EAP Re-authentication Protocol Extensions for Authenticated Anticipatory Keying (ERP/AAK)

The Extensible Authentication Protocol (EAP) is a generic framework supporting multiple types of authentication methods. The EAP Re- authentication Protocol (ERP) specifies extensions to EAP and the EAP keying hierarchy to support an EAP method-independent protocol for efficient re-authentication between the peer and an EAP re- authentication server through any authenticator. Authenticated Anticipatory Keying (AAK) is a method by which cryptographic keying material may be established prior to handover upon one or more candidate attachment points (CAPs), AAK uses the AAA infrastructure for key transport. This document specifies the extensions necessary to enable AAK support in ERP.

[1]  Ralph E. Droms,et al.  Dynamic Host Configuration Protocol for IPv6 (DHCPv6) , 2003, RFC.

[2]  Sheila Frankel,et al.  Using HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 with IPsec , 2007, RFC.

[3]  Thomas Narten,et al.  Guidelines for Writing an IANA Considerations Section in RFCs , 1998, RFC.

[4]  Larry J. Blunk,et al.  PPP Extensible Authentication Protocol (EAP) , 1998, RFC.

[5]  John C. Klensin,et al.  Internationalized Domain Names for Applications ( IDNA ) : Definitions and Document Framework , 2022 .

[6]  C. Perkins,et al.  Internet Engineering Task Force J . Bound INTERNET DRAFT Compaq DHC Working Group , 1998 .

[7]  Bernard Aboba,et al.  Extensible Authentication Protocol (EAP) , 2004, RFC.

[8]  Hugo Krawczyk,et al.  HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.

[9]  Scott O. Bradner,et al.  Key words for use in RFCs to Indicate Requirement Levels , 1997, RFC.

[10]  Zhen Cao,et al.  EAP Extensions for the EAP Re-authentication Protocol (ERP) , 2012, RFC.

[11]  Glen Zorn,et al.  Extensible Authentication Protocol (EAP) Early Authentication Problem Statement , 2010, RFC.

[12]  Vidya Narayanan,et al.  Specification for the Derivation of Root Keys from an Extended Master Session Key (EMSK) , 2008, RFC.

[13]  Victor Fajardo,et al.  Diameter Base Protocol , 2003, RFC.

[14]  Glen Zorn,et al.  Diameter Attribute-Value Pairs for Cryptographic Key Transport , 2012, RFC.

[15]  Russ Housley,et al.  Guidance for Authentication, Authorization, and Accounting (AAA) Key Management , 2007, RFC.

[16]  Jari Arkko,et al.  The Network Access Identifier , 2005, RFC.