Last Call: <draft-ietf-kitten-pkinit-freshness-07.txt> (Public Key Cryptography for Initial Authentication in Kerberos (PKINIT) Freshness Extension) to Proposed Standard

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



The IESG has received a request from the Common Authentication Technology
Next Generation WG (kitten) to consider the following document:
- 'Public Key Cryptography for Initial Authentication in Kerberos
   (PKINIT) Freshness Extension'
  <draft-ietf-kitten-pkinit-freshness-07.txt> as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2016-11-03. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


   This document describes how to further extend the Public Key
   Cryptography for Initial Authentication in Kerberos (PKINIT)
   extension [RFC4556] to exchange an opaque data blob that a KDC can
   validate to ensure that the client is currently in possession of the
   private key during a PKINIT AS exchange.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-kitten-pkinit-freshness/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-kitten-pkinit-freshness/ballot/


No IPR declarations have been submitted directly on this I-D.


The document contains these normative downward references.
See RFC 3967 for additional information: 
    rfc5349: Elliptic Curve Cryptography (ECC) Support for Public Key Cryptography for Initial Authentication in Kerberos (PKINIT) (Informational - IETF stream)
Note that some of these references may already be listed in the acceptable Downref Registry.





[Index of Archives]     [IETF]     [IETF Discussion]     [Linux Kernel]

  Powered by Linux