EAP shared key methods: a tentative synthesis of those proposed so far
draft-bersani-eap-synthesis-sharedkeymethods-00

 
Document Type Expired Internet-Draft (individual)
Last updated 2004-04-02
Stream (None)
Intended RFC status (None)
Formats
Expired & archived
plain text pdf html
Stream Stream state (No stream defined)
Document shepherd No shepherd assigned
IESG IESG state Expired
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-bersani-eap-synthesis-sharedkeymethods-00.txt

Abstract

The purpose of this draft is to gives a broad picture of the existing proposed EAP methods, with a focus on shared key EAP methods. Indeed, it is the belief of the author that a standard replacement for EAP- MD5 (that is deprecated due to security reasons) is needed. By listing the existing shared key EAP methods, the goal is to gather consensus that such a multiplication of methods is detrimental and that a single methods retaining the best of the existing proposals could and should be drafted.

Authors

Florent Bersani (florent.bersani@francetelecom.com)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)