[HOKEY] I-D Action: draft-ietf-hokey-erp-aak-07.txt
internet-drafts@ietf.org Tue, 17 January 2012 07:08 UTC
Return-Path: <internet-drafts@ietf.org>
X-Original-To: hokey@ietfa.amsl.com
Delivered-To: hokey@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A232321F8600; Mon, 16 Jan 2012 23:08:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.567
X-Spam-Level:
X-Spam-Status: No, score=-102.567 tagged_above=-999 required=5 tests=[AWL=0.032, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JnlJS0sgMBiO; Mon, 16 Jan 2012 23:08:22 -0800 (PST)
Received: from ietfa.amsl.com (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B316521F85EF; Mon, 16 Jan 2012 23:08:01 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 3.64p1
Message-ID: <20120117070801.32246.83927.idtracker@ietfa.amsl.com>
Date: Mon, 16 Jan 2012 23:08:01 -0800
Cc: hokey@ietf.org
Subject: [HOKEY] I-D Action: draft-ietf-hokey-erp-aak-07.txt
X-BeenThere: hokey@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: HOKEY WG Mailing List <hokey.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hokey>, <mailto:hokey-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/hokey>
List-Post: <mailto:hokey@ietf.org>
List-Help: <mailto:hokey-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hokey>, <mailto:hokey-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Jan 2012 07:08:24 -0000
A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Handover Keying Working Group of the IETF. Title : EAP Re-authentication Protocol Extensions for Authenticated Anticipatory Keying (ERP/AAK) Author(s) : Zhen Cao Hui Deng Qin Wu Glen Zorn Filename : draft-ietf-hokey-erp-aak-07.txt Pages : 18 Date : 2012-01-16 The Extensible Authentication Protocol (EAP) is a generic framework supporting multiple types of authentication methods. The EAP Re-authentication Protocol (ERP) specifies extensions to EAP and the EAP keying hierarchy to support an EAP method-independent protocol for efficient re-authentication between the peer and an EAP re-authentication server through any authenticator. Authenticated Anticipatory Keying (AAK) is a method by which cryptographic keying material may be established upon one or more candidate attachment points (CAPs) prior to handover. AAK uses the AAA infrastructure for key transport. This document specifies the extensions necessary to enable AAK support in ERP. A URL for this Internet-Draft is: http://www.ietf.org/internet-drafts/draft-ietf-hokey-erp-aak-07.txt Internet-Drafts are also available by anonymous FTP at: ftp://ftp.ietf.org/internet-drafts/ This Internet-Draft can be retrieved at: ftp://ftp.ietf.org/internet-drafts/draft-ietf-hokey-erp-aak-07.txt
- [HOKEY] I-D Action: draft-ietf-hokey-erp-aak-07.t… internet-drafts