Technical Summary
This document specifies the EAP key hierarchy and provides a
framework for the transport and usage of keying material generated
by EAP authentication algorithms, known as "methods". It also
provides a system-level security analysis, according to the
principles described in "Guidance for AAA Key Management".
Working Group Summary
Much of the WG discussion of this document centered on aspects of
key management, including key creation, deletion, transport and
naming. EAP usage is growing increasingly diverse, so that there
was discussion about whether the the examples depict the issues
encountered in existing EAP lower layer implementations, and whether
the principles articulated are universal or merely true for all
existing implementations. There was also discussion about
the relationship between this document and "Guidance for AAA Key
Management" which articulates principles that AAA Key Management
solutions must satisfy to qualify for standards track publication.
Document Quality
There are existing implementations of this document, and further
implementations are likely.
Personnel
Bernard Aboba is the document shepherd. The responsible Area Director
is Jari Arkko. No IANA expert is needed.