf.org/doc/draft-ietf-hokey-erp-aak/

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-ietf-hokey-erp-aak/


The following IPR Declarations may be related to this I-D:

   http://datatracker.ietf.org/ipr/1450/