Extensible Authentication Protocol (EAP) Key Management Framework
draft-ietf-eap-keying-22
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2012-08-22
|
22 | (System) | post-migration administrative database adjustment to the No Objection position for Tim Polk |
2012-08-22
|
22 | (System) | post-migration administrative database adjustment to the No Objection position for Sam Hartman |
2012-08-22
|
22 | (System) | post-migration administrative database adjustment to the No Objection position for Russ Housley |
2008-05-30
|
22 | (System) | IANA Action state changed to No IC from In Progress |
2008-05-30
|
22 | Cindy Morgan | State Changes to RFC Ed Queue from Approved-announcement sent by Cindy Morgan |
2008-05-30
|
22 | (System) | IANA Action state changed to In Progress |
2008-05-30
|
22 | Cindy Morgan | IESG state changed to Approved-announcement sent |
2008-05-30
|
22 | Cindy Morgan | IESG has approved the document |
2008-05-30
|
22 | Cindy Morgan | Closed "Approve" ballot |
2008-05-30
|
22 | Jari Arkko | State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Jari Arkko |
2008-03-14
|
22 | Sam Hartman | [Ballot Position Update] Position for Sam Hartman has been changed to No Objection from Discuss by Sam Hartman |
2007-11-22
|
22 | Jari Arkko | State Changes to IESG Evaluation::AD Followup from IESG Evaluation::External Party by Jari Arkko |
2007-11-12
|
22 | (System) | New version available: draft-ietf-eap-keying-22.txt |
2007-11-11
|
22 | Jari Arkko | State Changes to IESG Evaluation::External Party from IESG Evaluation::AD Followup by Jari Arkko |
2007-11-11
|
22 | Jari Arkko | Waiting for Sam to clear with new RFC Editor notes. |
2007-10-31
|
21 | (System) | New version available: draft-ietf-eap-keying-21.txt |
2007-10-31
|
22 | Sam Hartman | [Ballot discuss] >The backend authentication server is trusted >to refrain from deriving these same keys or acting as a man-in-the- >middle even though it has … [Ballot discuss] >The backend authentication server is trusted >to refrain from deriving these same keys or acting as a man-in-the- >middle even though it has access to the EAP keying material that is >needed to do so. Don't several fast handoff schemes depend on the backend authentication server or some other party handing out such keys to appropriate parties? If so, this needs to be reworded. IN section 2 and really in most of the document I think it would be much more clear what is going on if the document made it clear that while EAP keying material cannot be exported, keys derived from EAP keying material may be exported within appropriate key scopes. >An EAP authenticator MUST NOT share any keying material with >another EAP authenticator, since if one EAP authenticator were >compromised, this would enable the compromise of keying material on >another authenticator. This text needs to be fixed to allow 802.11r style key hierarchies. Previous text gets this correct. |
2007-10-30
|
20 | (System) | New version available: draft-ietf-eap-keying-20.txt |
2007-10-30
|
22 | Jari Arkko | State Changes to IESG Evaluation::AD Followup from IESG Evaluation::External Party by Jari Arkko |
2007-10-30
|
22 | Jari Arkko | Charlie Kaufman says he is OK with the new version. |
2007-10-24
|
22 | Jari Arkko | State Changes to IESG Evaluation::External Party from IESG Evaluation::AD Followup by Jari Arkko |
2007-10-24
|
22 | Jari Arkko | Waiting for Charlie Kaufman's response to the changes in a new revision. |
2007-10-23
|
22 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2007-10-23
|
19 | (System) | New version available: draft-ietf-eap-keying-19.txt |
2007-05-09
|
22 | Jari Arkko | State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation::AD Followup by Jari Arkko |
2007-05-09
|
22 | Jari Arkko | Author is working on a new revision. |
2007-04-19
|
22 | Tim Polk | [Ballot Position Update] Position for Tim Polk has been changed to No Objection from Discuss by Tim Polk |
2007-04-05
|
22 | Amy Vezza | State Changes to IESG Evaluation::AD Followup from IESG Evaluation by Amy Vezza |
2007-04-05
|
22 | Russ Housley | [Ballot Position Update] Position for Russ Housley has been changed to No Objection from Discuss by Russ Housley |
2007-04-05
|
22 | Lisa Dusseault | [Ballot Position Update] New position, No Objection, has been recorded by Lisa Dusseault |
2007-04-05
|
22 | Ron Bonica | [Ballot Position Update] New position, No Objection, has been recorded by Ron Bonica |
2007-04-05
|
22 | Jon Peterson | [Ballot Position Update] New position, No Objection, has been recorded by Jon Peterson |
2007-04-05
|
22 | Chris Newman | [Ballot Position Update] New position, No Objection, has been recorded by Chris Newman |
2007-04-04
|
22 | Ross Callon | [Ballot Position Update] New position, No Objection, has been recorded by Ross Callon |
2007-04-04
|
22 | Amy Vezza | State Changes to IESG Evaluation from IESG Evaluation - Defer by Amy Vezza |
2007-04-04
|
22 | Mark Townsley | [Ballot Position Update] New position, No Objection, has been recorded by Mark Townsley |
2007-04-04
|
22 | Magnus Westerlund | [Ballot Position Update] New position, No Objection, has been recorded by Magnus Westerlund |
2007-03-30
|
22 | Russ Housley | [Ballot discuss] draft-housley-aaa-key-mgmt must be approved before this document can be appropriately reviewed. |
2007-03-30
|
22 | Russ Housley | [Ballot Position Update] New position, Discuss, has been recorded by Russ Housley |
2007-03-27
|
22 | Sam Hartman | [Ballot discuss] In addition to the following points I'm holding a discuss until draft-housley-aaa-key-mgmt is approved: changes ind that draft are very likely to affect … [Ballot discuss] In addition to the following points I'm holding a discuss until draft-housley-aaa-key-mgmt is approved: changes ind that draft are very likely to affect this draft. I expect that approval before Prague. >The backend authentication server is trusted >to refrain from deriving these same keys or acting as a man-in-the- >middle even though it has access to the EAP keying material that is >needed to do so. Don't several fast handoff schemes depend on the backend authentication server or some other party handing out such keys to appropriate parties? If so, this needs to be reworded. IN section 2 and really in most of the document I think it would be much more clear what is going on if the document made it clear that while EAP keying material cannot be exported, keys derived from EAP keying material may be exported within appropriate key scopes. In section 2.2: >Where the backend server FQDN differs from the subjectAltName in the >certificate, the AAA client may not be able to successfully determine >whether it is talking to the correct backend authentication server. Why does the AAA client even examine the certificate used within the EAP method? >An EAP authenticator MUST NOT share any keying material with >another EAP authenticator, since if one EAP authenticator were >compromised, this would enable the compromise of keying material on >another authenticator. This text needs to be fixed to allow 802.11r style key hierarchies. Previous text gets this correct. From a security directorate review by David Harrington: >The single largest issue I have with this document is its use of >RFC2119 keywords, especially in lowercase. It is very difficult to >tell which specifications are required for interoperability, which >because the authors want to see a particular way of doing things, and >which are simply not requirements at all, but RFC2119 language is used >anyway. This point really needs work! I would also appreciate a response to the rest of David's points as last call comments. |
2007-03-26
|
22 | Tim Polk | [Ballot discuss] In Section 3.1, Secure Association Protocol entry (e) The two paragraphs are in conflict. Paragraph 1 states that if the TSKs are "derived … [Ballot discuss] In Section 3.1, Secure Association Protocol entry (e) The two paragraphs are in conflict. Paragraph 1 states that if the TSKs are "derived from a portion of the exported EAP keying material [this could] expose the underlying ciphersuite to attack." Paragraph 2 describes how nonces or counters are "mixed with the exported keying material in order to generate fresh ... session keys." This conflict needs to be resolved. Section 2.1 "AAA" Other entries in this section refer to requirements in specifications, but this entry begins with "Existing implementations ..." Please clarify whether this reflects the details of the RADIUS/EAP and Diameter EAP specifications as well. Editorial: Section 1.2 Consider adding a definition for "Handoff". This term first appears in the title for section 4 and is never defined in the document. Section 1.4, paragraphs two and three open with the exact same sentence, and the second sentence is almost the same. Please review and delete the redundant text. Section 1.6 begins "Certain basic characteristics, known as "EAP Invariants", hold true for EAP implementations on all media:" Given that "media independence" is the second member of the list, perhaps "on all media" is unecessary in the opening clause? Consider deleting "on all media". |
2007-03-26
|
22 | Tim Polk | [Ballot discuss] In Section 3.1, Secure Association Protocol entry (e) The two paragraphs are in conflict. Paragraph 1 states that if the TSKs are "derived … [Ballot discuss] In Section 3.1, Secure Association Protocol entry (e) The two paragraphs are in conflict. Paragraph 1 states that if the TSKs are "derived from a portion of the exported EAP keying material [this could] expose the underlying ciphersuite to attack." Paragraph 2 describes how nonces or counters are "mixed with the exported keying material in order to generate fresh ... session keys." This conflict needs to be resolved. Section 2.1 "AAA" Other entries in this section refer to requirements in specifications, but this entry begins with "Existing implementations ..." Please clarify whether this reflects the details of the RADIUS/EAP and Diameter EAP specifications as well. Editorial: Section 1.2 Consider adding a definition for "Handoff". This term first appears in the title for section 4 and is never defined in the document. Section 1.4, paragraphs two and three open with the exact same sentence, and the second sentence is almost the same. Please review and delete the redundant text. Section 1.6 begins "Certain basic characteristics, known as "EAP Invariants", hold true for EAP implementations on all media:" Given that "media independence" is the second member of the list, perhaps "on all media" is unecessary in the opening clause? Consider deleting "on all media". |
2007-03-26
|
22 | Tim Polk | [Ballot Position Update] Position for Tim Polk has been changed to Discuss from No Objection by Tim Polk |
2007-03-26
|
22 | Tim Polk | [Ballot Position Update] Position for Tim Polk has been changed to No Objection from Discuss by Tim Polk |
2007-03-26
|
22 | Tim Polk | [Ballot Position Update] New position, Discuss, has been recorded by Tim Polk |
2007-03-09
|
22 | (System) | Removed from agenda for telechat - 2007-03-08 |
2007-03-07
|
22 | Sam Hartman | [Ballot discuss] In addition to the following points I'm holding a discuss until draft-housley-aaa-key-mgmt is approved: changes ind that draft are very likely to affect … [Ballot discuss] In addition to the following points I'm holding a discuss until draft-housley-aaa-key-mgmt is approved: changes ind that draft are very likely to affect this draft. I expect that approval before Prague. >The backend authentication server is trusted >to refrain from deriving these same keys or acting as a man-in-the- >middle even though it has access to the EAP keying material that is >needed to do so. Don't several fast handoff schemes depend on the backend authentication server or some other party handing out such keys to appropriate parties? If so, this needs to be reworded. IN section 2 and really in most of the document I think it would be much more clear what is going on if the document made it clear that while EAP keying material cannot be exported, keys derived from EAP keying material may be exported within appropriate key scopes. I don't understand how the backend authentication server authorizes the peer's lower layer identity in section 2.2.1. In section 2.2: >Where the backend server FQDN differs from the subjectAltName in the >certificate, the AAA client may not be able to successfully determine >whether it is talking to the correct backend authentication server. Why does the AAA client even examine the certificate used within the EAP method? >An EAP authenticator MUST NOT share any keying material with >another EAP authenticator, since if one EAP authenticator were >compromised, this would enable the compromise of keying material on >another authenticator. This text needs to be fixed to allow 802.11r style key hierarchies. Previous text gets this correct. |
2007-03-07
|
22 | Sam Hartman | [Ballot Position Update] New position, Discuss, has been recorded by Sam Hartman |
2007-03-06
|
22 | Ted Hardie | State Changes to IESG Evaluation - Defer from IESG Evaluation by Ted Hardie |
2007-03-06
|
22 | Cullen Jennings | [Ballot Position Update] New position, No Objection, has been recorded by Cullen Jennings |
2007-03-02
|
22 | Lars Eggert | [Ballot Position Update] New position, No Objection, has been recorded by Lars Eggert |
2007-03-02
|
22 | Samuel Weiler | Request for Last Call review by SECDIR Completed. Reviewer: Charlie Kaufman. |
2007-03-02
|
22 | Samuel Weiler | Request for Last Call review by SECDIR Rejected. Reviewer: David Harrington. |
2007-03-01
|
22 | Jari Arkko | State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Jari Arkko |
2007-03-01
|
22 | Jari Arkko | Going for the IESG evaluation. Need to think about response to the secdir review in the meanwhile. |
2007-02-28
|
22 | (System) | State has been changed to Waiting for AD Go-Ahead from In Last Call by system |
2007-02-27
|
22 | Jari Arkko | [Ballot Position Update] New position, Yes, has been recorded for Jari Arkko |
2007-02-27
|
22 | Jari Arkko | Ballot has been issued by Jari Arkko |
2007-02-27
|
22 | Jari Arkko | Created "Approve" ballot |
2007-02-21
|
22 | Yoshiko Fong | IANA Last Call Comments: As described in the IANA Considerations section, we understand this document to have NO IANA Actions. |
2007-02-17
|
22 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Charlie Kaufman |
2007-02-17
|
22 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Charlie Kaufman |
2007-02-16
|
22 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to David Harrington |
2007-02-16
|
22 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to David Harrington |
2007-02-15
|
22 | Jari Arkko | Placed on agenda for telechat - 2007-03-08 by Jari Arkko |
2007-02-14
|
22 | Amy Vezza | Last call sent |
2007-02-14
|
22 | Amy Vezza | State Changes to In Last Call from Last Call Requested by Amy Vezza |
2007-02-14
|
22 | Jari Arkko | Last Call was requested by Jari Arkko |
2007-02-14
|
22 | Jari Arkko | State Changes to Last Call Requested from AD Evaluation by Jari Arkko |
2007-02-14
|
22 | (System) | Ballot writeup text was added |
2007-02-14
|
22 | (System) | Last call text was added |
2007-02-14
|
22 | (System) | Ballot approval text was added |
2007-02-14
|
22 | Jari Arkko | State Change Notice email list have been change to eap-chairs@tools.ietf.org,dansimon@microsoft.com,pasi.eronen@nokia.com,henrik@levkowetz.com from eap-chairs@tools.ietf.org |
2007-02-14
|
22 | Jari Arkko | State Changes to AD Evaluation from Publication Requested by Jari Arkko |
2007-02-13
|
22 | Dinara Suleymanova | PROTO Write-up (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the document and, in particular, … PROTO Write-up (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the document and, in particular, does he or she believe this version is ready for forwarding to the IESG for publication? Document Shepherd: Bernard Aboba I have personally reviewed the document. (1.b) Has the document had adequate review from both key WG members and key non-WG members? Does the Document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? Yes. This document has been through two WG last calls. (1.c) Does the Document Shepherd have concerns that the document needs more review from a particular or broader perspective e.g., security, operational complexity, someone familiar with AAA, internationalization or XML? The document has been reviewed by the EAP WG, as well as by participants in other SDOs such as IEEE 802.11. However, the topic is complex, so that review by the Security Directorate during IETF last call would be appropriate. (1.d) Does the Document Shepherd have any specific concerns or issues with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. Has an IPR disclosure related to this document been filed? If so, please include a reference to the disclosure and summarize the WG discussion and conclusion on this issue. No concerns. (1.e) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? There is solid consensus behind this document. At various points, more than 18 people have posted review comments relating to the document. The issues raised and the resolutions are available for inspection at http://www.drizzle.com/~aboba/EAP/. (1.f) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is entered into the ID Tracker.) No. (1.g) Has the Document Shepherd personally verified that the document satisfies all ID nits? (See http://www.ietf.org/ID-Checklist.html and http://tools.ietf.org/tools/idnits/). Boilerplate checks are not enough; this check needs to be thorough. Has the document met all formal review criteria it needs to, such as the MIB Doctor, media type and URI type reviews? Yes. An output of the run on this revision of the ID by the online nits checker: idnits 2.00.3 (The RFC status file is not from today - attempting to download a newer one... - Success fetching RFC status file.) tmp/draft-ietf-eap-keying-18.txt: Checking nits according to http://www.ietf.org/ID-Checklist.html: No ID-Checklist nits found. Checking nits according to http://www.ietf.org/ietf/1id-guidelines.txt: * Missing expiration date. The document expiration date should appear on the first and last page. Miscellaneous warnings: None. Experimental warnings: (Checking references for intended status: Proposed Standard) - Obsolete Reference: RFC 2409 Summary: 1 nit, 1 warning (1.h) Has the document split its references into normative and informative? Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the strategy for their completion? Are there normative references that are downward references, as described in [RFC3967]? If so, list these downward references to support the Area Director in the Last Call procedure for them [RFC3967]. The document splits normative and informative references. There are no normative references to IDs. (1.i) Has the Document Shepherd verified that the document IANA consideration section exists and is consistent with the body of the document? If the document specifies protocol extensions, are reservations requested in appropriate IANA registries? Are the IANA registries clearly identified? If the document creates a new registry, does it define the proposed initial contents of the registry and an allocation procedure for future registrations? Does it suggest a reasonable name for the new registry? See [RFC2434]. If the document describes an Expert Review process has Shepherd conferred with the Responsible Area Director so that the IESG can appoint the needed Expert during the IESG Evaluation? This document has no actions for IANA. (1.j) Has the Document Shepherd verified that sections of the document that are written in a formal language, such as XML code, BNF rules, MIB definitions, etc., validate correctly in an automated checker? This document does not contain sections written in a formal language. (1.k) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up? Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: - Technical Summary This document specifies the EAP key hierarchy and provides a framework for the transport and usage of keying material generated by EAP authentication algorithms, known as "methods". It also provides a system-level security analysis, according to the principles described in "Guidance for AAA Key Management". - Working Group Summary Much of the WG discussion of this document centered on aspects of key management, including key creation, deletion, transport and naming. EAP usage is growing increasingly diverse, so that there was discussion about whether the the examples depict the issues encountered in existing EAP lower layer implementations, and whether the principles articulated are universal or merely true for all existing implementations. There was also discussion about the relationship between this document and "Guidance for AAA Key Management" which articulates principles that AAA Key Management solutions must satisfy to qualify for standards track publication. - Document Quality There are existing implementations of this document, and further implementations are likely. - Personnel Bernard Aboba is the document shepherd. The responsible Area Director is Jari Arkko. No IANA expert is needed. |
2007-02-13
|
22 | Dinara Suleymanova | Draft Added by Dinara Suleymanova in state Publication Requested |
2007-02-08
|
18 | (System) | New version available: draft-ietf-eap-keying-18.txt |
2007-01-22
|
17 | (System) | New version available: draft-ietf-eap-keying-17.txt |
2007-01-03
|
16 | (System) | New version available: draft-ietf-eap-keying-16.txt |
2006-10-25
|
15 | (System) | New version available: draft-ietf-eap-keying-15.txt |
2006-06-27
|
14 | (System) | New version available: draft-ietf-eap-keying-14.txt |
2006-05-02
|
13 | (System) | New version available: draft-ietf-eap-keying-13.txt |
2006-04-14
|
12 | (System) | New version available: draft-ietf-eap-keying-12.txt |
2006-04-05
|
11 | (System) | New version available: draft-ietf-eap-keying-11.txt |
2006-03-08
|
10 | (System) | New version available: draft-ietf-eap-keying-10.txt |
2006-01-09
|
09 | (System) | New version available: draft-ietf-eap-keying-09.txt |
2005-10-26
|
08 | (System) | New version available: draft-ietf-eap-keying-08.txt |
2005-07-19
|
07 | (System) | New version available: draft-ietf-eap-keying-07.txt |
2005-04-05
|
06 | (System) | New version available: draft-ietf-eap-keying-06.txt |
2005-02-21
|
05 | (System) | New version available: draft-ietf-eap-keying-05.txt |
2004-11-18
|
04 | (System) | New version available: draft-ietf-eap-keying-04.txt |
2004-07-19
|
03 | (System) | New version available: draft-ietf-eap-keying-03.txt |
2004-06-29
|
02 | (System) | New version available: draft-ietf-eap-keying-02.txt |
2003-10-28
|
01 | (System) | New version available: draft-ietf-eap-keying-01.txt |
2003-10-13
|
00 | (System) | New version available: draft-ietf-eap-keying-00.txt |