{"draft":"draft-ietf-nea-asokan-02","doc_id":"RFC6813","title":"The Network Endpoint Assessment (NEA) Asokan Attack Analysis","authors":["J. Salowey","S. Hanna"],"format":["ASCII","HTML"],"page_count":"8","pub_status":"INFORMATIONAL","status":"INFORMATIONAL","source":"Network Endpoint Assessment","abstract":"The Network Endpoint Assessment (NEA) protocols are subject to a subtle\r\nforwarding attack that has become known as the NEA Asokan Attack.\r\nThis document describes the attack and countermeasures that may be\r\nmounted. This document is not an Internet Standards Track specification;\r\nit is published for informational purposes.","pub_date":"December 2012","keywords":["Man-in-the-Middle","MITM","Security","Endpoint","Posture","Protocol","Forwarding","TNC","Channel","Binding","Cryptographic","Countermeasure"],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC6813","errata_url":null}