1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613
|
<pre>Network Working Group D. Stanley
Request for Comments: 4017 Agere Systems
Category: Informational J. Walker
Intel Corporation
B. Aboba
Microsoft Corporation
March 2005
<span class="h1">Extensible Authentication Protocol (EAP) Method Requirements</span>
<span class="h1">for Wireless LANs</span>
Status of this Memo
This memo provides information for the Internet community. It does
not specify an Internet standard of any kind. Distribution of this
memo is unlimited.
Copyright Notice
Copyright (C) The Internet Society (2005).
Abstract
The IEEE 802.11i MAC Security Enhancements Amendment makes use of
IEEE 802.1X, which in turn relies on the Extensible Authentication
Protocol (EAP). This document defines requirements for EAP methods
used in IEEE 802.11 wireless LAN deployments. The material in this
document has been approved by IEEE 802.11 and is being presented as
an IETF RFC for informational purposes.
Table of Contents
<a href="#section-1">1</a>. Introduction ................................................. <a href="#page-2">2</a>
<a href="#section-1.1">1.1</a>. Requirements Specification ............................. <a href="#page-2">2</a>
<a href="#section-1.2">1.2</a>. Terminology ............................................ <a href="#page-2">2</a>
<a href="#section-2">2</a>. Method Requirements .......................................... <a href="#page-3">3</a>
<a href="#section-2.1">2.1</a>. Credential Types ....................................... <a href="#page-3">3</a>
<a href="#section-2.2">2.2</a>. Mandatory Requirements ................................. <a href="#page-4">4</a>
<a href="#section-2.3">2.3</a>. Recommended Requirements ............................... <a href="#page-5">5</a>
<a href="#section-2.4">2.4</a>. Optional Features ...................................... <a href="#page-5">5</a>
<a href="#section-2.5">2.5</a>. Non-compliant EAP Authentication Methods ............... <a href="#page-5">5</a>
<a href="#section-3">3</a>. Security Considerations ...................................... <a href="#page-6">6</a>
<a href="#section-4">4</a>. References ................................................... <a href="#page-8">8</a>
Acknowledgments .................................................. <a href="#page-9">9</a>
Authors' Addresses ............................................... <a href="#page-10">10</a>
Full Copyright Statement ......................................... <a href="#page-11">11</a>
<span class="grey">Stanley, et al. Informational [Page 1]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-2" ></span>
<span class="grey"><a href="./rfc4017">RFC 4017</a> EAP Method Requirements for Wireless LANs March 2005</span>
<span class="h2"><a class="selflink" id="section-1" href="#section-1">1</a>. Introduction</span>
The IEEE 802.11i MAC Security Enhancements Amendment [<a href="#ref-IEEE802.11i" title=""Supplement to Standard for Telecommunications and Information Exchange Between Systems - LAN/MAN Specific Requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Specification for Enhanced Security"">IEEE802.11i</a>]
makes use of IEEE 802.1X [<a href="#ref-IEEE802.1X" title="IEEE Std 802.1X-2004">IEEE802.1X</a>], which in turn relies on the
Extensible Authentication Protocol (EAP), defined in [<a href="./rfc3748" title=""Extensible Authentication Protocol (EAP)"">RFC3748</a>].
Today, deployments of IEEE 802.11 wireless LANs are based on EAP and
use several EAP methods, including EAP-TLS [<a href="./rfc2716" title=""PPP EAP TLS Authentication Protocol"">RFC2716</a>], EAP-TTLS
[<a href="#ref-TTLS" title=""EAP Tunneled TLS Authentication Protocol (EAP-TTLS)"">TTLS</a>], PEAP [<a href="#ref-PEAP" title=""Protected EAP Protocol (PEAP)"">PEAP</a>], and EAP-SIM [<a href="#ref-EAPSIM" title=""EAP SIM Authentication"">EAPSIM</a>]. These methods support
authentication credentials that include digital certificates, user-
names and passwords, secure tokens, and SIM secrets.
This document defines requirements for EAP methods used in IEEE
802.11 wireless LAN deployments. EAP methods claiming conformance to
the IEEE 802.11 EAP method requirements for wireless LANs must
complete IETF last call review.
<span class="h3"><a class="selflink" id="section-1.1" href="#section-1.1">1.1</a>. Requirements Specification</span>
In this document, several words are used to signify the requirements
of the specification. The key words "MUST", "MUST NOT", "REQUIRED",
"SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY",
and "OPTIONAL" in this document are to be interpreted as described in
[<a href="./rfc2119" title=""Key words for use in RFCs to Indicate Requirement Levels"">RFC2119</a>].
An EAP authentication method is not compliant with this specification
if it fails to satisfy one or more of the MUST or MUST NOT
requirements. An EAP authentication method that satisfies all the
MUST, MUST NOT, SHOULD, and SHOULD NOT requirements is said to be
"unconditionally compliant"; one that satisfies all the MUST and MUST
NOT requirements but not all the SHOULD or SHOULD NOT requirements is
said to be "conditionally compliant".
<span class="h3"><a class="selflink" id="section-1.2" href="#section-1.2">1.2</a>. Terminology</span>
authenticator
The end of the link initiating EAP authentication. The term
authenticator is used in [<a href="#ref-IEEE802.1X" title="IEEE Std 802.1X-2004">IEEE802.1X</a>], and authenticator has the
same meaning in this document.
peer
The end of the link that responds to the authenticator. In
[<a href="#ref-IEEE802.1X" title="IEEE Std 802.1X-2004">IEEE802.1X</a>], this end is known as the supplicant.
Supplicant
The end of the link that responds to the authenticator in
[<a href="#ref-IEEE802.1X" title="IEEE Std 802.1X-2004">IEEE802.1X</a>].
<span class="grey">Stanley, et al. Informational [Page 2]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-3" ></span>
<span class="grey"><a href="./rfc4017">RFC 4017</a> EAP Method Requirements for Wireless LANs March 2005</span>
backend authentication server
A backend authentication server is an entity that provides an
authentication service to an authenticator. When used, this
server typically executes EAP methods for the authenticator. This
terminology is also used in [<a href="#ref-IEEE802.1X" title="IEEE Std 802.1X-2004">IEEE802.1X</a>].
EAP server
The entity that terminates the EAP authentication method with the
peer. In the case where no backend authentication server is used,
the EAP server is part of the authenticator. In the case where
the authenticator operates in pass-through mode, the EAP server is
located on the backend authentication server.
Master Session Key (MSK)
Keying material that is derived between the EAP peer and server
and exported by the EAP method. The MSK is at least 64 octets in
length. In existing implementations, an AAA server acting as an
EAP server transports the MSK to the authenticator.
Extended Master Session Key (EMSK)
Additional keying material derived between the EAP client and
server that is exported by the EAP method. The EMSK is at least
64 octets in length. The EMSK is not shared with the
authenticator or any other third party. The EMSK is reserved for
future uses that are not yet defined.
4-Way Handshake
A pairwise Authentication and Key Management Protocol (AKMP)
defined in [<a href="#ref-IEEE802.11i" title=""Supplement to Standard for Telecommunications and Information Exchange Between Systems - LAN/MAN Specific Requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Specification for Enhanced Security"">IEEE802.11i</a>], which confirms mutual possession of a
Pairwise Master Key by two parties and distributes a Group Key.
<span class="h2"><a class="selflink" id="section-2" href="#section-2">2</a>. Method Requirements</span>
<span class="h3"><a class="selflink" id="section-2.1" href="#section-2.1">2.1</a>. Credential Types</span>
The IEEE 802.11i MAC Security Enhancements Amendment requires that
EAP authentication methods be available. Wireless LAN deployments
are expected to use different credential types, including digital
certificates, user-names and passwords, existing secure tokens, and
mobile network credentials (GSM and UMTS secrets). Other credential
types that may be used include public/private key (without
necessarily requiring certificates) and asymmetric credential support
(such as password on one side, public/private key on the other).
<span class="grey">Stanley, et al. Informational [Page 3]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-4" ></span>
<span class="grey"><a href="./rfc4017">RFC 4017</a> EAP Method Requirements for Wireless LANs March 2005</span>
<span class="h3"><a class="selflink" id="section-2.2" href="#section-2.2">2.2</a>. Mandatory Requirements</span>
EAP authentication methods suitable for use in wireless LAN
authentication MUST satisfy the following criteria:
[<a id="ref-1">1</a>] Generation of symmetric keying material. This corresponds to
the "Key derivation" security claim defined in <a href="./rfc3748#section-7.2.1">[RFC3748],
Section 7.2.1</a>.
[<a id="ref-2">2</a>] Key strength. An EAP method suitable for use with IEEE 802.11
MUST be capable of generating keying material with 128-bits of
effective key strength, as defined in <a href="./rfc3748#section-7.2.1">[RFC3748], Section 7.2.1</a>.
As noted in <a href="./rfc3748#section-7.10">[RFC3748], Section 7.10</a>, an EAP method supporting
key derivation MUST export a Master Session Key (MSK) of at
least 64 octets, and an Extended Master Session Key (EMSK) of at
least 64 octets.
[<a id="ref-3">3</a>] Mutual authentication support. This corresponds to the "Mutual
authentication" security claim defined in [<a href="./rfc3748" title=""Extensible Authentication Protocol (EAP)"">RFC3748</a>], <a href="#section-7.2.1">Section</a>
<a href="#section-7.2.1">7.2.1</a>.
[<a id="ref-4">4</a>] Shared state equivalence. The shared EAP method state of the
EAP peer and server must be equivalent when the EAP method is
successfully completed on both sides. This includes the
internal state of the authentication protocol but not the state
external to the EAP method, such as the negotiation occurring
prior to initiation of the EAP method. The exact state
attributes that are shared may vary from method to method, but
typically include the method version number, the credentials
presented and accepted by both parties, the cryptographic keys
shared, and the EAP method specific attributes negotiated, such
as ciphersuites and limitations of usage on all protocol state.
Both parties must be able to distinguish this instance of the
protocol from all other instances of the protocol, and they must
share the same view regarding which state attributes are public
and which are private to the two parties alone. The server must
obtain the authenticated peer name, and the peer must obtain the
authenticated server name (if the authenticated server name is
available).
[<a id="ref-5">5</a>] Resistance to dictionary attacks. This corresponds to the
"Dictionary attack resistance" security claim defined in
<a href="./rfc3748#section-7.2.1">[RFC3748], Section 7.2.1</a>.
[<a id="ref-6">6</a>] Protection against man-in-the-middle attacks. This corresponds
to the "Cryptographic binding", "Integrity protection", "Replay
protection", and "Session independence" security claims defined
in <a href="./rfc3748#section-7.2.1">[RFC3748], Section 7.2.1</a>.
<span class="grey">Stanley, et al. Informational [Page 4]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-5" ></span>
<span class="grey"><a href="./rfc4017">RFC 4017</a> EAP Method Requirements for Wireless LANs March 2005</span>
[<a id="ref-7">7</a>] Protected ciphersuite negotiation. If the method negotiates the
ciphersuite used to protect the EAP conversation, then it MUST
support the "Protected ciphersuite negotiation" security claim
defined in <a href="./rfc3748#section-7.2.1">[RFC3748], Section 7.2.1</a>.
<span class="h3"><a class="selflink" id="section-2.3" href="#section-2.3">2.3</a>. Recommended Requirements</span>
EAP authentication methods used for wireless LAN authentication
SHOULD support the following features:
[<a id="ref-8">8</a>] Fragmentation. This implies support for the "Fragmentation"
claim defined in [<a href="./rfc3748" title=""Extensible Authentication Protocol (EAP)"">RFC3748</a>], <a href="./rfc3748#section-7.2.1">Section 7.2.1. [RFC3748]</a>, <a href="#section-3.1">Section</a>
<a href="#section-3.1">3.1</a> states: "EAP methods can assume a minimum EAP MTU of 1020
octets, in the absence of other information. EAP methods SHOULD
include support for fragmentation and reassembly if their
payloads can be larger than this minimum EAP MTU."
[<a id="ref-9">9</a>] End-user identity hiding. This corresponds to the
"Confidentiality" security claim defined in [<a href="./rfc3748" title=""Extensible Authentication Protocol (EAP)"">RFC3748</a>], <a href="#section-7.2.1">Section</a>
<a href="#section-7.2.1">7.2.1</a>.
<span class="h3"><a class="selflink" id="section-2.4" href="#section-2.4">2.4</a>. Optional Features</span>
EAP authentication methods used for wireless LAN authentication MAY
support the following features:
[<a id="ref-10">10</a>] Channel binding. This corresponds to the "Channel binding"
security claim defined in <a href="./rfc3748#section-7.2.1">[RFC3748], Section 7.2.1</a>.
[<a id="ref-11">11</a>] Fast reconnect. This corresponds to the "Fast reconnect"
security claim defined in <a href="./rfc3748#section-7.2.1">[RFC3748], Section 7.2.1</a>.
<span class="h3"><a class="selflink" id="section-2.5" href="#section-2.5">2.5</a>. Non-compliant EAP Authentication Methods</span>
EAP-MD5-Challenge (the current mandatory-to-implement EAP
authentication method), is defined in <a href="./rfc3748#section-5.4">[RFC3748], Section 5.4</a>. As
defined in [<a href="./rfc3748" title=""Extensible Authentication Protocol (EAP)"">RFC3748</a>], EAP-MD5-Challenge, One-Time Password (<a href="#section-5.5">Section</a>
<a href="#section-5.5">5.5</a>), and Generic Token Card (<a href="#section-5.6">Section 5.6</a>) are non-compliant with the
requirements specified in this document. As noted in [<a href="./rfc3748" title=""Extensible Authentication Protocol (EAP)"">RFC3748</a>],
these methods do not support any of the mandatory requirements
defined in <a href="#section-2.2">Section 2.2</a>, including key derivation and mutual
authentication. In addition, these methods do not support any of the
recommended features defined in <a href="#section-2.3">Section 2.3</a> or any of the optional
features defined in <a href="#section-2.4">Section 2.4</a>.
<span class="grey">Stanley, et al. Informational [Page 5]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-6" ></span>
<span class="grey"><a href="./rfc4017">RFC 4017</a> EAP Method Requirements for Wireless LANs March 2005</span>
<span class="h2"><a class="selflink" id="section-3" href="#section-3">3</a>. Security Considerations</span>
Within [<a href="#ref-IEEE802.11i" title=""Supplement to Standard for Telecommunications and Information Exchange Between Systems - LAN/MAN Specific Requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Specification for Enhanced Security"">IEEE802.11i</a>], EAP is used for both authentication and key
exchange between the EAP peer and server. Given that wireless local
area networks provide ready access to an attacker within range, EAP
usage within [<a href="#ref-IEEE802.11i" title=""Supplement to Standard for Telecommunications and Information Exchange Between Systems - LAN/MAN Specific Requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Specification for Enhanced Security"">IEEE802.11i</a>] is subject to the threats outlined in
<a href="./rfc3748#section-7.1">[RFC3748], Section 7.1</a>. Security considerations relating to EAP are
discussed in [<a href="./rfc3748" title=""Extensible Authentication Protocol (EAP)"">RFC3748</a>], Sections <a href="#section-7">7</a>; where an authentication server is
utilized, the security considerations described in [<a href="./rfc3579" title=""RADIUS (Remote Authentication Dial In User Service) Support For Extensible Authentication Protocol (EAP)"">RFC3579</a>], <a href="#section-4">Section</a>
<a href="#section-4">4</a>, will apply.
The system security properties required to address the threats
described in <a href="./rfc3748#section-7.1">[RFC3748], Section 7.1</a>, are noted in [<a href="#ref-Housley56" title=""Key Management in AAA"">Housley56</a>]. In
the material below, the requirements articulated in [<a href="#ref-Housley56" title=""Key Management in AAA"">Housley56</a>] are
listed, along with the corresponding recommendations.
Algorithm independence
Requirement: "Wherever cryptographic algorithms are chosen, the
algorithms must be negotiable, in order to provide resilience
against compromise of a particular cryptographic algorithm."
This issue is addressed by mandatory requirement [<a href="#ref-7">7</a>] in <a href="#section-2.2">Section</a>
<a href="#section-2.2">2.2</a>. Algorithm independence is one of the EAP invariants
described in [<a href="#ref-KEYFRAME" title=""EAP Key Management Framework"">KEYFRAME</a>].
Strong, fresh session keys
Requirement: "Session keys must be demonstrated to be strong and
fresh in all circumstances, while at the same time retaining
algorithm independence."
Key strength is addressed by mandatory requirement [<a href="#ref-2">2</a>] in <a href="#section-2.2">Section</a>
<a href="#section-2.2">2.2</a>. Recommendations for ensuring the Freshness of keys derived
by EAP methods are discussed in <a href="./rfc3748#section-7.10">[RFC3748], Section 7.10</a>.
Replay protection
Requirement: "All protocol exchanges must be replay protected."
This is addressed by mandatory requirement [<a href="#ref-6">6</a>] in <a href="#section-2.2">Section 2.2</a>.
Authentication
Requirements: "All parties need to be authenticated. The
confidentiality of the authenticator must be maintained. No
plaintext passwords are allowed."
<span class="grey">Stanley, et al. Informational [Page 6]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-7" ></span>
<span class="grey"><a href="./rfc4017">RFC 4017</a> EAP Method Requirements for Wireless LANs March 2005</span>
Mutual authentication is required as part of mandatory requirement
[<a href="#ref-3">3</a>] in <a href="#section-2.2">Section 2.2</a>. Identity protection is a recommended
capability, described in requirement [<a href="#ref-9">9</a>] in <a href="#section-2.3">Section 2.3</a>. EAP does
not support plaintext passwords, as noted in [<a href="./rfc3748" title=""Extensible Authentication Protocol (EAP)"">RFC3748</a>], <a href="#section-7.14">Section</a>
<a href="#section-7.14">7.14</a>.
Authorization
Requirement: "EAP peer and authenticator authorization must be
performed."
Authorization issues are discussed in [<a href="./rfc3748" title=""Extensible Authentication Protocol (EAP)"">RFC3748</a>], Sections <a href="#section-1.2">1.2</a> and
7.16. Authentication, Authorization, and Accounting (AAA)
protocols such as RADIUS [<a href="./rfc2865" title=""Remote Authentication Dial In User Service (RADIUS)"">RFC2865</a>][RFC3579] may be used to enable
authorization of EAP peers by a central authority. AAA
authorization issues are discussed in [<a href="./rfc3579" title=""RADIUS (Remote Authentication Dial In User Service) Support For Extensible Authentication Protocol (EAP)"">RFC3579</a>], Sections <a href="#section-2.6.3">2.6.3</a>
and 4.3.7.
Session keys
Requirement: "Confidentiality of session keys must be maintained."
Issues relating to Key Derivation are described in <a href="./rfc3748#section-7.10">[RFC3748],
Section 7.10</a>, as well as in [<a href="#ref-KEYFRAME" title=""EAP Key Management Framework"">KEYFRAME</a>].
Ciphersuite negotiation
Requirement: "The selection of the "best" ciphersuite must be
securely confirmed."
This is addressed in mandatory requirement [<a href="#ref-7">7</a>] in <a href="#section-2.2">Section 2.2</a>.
Unique naming
Requirement: "Session keys must be uniquely named."
Key naming issues are addressed in [<a href="#ref-KEYFRAME" title=""EAP Key Management Framework"">KEYFRAME</a>].
Domino effect
Requirement: "Compromise of a single authenticator cannot
compromise any other part of the system, including session keys
and long-term secrets."
This issue is addressed by mandatory requirement [<a href="#ref-6">6</a>] in <a href="#section-2.2">Section</a>
<a href="#section-2.2">2.2</a>.
Key binding
Requirement: "The key must be bound to the appropriate context."
This issue is addressed in optional requirement [<a href="#ref-10">10</a>] in <a href="#section-2.4">Section</a>
<a href="#section-2.4">2.4</a>. Channel binding is also discussed in <a href="./rfc3748#section-7.15">Section 7.15 of
[RFC3748]</a> and <a href="./rfc3579#section-4.3.7">Section 4.3.7 of [RFC3579]</a>.
<span class="grey">Stanley, et al. Informational [Page 7]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-8" ></span>
<span class="grey"><a href="./rfc4017">RFC 4017</a> EAP Method Requirements for Wireless LANs March 2005</span>
<span class="h2"><a class="selflink" id="section-4" href="#section-4">4</a>. References</span>
<span class="h3"><a class="selflink" id="section-4.1" href="#section-4.1">4.1</a>. Normative References</span>
[<a id="ref-RFC2119">RFC2119</a>] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", <a href="https://www.rfc-editor.org/bcp/bcp14">BCP 14</a>, <a href="./rfc2119">RFC 2119</a>, March 1997.
[<a id="ref-RFC2865">RFC2865</a>] Rigney, C., Willens, S., Rubens, A., and W. Simpson,
"Remote Authentication Dial In User Service (RADIUS)",
<a href="./rfc2865">RFC 2865</a>, June 2000.
[<a id="ref-RFC3579">RFC3579</a>] Aboba, B. and P. Calhoun, "RADIUS (Remote
Authentication Dial In User Service) Support For
Extensible Authentication Protocol (EAP)", <a href="./rfc3579">RFC 3579</a>,
September 2003.
[<a id="ref-RFC3748">RFC3748</a>] Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., and
H. Levkowetz, "Extensible Authentication Protocol
(EAP)", <a href="./rfc3748">RFC 3748</a>, June 2004.
[<a id="ref-802.11">802.11</a>] Information technology - Telecommunications and
information exchange between systems - Local and
metropolitan area networks - Specific Requirements Part
11: Wireless LAN Medium Access Control (MAC) and
Physical Layer (PHY) Specifications, IEEE Std. 802.11-
2003, 2003.
[<a id="ref-IEEE802.1X">IEEE802.1X</a>] IEEE Standards for Local and Metropolitan Area
Networks: Port based Network Access Control, IEEE Std
802.1X-2004, December 2004.
[<a id="ref-IEEE802.11i">IEEE802.11i</a>] Institute of Electrical and Electronics Engineers,
"Supplement to Standard for Telecommunications and
Information Exchange Between Systems - LAN/MAN Specific
Requirements - Part 11: Wireless LAN Medium Access
Control (MAC) and Physical Layer (PHY) Specifications:
Specification for Enhanced Security", IEEE 802.11i,
July 2004.
<span class="grey">Stanley, et al. Informational [Page 8]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-9" ></span>
<span class="grey"><a href="./rfc4017">RFC 4017</a> EAP Method Requirements for Wireless LANs March 2005</span>
<span class="h3"><a class="selflink" id="section-4.2" href="#section-4.2">4.2</a>. Informative References</span>
[<a id="ref-Housley56">Housley56</a>] Housley, R., "Key Management in AAA", Presentation to
the AAA WG at IETF 56,
<a href="http://www.ietf.org/proceedings/03mar/slides/aaa-5/index.html">http://www.ietf.org/proceedings/03mar/slides/aaa-</a>
<a href="http://www.ietf.org/proceedings/03mar/slides/aaa-5/index.html">5/index.html</a>, March 2003.
[<a id="ref-RFC2716">RFC2716</a>] Aboba, B. and D. Simon, "PPP EAP TLS Authentication
Protocol", <a href="./rfc2716">RFC 2716</a>, October 1999.
[<a id="ref-PEAP">PEAP</a>] Palekar, A., et al., <a style="text-decoration: none" href='https://www.google.com/search?sitesearch=datatracker.ietf.org%2Fdoc%2Fhtml%2F&q=inurl:draft-+%22Protected+EAP+Protocol+%28PEAP%29%22'>"Protected EAP Protocol (PEAP)"</a>,
Work in Progress, July 2004.
[<a id="ref-TTLS">TTLS</a>] Funk, P. and S. Blake-Wilson, "EAP Tunneled TLS
Authentication Protocol (EAP-TTLS)", Work in Progress,
August 2004.
[<a id="ref-EAPSIM">EAPSIM</a>] Haverinen, H. and J. Salowey, <a style="text-decoration: none" href='https://www.google.com/search?sitesearch=datatracker.ietf.org%2Fdoc%2Fhtml%2F&q=inurl:draft-+%22EAP+SIM+Authentication%22'>"EAP SIM Authentication"</a>,
Work in Progress, April 2004.
[<a id="ref-KEYFRAME">KEYFRAME</a>] Aboba, B., et al., <a style="text-decoration: none" href='https://www.google.com/search?sitesearch=datatracker.ietf.org%2Fdoc%2Fhtml%2F&q=inurl:draft-+%22EAP+Key+Management+Framework%22'>"EAP Key Management Framework"</a>, Work
in Progress, July 2004.
Acknowledgements
The authors would like to acknowledge contributions to this document
from members of the IEEE 802.11i Task Group, including Russ Housley
of Vigil Security, David Nelson of Enterasys Networks and Clint
Chaplin of Symbol Technologies, as well as members of the EAP WG
including Joe Salowey of Cisco Systems, Pasi Eronen of Nokia, Jari
Arkko of Ericsson, and Florent Bersani of France Telecom.
<span class="grey">Stanley, et al. Informational [Page 9]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-10" ></span>
<span class="grey"><a href="./rfc4017">RFC 4017</a> EAP Method Requirements for Wireless LANs March 2005</span>
Authors' Addresses
Dorothy Stanley
Agere Systems
2000 North Naperville Rd.
Naperville, IL 60566
Phone: +1 630 979 1572
EMail: dstanley@agere.com
Jesse R. Walker
Intel Corporation
2111 N.E. 25th Avenue
Hillsboro, OR 97214
EMail: jesse.walker@intel.com
Bernard Aboba
Microsoft Corporation
One Microsoft Way
Redmond, WA 98052
Phone: +1 425 818 4011
Fax: +1 425 936 7329
EMail: bernarda@microsoft.com
<span class="grey">Stanley, et al. Informational [Page 10]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-11" ></span>
<span class="grey"><a href="./rfc4017">RFC 4017</a> EAP Method Requirements for Wireless LANs March 2005</span>
Full Copyright Statement
Copyright (C) The Internet Society (2005).
This document is subject to the rights, licenses and restrictions
contained in <a href="https://www.rfc-editor.org/bcp/bcp78">BCP 78</a>, and except as set forth therein, the authors
retain all their rights.
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Intellectual Property
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in <a href="https://www.rfc-editor.org/bcp/bcp78">BCP 78</a> and <a href="https://www.rfc-editor.org/bcp/bcp79">BCP 79</a>.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
<a href="http://www.ietf.org/ipr">http://www.ietf.org/ipr</a>.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at ietf-
ipr@ietf.org.
Acknowledgement
Funding for the RFC Editor function is currently provided by the
Internet Society.
Stanley, et al. Informational [Page 11]
</pre>
|