[HOKEY] I-D Action: draft-ietf-hokey-erp-aak-09.txt

internet-drafts@ietf.org Sun, 12 February 2012 11:01 UTC

Return-Path: <internet-drafts@ietf.org>
X-Original-To: hokey@ietfa.amsl.com
Delivered-To: hokey@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2980D21F861D; Sun, 12 Feb 2012 03:01:28 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.584
X-Spam-Level:
X-Spam-Status: No, score=-102.584 tagged_above=-999 required=5 tests=[AWL=0.015, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KFMt--oUF+Ei; Sun, 12 Feb 2012 03:01:27 -0800 (PST)
Received: from ietfa.amsl.com (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E67BF21F85B9; Sun, 12 Feb 2012 03:01:08 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 3.64p1
Message-ID: <20120212110108.11084.10493.idtracker@ietfa.amsl.com>
Date: Sun, 12 Feb 2012 03:01:08 -0800
Cc: hokey@ietf.org
Subject: [HOKEY] I-D Action: draft-ietf-hokey-erp-aak-09.txt
X-BeenThere: hokey@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: HOKEY WG Mailing List <hokey.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hokey>, <mailto:hokey-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/hokey>
List-Post: <mailto:hokey@ietf.org>
List-Help: <mailto:hokey-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hokey>, <mailto:hokey-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 12 Feb 2012 11:01:28 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Handover Keying Working Group of the IETF.

	Title           : EAP Re-authentication Protocol Extensions for Authenticated Anticipatory Keying (ERP/AAK)
	Author(s)       : Zhen Cao
                          Hui Deng
                          Qin Wu
                          Glen Zorn
	Filename        : draft-ietf-hokey-erp-aak-09.txt
	Pages           : 19
	Date            : 2012-02-12

   The Extensible Authentication Protocol (EAP) is a generic framework
   supporting multiple types of authentication methods.

   The EAP Re-authentication Protocol (ERP) specifies extensions to EAP
   and the EAP keying hierarchy to support an EAP method-independent
   protocol for efficient re-authentication between the peer and an EAP
   re-authentication server through any authenticator.

   Authenticated Anticipatory Keying (AAK) is a method by which
   cryptographic keying material may be established upon one or more
   candidate attachment points (CAPs) prior to handover.  AAK uses the
   AAA infrastructure for key transport.

   This document specifies the extensions necessary to enable AAK
   support in ERP.


A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-hokey-erp-aak-09.txt

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

This Internet-Draft can be retrieved at:
ftp://ftp.ietf.org/internet-drafts/draft-ietf-hokey-erp-aak-09.txt