# HG changeset patch # User Sebastien Decugis # Date 1287730045 -32400 # Node ID 067a0092bb64a509bd320d94539c0d95eb36a409 # Parent 4890fc91096d90972f31924349c92a1c226baeac Fix version number diff -r 4890fc91096d -r 067a0092bb64 draft-ietf-dime-erp-05.xml --- a/draft-ietf-dime-erp-05.xml Fri Oct 22 15:46:32 2010 +0900 +++ b/draft-ietf-dime-erp-05.xml Fri Oct 22 15:47:25 2010 +0900 @@ -24,7 +24,7 @@ - + Diameter Support for the EAP Re-authentication Protocol (ERP) @@ -407,7 +407,7 @@ (code TBD) Extract and cache the content of the Key AVP with Key-Type set - to rRK, as described in implicit scenario. + to rRK, as described in implicit scenario. The ERP/DEA message is then forwarded to the authenticator, that can use the rMSK as described in RFC 5296. The figure below captures this @@ -494,7 +494,7 @@ The Auth-Request-Type AVP content is set to [Editor's note: FFS - -- cf. open issues]. + -- cf. open issues]. The EAP-Payload AVP contains the EAP-Initiate/Re-Auth message. @@ -612,7 +612,7 @@ authenticator learn what the home domain is?) how does the peer learn the ERP domain of the new authenticator - -- this is being addressed in HOKEY architecture draft; + -- this is being addressed in HOKEY architecture draft; how does the home server reachs the peer to for example terminate the session if there is no notification sent to the home domain;