
|
Process for Analyzing New EAP Applications System level security analysis required for EAP key management applications Requirements outlined by Russ Housley at IETF 56 All EAP key management applications need to meet these requirements EAP methods used in those applications need to meet the requirements as well EAP Key Management Framework document (work in progress) Focus is on Scenario 2: defining and analyzing existing usage EAP Key Management Extensions may handle new applications (Scenario 3) |