[Sandbox-mailoutput] [Django development] Document Action: 'Handling Large Certificates and Long Certificate Chains in TLS-based EAP Methods' to Informational RFC (draft-ietf-emu-eaptlscert-05.txt)
IETF Secretariat <ietf-secretariat-reply@ietf.org> Wed, 09 December 2020 19:14 UTC
Return-Path: <ietf-secretariat-reply@ietf.org>
X-Original-To: sandbox-mailoutput@ietfa.amsl.com
Delivered-To: sandbox-mailoutput@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 094383A170C for <sandbox-mailoutput@ietfa.amsl.com>; Wed, 9 Dec 2020 11:14:42 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tsrZdDHJRuxe for <sandbox-mailoutput@ietfa.amsl.com>; Wed, 9 Dec 2020 11:14:40 -0800 (PST)
Received: from mailtest.ietf.org (sandbox.ietf.org [4.31.198.57]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D4B843A170E for <sandbox-mailoutput@ietf.org>; Wed, 9 Dec 2020 11:14:40 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by sandbox.amsl.com (Postfix) with ESMTP id C113623C7 for <sandbox-mailoutput@ietf.org>; Wed, 9 Dec 2020 11:14:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at mailtest.ietf.org
Received: from mailtest.ietf.org ([4.31.198.57]) by localhost (mailtest.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id M828YN-z-yVj for <sandbox-mailoutput@ietf.org>; Wed, 9 Dec 2020 11:14:36 -0800 (PST)
Received: from sandbox.amsl.com (localhost [IPv6:::1]) by sandbox.amsl.com (Postfix) with ESMTP id 05F6E23CD for <sandbox-mailoutput@ietf.org>; Wed, 9 Dec 2020 11:14:33 -0800 (PST)
Content-Type: multipart/mixed; boundary="===============7911498055377252870=="
MIME-Version: 1.0
From: IETF Secretariat <ietf-secretariat-reply@ietf.org>
To: sandbox-mailoutput@ietf.org
Message-ID: <160754127301.4919.5960035281709513639@sandbox.amsl.com>
Date: Wed, 09 Dec 2020 11:14:33 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/sandbox-mailoutput/pDeqjUSQ8OPN4-WNheoEcIMRJ7Q>
Subject: [Sandbox-mailoutput] [Django development] Document Action: 'Handling Large Certificates and Long Certificate Chains in TLS-based EAP Methods' to Informational RFC (draft-ietf-emu-eaptlscert-05.txt)
X-BeenThere: sandbox-mailoutput@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <sandbox-mailoutput.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sandbox-mailoutput>, <mailto:sandbox-mailoutput-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sandbox-mailoutput/>
List-Post: <mailto:sandbox-mailoutput@ietf.org>
List-Help: <mailto:sandbox-mailoutput-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sandbox-mailoutput>, <mailto:sandbox-mailoutput-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 09 Dec 2020 19:14:42 -0000
The attached message would have been sent, but the tracker is in development mode. It was not sent to anybody.
--- Begin Message ---The IESG has approved the following document: - 'Handling Large Certificates and Long Certificate Chains in TLS-based EAP Methods' (draft-ietf-emu-eaptlscert-05.txt) as Informational RFC This document is the product of the EAP Method Update Working Group. The IESG contact persons are Benjamin Kaduk and Roman Danyliw. A URL of this Internet Draft is: https://datatracker.ietf.org/doc/draft-ietf-emu-eaptlscert/ Technical Summary The Extensible Authentication Protocol (EAP), defined in RFC3748, provides a standard mechanism for support of multiple authentication methods. EAP-Transport Layer Security (EAP-TLS) and other TLS-based EAP methods are widely deployed and used for network access authentication. Large certificates and long certificate chains combined with authenticators that drop an EAP session after only 40 - 50 round-trips is a major deployment problem. This document looks at the this problem in detail and describes the potential solutions available. Working Group Summary There was good support in the working group for this document. There we several substantive reviews of the document. Document Quality This document has be reviewed by members of the EAP and the TLS community. Some of the mechanisms in the document are being implemented. Personnel Joseph Salowey is the document shepherd Roman Danyliw is the responsible AD--- End Message ---
- [Sandbox-mailoutput] [Django development] Documen… IETF Secretariat