Mercurial > hg > ietf
comparison New_ERP_draft.txt @ 15:a55830de00df
Update to latest
author | Sebastien Decugis <sdecugis@nict.go.jp> |
---|---|
date | Wed, 18 Mar 2009 14:20:14 +0900 |
parents | ece18f20b72c |
children | 258e3618b438 |
comparison
equal
deleted
inserted
replaced
14:1c2d1b7327af | 15:a55830de00df |
---|---|
1 ===================== | 1 ===================== |
2 changeset: 13:aa31cf892b1b | |
3 parent: 11:c8dd0bdbd9e6 | |
4 user: Sebastien Decugis <sdecugis@nict.go.jp> | |
5 date: Wed Mar 18 14:21:19 2009 +0900 | |
6 summary: Yet more cleanups... | |
7 | |
2 changeset: 11:c8dd0bdbd9e6 | 8 changeset: 11:c8dd0bdbd9e6 |
3 tag: tip | |
4 user: Sebastien Decugis <sdecugis@nict.go.jp> | 9 user: Sebastien Decugis <sdecugis@nict.go.jp> |
5 date: Wed Mar 18 14:16:22 2009 +0900 | 10 date: Wed Mar 18 14:16:22 2009 +0900 |
6 summary: More cleanups. | 11 summary: More cleanups. |
7 | 12 |
8 changeset: 9:5fdd3345477f | 13 changeset: 9:5fdd3345477f |
126 deployed as well. See the following sections for more details about | 131 deployed as well. See the following sections for more details about |
127 bootstrapping scenarii. | 132 bootstrapping scenarii. |
128 | 133 |
129 ER server | 134 ER server |
130 (bootstrapped) | 135 (bootstrapped) |
131 Peer Authenticator (local or home domain) | 136 Peer Authenticator (local or home domain) |
132 | 137 ==== ============= ====================== |
133 ==== ============= ====================== | |
134 [ <------------------------ ] | 138 [ <------------------------ ] |
135 [optional EAP-Initiate/Re-auth-start] | 139 [optional EAP-Initiate/Re-auth-start] |
136 | 140 |
137 -----------------------> | 141 -----------------------> |
138 EAP-Initiate/Re-auth | 142 EAP-Initiate/Re-auth |
282 | 286 |
283 Figure 4. Implicit ERP bootstrapping during full EAP authentication. | 287 Figure 4. Implicit ERP bootstrapping during full EAP authentication. |
284 | 288 |
285 | 289 |
286 | 290 |
287 *Scenario 4: Case of MIP6* | 291 *Scenario 3: Case of MIP6* |
288 | 292 |
289 {TODO: study this case ?} | 293 {TODO: study this case ?} |
290 | 294 |
291 | 295 |
292 | 296 |
293 *Scenario 5: Other possibilities* | 297 *Scenario 4: Other possibilities* |
294 | 298 |
295 {In case implementation-specific solution is retained, list here the | 299 {In case implementation-specific solution is retained, list here the |
296 constraints?} | 300 constraints?} |
297 | 301 |
298 | 302 |
346 { ERP-RK-Name } | 350 { ERP-RK-Name } |
347 { ERP-RK-Lifetime } | 351 { ERP-RK-Lifetime } |
348 * [ AVP ] | 352 * [ AVP ] |
349 | 353 |
350 | 354 |
355 | |
351 *ERP-RK AVP* | 356 *ERP-RK AVP* |
352 | 357 |
353 The ERP-RK AVP (AVP Code TBD) is of type OctetString. It contains the root key | 358 The ERP-RK AVP (AVP Code TBD) is of type OctetString. It contains the root key |
354 (either rRK or rDSRK) to be used for ERP with the peer to which this session | 359 (either rRK or rDSRK) to be used for ERP with the peer to which this session |
355 belongs. How this material is derived and used is specified in [RFC5296]. | 360 belongs. How this material is derived and used is specified in [RFC5296]. |