protected eap tlv ietf 56
play

Protected EAP-TLV IETF 56 - PowerPoint PPT Presentation

Protected EAP-TLV IETF 56 (internet-draft-salowey-eap-protectedtlv-01.txt) Joe Salowey (jsalowey@cisco.com) Protected TLV TLVs can carry data related to authorization, session attributes etc. Protect against eaves droppers and men


  1. Protected EAP-TLV IETF 56 (internet-draft-salowey-eap-protectedtlv-01.txt) Joe Salowey (jsalowey@cisco.com)

  2. Protected TLV • TLVs can carry data related to authorization, session attributes etc. • Protect against eaves droppers and men in the middle. • Provide encryption and authentication for EAP-TLVs chained after authentication • Keys derived from EMSK • Used in unprotected tunnel

  3. Issues • Relies on consistent key derivation from EMSK • Similar to crypto binding TLV in binding problem draft (draft-puthenkulam-eap-binding-02.txt)

  4. Questions? http://www.ietf.org/internet- drafts/draft/salowey-eap-protectedtlv-01.txt jsalowey@cisco.com

Recommend


More recommend