Last Call: <draft-ietf-kitten-pkinit-freshness-07.txt> (Public Key Cryptography for Initial Authentication in Kerberos (PKINIT) Freshness Extension) to Proposed Standard
The IESG <iesg-secretary@ietf.org> Thu, 20 October 2016 15:08 UTC
Return-Path: <iesg-secretary@ietf.org>
X-Original-To: ietf-announce@ietf.org
Delivered-To: ietf-announce@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id DCB0B129627; Thu, 20 Oct 2016 08:08:07 -0700 (PDT)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce <ietf-announce@ietf.org>
Subject: Last Call: <draft-ietf-kitten-pkinit-freshness-07.txt> (Public Key Cryptography for Initial Authentication in Kerberos (PKINIT) Freshness Extension) to Proposed Standard
X-Test-IDTracker: no
X-IETF-IDTracker: 6.35.0
Auto-Submitted: auto-generated
Precedence: bulk
Sender: iesg-secretary@ietf.org
Message-ID: <147697608790.18155.6064153394980486432.idtracker@ietfa.amsl.com>
Date: Thu, 20 Oct 2016 08:08:07 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf-announce/vnK8YlyIEo85-X3QBC90Ez0dKYM>
Cc: kitten@ietf.org, mrogers@redhat.com, kitten-chairs@ietf.org, draft-ietf-kitten-pkinit-freshness@ietf.org
X-BeenThere: ietf-announce@ietf.org
X-Mailman-Version: 2.1.17
Reply-To: ietf@ietf.org
List-Id: "IETF announcement list. No discussions." <ietf-announce.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf-announce>, <mailto:ietf-announce-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf-announce/>
List-Post: <mailto:ietf-announce@ietf.org>
List-Help: <mailto:ietf-announce-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf-announce>, <mailto:ietf-announce-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 20 Oct 2016 15:08:08 -0000
The IESG has received a request from the Common Authentication Technology Next Generation WG (kitten) to consider the following document: - 'Public Key Cryptography for Initial Authentication in Kerberos (PKINIT) Freshness Extension' <draft-ietf-kitten-pkinit-freshness-07.txt> as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2016-11-03. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract This document describes how to further extend the Public Key Cryptography for Initial Authentication in Kerberos (PKINIT) extension [RFC4556] to exchange an opaque data blob that a KDC can validate to ensure that the client is currently in possession of the private key during a PKINIT AS exchange. The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-kitten-pkinit-freshness/ IESG discussion can be tracked via https://datatracker.ietf.org/doc/draft-ietf-kitten-pkinit-freshness/ballot/ No IPR declarations have been submitted directly on this I-D. The document contains these normative downward references. See RFC 3967 for additional information: rfc5349: Elliptic Curve Cryptography (ECC) Support for Public Key Cryptography for Initial Authentication in Kerberos (PKINIT) (Informational - IETF stream) Note that some of these references may already be listed in the acceptable Downref Registry.