EAP Extensions for Efficient Re-authentication
draft-vidya-eap-er-02
Document | Type |
Expired Internet-Draft
(individual)
Expired & archived
|
|
---|---|---|---|
Authors | Vidya Narayanan , Lakshminath R. Dondeti | ||
Last updated | 2007-01-22 | ||
RFC stream | (None) | ||
Intended RFC status | (None) | ||
Formats | |||
Stream | Stream state | (No stream defined) | |
Consensus boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Expired | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
The extensible authentication protocol (EAP) is a generic framework supporting multiple types of authentication methods. In the most common deployment scenario, a peer and server authenticate each other through an authenticator; the server sends the master session key (MSK) to the authenticator so that the peer and the authenticator can establish a security association for per-packet access enforcement. It is desirable to not repeat the entire process of authentication when the peer moves to another authenticator. This document specifies extensions to EAP keying hierarchy and an EAP method- independent protocol to facilitate such efficient Re-authentication between the peer and the server through an authenticator.
Authors
Vidya Narayanan
Lakshminath R. Dondeti
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)