Quantcast
Channel: Internet Drafts: emu
Browsing all 26 articles
Browse latest View live
↧

"Improved Extensible Authentication Protocol Method for 3GPP Mobile Network...

2019-07-08, rev -05: The 3GPP Mobile Network Authentication and Key Agreement (AKA) is the primary authentication mechanism for devices wishing to access mobile networks. RFC 4187 (EAP-AKA) made the...

View Article


"Perfect-Forward Secrecy for the Extensible Authentication Protocol Method...

2019-07-25, rev -00: Many different attacks have been reported as part of revelations associated with pervasive surveillance. Some of the reported attacks involved compromising smart cards, such as...

View Article


"Handling Large Certificates and Long Certificate Chains in TLS-based EAP...

2019-08-13, rev -00: EAP-TLS and other TLS-based EAP methods are widely deployed and used for network access authentication. Large certificates and long certificate chains combined with authenticators...

View Article

"EAP Session-Id Derivation" - Alan DeKok

2019-08-29, rev -00: EAP Session-Id derivation has not been defined for EAP-SIM or EAP-AKA when using the fast re-authentication exchange instead of full authentication. This document updates RFC 5247...

View Article

"Using EAP-TLS with TLS 1.3" - John Mattsson, Mohit Sethi

2019-09-21, rev -07: This document specifies the use of EAP-TLS with TLS 1.3 while remaining backwards compatible with existing implementations of EAP- TLS. TLS 1.3 provides significantly improved...

View Article


"Perfect-Forward Secrecy for the Extensible Authentication Protocol Method...

2019-11-04, rev -01: Many different attacks have been reported as part of revelations associated with pervasive surveillance. Some of the reported attacks involved compromising smart cards, such as...

View Article

"EAP Session-Id Derivation for EAP-SIM, EAP-AKA, and PEAP" - Alan DeKok

2019-11-04, rev -01: EAP Session-Id derivation has not been defined for EAP-SIM or EAP-AKA when using the fast re-authentication exchange instead of full authentication. This document updates RFC 5247...

View Article

"Perfect-Forward Secrecy for the Extensible Authentication Protocol Method...

2019-11-17, rev -02: Many different attacks have been reported as part of revelations associated with pervasive surveillance. Some of the reported attacks involved compromising smart cards, such as...

View Article


"Improved Extensible Authentication Protocol Method for 3GPP Mobile Network...

2019-11-17, rev -06: The 3GPP Mobile Network Authentication and Key Agreement (AKA) is the primary authentication mechanism for devices wishing to access mobile networks. RFC 4187 (EAP-AKA) made the...

View Article


"Using EAP-TLS with TLS 1.3" - John Mattsson, Mohit Sethi

2019-12-27, rev -08: This document specifies the use of EAP-TLS with TLS 1.3 while remaining backwards compatible with existing implementations of EAP- TLS. TLS 1.3 provides significantly improved...

View Article

"EAP Session-Id Derivation for EAP-SIM, EAP-AKA, and PEAP" - Alan DeKok

2020-01-07, rev -02: EAP Session-Id derivation has not been defined for EAP-SIM or EAP-AKA when using the fast re-authentication exchange instead of full authentication. This document updates RFC 5247...

View Article

"Using EAP-TLS with TLS 1.3" - John Mattsson, Mohit Sethi

2020-03-09, rev -09: This document specifies the use of EAP-TLS with TLS 1.3 while remaining backwards compatible with existing implementations of EAP- TLS. TLS 1.3 provides significantly improved...

View Article

"Improved Extensible Authentication Protocol Method for 3GPP Mobile Network...

2020-03-09, rev -07: The 3GPP Mobile Network Authentication and Key Agreement (AKA) is the primary authentication mechanism for devices wishing to access mobile networks. RFC 4187 (EAP-AKA) made the...

View Article


"Handling Large Certificates and Long Certificate Chains in TLS-based EAP...

2020-03-16, rev -02: EAP-TLS and other TLS-based EAP methods are widely deployed and used for network access authentication. Large certificates and long certificate chains combined with authenticators...

View Article

"Nimble out-of-band authentication for EAP (EAP-NOOB)" - Tuomas Aura, Mohit...

2020-05-05, rev -00: Extensible Authentication Protocol (EAP) provides support for multiple authentication methods. This document defines the EAP-NOOB authentication method for nimble out-of-band (OOB)...

View Article


"Handling Large Certificates and Long Certificate Chains in TLS-based EAP...

2020-05-09, rev -03: EAP-TLS and other TLS-based EAP methods are widely deployed and used for network access authentication. Large certificates and long certificate chains combined with authenticators...

View Article

"TLS-based EAP types and TLS 1.3" - Alan DeKok

2020-05-14, rev -00: EAP-TLS [RFC5216] is being updated for TLS 1.3 in [EAPTLS]. Many other EAP [RFC3748] and [RFC5247] types also depend on TLS, such as FAST [RFC4851], TTLS [RFC5281], TEAP [RFC7170],...

View Article


"Perfect-Forward Secrecy for the Extensible Authentication Protocol Method...

2020-05-25, rev -04: Many different attacks have been reported as part of revelations associated with pervasive surveillance. Some of the reported attacks involved compromising smart cards, such as...

View Article

"EAP Session-Id Derivation for EAP-SIM, EAP-AKA, and PEAP" - Alan DeKok

2020-05-27, rev -04: EAP Session-Id derivation has not been defined for EAP-SIM or EAP-AKA when using the fast re-authentication exchange instead of full authentication. This document updates RFC 5247...

View Article

"Nimble out-of-band authentication for EAP (EAP-NOOB)" - Tuomas Aura, Mohit...

2020-06-01, rev -01: Extensible Authentication Protocol (EAP) provides support for multiple authentication methods. This document defines the EAP-NOOB authentication method for nimble out-of-band (OOB)...

View Article
Browsing all 26 articles
Browse latest View live