Kerberized Internet Negotiation of Keys (kink)

This Working Group did not meet

NOTE: This charter is a snapshot of the 53rd IETF Meeting in Minneapolis, MN USA. It may now be out-of-date. Last Modified: 09-Oct-01

Chair(s):
Derek Atkins <derek@ihtfp.com>
J Trostle <jtrostle@cisco.com>
Security Area Director(s):
Jeffrey Schiller <jis@mit.edu>
Marcus Leech <mleech@nortelnetworks.com>
Security Area Advisor:
Marcus Leech <mleech@nortelnetworks.com>
Mailing Lists:
General Discussion:ietf-kink@vpnc.org
To Subscribe: majordomo@vpnc.org
In Body: subscribe ietf-kink
Archive: www.vpnc.org/ietf-kink/
Description of Working Group:
The KINK working group is chartered to create a standards track protocol to facilitate centralized key management for IPsec security associations as defined in RFC 2401, as an alternative to IKE (RFC 2409). Participating systems will use the Kerberos architecture as defined in RFC 1510 (and its successors) for key management. The goal of the working group is to produce a streamlined, fast, easily managed, and cryptographically sound protocol that does not require public key operations, and is compatible with existing and future Kerberos infrastructures.

The working group will not require changes to either IPsec (RFC 2401), or Kerberos (RFC 1510).

Goals and Milestones:
Done   Reach Consensus on requirements document
Done   Meet at San Diego IETF to review drafts
Jan 01   Reach Consensus on base draft protocol
Feb 01   Conduct WG last call on base draft prototol
Mar 01   Begin Interoperability bakeoffs
Aug 01   Document interoperability results. Make decision to recycle or move forward
Internet-Drafts:
No Request For Comments

Current Meeting Report

None received.

Slides

None received.