Skip to main content

Extensible Authentication Protocol (EAP) Key Management Framework
draft-ietf-eap-keying-22

Revision differences

Document history

Date Rev. By Action
2012-08-22
22 (System) post-migration administrative database adjustment to the No Objection position for Tim Polk
2012-08-22
22 (System) post-migration administrative database adjustment to the No Objection position for Sam Hartman
2012-08-22
22 (System) post-migration administrative database adjustment to the No Objection position for Russ Housley
2008-05-30
22 (System) IANA Action state changed to No IC from In Progress
2008-05-30
22 Cindy Morgan State Changes to RFC Ed Queue from Approved-announcement sent by Cindy Morgan
2008-05-30
22 (System) IANA Action state changed to In Progress
2008-05-30
22 Cindy Morgan IESG state changed to Approved-announcement sent
2008-05-30
22 Cindy Morgan IESG has approved the document
2008-05-30
22 Cindy Morgan Closed "Approve" ballot
2008-05-30
22 Jari Arkko State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Jari Arkko
2008-03-14
22 Sam Hartman [Ballot Position Update] Position for Sam Hartman has been changed to No Objection from Discuss by Sam Hartman
2007-11-22
22 Jari Arkko State Changes to IESG Evaluation::AD Followup from IESG Evaluation::External Party by Jari Arkko
2007-11-12
22 (System) New version available: draft-ietf-eap-keying-22.txt
2007-11-11
22 Jari Arkko State Changes to IESG Evaluation::External Party from IESG Evaluation::AD Followup by Jari Arkko
2007-11-11
22 Jari Arkko Waiting for Sam to clear with new RFC Editor notes.
2007-10-31
21 (System) New version available: draft-ietf-eap-keying-21.txt
2007-10-31
22 Sam Hartman
[Ballot discuss]
>The backend authentication server is trusted
>to refrain from deriving these same keys or acting as a man-in-the-
>middle even though it has …
[Ballot discuss]
>The backend authentication server is trusted
>to refrain from deriving these same keys or acting as a man-in-the-
>middle even though it has access to the EAP keying material that is
>needed to do so. 

Don't several fast handoff schemes depend on the backend
authentication server or some other party handing out such keys to
appropriate parties?  If so, this needs to be reworded.

IN section 2 and really in most of the document I think it would be
much more clear what is going on if the document made it clear that
while EAP keying material cannot be exported, keys derived from EAP
keying material may be exported within appropriate key scopes.




>An EAP authenticator MUST NOT share any keying material with
>another EAP authenticator, since if one EAP authenticator were
>compromised, this would enable the compromise of keying material on
>another authenticator. 

This text needs to be fixed to allow 802.11r style key hierarchies.
Previous text gets this correct.
2007-10-30
20 (System) New version available: draft-ietf-eap-keying-20.txt
2007-10-30
22 Jari Arkko State Changes to IESG Evaluation::AD Followup from IESG Evaluation::External Party by Jari Arkko
2007-10-30
22 Jari Arkko Charlie Kaufman says he is OK with the new version.
2007-10-24
22 Jari Arkko State Changes to IESG Evaluation::External Party from IESG Evaluation::AD Followup by Jari Arkko
2007-10-24
22 Jari Arkko Waiting for Charlie Kaufman's response to the changes in a new revision.
2007-10-23
22 (System) Sub state has been changed to AD Follow up from New Id Needed
2007-10-23
19 (System) New version available: draft-ietf-eap-keying-19.txt
2007-05-09
22 Jari Arkko State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation::AD Followup by Jari Arkko
2007-05-09
22 Jari Arkko Author is working on a new revision.
2007-04-19
22 Tim Polk [Ballot Position Update] Position for Tim Polk has been changed to No Objection from Discuss by Tim Polk
2007-04-05
22 Amy Vezza State Changes to IESG Evaluation::AD Followup from IESG Evaluation by Amy Vezza
2007-04-05
22 Russ Housley [Ballot Position Update] Position for Russ Housley has been changed to No Objection from Discuss by Russ Housley
2007-04-05
22 Lisa Dusseault [Ballot Position Update] New position, No Objection, has been recorded by Lisa Dusseault
2007-04-05
22 Ron Bonica [Ballot Position Update] New position, No Objection, has been recorded by Ron Bonica
2007-04-05
22 Jon Peterson [Ballot Position Update] New position, No Objection, has been recorded by Jon Peterson
2007-04-05
22 Chris Newman [Ballot Position Update] New position, No Objection, has been recorded by Chris Newman
2007-04-04
22 Ross Callon [Ballot Position Update] New position, No Objection, has been recorded by Ross Callon
2007-04-04
22 Amy Vezza State Changes to IESG Evaluation from IESG Evaluation - Defer by Amy Vezza
2007-04-04
22 Mark Townsley [Ballot Position Update] New position, No Objection, has been recorded by Mark Townsley
2007-04-04
22 Magnus Westerlund [Ballot Position Update] New position, No Objection, has been recorded by Magnus Westerlund
2007-03-30
22 Russ Housley [Ballot discuss]
draft-housley-aaa-key-mgmt must be approved before this document can
  be appropriately reviewed.
2007-03-30
22 Russ Housley [Ballot Position Update] New position, Discuss, has been recorded by Russ Housley
2007-03-27
22 Sam Hartman
[Ballot discuss]
In addition to the following points I'm holding a discuss until
draft-housley-aaa-key-mgmt is approved: changes ind that draft are
very likely to affect …
[Ballot discuss]
In addition to the following points I'm holding a discuss until
draft-housley-aaa-key-mgmt is approved: changes ind that draft are
very likely to affect this draft.  I expect that approval before
Prague.


>The backend authentication server is trusted
>to refrain from deriving these same keys or acting as a man-in-the-
>middle even though it has access to the EAP keying material that is
>needed to do so. 

Don't several fast handoff schemes depend on the backend
authentication server or some other party handing out such keys to
appropriate parties?  If so, this needs to be reworded.

IN section 2 and really in most of the document I think it would be
much more clear what is going on if the document made it clear that
while EAP keying material cannot be exported, keys derived from EAP
keying material may be exported within appropriate key scopes.



In section 2.2:
>Where the backend server FQDN differs from the subjectAltName in the
>certificate, the AAA client may not be able to successfully determine
>whether it is talking to the correct backend authentication server.

Why does the AAA client even examine the certificate used within the
EAP method?


>An EAP authenticator MUST NOT share any keying material with
>another EAP authenticator, since if one EAP authenticator were
>compromised, this would enable the compromise of keying material on
>another authenticator. 

This text needs to be fixed to allow 802.11r style key hierarchies.
Previous text gets this correct.


From a security directorate review by David Harrington:

>The single largest issue I have with this document is its use of
>RFC2119 keywords, especially in lowercase. It is very difficult to
>tell which specifications are required for interoperability, which
>because the authors want to see a particular way of doing things, and
>which are simply not requirements at all, but RFC2119 language is used
>anyway. This point really needs work!

I would also appreciate a response to the rest of David's points as last call comments.
2007-03-26
22 Tim Polk
[Ballot discuss]
In Section 3.1, Secure Association Protocol entry (e)
The two paragraphs are in conflict.  Paragraph 1 states that if the TSKs are "derived …
[Ballot discuss]
In Section 3.1, Secure Association Protocol entry (e)
The two paragraphs are in conflict.  Paragraph 1 states that if the TSKs are "derived from a portion of the exported EAP keying material [this could] expose the underlying ciphersuite to attack."  Paragraph 2 describes how nonces or counters are "mixed with the exported keying material in order to generate fresh ... session keys."

This conflict needs to be resolved.

Section 2.1 "AAA"
Other entries in this section refer to requirements in specifications, but this entry begins with "Existing implementations ..."  Please clarify whether this reflects the details of the RADIUS/EAP and Diameter EAP specifications as well.

Editorial:

Section 1.2

Consider adding a definition for "Handoff".  This term first appears in the title for section 4 and is never defined in the document.

Section 1.4, paragraphs two and three open with the exact same sentence, and the second sentence is almost the same.  Please review and delete the redundant text.

Section 1.6 begins "Certain basic characteristics, known as "EAP Invariants", hold true for EAP implementations on all media:"

Given that "media independence" is the second member of the list, perhaps "on all media" is unecessary in the opening clause?  Consider deleting "on all media".
2007-03-26
22 Tim Polk
[Ballot discuss]
In Section 3.1, Secure Association Protocol entry (e)
The two paragraphs are in conflict.  Paragraph 1 states that if the TSKs are "derived …
[Ballot discuss]
In Section 3.1, Secure Association Protocol entry (e)
The two paragraphs are in conflict.  Paragraph 1 states that if the TSKs are "derived from a portion of the exported EAP keying material [this could] expose the underlying ciphersuite to attack."  Paragraph 2 describes how nonces or counters are "mixed with the exported keying material in order to generate fresh ... session keys."

This conflict needs to be resolved.

Section 2.1 "AAA"
Other entries in this section refer to requirements in specifications, but this entry begins with "Existing implementations ..."  Please clarify whether this reflects the details of the RADIUS/EAP and Diameter EAP specifications as well.

Editorial:

Section 1.2

Consider adding a definition for "Handoff".  This term first appears in the title for section 4 and is never defined in the document.

Section 1.4, paragraphs two and three open with the exact same sentence, and the second sentence is almost the same.  Please review and delete the redundant text.

Section 1.6 begins "Certain basic characteristics, known as "EAP Invariants", hold true for EAP implementations on all media:"

Given that "media independence" is the second member of the list, perhaps "on all media" is unecessary in the opening clause?  Consider deleting "on all media".
2007-03-26
22 Tim Polk [Ballot Position Update] Position for Tim Polk has been changed to Discuss from No Objection by Tim Polk
2007-03-26
22 Tim Polk [Ballot Position Update] Position for Tim Polk has been changed to No Objection from Discuss by Tim Polk
2007-03-26
22 Tim Polk [Ballot Position Update] New position, Discuss, has been recorded by Tim Polk
2007-03-09
22 (System) Removed from agenda for telechat - 2007-03-08
2007-03-07
22 Sam Hartman
[Ballot discuss]
In addition to the following points I'm holding a discuss until
draft-housley-aaa-key-mgmt is approved: changes ind that draft are
very likely to affect …
[Ballot discuss]
In addition to the following points I'm holding a discuss until
draft-housley-aaa-key-mgmt is approved: changes ind that draft are
very likely to affect this draft.  I expect that approval before
Prague.


>The backend authentication server is trusted
>to refrain from deriving these same keys or acting as a man-in-the-
>middle even though it has access to the EAP keying material that is
>needed to do so. 

Don't several fast handoff schemes depend on the backend
authentication server or some other party handing out such keys to
appropriate parties?  If so, this needs to be reworded.

IN section 2 and really in most of the document I think it would be
much more clear what is going on if the document made it clear that
while EAP keying material cannot be exported, keys derived from EAP
keying material may be exported within appropriate key scopes.


I don't understand how the backend authentication server authorizes
the peer's lower layer identity in section 2.2.1.

In section 2.2:
>Where the backend server FQDN differs from the subjectAltName in the
>certificate, the AAA client may not be able to successfully determine
>whether it is talking to the correct backend authentication server.

Why does the AAA client even examine the certificate used within the
EAP method?


>An EAP authenticator MUST NOT share any keying material with
>another EAP authenticator, since if one EAP authenticator were
>compromised, this would enable the compromise of keying material on
>another authenticator. 

This text needs to be fixed to allow 802.11r style key hierarchies.
Previous text gets this correct.
2007-03-07
22 Sam Hartman [Ballot Position Update] New position, Discuss, has been recorded by Sam Hartman
2007-03-06
22 Ted Hardie State Changes to IESG Evaluation - Defer from IESG Evaluation by Ted Hardie
2007-03-06
22 Cullen Jennings [Ballot Position Update] New position, No Objection, has been recorded by Cullen Jennings
2007-03-02
22 Lars Eggert [Ballot Position Update] New position, No Objection, has been recorded by Lars Eggert
2007-03-02
22 Samuel Weiler Request for Last Call review by SECDIR Completed. Reviewer: Charlie Kaufman.
2007-03-02
22 Samuel Weiler Request for Last Call review by SECDIR Rejected. Reviewer: David Harrington.
2007-03-01
22 Jari Arkko State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Jari Arkko
2007-03-01
22 Jari Arkko Going for the IESG evaluation. Need to think about response to the secdir review in the meanwhile.
2007-02-28
22 (System) State has been changed to Waiting for AD Go-Ahead from In Last Call by system
2007-02-27
22 Jari Arkko [Ballot Position Update] New position, Yes, has been recorded for Jari Arkko
2007-02-27
22 Jari Arkko Ballot has been issued by Jari Arkko
2007-02-27
22 Jari Arkko Created "Approve" ballot
2007-02-21
22 Yoshiko Fong IANA Last Call Comments:

As described in the IANA Considerations section, we understand
this document to have NO IANA Actions.
2007-02-17
22 Samuel Weiler Request for Last Call review by SECDIR is assigned to Charlie Kaufman
2007-02-17
22 Samuel Weiler Request for Last Call review by SECDIR is assigned to Charlie Kaufman
2007-02-16
22 Samuel Weiler Request for Last Call review by SECDIR is assigned to David Harrington
2007-02-16
22 Samuel Weiler Request for Last Call review by SECDIR is assigned to David Harrington
2007-02-15
22 Jari Arkko Placed on agenda for telechat - 2007-03-08 by Jari Arkko
2007-02-14
22 Amy Vezza Last call sent
2007-02-14
22 Amy Vezza State Changes to In Last Call from Last Call Requested by Amy Vezza
2007-02-14
22 Jari Arkko Last Call was requested by Jari Arkko
2007-02-14
22 Jari Arkko State Changes to Last Call Requested from AD Evaluation by Jari Arkko
2007-02-14
22 (System) Ballot writeup text was added
2007-02-14
22 (System) Last call text was added
2007-02-14
22 (System) Ballot approval text was added
2007-02-14
22 Jari Arkko State Change Notice email list have been change to eap-chairs@tools.ietf.org,dansimon@microsoft.com,pasi.eronen@nokia.com,henrik@levkowetz.com from eap-chairs@tools.ietf.org
2007-02-14
22 Jari Arkko State Changes to AD Evaluation from Publication Requested by Jari Arkko
2007-02-13
22 Dinara Suleymanova
PROTO Write-up

(1.a) Who is the Document Shepherd for this document? Has the Document
Shepherd personally reviewed this version of the document and, in particular, …
PROTO Write-up

(1.a) Who is the Document Shepherd for this document? Has the Document
Shepherd personally reviewed this version of the document and, in particular,
does he or she believe this version is ready for forwarding to the IESG for
publication?

Document Shepherd: Bernard Aboba
I have personally reviewed the document.

(1.b) Has the document had adequate review from both key WG members and
key non-WG members? Does the Document Shepherd have any concerns
about the depth or breadth of the reviews that have been performed?

Yes. This document has been through two WG last calls.

(1.c) Does the Document Shepherd have concerns that the document needs
more review from a particular or broader perspective e.g., security, operational
complexity, someone familiar with AAA, internationalization or XML?

The document has been reviewed by the EAP WG, as well as by participants
in other SDOs such as IEEE 802.11. However, the topic is complex, so that
review by the Security Directorate during IETF last call would be appropriate.

(1.d) Does the Document Shepherd have any specific concerns or issues with this
document that the Responsible Area Director and/or the IESG should be aware of?
For example, perhaps he or she is uncomfortable with certain parts of the document,
or has concerns whether there really is a need for it. In any event, if the WG has
discussed those issues and has indicated that it still wishes to advance the document,
detail those concerns here. Has an IPR disclosure related to this document been filed?
If so, please include a reference to the disclosure and summarize the WG discussion
and conclusion on this issue.

No concerns.

(1.e) How solid is the WG consensus behind this document? Does it
represent the strong concurrence of a few individuals, with others
being silent, or does the WG as a whole understand and agree with
it?

There is solid consensus behind this document. At various points,
more than 18 people have posted review comments relating to the document.

The issues raised and the resolutions are available for inspection at
http://www.drizzle.com/~aboba/EAP/.

(1.f) Has anyone threatened an appeal or otherwise indicated extreme discontent?
If so, please summarise the areas of conflict in separate email messages to the
Responsible Area Director. (It should be in a separate email because this
questionnaire is entered into the ID Tracker.)

No.

(1.g) Has the Document Shepherd personally verified that the document satisfies
all ID nits? (See http://www.ietf.org/ID-Checklist.html and
http://tools.ietf.org/tools/idnits/). Boilerplate checks are not enough; this
check needs to be thorough. Has the document met all formal review criteria it
needs to, such as the MIB Doctor, media type and URI type reviews?

Yes. An output of the run on this revision of the ID by the online nits
checker:

idnits 2.00.3

(The RFC status file is not from today - attempting to download a newer one...
- Success fetching RFC status file.)

tmp/draft-ietf-eap-keying-18.txt:

Checking nits according to http://www.ietf.org/ID-Checklist.html:
No ID-Checklist nits found.

Checking nits according to http://www.ietf.org/ietf/1id-guidelines.txt:
* Missing expiration date. The document expiration date should appear on
the first and last page.

Miscellaneous warnings:
None.

Experimental warnings:
(Checking references for intended status: Proposed Standard)

- Obsolete Reference: RFC 2409

Summary: 1 nit, 1 warning

(1.h) Has the document split its references into normative and informative?
Are there normative references to documents that are not ready for advancement
or are otherwise in an unclear state? If such normative references exist, what
is the strategy for their completion? Are there normative references that are
downward references, as described in [RFC3967]? If so, list these downward
references to support the Area Director in the Last Call procedure for them [RFC3967].

The document splits normative and informative references.
There are no normative references to IDs.

(1.i) Has the Document Shepherd verified that the document IANA consideration
section exists and is consistent with the body of the document? If the document
specifies protocol extensions, are reservations requested in appropriate IANA
registries? Are the IANA registries clearly identified? If the document creates
a new registry, does it define the proposed initial contents of the registry and
an allocation procedure for future registrations? Does it suggest a reasonable
name for the new registry? See [RFC2434]. If the document describes an Expert
Review process has Shepherd conferred with the Responsible Area Director so
that the IESG can appoint the needed Expert during the IESG Evaluation?

This document has no actions for IANA.

(1.j) Has the Document Shepherd verified that sections of the document that
are written in a formal language, such as XML code, BNF rules, MIB definitions,
etc., validate correctly in an automated checker?

This document does not contain sections written in a formal language.

(1.k) The IESG approval announcement includes a Document Announcement Write-Up.
Please provide such a Document Announcement Write-Up? Recent examples can be
found in the "Action" announcements for approved documents. The approval
announcement contains the following sections:

- Technical Summary

This document specifies the EAP key hierarchy and provides a framework
for the transport and usage of keying material generated by EAP
authentication algorithms, known as "methods". It also provides
a system-level security analysis, according to the principles described in
"Guidance for AAA Key Management".

- Working Group Summary

Much of the WG discussion of this document centered on aspects of key management,
including key creation, deletion, transport and naming. EAP usage is growing
increasingly diverse, so that there was discussion about whether the
the examples depict the issues encountered in existing EAP lower layer
implementations, and whether the principles articulated are universal or
merely true for all existing implementations. There was also discussion about
the relationship between this document and "Guidance for AAA Key Management"
which articulates principles that AAA Key Management solutions must satisfy to
qualify for standards track publication.

- Document Quality

There are existing implementations of this document, and further implementations
are likely.

- Personnel

Bernard Aboba is the document shepherd. The responsible Area Director is
Jari Arkko. No IANA expert is needed.
2007-02-13
22 Dinara Suleymanova Draft Added by Dinara Suleymanova in state Publication Requested
2007-02-08
18 (System) New version available: draft-ietf-eap-keying-18.txt
2007-01-22
17 (System) New version available: draft-ietf-eap-keying-17.txt
2007-01-03
16 (System) New version available: draft-ietf-eap-keying-16.txt
2006-10-25
15 (System) New version available: draft-ietf-eap-keying-15.txt
2006-06-27
14 (System) New version available: draft-ietf-eap-keying-14.txt
2006-05-02
13 (System) New version available: draft-ietf-eap-keying-13.txt
2006-04-14
12 (System) New version available: draft-ietf-eap-keying-12.txt
2006-04-05
11 (System) New version available: draft-ietf-eap-keying-11.txt
2006-03-08
10 (System) New version available: draft-ietf-eap-keying-10.txt
2006-01-09
09 (System) New version available: draft-ietf-eap-keying-09.txt
2005-10-26
08 (System) New version available: draft-ietf-eap-keying-08.txt
2005-07-19
07 (System) New version available: draft-ietf-eap-keying-07.txt
2005-04-05
06 (System) New version available: draft-ietf-eap-keying-06.txt
2005-02-21
05 (System) New version available: draft-ietf-eap-keying-05.txt
2004-11-18
04 (System) New version available: draft-ietf-eap-keying-04.txt
2004-07-19
03 (System) New version available: draft-ietf-eap-keying-03.txt
2004-06-29
02 (System) New version available: draft-ietf-eap-keying-02.txt
2003-10-28
01 (System) New version available: draft-ietf-eap-keying-01.txt
2003-10-13
00 (System) New version available: draft-ietf-eap-keying-00.txt