RFC 5281 on Extensible Authentication Protocol Tunneled Transport Layer Security Authenticated Protocol Version 0 (EAP-TTLSv0)

rfc-editor@rfc-editor.org Fri, 15 August 2008 20:54 UTC

Return-Path: <ietf-announce-bounces@ietf.org>
X-Original-To: ietf-announce-archive@megatron.ietf.org
Delivered-To: ietfarch-ietf-announce-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 1FE1728C292; Fri, 15 Aug 2008 13:54:18 -0700 (PDT)
X-Original-To: ietf-announce@core3.amsl.com
Delivered-To: ietf-announce@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E535228C292 for <ietf-announce@core3.amsl.com>; Fri, 15 Aug 2008 13:54:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -17.419
X-Spam-Level:
X-Spam-Status: No, score=-17.419 tagged_above=-999 required=5 tests=[AWL=0.180, BAYES_00=-2.599, USER_IN_DEF_WHITELIST=-15]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OApJWicBApBl for <ietf-announce@core3.amsl.com>; Fri, 15 Aug 2008 13:54:16 -0700 (PDT)
Received: from bosco.isi.edu (bosco.isi.edu [128.9.168.207]) by core3.amsl.com (Postfix) with ESMTP id 14FC428C23E for <ietf-announce@ietf.org>; Fri, 15 Aug 2008 13:54:16 -0700 (PDT)
Received: by bosco.isi.edu (Postfix, from userid 70) id A7B0C14E574; Fri, 15 Aug 2008 13:54:21 -0700 (PDT)
To: ietf-announce@ietf.org, rfc-dist@rfc-editor.org
Subject: RFC 5281 on Extensible Authentication Protocol Tunneled Transport Layer Security Authenticated Protocol Version 0 (EAP-TTLSv0)
From: rfc-editor@rfc-editor.org
Message-Id: <20080815205421.A7B0C14E574@bosco.isi.edu>
Date: Fri, 15 Aug 2008 13:54:21 -0700
Cc: rfc-editor@rfc-editor.org
X-BeenThere: ietf-announce@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "IETF announcement list. No discussions." <ietf-announce.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ietf-announce>, <mailto:ietf-announce-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/ietf-announce>
List-Post: <mailto:ietf-announce@ietf.org>
List-Help: <mailto:ietf-announce-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf-announce>, <mailto:ietf-announce-request@ietf.org?subject=subscribe>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: ietf-announce-bounces@ietf.org
Errors-To: ietf-announce-bounces@ietf.org

A new Request for Comments is now available in online RFC libraries.

        
        RFC 5281

        Title:      Extensible Authentication Protocol Tunneled Transport 
                    Layer Security Authenticated Protocol Version 0 
                    (EAP-TTLSv0) 
        Author:     P. Funk, S. Blake-Wilson
        Status:     Informational
        Date:       August 2008
        Mailbox:    PaulFunk@alum.mit.edu, 
                    sblakewilson@nl.safenet-inc.com
        Pages:      51
        Characters: 117059
        Updates/Obsoletes/SeeAlso:   None

        I-D Tag:    draft-funk-eap-ttls-v0-05.txt

        URL:        http://www.rfc-editor.org/rfc/rfc5281.txt

EAP-TTLS is an EAP (Extensible Authentication Protocol) method that
encapsulates a TLS (Transport Layer Security) session, consisting of
a handshake phase and a data phase.  During the handshake phase, the
server is authenticated to the client (or client and server are
mutually authenticated) using standard TLS procedures, and keying
material is generated in order to create a cryptographically secure
tunnel for information exchange in the subsequent data phase.  During
the data phase, the client is authenticated to the server (or client
and server are mutually authenticated) using an arbitrary
authentication mechanism encapsulated within the secure tunnel.  The
encapsulated authentication mechanism may itself be EAP, or it may
be another authentication protocol such as PAP, CHAP, MS-CHAP, or
MS-CHAP-V2.  Thus, EAP-TTLS allows legacy password-based authentication
protocols to be used against existing authentication databases,
while protecting the security of these legacy protocols against
eavesdropping, man-in-the-middle, and other attacks.  The data phase
may also be used for additional, arbitrary data exchange.  This memo 
provides information for the Internet community.


INFORMATIONAL: This memo provides information for the Internet community.
It does not specify an Internet standard of any kind. Distribution of
this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  http://www.ietf.org/mailman/listinfo/ietf-announce
  http://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see http://www.rfc-editor.org/rfcsearch.html.
For downloading RFCs, see http://www.rfc-editor.org/rfc.html.

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-editor@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
USC/Information Sciences Institute


_______________________________________________
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce