[HOKEY] Fwd: I-D Action:draft-ietf-hokey-erp-aak-04.txt

Zhen Cao <zehn.cao@gmail.com> Mon, 14 March 2011 13:21 UTC

Return-Path: <zehn.cao@gmail.com>
X-Original-To: hokey@core3.amsl.com
Delivered-To: hokey@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 8B1FA3A6D53 for <hokey@core3.amsl.com>; Mon, 14 Mar 2011 06:21:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.839
X-Spam-Level:
X-Spam-Status: No, score=-3.839 tagged_above=-999 required=5 tests=[AWL=-0.240, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qBiIuSQXt8sr for <hokey@core3.amsl.com>; Mon, 14 Mar 2011 06:21:53 -0700 (PDT)
Received: from mail-iw0-f172.google.com (mail-iw0-f172.google.com [209.85.214.172]) by core3.amsl.com (Postfix) with ESMTP id DF9293A6D3E for <hokey@ietf.org>; Mon, 14 Mar 2011 06:21:52 -0700 (PDT)
Received: by iwl42 with SMTP id 42so6120482iwl.31 for <hokey@ietf.org>; Mon, 14 Mar 2011 06:23:16 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:in-reply-to:references:date :message-id:subject:from:to:content-type:content-transfer-encoding; bh=+S4Xiy0YMu/9hhTr973Hry+cT8Oa/tJIQal9g1BqC+E=; b=lu81S6Cf9+5VbTmgJOf3uFA0Oan0Q5a+pPTEYzC8v3vHe91rXjcyQ5mwhPqPksIXD0 CaEfGxK7f1B4gnZwAeIIV1k5qfAHTS/Xqn6veEIHmtEnAF12kdmLmpxEXtHFeuLw+Scn 3RsAMf3DkEcWKXYS7qXKQ1+qK94mpK7gel89k=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type:content-transfer-encoding; b=unL6KxV9a/TTpwxQrmfZOlNT8bc6gvT8SINMM1BhxzZY/SscFH8R0AD8vC3tEXt+bG To1cHgxAkwu06lpaGoxhYT89jsSz/FO7a3NxzslQScxeARG+vDNEWxe9aC24fkmQhcg3 QgMyFT0dC4lJ6W66JFG1Z36aLmH+q/Mf71eBE=
MIME-Version: 1.0
Received: by 10.43.58.206 with SMTP id wl14mr6878823icb.2.1300108996244; Mon, 14 Mar 2011 06:23:16 -0700 (PDT)
Received: by 10.42.136.130 with HTTP; Mon, 14 Mar 2011 06:23:16 -0700 (PDT)
In-Reply-To: <20110314070002.2810.48666.idtracker@localhost>
References: <20110314070002.2810.48666.idtracker@localhost>
Date: Mon, 14 Mar 2011 21:23:16 +0800
Message-ID: <AANLkTi=jGcq6+aiHOQckwCcQRQ2j=Pa9aJcprLOSej+G@mail.gmail.com>
From: Zhen Cao <zehn.cao@gmail.com>
To: hokey@ietf.org
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
Subject: [HOKEY] Fwd: I-D Action:draft-ietf-hokey-erp-aak-04.txt
X-BeenThere: hokey@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: HOKEY WG Mailing List <hokey.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/hokey>, <mailto:hokey-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/hokey>
List-Post: <mailto:hokey@ietf.org>
List-Help: <mailto:hokey-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hokey>, <mailto:hokey-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Mar 2011 13:21:54 -0000

---------- Forwarded message ----------
From:  <Internet-Drafts@ietf.org>
Date: Mon, Mar 14, 2011 at 3:00 PM
Subject: [HOKEY] I-D Action:draft-ietf-hokey-erp-aak-04.txt
To: i-d-announce@ietf.org
Cc: hokey@ietf.org


A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Handover Keying Working Group of the IETF.


       Title           : EAP Re-authentication Protocol Extensions for
Authenticated Anticipatory Keying (ERP/AAK)
       Author(s)       : Z. Cao, et al.
       Filename        : draft-ietf-hokey-erp-aak-04.txt
       Pages           : 15
       Date            : 2011-03-13

The Extensible Authentication Protocol (EAP) is a generic framework
supporting multiple of authentication methods.

The EAP Re-authentication Protocol (ERP) specifies extensions to EAP
and the EAP keying hierarchy to support an EAP method-independent
protocol for efficient re-authentication between the peer and an EAP
re-authentication server through any authenticator.

Authenticated Anticipatory Keying (AAK) is a method by which
cryptographic keying material may be established prior to handover
upon one or more candidate attachment points (CAPs).  AAK uses the
AAA infrastructure for key transport.

This document specifies the extensions necessary to enable AAK
support in ERP.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-hokey-erp-aak-04.txt

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.


_______________________________________________
HOKEY mailing list
HOKEY@ietf.org
https://www.ietf.org/mailman/listinfo/hokey




-- 
Best regards,
Zhen