Security Area Advisory Group Sam Hartman Tim Polk July 26, 2007.

Slides:



Advertisements
Similar presentations
1 IETF KEYPROV WG Protocol Basis and Characteristics IEEE P April 11, 2007 Andrea Doherty.
Advertisements

EAP-Only Authentication in IKEv2 draft-eronen-ipsec-ikev2-eap-auth
Provision of Symmetric Keys (KEYPROV) WG Thursday, July 30, 2009 Morning Session I Todays presentations available at:
Transport Layer Security (TLS) IETF-76 Chairs Joe Salowey Eric Rescorla
ABFAB for Internet-of-Things Rhys Smith, Janet Sam Hartman & Margaret Wasserman, Painless Security.
Ch. 2 Protocol Architecture. 2.1 The Need for a Protocol Architecture Same set of layered functions need to exist in the two communicating systems. Key.
Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
Slides by Kent Seamons and Tim van der Horst Last Updated: Nov 8, 2013.
SIPPING IETF51 3GPP Security and Authentication Peter Howard 3GPP SA3 (Security) delegate
LTANS WG Meeting July 30, IETF 78 – Maastricht Tobias Gondrom Carl Wallace.
Wireless LAN Security Framework Backend AAA Infrastructure RADIUS, TACACS+, LDAP, Kerberos TLSLEAPTTLSPEAPMD5 VPN EAP PPP x EAP API.
S/MIME v3.2 draft-ietf-smime-3850bis-00.txt draft-ietf-smime-3851bis-00.txt Sean Turner Blake Ramsdell.
Key Management Guidelines. 1. Introduction 2. Glossary of Terms and Acronyms 3. Cryptographic Algorithms, Keys and Other Keying Material 4. Key Management.
Russ Housley IETF Chair Founder, Vigil Security, LLC 8 June 2009 NIST Key Management Workshop Key Management in Internet Security Protocols.
1/28/2010 Network Plus Security Review Identify and Describe Security Risks People –Phishing –Passwords Transmissions –Man in middle –Packet sniffing.
Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.
User Authentication By Eric Sita. Message Security Privacy: To expect confidentiality from a sender. Authentication: To be sure of someone's identity.
Introduction to Secure Messaging Issues Russ Chung, American Eagle Group The Open Group Messaging Forum July 24, 2003.
9-10 March 2005IETF 62 - Minneapolis, MN, USA1 Lemonade IETF 62 Eric Burger Glenn Parsons
DIME Rechartering Hannes Tschofenig & Dave Frascone.
Doc.: IEEE /0394r0 Submission March 2008 Dorothy Stanley, Aruba NetworksSlide 1 IEEE IETF Liaison Report Date: Authors:
(Preliminary) Gap Analysis Hannes Tschofenig. Goal of this Presentation The IETF has developed a number of security technologies that are applicable to.
Module 9: Fundamentals of Securing Network Communication.
Authentication Mechanism for Port Control Protocol (PCP) draft-wasserman-pcp-authentication-01.txt Margaret Wasserman Sam Hartman Painless Security Dacheng.
Transport Layer Security (TLS) IETF-72, Dublin July 27, 2008 Chairs: Eric Rescorla Joseph Salowey.
EAP Method Update (EMU) IETF-79 Chairs Joe Salowey Alan DeKok.
Application Layer Security Mike Pajevski (NASA/JPL) April 2009.
Maryland Information Systems Security Lab D EPARTMENT OF C OMPUTER S CIENCE EAP Password Authenticated eXchange (PAX) T. Charles Clancy William A. Arbaugh.
NEA Requirements Update -06 version summary. Posture Transport Considerations Issue –Ability of existing protocols used for network access to meet requirements.
Mobile Communication MMS. Mobile Communication The MM7 interface enables interactions between Value Added Service applications and an MMSC. The technical.
EAP Method Update (EMU) IETF-80 Chairs: Joe Salowey Alan DeKok.
Security Area Advisory Group 9 November 2006 Russ Housley Sam Hartman.
SSL MUST NOT draft-turner-ssl-must-not-02.txt Tim Polk Sean Turner IETF July 2010.
LTANS service and protocol Carl Wallace (on behalf of Peter Sylvester) 6 Aug 2004, 60th IETF, San Diego.
NEA Working Group IETF meeting July 27, Co-chairs: Steve Hanna
9-10 March 2005IETF 62 - Minneapolis, MN, USA1 Lemonade IETF 62 Eric Burger Glenn Parsons
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential.
Emu wg, IETF 70 Steve Hanna, EAP-TTLS draft-funk-eap-ttls-v0-02.txt draft-hanna-eap-ttls-agility-00.txt emu wg, IETF 70 Steve Hanna,
An Analysis of XMPP Security Team “Vision” Chris Nelson Ashwin Kulkarni Nitin Khatri Taulant Haka Yong Chen CMPE 209 Spring 2009.
LTANS WG: ERS November 7, 2005 Tobias Gondrom. LTANS WG (ltans): ERS Draft straightened up Corrected ERS (feedback from Peter and Carl) Prepared for WG.
Secure Multipart Internet Mail (S/MIME) Working Group Tuesday, July 24, 2007 Afternoon Session III
MSEC Montreal, July 26 Ran Canetti and Lakshminath Dondeti
Security Area Advisory Group Tim Polk Sean Turner July 29, 2010.
Long-term Archive and Notary Services (LTANS) Working Group Charter Review.
Transport Layer Security (TLS) Chairs: Eric Rescorla Joe Salowey.
MIKEY, Revisited Lakshminath Dondeti Thanks to: Dragan Ignjatic, Ran Canetti and others.
Public Key Infrastructure Using X.509 (PKIX) Working Group March 20,
IETF sec - 1 Security Work in the IETF Scott Bradner Harvard University
Transport Layer Security (TLS) IETF-84 Chairs: Eric Rescorla Joe Salowey.
Transport Layer Security (TLS) IETF 73 Thursday, November Chairs: Eric Rescorla Joe Salowey.
Long-term Archive and Notary Services (LTANS) Working Group.
Transport Layer Security (TLS) IETF-78 Chairs Joe Salowey Eric Rescorla
TEE: TLS Authentication Using EAP draft-nir-tls-eap-02.txt Yoav Nir Yaron Sheffer (presenter) Hannes Tschofenig Peter Gutmann IETF-70, Vancouver, Dec.
1 Extensible Authentication Protocol (EAP) Working Group IETF-57.
Long-term Archive and Notary Services (LTANS) Working Group.
RADIUS Attributes for the Delivery of Keying Material Joe Salowey Jesse Walker Tiebing Zhang Glen Zorn.
IETF-84 EMU TEAP Updates Nancy Joseph Salowey Hao Zhou
Technical Security Issues in Cloud Computing By: Meiko Jensen, Jorg Schwenk, Nils Gruschka, Luigi Lo Lacono Presentation by: Winston Tong 2009 IEEE.
DICE BOF, IETF-87 Berlin DTLS In Constrained Environments (DICE) BOF Wed 15:10-16:10, Potsdam 3 BOF Chairs: Zach Shelby, Carsten Bormann Responsible AD:
IETF Provisioning of Symmetric Keys (keyprov) WG Update WG Chairs: Phillip Hallam-Baker Hannes Tschofenig Presentation by Mingliang Pei 05/05/2008.
EAP Applicability IETF-86 Joe Salowey. Open Issues Open Issues with Retransmission and re- authentication Remove text about lack of differentiation in.
Public Key Infrastructure Using X.509 (PKIX) Working Group
IETF Provisioning of Symmetric Keys (keyprov) WG Update
August 1, 2005 Carl Wallace & Tobias Gondrom
IKEv2 Mobility and Multihoming WG
LTANS WG: ERS Status July 10, 2006 Tobias Gondrom.
IETF103 Bangkok Web Authorization Protocol (OAuth)
Addressing security challenges on a global scale
Presentation transcript:

Security Area Advisory Group Sam Hartman Tim Polk July 26, 2007

Agenda WG Reports Invited Presentations Open Mike

tls (Transport Layer Security) Pasi Eronen Eric Rescorla

pkix (Public Key Infrastructure using X.509) Steve Kent Stefan Santesson

keyprov (Provisioning of Symmetric Key) Phillip Hallam-Baker Hannes Tschofenig

emu (EAP Method Update) Joe Salowey

kitten (GSS-API Next Generation) Shawn Emery Alexey Melnikov

dkim (Domain Keys Identified Mail) Stephen Farrrell Barry Leiba

ltans (Long Term Archive and Notary Service) Tobias Gondrom Carl Wallace

smime (S/MIME Mail Security) Sean Turner Blake Ramsdell

nea (Network Endpoint Assessment) Steve Hanna Susan Thompson

sasl (Simple Authentication and Security Layer) Tom Yu Kurt Zeilenga

Msec (Multicast Security) Ran Canetti Lakshminath Dondeti

Hokey (Handover Keying) Charles Clancy Glenn Zorn

btns (Better Than Nothing Security) Julien Langanier Love Hornqvist-Astrand

Krb-wg (Kerberos) Jeff Hutzelman Larry Zhu

Invited Presentations TCP MD5 Replacement –Sandy Murphy Simple Key Establishment Method for the TCP Authentication Option –Brian Weis TCP Authentication Options: Keying Protocol Issues –Joe Touch

Open Mike Concerns? Issues? Soap Box?