<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.26 (Ruby 2.6.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-dekok-emu-eap-arpa-00" category="std" consensus="true" submissionType="IETF" updates="9140" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.13.0 -->
  <front>
    <title abbrev="eap.arpa">The eap.arpa domain and EAP provisioning</title>
    <seriesInfo name="Internet-Draft" value="draft-dekok-emu-eap-arpa-00"/>
    <author initials="A." surname="DeKok" fullname="Alan DeKok">
      <organization>FreeRADIUS</organization>
      <address>
        <email>aland@freeradius.org</email>
      </address>
    </author>
    <date year="2023" month="August" day="30"/>
    <area>Internet</area>
    <workgroup>EMY Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document defines the eap.arpa domain as a way for EAP peers to
signal to EAP servers that they wish to obtain limited, and
unauthenticated, network access.  EAP peers leverage user identifier
portion of the Network Access Identifier (NAI) format of RFC7542 in
order to describe what kind of provisioning they need.  A table of
identifiers and meanings is defined.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-dekok-emu-eap-arpa/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        EMU Working Group mailing list (<eref target="mailto:emut@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/emut/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/freeradius/eap-arpa.git"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>In most uses, EAP <xref target="RFC3748"/> requires that the EAP peer have a known
identity.  However, when the peer does not already have an identity,
this requirement creates a bootstrapping problem.  It may not be
possible for the device to obtain network access without credentials.
However, credentials are usually required in order to obtain network
access.  As a result, the device is unprovisioned, and unable to be
provisioned.</t>
      <t>This specification addresses that problem.  It creates a framework by
which clients can submit predefined credentials to a server in order to
obtain limited network access.  At the same time, servers can know in
advance that these credentials are only to be used for provisioning,
and that unrestricted network access should not be granted.</t>
      <t>The device can either use the EAP channel itself for provisioning, as
with TEAP <xref target="RFC7170"/>, or the EAP server can give the device access to
a limited captive portal such as with <xref target="RFC8952"/>.  Once the device is
provisioned, it can use those provisioned credentials to obtain full
network access.</t>
      <t>The identifiers used here are generically referred to as "EAP
Provisioning Identifiers" (EPI).  The choice of "Provisioning
Identifiers for EAP" (PIE) was considered and rejected.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="concepts">
      <name>Concepts</name>
      <t>A device which has no device-specific credentials can use a predefined
identifier in Network Access Identifier (NAI) format <xref target="RFC7542"/>.  The
NAI is composed of two portions, the utf8-username, and the utf8-realm
domain.  For simplicity here, we refer to these as the "username" and
"realm" fields.</t>
      <t>The realm is chosen to be non-routable, so that the EAP packet
exchange is not sent across an Authentication, Authorization, and
Accounting (AAA) proxy framework as defined in <xref target="RFC7542"/> Section 3.
Instead, the packets remains local to the EAP server.  If the EAP
server implements this standard, then it can proceed with the full EAP
conversation.  If the EAP server does not implement this standard,
then it MUST reply with an EAP Failure, as per <xref target="RFC3748"/> Section
4.2.</t>
      <t>We note that this specification is fully compatible with all existing
EAP implementations, so its is fail-safe.  When presented with a peer
wishing to use this specification, existing implementations will
return EAP Failure, and will not otherwise misbehave.</t>
      <t>We now discuss the NAI format in more detail.  We first discuss the
eap.arpa realm, and second the use and purpose of the username field.</t>
      <section anchor="the-eaparpa-realm">
        <name>The eap.arpa realm</name>
        <t>This document defines the "eap.arpa" domain as being used for
provisioning within EAP.  A similar domain has previously been used
for EAP-NOOB <xref target="RFC9140"/>, as "eap-noob.arpa".  This document extends
that concept, and standardizes the practices surrounding it,</t>
        <t>NOTE: the "arpa" domain is controlled by the IAB.  Allocation of
"eap.arpa" requires agreement from the IAB.</t>
      </section>
      <section anchor="the-username-field">
        <name>The username field</name>
        <t>The username field is assigned via the EAP Provisioning Identifier
Registry which is defined below.  The registry can either hold a fixed
string such as "noob", or a prefix such as "V-".  Prefixes give
vendors and Service delivery organizations (SDOs) the ability to
self-assign a delegated range of identifiers which cannot conflict
with other identifiers.</t>
        <t>The username field MUST NOT omitted.  That is, "@eap.arpa" is not a
valid identifier for the purposes of this specification.  <xref target="RFC7542"/>
recommends omitting the username portion for user privacy.  As user
privacy is not needed here, the username field can be publicly visible.</t>
      </section>
    </section>
    <section anchor="overview">
      <name>Overview</name>
      <t>For EAP-TLS, both <xref target="RFC5216"/> Section 2.1.1 and <xref target="RFC9190"/> provide
for "peer unauthenticated access".  However, those documents define no
way for a peer to signal that it is requesting such access.  The
presumption is that the peer connects with some value for the EAP
Identity, but without using a client certificate.  The EAP server is
then supposed to determine that the peer is requesting unauthenticated
access, and take the approprate steps to limit authorization.</t>
      <t>There appears to be no EAP peer or server implementations which
support such access, since there is no defined way to perform any of
the steps required.  i.e. to signal that this access is desired, and
then limit access.</t>
      <t>TBD: The Wireless Broadband Alliance (WBA) has defined an unauthenticated
EAP-TLS method, using a vendor-specific EAP type. Get link.</t>
      <t>EAP-NOOB <xref target="RFC9140"/> takes this process a step further.  It defines both
a way to signal that provisioning is desired, and also a way to
exchange provisioning information within EAP-NOOB.  That is, there is
no need for the device to obtain limited network access, as all of the
provisioning is done inside of the EAP-NOOB protocol.</t>
      <t>TEAP <xref target="RFC7170"/> provides for provisioning via an unauthenticated TLS
tunnel.  There is a server unauthenticated provisioning mode (TBD),
but the inner TLS exchange requires that both end authenticate each
other.  There are ways to provision a certificate, but the peer must
still authenticate itself to the server.</t>
      <section anchor="taxonomy-of-provisioning-types">
        <name>Taxonomy of Provisioning Types</name>
        <t>There are two scenarios where provisioning can be done.  The first is
where provisioning is done within the EAP type, as with EAP-NOOB
<xref target="RFC9140"/>.  The second is where EAP is used to obtain limited
network access (e.g. as with a captive portal).  That limited network
access is then used to run Internet Protocol (IP) based provisioning
over more complex protocols.</t>
        <section anchor="rationale-for-provisioning-over-eap">
          <name>Rationale for Provisioning over EAP</name>
          <t>It is often useful to do all provisioning inside of EAP, because the EAP / AAA
admin does not have control over the network.  It is not always
possible to define a captive portal where provisioning can be done.
As a result, we need to be able to perform provisioning via EAP, and
not via some IP protocol.</t>
        </section>
      </section>
    </section>
    <section anchor="interaction-with-existing-eap-types">
      <name>Interaction with existing EAP types</name>
      <t>As the provisioning identifer is used within EAP, it necessarily has
interactions with, and effects on, the various EAP types.  This
section discusses those effects in more detail.</t>
      <t>Some EAP methods require shared credentials such as passwords in order
to succeed.  For example, both EAP-MSCHAPv2 (PEAP) and EAP-PWD
<xref target="RFC5931"/> perform cryptographic exchanges where both parties
knowing a shared password.  Where those methods are used, the password
MUST be the same as the provisioning identifier.</t>
      <t>This requirement also applies to TLS-based EAP methods such as TTLS
and PEAP.  Where the TLS-based EAP method provides for an inner
identity and inner authentication method, the credentials used there
MUST be the provisioning identifier for both the inner identity, and
any inner password.</t>
      <t>This process ensures that most EAP methods will work for provisioning,
at the expense of potential security attacks.  TBD - discuss.</t>
      <t>It is RECOMMENDED that provisioning be done via a TLS-based EAP methods.
TLS provides for authentication of the EAP server, along with security
and confidentiality of any provisioning data exchanged in the tunnel.
Similarly if provisioning is done in a captive portal outside of EAP,
EAP-TLS permits the EAP peer to run a full EAP authentication session
while having nothing more than a few certification authorities (CAs)
locally configured.</t>
      <section anchor="eap-tls">
        <name>EAP-TLS</name>
        <t>This document defines an identifier "portal@eap.arpa", which is the
first step towards permitted unauthenticated client provisioning in
EAP-TLS.  The purpose of the identifier is to allow EAP peers to
signal EAP servers that they wish to obtain a "captive portal" style
network access.</t>
        <t>This identifier signals the EAP server that the peer wishes to obtain
"peer unauthenticated access" as per <xref target="RFC5216"/> Section 2.1.1 and
<xref target="RFC9190"/>.</t>
        <t>An EAP server which agrees to authenticate this request MUST ensure
that the device is placed into a captive portal with limited network
access.  Further details of the captive portal architecture can be
found in <xref target="RFC8952"/>.</t>
        <t>The remaining question is how the EAP peer verifies the identity of
the EAP server.  The device SHOULD ignore the EAP server certificate
entirely, as the servers identity does not matter.  Any verification
of servers can be done at the HTTPS layer when the device access the
captive portal.  Where possible the device SHOULD warn the end user
that the provided certificate is unchecked, and untrusted.</t>
        <t>However, since the device likely is configured with web CAs (otherwise
the captive portal would also be unauthenticated), EAP peers MAY use
the CAs available for the web in order to validate the EAP server
certificate.  If the presented certificate passes validation, the
device does not need to warn the end user that the provided
certificate is untrusted.</t>
      </section>
      <section anchor="tls-based-eap-methods">
        <name>TLS-based EAP methods</name>
        <t>Other TLS-based EAP methods such as TTLS and PEAP can use the same
method as defined for EAP-TLS above.  The only difference is that the
inner identity and password is also the provisioning identifier.</t>
        <t>Is is RECOMMENDED that provisioning methods use EAP-TLS in preference
to any other TLS-based EAP methods.  As the credentials for other
methods are predefined and known in advanc, those methods offer little
benefit over EAP-TLS.</t>
      </section>
      <section anchor="eap-noob">
        <name>EAP-NOOB</name>
        <t>It is RECOMMENDED that server implementations of EAP-NOOB accept both
identities "noob@eap-noob.arpa" and "noob@eap.arpa" as synonyms.</t>
        <t>It is RECOMMENDED that EAP-NOOB peers use "noob@eap.arpa" first, and
if that does not succeed, use "noob@eap-noob.arpa"</t>
        <t>@todo - what is the deployment of EAP-NOOB?  Can we even make this
recommendation?</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>Three IANA actions are required.  The first two are registry updates
for "eap.arpa".  The second is the creation of a new registry.</t>
      <section anchor="arpa-updates">
        <name>.arpa updates</name>
        <t>IANA is instructed to update the ".ARPA Zone Management" registry with
the following entry:</t>
        <t>DOMAIN</t>
        <ul empty="true">
          <li>
            <t>eap.arpa</t>
          </li>
        </ul>
        <t>USAGE</t>
        <ul empty="true">
          <li>
            <t>For provisioning within the Extensible Authentication Protocol framework.</t>
          </li>
        </ul>
        <t>REFERENCE</t>
        <ul empty="true">
          <li>
            <t>THIS-DOCUMENT</t>
          </li>
        </ul>
        <t>IANA is instructed to update the "Special-Use Domain Names" registry as follows:</t>
        <t>NAME</t>
        <ul empty="true">
          <li>
            <t>eap.arpa</t>
          </li>
        </ul>
        <t>REFERENCE</t>
        <ul empty="true">
          <li>
            <t>THIS-DOCUMENT</t>
          </li>
        </ul>
      </section>
      <section anchor="eap-provisioning-identifier-registry">
        <name>EAP Provisioning Identifier Registry</name>
        <t>IANA is instructed to update the "Extensible Authentication Protocol
(EAP) Registry" with a new child registry.</t>
        <t>Assignments in this registry are done via "Expert Review" as described in <xref target="RFC8126"/> Section 4.5.</t>
        <t>The contents of the registry are as follows.</t>
        <t>Title</t>
        <ul empty="true">
          <li>
            <t>EAP Provisioning Identifier Registry</t>
          </li>
        </ul>
        <t>Registration Procedure(s)</t>
        <ul empty="true">
          <li>
            <t>Expert review</t>
          </li>
        </ul>
        <t>Reference</t>
        <ul empty="true">
          <li>
            <t>THIS-DOCUMENT</t>
          </li>
        </ul>
        <t>Registry</t>
        <ul empty="true">
          <li>
            <t>Name</t>
            <ul empty="true">
              <li>
                <t>The name of the identifier.  Names are listed in sorted order, case insensitive.</t>
              </li>
            </ul>
            <t>Prefix</t>
            <ul empty="true">
              <li>
                <t>A boolean true/false flag indicating if this name is a prefix.</t>
              </li>
            </ul>
            <t>Description</t>
            <ul empty="true">
              <li>
                <t>Description of the use-cases for this identifier.</t>
              </li>
            </ul>
            <t>Reference</t>
            <ul empty="true">
              <li>
                <t>Reference where this identifier was defined.</t>
              </li>
            </ul>
          </li>
        </ul>
        <section anchor="initial-values">
          <name>Initial Values</name>
          <t>The following table gives the initial values for this table.</t>
          <t>Value,Prefix,Description,Reference</t>
          <t>noob,false,EAP-NOOB,RFC9140 and THIS-DOCUMENT
portal,false,generic captive portal,THIS-DOCUMENT
V-,true,reserved for vendor self-assignment,THIS-DOCUMENT</t>
        </section>
      </section>
      <section anchor="guidelines-for-designated-experts">
        <name>Guidelines for Designated Experts</name>
        <t>Identifiers and prefixes in the "Name" field of this registry MUST
satisfy the "utf8-username" format defined in <xref target="RFC7542"/> Section 2.2.</t>
        <t>Identifiers should be unique when compared in a case-insensitive
fashion.  While <xref target="RFC7542"/> notes that similar identifiers of
different case can be considered to be different, this registry is
made simpler by requiring case-insensitivity.</t>
        <t>Identifiers and prefixes should be short.  The NAIs created from these
prefixes will generally be sent in a RADIUS packet in the User-Name
attribute (<xref target="RFC2865"/> Section 5.1).  That specification recommends
that implementations should support User-Names of at least 63 octets.
NAI length considerations are further discussed in <xref target="RFC7542"/> Section
2.3, and any allocations need to take those limitations into
consideration.</t>
        <t>Implementations are likely to support a total NAI length of 63 octets.
Lengths between 63 and 253 octets may work.  Lengths of 254 octets or
more will not work with RADIUS <xref target="RFC2865"/>.</t>
        <t>For registration requests where a Designated Expert should be
consulted, the responsible IESG area director should appoint the
Designated Expert.  The intention is that any non-prefix allocation
will be accompanied by a published RFC.  But in order to allow for the
allocation of values prior to the RFC being approved for publication,
the Designated Expert can approve allocations once it seems clear that
an RFC will be published.</t>
        <t>For allocation of a prefix, the Designated Expert should verify that
the requested prefix clearly identifies the organization requesting
the prefix, that there is a publicly available document from the
organization which describes the prefix, and that the prefix ends with
the "-" character.</t>
        <t>Once a prefix has been assigned, it is not possible to perform further
allocations in this registry which use that prefix.  All such
allocations have instead been delegated to the external organization.</t>
        <t>The Designated expert will post a request to the EMU WG mailing list
(or a successor designated by the Area Director) for comment and
review, including an Internet-Draft or reference to external
specification.  Before a period of 30 days has passed, the Designated
Expert will either approve or deny the registration request and
publish a notice of the decision to the EAP WG mailing list or its
successor, as well as informing IANA.  A denial notice must be
justified by an explanation, and in the cases where it is possible,
concrete suggestions on how the request can be modified so as to
become acceptable should be provided.</t>
        <t>A short-hand summary of the requirements follows:</t>
        <ul spacing="normal">
          <li>Identifiers and prefixes in the "Name" field of this registry MUST satisfy the "utf8-username" format defined in <xref target="RFC7542"/> Section 2.2.</li>
          <li>Names MUST be unique, compared in a case-insensitive fashion.</li>
          <li>Prefixes MUST NOT overlap with the beginning any other identifier.  That is, if the prefix "foo-" has been allocated, then an identifier of "foo-bar" MUST NOT be allocated.</li>
          <li>If the "prefix" flag is "false", then the Name field MUST NOT end with the "-" character.</li>
          <li>If the "prefix" flag is "true", then the Name field MUST end with the "-" character.</li>
        </ul>
        <section anchor="example-of-vendor-self-assignment">
          <name>Example of Vendor Self Assignment</name>
          <t>Identifiers beginning with "V-" are for vendor self-assignment.  The
name MUST begin with the string "V-", following by 1 or more digits
(0-9).  The digits used here are taken from the vendor private
enterprise number (PEN).</t>
          <t>The name MUST then contain another "-" which delineates the vendor
specific suffix namespace.  The suffix is managed and allocated by the
vendor, and does not need to be added to the registry.</t>
          <t>The suffix is text which matches the "dot-string" definition of
<xref target="RFC7542"/> Section 2.2.</t>
          <t>For example, an identifier chosen by Cisco (PEN of 9) could be:</t>
          <ul empty="true">
            <li>
              <t>V-9-foo</t>
            </li>
          </ul>
          <t>Which then creates an NAI of the form:</t>
          <ul empty="true">
            <li>
              <t>V-9-foo@eap.arpa</t>
            </li>
          </ul>
        </section>
        <section anchor="example-of-service-delivery-organization">
          <name>Example of Service Delivery Organization</name>
          <t>Service delivery organizations (SDOs) can request allocations of
prefixes for use within their SDO.  The prefix should be the name
(abbreviated where possible) of the SDO, followed by a "-" character.
The suffix is managed and allocated by the SDO, and does not need to
be added to the registry.</t>
          <t>The suffix is text which matches the "dot-string" definition of
<xref target="RFC7542"/> Section 2.2.</t>
          <t>For example, the 3rd Generation Partnership Project (3GPP) could
request a prefix "3gpp-", and then self-assign a suffix "baz", to
create an identifier:</t>
          <ul empty="true">
            <li>
              <t>3gpp-baz</t>
            </li>
          </ul>
          <t>Which then creates an NAI of the form:</t>
          <ul empty="true">
            <li>
              <t>3gpp-baz@eap.arpa</t>
            </li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>TBD.</t>
    </section>
    <section anchor="changelog">
      <name>Changelog</name>
      <ul spacing="normal">
        <li>00 - initial version</li>
      </ul>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="BCP14" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC3748" target="https://www.rfc-editor.org/info/rfc3748">
          <front>
            <title>Extensible Authentication Protocol (EAP)</title>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="L. Blunk" initials="L." surname="Blunk"/>
            <author fullname="J. Vollbrecht" initials="J." surname="Vollbrecht"/>
            <author fullname="J. Carlson" initials="J." surname="Carlson"/>
            <author fullname="H. Levkowetz" initials="H." role="editor" surname="Levkowetz"/>
            <date month="June" year="2004"/>
            <abstract>
              <t>This document defines the Extensible Authentication Protocol (EAP), an authentication framework which supports multiple authentication methods. EAP typically runs directly over data link layers such as Point-to-Point Protocol (PPP) or IEEE 802, without requiring IP. EAP provides its own support for duplicate elimination and retransmission, but is reliant on lower layer ordering guarantees. Fragmentation is not supported within EAP itself; however, individual EAP methods may support this. This document obsoletes RFC 2284. A summary of the changes between this document and RFC 2284 is available in Appendix A. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3748"/>
          <seriesInfo name="DOI" value="10.17487/RFC3748"/>
        </reference>
        <reference anchor="RFC5216" target="https://www.rfc-editor.org/info/rfc5216">
          <front>
            <title>The EAP-TLS Authentication Protocol</title>
            <author fullname="D. Simon" initials="D." surname="Simon"/>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="R. Hurst" initials="R." surname="Hurst"/>
            <date month="March" year="2008"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides support for multiple authentication methods. Transport Layer Security (TLS) provides for mutual authentication, integrity-protected ciphersuite negotiation, and key exchange between two endpoints. This document defines EAP-TLS, which includes support for certificate-based mutual authentication and key derivation.</t>
              <t>This document obsoletes RFC 2716. A summary of the changes between this document and RFC 2716 is available in Appendix A. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5216"/>
          <seriesInfo name="DOI" value="10.17487/RFC5216"/>
        </reference>
        <reference anchor="RFC7542" target="https://www.rfc-editor.org/info/rfc7542">
          <front>
            <title>The Network Access Identifier</title>
            <author fullname="A. DeKok" initials="A." surname="DeKok"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>In order to provide inter-domain authentication services, it is necessary to have a standardized method that domains can use to identify each other's users. This document defines the syntax for the Network Access Identifier (NAI), the user identifier submitted by the client prior to accessing resources. This document is a revised version of RFC 4282. It addresses issues with international character sets and makes a number of other corrections to RFC 4282.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7542"/>
          <seriesInfo name="DOI" value="10.17487/RFC7542"/>
        </reference>
        <reference anchor="RFC8126" target="https://www.rfc-editor.org/info/rfc8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC9140" target="https://www.rfc-editor.org/info/rfc9140">
          <front>
            <title>Nimble Out-of-Band Authentication for EAP (EAP-NOOB)</title>
            <author fullname="T. Aura" initials="T." surname="Aura"/>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <author fullname="A. Peltonen" initials="A." surname="Peltonen"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP) provides support for multiple authentication methods. This document defines the EAP-NOOB authentication method for nimble out-of-band (OOB) authentication and key derivation. The EAP method is intended for bootstrapping all kinds of Internet-of-Things (IoT) devices that have no preconfigured authentication credentials. The method makes use of a user-assisted, one-directional, out-of-band (OOB) message between the peer device and authentication server to authenticate the in-band key exchange. The device must have a nonnetwork input or output interface, such as a display, microphone, speaker, or blinking light, that can send or receive dynamically generated messages of tens of bytes in length.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9140"/>
          <seriesInfo name="DOI" value="10.17487/RFC9140"/>
        </reference>
        <reference anchor="RFC9190" target="https://www.rfc-editor.org/info/rfc9190">
          <front>
            <title>EAP-TLS 1.3: Using the Extensible Authentication Protocol with TLS 1.3</title>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods. This document specifies the use of EAP-TLS with TLS 1.3 while remaining backwards compatible with existing implementations of EAP-TLS. TLS 1.3 provides significantly improved security and privacy, and reduced latency when compared to earlier versions of TLS. EAP-TLS with TLS 1.3 (EAP-TLS 1.3) further improves security and privacy by always providing forward secrecy, never disclosing the peer identity, and by mandating use of revocation checking when compared to EAP-TLS with earlier versions of TLS. This document also provides guidance on authentication, authorization, and resumption for EAP-TLS in general (regardless of the underlying TLS version used). This document updates RFC 5216.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9190"/>
          <seriesInfo name="DOI" value="10.17487/RFC9190"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC2865" target="https://www.rfc-editor.org/info/rfc2865">
          <front>
            <title>Remote Authentication Dial In User Service (RADIUS)</title>
            <author fullname="C. Rigney" initials="C." surname="Rigney"/>
            <author fullname="S. Willens" initials="S." surname="Willens"/>
            <author fullname="A. Rubens" initials="A." surname="Rubens"/>
            <author fullname="W. Simpson" initials="W." surname="Simpson"/>
            <date month="June" year="2000"/>
            <abstract>
              <t>This document describes a protocol for carrying authentication, authorization, and configuration information between a Network Access Server which desires to authenticate its links and a shared Authentication Server. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2865"/>
          <seriesInfo name="DOI" value="10.17487/RFC2865"/>
        </reference>
        <reference anchor="RFC7170" target="https://www.rfc-editor.org/info/rfc7170">
          <front>
            <title>Tunnel Extensible Authentication Protocol (TEAP) Version 1</title>
            <author fullname="H. Zhou" initials="H." surname="Zhou"/>
            <author fullname="N. Cam-Winget" initials="N." surname="Cam-Winget"/>
            <author fullname="J. Salowey" initials="J." surname="Salowey"/>
            <author fullname="S. Hanna" initials="S." surname="Hanna"/>
            <date month="May" year="2014"/>
            <abstract>
              <t>This document defines the Tunnel Extensible Authentication Protocol (TEAP) version 1. TEAP is a tunnel-based EAP method that enables secure communication between a peer and a server by using the Transport Layer Security (TLS) protocol to establish a mutually authenticated tunnel. Within the tunnel, TLV objects are used to convey authentication-related data between the EAP peer and the EAP server.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7170"/>
          <seriesInfo name="DOI" value="10.17487/RFC7170"/>
        </reference>
        <reference anchor="RFC8952" target="https://www.rfc-editor.org/info/rfc8952">
          <front>
            <title>Captive Portal Architecture</title>
            <author fullname="K. Larose" initials="K." surname="Larose"/>
            <author fullname="D. Dolson" initials="D." surname="Dolson"/>
            <author fullname="H. Liu" initials="H." surname="Liu"/>
            <date month="November" year="2020"/>
            <abstract>
              <t>This document describes a captive portal architecture. Network provisioning protocols such as DHCP or Router Advertisements (RAs), an optional signaling protocol, and an HTTP API are used to provide the solution.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8952"/>
          <seriesInfo name="DOI" value="10.17487/RFC8952"/>
        </reference>
        <reference anchor="RFC9191" target="https://www.rfc-editor.org/info/rfc9191">
          <front>
            <title>Handling Large Certificates and Long Certificate Chains in TLS-Based EAP Methods</title>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods. EAP-TLS and other TLS-based EAP methods are widely deployed and used for network access authentication. Large certificates and long certificate chains combined with authenticators that drop an EAP session after only 40 - 50 round trips is a major deployment problem. This document looks at this problem in detail and describes the potential solutions available.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9191"/>
          <seriesInfo name="DOI" value="10.17487/RFC9191"/>
        </reference>
        <reference anchor="I-D.friel-tls-eap-dpp" target="https://datatracker.ietf.org/doc/html/draft-friel-tls-eap-dpp-05">
          <front>
            <title>Bootstrapped TLS Authentication</title>
            <author fullname="Owen Friel" initials="O." surname="Friel">
              <organization>Cisco</organization>
            </author>
            <author fullname="Dan Harkins" initials="D." surname="Harkins">
              <organization>Hewlett-Packard Enterprise</organization>
            </author>
            <date day="26" month="May" year="2022"/>
            <abstract>
              <t>   This document defines a TLS extension that enables a server to prove
   to a client that it has knowledge of the public key of a key pair
   where the client has knowledge of the private key of the key pair.
   Unlike standard TLS key exchanges, the public key is never exchanged
   in TLS protocol messages.  Proof of knowledge of the public key is
   used by the client to bootstrap trust in the server.  The use case
   outlined in this document is to establish trust in an EAP server.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-friel-tls-eap-dpp-05"/>
        </reference>
        <reference anchor="RFC5931" target="https://www.rfc-editor.org/info/rfc5931">
          <front>
            <title>Extensible Authentication Protocol (EAP) Authentication Using Only a Password</title>
            <author fullname="D. Harkins" initials="D." surname="Harkins"/>
            <author fullname="G. Zorn" initials="G." surname="Zorn"/>
            <date month="August" year="2010"/>
            <abstract>
              <t>This memo describes an Extensible Authentication Protocol (EAP) method, EAP-pwd, which uses a shared password for authentication. The password may be a low-entropy one and may be drawn from some set of possible passwords, like a dictionary, which is available to an attacker. The underlying key exchange is resistant to active attack, passive attack, and dictionary attack. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5931"/>
          <seriesInfo name="DOI" value="10.17487/RFC5931"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
