protected eap tlv ietf 56
play

Protected EAP-TLV IETF 56 - PowerPoint PPT Presentation

Protected EAP-TLV IETF 56 (internet-draft-salowey-eap-protectedtlv-01.txt) Joe Salowey (jsalowey@cisco.com) Protected TLV TLVs can carry data related to authorization, session attributes etc. Protect against eaves droppers and men


  1. Protected EAP-TLV IETF 56 (internet-draft-salowey-eap-protectedtlv-01.txt) Joe Salowey (jsalowey@cisco.com)

  2. Protected TLV • TLVs can carry data related to authorization, session attributes etc. • Protect against eaves droppers and men in the middle. • Provide encryption and authentication for EAP-TLVs chained after authentication • Keys derived from EMSK • Used in unprotected tunnel

  3. Issues • Relies on consistent key derivation from EMSK • Similar to crypto binding TLV in binding problem draft (draft-puthenkulam-eap-binding-02.txt)

  4. Questions? http://www.ietf.org/internet- drafts/draft/salowey-eap-protectedtlv-01.txt jsalowey@cisco.com

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend