[Ipsec] Last Call: 'Multiple Authentication Exchanges in IKEv2' to Experimental RFC (draft-eronen-ipsec-ikev2-multiple-auth)

The IESG <iesg-secretary@ietf.org> Mon, 26 June 2006 16:18 UTC

Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1FutnK-0007a2-93; Mon, 26 Jun 2006 12:18:38 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1FutnI-0007Zo-IF for ipsec@ietf.org; Mon, 26 Jun 2006 12:18:36 -0400
Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FutnH-0005BJ-6F for ipsec@ietf.org; Mon, 26 Jun 2006 12:18:36 -0400
Received: from [10.20.30.249] (dsl-63-249-108-169.cruzio.com [63.249.108.169]) (authenticated bits=0) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id k5QGIXYU087298 for <ipsec@ietf.org>; Mon, 26 Jun 2006 09:18:34 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
Mime-Version: 1.0
Message-Id: <p06230931c0c5b947c3ad@[10.20.30.249]>
Date: Mon, 26 Jun 2006 09:18:31 -0700
To: IPsec WG <ipsec@ietf.org>
From: The IESG <iesg-secretary@ietf.org>
Content-Type: text/plain; charset="us-ascii"; format="flowed"
X-Spam-Score: 0.0 (/)
X-Scan-Signature: e5ba305d0e64821bf3d8bc5d3bb07228
Subject: [Ipsec] Last Call: 'Multiple Authentication Exchanges in IKEv2' to Experimental RFC (draft-eronen-ipsec-ikev2-multiple-auth)
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Security <ipsec.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
Errors-To: ipsec-bounces@ietf.org

The IESG has received a request from an individual submitter to consider the
following document:

- 'Multiple Authentication Exchanges in IKEv2 '
    <draft-eronen-ipsec-ikev2-multiple-auth-01.txt> as an Experimental RFC

IKEv2 supports several mechanisms for authenticating the parties,
including signatures with public-key certificates, shared secrets, and
Extensible Authentication Protocol (EAP) methods.  Currently, each
endpoint uses only one of these mechanisms to authenticate itself.
This document specifies an extension to IKEv2 that allows the use of
multiple authentication exchanges, either using different mechanisms
or the same mechanism.

The document has been stable for some time.  It is also a 3GPP
dependency for their "WLAN Interworking - Private Network access from
WLAN 3GPP IP Access" work item.

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action.  Please send any comments to the
iesg@ietf.org or ietf@ietf.org mailing lists by 2006-07-24.

The file can be obtained via
http://www.ietf.org/internet-drafts/draft-eronen-ipsec-ikev2-multiple-auth-01.tx
t


_______________________________________________
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf-announce

_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec