Protected EAP-TLV IETF 56 - - PowerPoint PPT Presentation

protected eap tlv ietf 56
SMART_READER_LITE
LIVE PREVIEW

Protected EAP-TLV IETF 56 - - PowerPoint PPT Presentation

Protected EAP-TLV IETF 56 (internet-draft-salowey-eap-protectedtlv-01.txt) Joe Salowey (jsalowey@cisco.com) Protected TLV TLVs can carry data related to authorization, session attributes etc. Protect against eaves droppers and men


slide-1
SLIDE 1

Protected EAP-TLV IETF 56

(internet-draft-salowey-eap-protectedtlv-01.txt)

Joe Salowey (jsalowey@cisco.com)

slide-2
SLIDE 2

Protected TLV

  • TLVs can carry data related to

authorization, session attributes etc.

  • Protect against eaves droppers and men

in the middle.

  • Provide encryption and authentication for

EAP-TLVs chained after authentication

  • Keys derived from EMSK
  • Used in unprotected tunnel
slide-3
SLIDE 3

Issues

  • Relies on consistent key derivation from

EMSK

  • Similar to crypto binding TLV in binding

problem draft (draft-puthenkulam-eap-binding-02.txt)

slide-4
SLIDE 4

Questions?

http://www.ietf.org/internet- drafts/draft/salowey-eap-protectedtlv-01.txt jsalowey@cisco.com