Skip to main content

EAP-Based Keying for IP Mobility Protocols
draft-vidya-eap-usrk-ip-mobility-01

Document Type Expired Internet-Draft (individual in sec area)
Expired & archived
Authors Vidya Narayanan , Gerardo Giaretta
Last updated 2015-10-14 (Latest revision 2007-11-16)
RFC stream Internet Engineering Task Force (IETF)
Intended RFC status (None)
Formats
Stream WG state (None)
Document shepherd (None)
IESG IESG state Expired (IESG: Dead)
Action Holders
(None)
Consensus boilerplate Unknown
Telechat date (None)
Responsible AD Tim Polk
IESG note
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

EAP [1] is increasingly used for network access authentication in various networks. Also, key generating EAP methods are being adopted in various systems for the purposes of cryptographic protection between an EAP peer and an enforcement point in the network. Key generating EAP methods produce an MSK and an EMSK in accordance with [1]. The MSK is meant for use by the EAP lower layer at the peer and the authenticator and is used differently by various lower layers. The EMSK hierarchy is defined in [2]. The EMSK hierarchy is meant to be extensible to derive keys for various usages. This document defines the key hierarchy and key derivations for using the EMSK hierarchy for keying in IP mobility protocols.

Authors

Vidya Narayanan
Gerardo Giaretta

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)