1 / 9

IEEE 802.11-IETF Liaison Report

IEEE 802.11-IETF Liaison Report. Authors:. Date: 2010-03-17. Abstract. This presentation contains the IEEE 802.11 – IETF liaison report for March 2010. IETF Geographic Location and Privacy (Geopriv) WG. See http://www.ietf.org/html.charters/geopriv-charter.html

grant-good
Download Presentation

IEEE 802.11-IETF Liaison Report

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. IEEE 802.11-IETF Liaison Report Authors: Date: 2010-03-17 Dorothy Stanley, Aruba Networks

  2. Abstract This presentation contains the IEEE 802.11 – IETF liaison report for March 2010. Dorothy Stanley, Aruba Networks

  3. IETF Geographic Location and Privacy (Geopriv) WG • See http://www.ietf.org/html.charters/geopriv-charter.html • Specific reference to WLANs: • Carrying Location Objects in RADIUS, see http://www3.ietf.org/proceedings/06jul/IDs/draft-ietf-geopriv-radius-lo-07.txt • Documents referenced in 802.11 (TGv) • Geopriv Requirements, see http://www.ietf.org/rfc/rfc3693.txt • Civic Address definitions, see http://www.ietf.org/rfc/rfc4776.txt • July 2009 Liaison to IETF GEOPRIV • See https://mentor.ieee.org/802.11/dcn/09/11-09-0718-01-000v-liaison-request-to-ietf-geopriv.doc • November 2009 Contributions • See http://www.ietf.org/id/draft-stanley-geopriv-int-ext-00.txt and http://tools.ietf.org/id/draft-polk-geopriv-int-relative-in-tlv-00.txt and http://tools.ietf.org/id/draft-thomson-geopriv-indoor-location-00.txt • March 2010 Contributions • http://tools.ietf.org/id/draft-rosen-geopriv-pidf-interior-01.txt and • http://tools.ietf.org/id/draft-thomson-geopriv-relative-location-00.txt Dorothy Stanley, Aruba Networks

  4. Update: CAPWAP WG • Control And Provisioning of Wireless Access Points • WG Website: http://www.ietf.org/html.charters/capwap-charter.html • RFC documents have been published • RFC 5415, Control And Provisioning of Wireless Access Points (CAPWAP) Protocol Specification • RFC 5416, Control and Provisioning of Wireless Access Points (CAPWAP) Protocol Binding for IEEE 802.11 • RFC 5417, Control And Provisioning of Wireless Access Points (CAPWAP) Access Controller DHCP Option • RFC 5418, Control And Provisioning of Wireless Access Points (CAPWAP) Threat Analysis for IEEE 802.11 Deployments • [March 2010]Remaining MIB documents to be published shortly • http://www.ietf.org/id/draft-ietf-capwap-base-mib-09.txt • http://www.ietf.org/id/draft-ietf-capwap-802dot11-mib-06.txt Dorothy Stanley, Aruba Networks

  5. Handover Keying (HOKEY) • Hokey Charter available at http://www.ietf.org/html.charters/hokey-charter.html • Extensions to current EAP key framework to facilitate inter-authenticator handover and roaming. • Published RFCs: • Handover Key Management and Re-authentication Problem Statement, see http://www.ietf.org/rfc/rfc5169.txt • Specification for the Derivation of Root Keys from an Extended Master Session Key (EMSK), see http://www.ietf.org/rfc/rfc5295.txt • EAP Extensions for EAP Re-authentication Protocol (ERP), see http://www.ietf.org/rfc/rfc5296.txt • Current work items: • Distribution of EAP based keys for handover and re-authentication , see http://www.ietf.org/rfc/rfc5749.txt[published March 2010] • Extensible Authentication Protocol (EAP) Early Authentication Problem Statement, see http://www.ietf.org/id/draft-ietf-hokey-preauth-ps-12.txt . Dorothy Stanley, Aruba Networks

  6. Update: EAP Method Update (EMU) • Working Group website: http://www.ietf.org/html.charters/emu-charter.html • EAP Authentication based on the EKE protocol [March 2010] • http://tools.ietf.org/id/draft-sheffer-emu-eap-eke-05.txt • EAP Authentication Using Only A Password [March 2010] • http://tools.ietf.org/html/draft-harkins-emu-eap-pwd-13 • IEEE 802.11 liaison request • Requirements are documented in 11-07-0508-01-000u-emergency-services-eap-requirements • Response received from IETF EMU, see https://mentor.ieee.org/802.11/public-file/07/11-07-2786-00-0000-liaison-from-ietf-emu-to-ieee-802-11u.doc . • Response under consideration in TGu Dorothy Stanley, Aruba Networks

  7. Emergency Context Resolution with Internet Technologies (ECRIT) • Working Group website: http://www.ietf.org/dyn/wg/charter/ecrit-charter.html • Emergency Services • Framework for Emergency Calling using Internet Multimedia, see http://www.ietf.org/id/draft-ietf-ecrit-framework-10.txt • Unauthenticated access being discussed, see http://tools.ietf.org/id/draft-schulzrinne-ecrit-unauthenticated-access-06.txt • Describing boundaries for Civic Addresses, see http://tools.ietf.org/id/draft-thomson-ecrit-civic-boundary-00.txt Dorothy Stanley, Aruba Networks

  8. IETF Meetings • Meetings: • March 21-26, 2010, Anaheim • July 25-30, 2010, Maastricht • November 7-12, 2010, Beijing • http://www.ietf.org Dorothy Stanley, Aruba Networks

  9. References • RFC 4017 - IEEE 802.11 Requirements on EAP Methods Dorothy Stanley, Aruba Networks

More Related