Protocol Action: 'Distribution of EAP based keys for handover and re-authentication' to Proposed Standard

The IESG <iesg-secretary@ietf.org> Tue, 08 December 2009 16:01 UTC

Return-Path: <wwwrun@core3.amsl.com>
X-Original-To: ietf-announce@ietf.org
Delivered-To: ietf-announce@core3.amsl.com
Received: by core3.amsl.com (Postfix, from userid 30) id EA98228C152; Tue, 8 Dec 2009 08:01:45 -0800 (PST)
X-idtracker: yes
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce <ietf-announce@ietf.org>
Subject: Protocol Action: 'Distribution of EAP based keys for handover and re-authentication' to Proposed Standard
Message-Id: <20091208160145.EA98228C152@core3.amsl.com>
Date: Tue, 08 Dec 2009 08:01:45 -0800
Cc: hokey chair <hokey-chairs@tools.ietf.org>, Internet Architecture Board <iab@iab.org>, hokey mailing list <hokey@ietf.org>, RFC Editor <rfc-editor@rfc-editor.org>
X-BeenThere: ietf-announce@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "IETF announcement list. No discussions." <ietf-announce.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ietf-announce>, <mailto:ietf-announce-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf-announce>
List-Post: <mailto:ietf-announce@ietf.org>
List-Help: <mailto:ietf-announce-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf-announce>, <mailto:ietf-announce-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 08 Dec 2009 16:01:46 -0000

The IESG has approved the following document:

- 'Distribution of EAP based keys for handover and re-authentication '
   <draft-ietf-hokey-key-mgm-13.txt> as a Proposed Standard


This document is the product of the Handover Keying Working Group. 

The IESG contact persons are Tim Polk and Pasi Eronen.

A URL of this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-hokey-key-mgm-13.txt

Technical Summary

    This document describes a mechanism for delivering root keys from an
    Extensible Authentication Protocol (EAP) server to another network
    server that requires the keys for offering security protected
    services, such as re-authentication, to an EAP peer.  The distributed
    root key can be either a usage-specific root key (USRK), a domain-
    specific root key (DSRK) or a domain-specific usage-specific root key
    (DSUSRK) that has been derived from an Extended Master Session Key
    (EMSK) hierarchy previously established between the EAP server and an
    EAP peer.  The document defines a key distribution exchange (KDE)
    protocol that can distribute these different types of root keys over
    AAA and discusses its security requirements.

Working Group Summary

    The hokey WG has reviewed the document without particular
controversy.

Document Quality

    The document is of high quality and well written.


Personnel

   Glen Zorn is the Document Shepherd; Tim Polk is the 
   Responsible Area Director.