<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.6.4 (Ruby 2.6.6) -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-richardson-emu-eap-onboarding-00" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 2.46.0 -->
  <front>
    <title abbrev="EAP-onboarding">EAP defaults for devices that need to onboard</title>
    <seriesInfo name="Internet-Draft" value="draft-richardson-emu-eap-onboarding-00"/>
    <author initials="A." surname="Dekok" fullname="Alan DeKok">
      <organization>FreeRADIUS</organization>
      <address>
        <email>aland@freeradius.orf</email>
      </address>
    </author>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <date year="2022" month="July" day="11"/>
    <area>Internet</area>
    <workgroup>anima Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document describes a method by which an unconfigured device can
use EAP to join a network on which further device onboarding, network
attestation or other remediation can be done.
While RFC 5216 supports EAP-TLS without a client certificate, that document defines no method by which unauthenticated EAP-TLS can be used.
This draft addresses that issue.
First, by defining the @eap.arpa domain, and second by showing how it
can be used to provide quarantined network access for onboarding unauthenticated devices.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-richardson-emu-eap-onboarding/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        anima Working Group mailing list (<eref target="mailto:anima@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/anima/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/mcr/eap-onboarding.git"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>There are a multitude of situations where a network device needs to join a new (wireless) network but where the device does not yet have the right credentials for that network.  As the device does not have credentials, it cannot access networks which typically require authentication.  However, since the device does not have network access, it cannot download a new configuration which contains updated credentials.</t>
      <t>The process by which a device acquires these credentials has become known as onboarding
<xref target="I-D.irtf-t2trg-secure-bootstrapping"/>.
There are many onboarding protocols, including <xref target="RFC8995"/>, <xref target="RFC9140"/>, <xref target="dpp"/>, CSA MATTER, and OPC UA Part 21.
Some of these protocols use WiFi Public frames, or provide for provisioning as part of EAP, such as <xref target="RFC7170"/>.
Other systems require pre-existing IP connectivity in order to configure credentials for a device, which causes a circular dependancy.</t>
      <t>This document defines a method where devices can use unauthenticated EAP in order to obtain network access, albeit in a captive portal <xref target="RFC8952"/>.
Once the device is in a captive portal, it has access to the full suite of Internet Protocol (IP) technologies, and can proceed with onboarding.
We believe that the method defined here is clearer, safer, and easier to implement and deploy than alternatives.
This method also allows for multiple onboarding technologies to co-exist, and for the technologies to evolve without requiring invasive upgrades to layer-2 infrastructure.</t>
      <t>The method detailed in this document uses the unauthenticated client mode of EAP-TLS.
While <xref target="RFC5216"/> defines EAP-TLS without a client certificate, that document defines no method by which unauthenticated EAP-TLS can be used.</t>
      <t>This draft addresses that issue.
First, by defining the @eap.arpa domain, and second by showing how it can be used to provid network access for onboarding unauthenticated devices.</t>
      <t>Note that this specification does not specify the exact method used for onboarding devices.
There are many possibilities, with some methods yet to be defined. Not all of them are enumerated here!</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP&nbsp;14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="protocol-details">
      <name>Protocol Details</name>
      <t>The onboarding is divided into the following phases:</t>
      <ul spacing="normal">
        <li>Discovery - the supplicant determines that a network can do onboarding,</li>
        <li>Authentication - the supplicant connects to the network as an unauthenticated device,</li>
        <li>Authorization - the network provides limited connectivity to the device,</li>
        <li>Onboarding - the device uses standard IP protocols to perform onboarding,</li>
        <li>Full network access - the device has provisioned credentials, and can proceed with normal network access.</li>
      </ul>
      <section anchor="discovery">
        <name>Discovery</name>
        <t>The network should use 802.11u to signal that it can potentially perform onboarding, by using 802.11u and indicating that it supports the realm "eap.arpa".
When a supplicant which requires onboarding sees this realm, it knows that the network may be suitable for onboarding.</t>
        <t>Note that not all such networks are suitable for onboarding.
There may be multiple such networks available, and only one (or none) may be willing to onboard this particular device.
Further, the device does not necessarily trust any such network.</t>
        <t>There are situations where there may be many hundreds of networks which offer onboarding, and a supplicant device may need to try all of them until it finds a network to which it can successfully onboard.
An example of such a situation is in a large (dozens to hundreds of floors) apartment building in a downtown core, where radio signals may leak from adjacent units, other floors, and even across the street from adjacent buildings.
This document does not address this issue, but anticipates future work in 802.11u involving some filtering mechanism involving Bloom Filters.</t>
        <t>Supplicants MUST limit their actions in the onboarding network to the action of onboarding.
If this process cannot be completed, the device MUST disconnect from the onboarding network, and try again, usually by selecting a different network.
As soon as the device has been onboarded, the device MUST disconnect from the onboarding network, and use the provided configuration to authenticate and connect to a fully-capable network.</t>
      </section>
      <section anchor="authentication">
        <name>Authentication</name>
        <t>The supplicant presents itself as an unauthenticated peer, which is allowed by EAP-TLS <xref target="RFC5216"/> Section 2.1.1.
TLS 1.2 or TLS 1.3 <xref target="RFC9190"/> may be used, but TLS 1.3 or higher is RECOMMENDED.</t>
        <t>The supplicant uses an identity of onboarding@eap.arpa, and provides no TLS client certificate.  The use of the "eap.arpa" domain signals to the network that the device wishes to use unauthenticated EAP-TLS.</t>
      </section>
      <section anchor="authorization">
        <name>Authorization</name>
        <t>Upon receipt of a supplicant without any authentication, the AAA server returns instructions to the authenticator to place the new client into a quarantined network.
The exact method is network-dependent, but it is usually done with a dedicated VLAN which has limited network access.</t>
      </section>
      <section anchor="characteristics-of-quarantine-network">
        <name>Characteristics of Quarantine Network</name>
        <t>The quarantine network SHOULD be segregated at layer-two (ethernet), and should not permit ethernet frames to any destination other than a small set of specified routers.</t>
        <t>For some onboarding protocols such as <xref target="RFC8995"/>, only IPv6 Link-Local frames are needed.
Such a network MUST provide a Join Proxy as specified in <xref section="4" sectionFormat="comma" target="RFC8995"/>.</t>
        <t>For other onboarding protocols more capabilities may be needed, in particular there need for a DHCPv4 server may be critical for the device to believe it has connected correctly.
This is particularly the case where a normal "smartphone" or laptop system will onboard via a captive portal.</t>
        <t>Once on the quarantine network, device uses other protocols <xref target="RFC6876"/> to perform the onboarding action.</t>
      </section>
    </section>
    <section anchor="captive-portal">
      <name>Captive Portal</name>
      <t>While we can impose no requirements on the rest of the network, captive portals <xref target="RFC8952"/> have been used for almost two decades.
The administration and operation of captive portals is typically within the authority of administrators who are responsible for network access.
As such, we can define additional behavior on, and requirements for, captive portals, so long as those changes materially benefit the network access administrator.</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>Devices should take care to hide all identifying information from the onboarding network.
Any identifying information MUST be sent encrypted via a method such as TLS.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Devices using an onboarding network MUST assume that the network is untrusted.
All network traffic SHOULD be encrypted in order to prevent attackers from both eavesdropping, and from modifying any provisioning information.</t>
      <t>Similarly onboarding networks MUST assume that devices are untrusted, and could be malicious.
Networks MUST make provisions to prevent Denial of Service (DoS) attacks, such as when many devices attempt to connect at the same time.
Networks MUST limit network access to onboarding protocols only.
Networks SHOULD also limit the bandwidth used by any device which is being onboarded.
The configuration information is likely to be small (megabytes at most), and it is reasonable to require a second or two for this process to take place.</t>
      <t>Any device which cannot be onboarded within approximately 30 seconds SHOULD be disconnected.
Such a delay signals either a malicious device / network, or a misconfigured device / network.
If onboarding cannot be finished within a short timer, the device should choose another network.</t>
      <section anchor="use-of-eaparpa">
        <name>Use of eap.arpa</name>
        <t>Supplicants MUST use the "eap.arpa" domain only for onboarding and related activities.
Supplicant MUST use unauthenticated EAP-TLS.</t>
        <t>Networks which support onboarding via the "eap.arpa" domain MUST require that supplicants use unauthenticated EAP-TLS.
The use of EAP types MUST result in rejection, and a denial of all network access.</t>
        <t>The "eap.arpa" domain MUST NOT be used in any other context, such as in an NAI <xref target="RFC7542"/>, etc. in any other protocol.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>The special-use domain "eap.arpa" should be registered in the .arpa registry (<eref target="https://www.iana.org/domains/arpa">https://www.iana.org/domains/arpa</eref>).  No A, AAAA, or PTR records are requested.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>TBD.</t>
    </section>
    <section anchor="changelog">
      <name>Changelog</name>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="BCP14" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <seriesInfo name="DOI" value="10.17487/RFC8174"/>
            <seriesInfo name="RFC" value="8174"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC5216" target="https://www.rfc-editor.org/info/rfc5216">
          <front>
            <title>The EAP-TLS Authentication Protocol</title>
            <seriesInfo name="DOI" value="10.17487/RFC5216"/>
            <seriesInfo name="RFC" value="5216"/>
            <author fullname="D. Simon" initials="D." surname="Simon">
              <organization/>
            </author>
            <author fullname="B. Aboba" initials="B." surname="Aboba">
              <organization/>
            </author>
            <author fullname="R. Hurst" initials="R." surname="Hurst">
              <organization/>
            </author>
            <date month="March" year="2008"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides support for multiple authentication methods.  Transport Layer Security (TLS) provides for mutual authentication, integrity-protected ciphersuite negotiation, and key exchange between two endpoints.  This document defines EAP-TLS, which includes support for certificate-based mutual authentication and key derivation.</t>
              <t>This document obsoletes RFC 2716.  A summary of the changes between this document and RFC 2716 is available in Appendix A.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC9190" target="https://www.rfc-editor.org/info/rfc9190">
          <front>
            <title>EAP-TLS 1.3: Using the Extensible Authentication Protocol with TLS 1.3</title>
            <seriesInfo name="DOI" value="10.17487/RFC9190"/>
            <seriesInfo name="RFC" value="9190"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson">
              <organization/>
            </author>
            <author fullname="M. Sethi" initials="M." surname="Sethi">
              <organization/>
            </author>
            <date month="February" year="2022"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods. This document specifies the use of EAP-TLS with TLS 1.3 while remaining backwards compatible with existing implementations of EAP-TLS. TLS 1.3 provides significantly improved security and privacy, and reduced latency when compared to earlier versions of TLS. EAP-TLS with TLS 1.3 (EAP-TLS 1.3) further improves security and privacy by always providing forward secrecy, never disclosing the peer identity, and by mandating use of revocation checking when compared to EAP-TLS with earlier versions of TLS. This document also provides guidance on authentication, authorization, and resumption for EAP-TLS in general (regardless of the underlying TLS version used). This document updates RFC 5216.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <seriesInfo name="DOI" value="10.17487/RFC2119"/>
            <seriesInfo name="RFC" value="2119"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <seriesInfo name="DOI" value="10.17487/RFC8174"/>
            <seriesInfo name="RFC" value="8174"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC6876" target="https://www.rfc-editor.org/info/rfc6876">
          <front>
            <title>A Posture Transport Protocol over TLS (PT-TLS)</title>
            <seriesInfo name="DOI" value="10.17487/RFC6876"/>
            <seriesInfo name="RFC" value="6876"/>
            <author fullname="P. Sangster" initials="P." surname="Sangster">
              <organization/>
            </author>
            <author fullname="N. Cam-Winget" initials="N." surname="Cam-Winget">
              <organization/>
            </author>
            <author fullname="J. Salowey" initials="J." surname="Salowey">
              <organization/>
            </author>
            <date month="February" year="2013"/>
            <abstract>
              <t>This document specifies PT-TLS, a TLS-based Posture Transport (PT) protocol.  The PT-TLS protocol carries the Network Endpoint Assessment (NEA) message exchange under the protection of a Transport Layer Security (TLS) secured tunnel.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC7030" target="https://www.rfc-editor.org/info/rfc7030">
          <front>
            <title>Enrollment over Secure Transport</title>
            <seriesInfo name="DOI" value="10.17487/RFC7030"/>
            <seriesInfo name="RFC" value="7030"/>
            <author fullname="M. Pritikin" initials="M." role="editor" surname="Pritikin">
              <organization/>
            </author>
            <author fullname="P. Yee" initials="P." role="editor" surname="Yee">
              <organization/>
            </author>
            <author fullname="D. Harkins" initials="D." role="editor" surname="Harkins">
              <organization/>
            </author>
            <date month="October" year="2013"/>
            <abstract>
              <t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport.  This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates.  It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC7170" target="https://www.rfc-editor.org/info/rfc7170">
          <front>
            <title>Tunnel Extensible Authentication Protocol (TEAP) Version 1</title>
            <seriesInfo name="DOI" value="10.17487/RFC7170"/>
            <seriesInfo name="RFC" value="7170"/>
            <author fullname="H. Zhou" initials="H." surname="Zhou">
              <organization/>
            </author>
            <author fullname="N. Cam-Winget" initials="N." surname="Cam-Winget">
              <organization/>
            </author>
            <author fullname="J. Salowey" initials="J." surname="Salowey">
              <organization/>
            </author>
            <author fullname="S. Hanna" initials="S." surname="Hanna">
              <organization/>
            </author>
            <date month="May" year="2014"/>
            <abstract>
              <t>This document defines the Tunnel Extensible Authentication Protocol (TEAP) version 1.  TEAP is a tunnel-based EAP method that enables secure communication between a peer and a server by using the Transport Layer Security (TLS) protocol to establish a mutually authenticated tunnel.  Within the tunnel, TLV objects are used to convey authentication-related data between the EAP peer and the EAP server.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC7542" target="https://www.rfc-editor.org/info/rfc7542">
          <front>
            <title>The Network Access Identifier</title>
            <seriesInfo name="DOI" value="10.17487/RFC7542"/>
            <seriesInfo name="RFC" value="7542"/>
            <author fullname="A. DeKok" initials="A." surname="DeKok">
              <organization/>
            </author>
            <date month="May" year="2015"/>
            <abstract>
              <t>In order to provide inter-domain authentication services, it is necessary to have a standardized method that domains can use to identify each other's users.  This document defines the syntax for the Network Access Identifier (NAI), the user identifier submitted by the client prior to accessing resources.  This document is a revised version of RFC 4282.  It addresses issues with international character sets and makes a number of other corrections to RFC 4282.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8952" target="https://www.rfc-editor.org/info/rfc8952">
          <front>
            <title>Captive Portal Architecture</title>
            <seriesInfo name="DOI" value="10.17487/RFC8952"/>
            <seriesInfo name="RFC" value="8952"/>
            <author fullname="K. Larose" initials="K." surname="Larose">
              <organization/>
            </author>
            <author fullname="D. Dolson" initials="D." surname="Dolson">
              <organization/>
            </author>
            <author fullname="H. Liu" initials="H." surname="Liu">
              <organization/>
            </author>
            <date month="November" year="2020"/>
            <abstract>
              <t>This document describes a captive portal architecture. Network provisioning protocols such as DHCP or Router Advertisements (RAs), an optional signaling protocol, and an HTTP API are used to provide the solution.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8995" target="https://www.rfc-editor.org/info/rfc8995">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <seriesInfo name="DOI" value="10.17487/RFC8995"/>
            <seriesInfo name="RFC" value="8995"/>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin">
              <organization/>
            </author>
            <author fullname="M. Richardson" initials="M." surname="Richardson">
              <organization/>
            </author>
            <author fullname="T. Eckert" initials="T." surname="Eckert">
              <organization/>
            </author>
            <author fullname="M. Behringer" initials="M." surname="Behringer">
              <organization/>
            </author>
            <author fullname="K. Watsen" initials="K." surname="Watsen">
              <organization/>
            </author>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document specifies automated bootstrapping of an Autonomic Control Plane.  To do this, a Secure Key Infrastructure is bootstrapped.  This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline.  We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device.  The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC9140" target="https://www.rfc-editor.org/info/rfc9140">
          <front>
            <title>Nimble Out-of-Band Authentication for EAP (EAP-NOOB)</title>
            <seriesInfo name="DOI" value="10.17487/RFC9140"/>
            <seriesInfo name="RFC" value="9140"/>
            <author fullname="T. Aura" initials="T." surname="Aura">
              <organization/>
            </author>
            <author fullname="M. Sethi" initials="M." surname="Sethi">
              <organization/>
            </author>
            <author fullname="A. Peltonen" initials="A." surname="Peltonen">
              <organization/>
            </author>
            <date month="December" year="2021"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP) provides support for multiple authentication methods. This document defines the EAP-NOOB authentication method for nimble out-of-band (OOB) authentication and key derivation. The EAP method is intended for bootstrapping all kinds of Internet-of-Things (IoT) devices that have no preconfigured authentication credentials. The method makes use of a user-assisted, one-directional, out-of-band (OOB) message between the peer device and authentication server to authenticate the in-band key exchange. The device must have a nonnetwork input or output interface, such as a display, microphone, speaker, or blinking light, that can send or receive dynamically generated messages of tens of bytes in length.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.irtf-t2trg-secure-bootstrapping" target="https://www.ietf.org/archive/id/draft-irtf-t2trg-secure-bootstrapping-02.txt">
          <front>
            <title>Terminology and processes for initial security setup of IoT devices</title>
            <seriesInfo name="Internet-Draft" value="draft-irtf-t2trg-secure-bootstrapping-02"/>
            <author fullname="Mohit Sethi">
              <organization>Aalto University</organization>
            </author>
            <author fullname="Behcet Sarikaya">
              <organization>Denpel Informatique</organization>
            </author>
            <author fullname="Dan Garcia-Carrillo">
              <organization>University of Oviedo</organization>
            </author>
            <date day="25" month="April" year="2022"/>
            <abstract>
              <t>   This document provides an overview of terms that are commonly used
   when discussing the initial security setup of Internet of Things
   (IoT) devices.  This document also presents a brief but illustrative
   survey of protocols and standards available for initial security
   setup of IoT devices.  For each protocol, we identify the terminology
   used, the entities involved, the initial assumptions, the processes
   necessary for completetion, and the knowledge imparted to the IoT
   devices after the setup is complete.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="dpp" target="https://www.wi-fi.org/downloads-registered-guest/Device_Provisioning_Protocol_Draft_Technical_Specification_Package_v0_0_23_0.zip/31255">
          <front>
            <title>Device Provisioning Protocol Specification</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
          <format type="pdf" target="https://github.com/kcdtv/wpa3/blob/master/Device_Provisioning_Protocol_Specification_v1.0.pdf"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAOJSzGIAA8Va3XLbuBW+51Ogzo3TWvJP7E3i6XRWayeNW8f2xk53euWB
SEjCmiS4BChFm8m79Fn6ZP3OAcAfSd7ptDPt7kUoEgTO73e+c+jRaJQ47XJ1
Lt5N7kSmZrLJnRUzU+PHUqfKCreQTpRKZcIZYcqpkXWWyOm0Vkt+axTu6XKe
ZCYtZYHdslrO3KjW6QJPrClHqmhGSla9xaOjoySxTpbZo8xNiZdc3ahEVzVf
WXdydPT26CSRtZLn4qp0qi6VS1bzcyFLXUjxk6mfsI/4c22aKnladYtGl3R8
kkp3LqzLkqTS5wL/vRCpLEVjlZB1LddiX8+EzHOxVvalgMoLaRdioWqVCCib
ntMDXFpTu1rN7Dlv0RoJ5gjP14V/TD8T2biFqc+TZCR0iZuTsbhUT+YJC71t
JjmEuFR/5Vumhj7va6U+TS6vPt/jjiqkzqEjVmXfz/Cklplu7NjUs3bPj2Px
qbVtu/FHuqXy4SM+4B57qbzAufdm5lYwKVvPdscVaf0HrdzsexuXjlOZJKWp
C+n0Up1j6Q8Xd8en5+LT+4s3x69PcQNXZyfH3537y7fHb4+gti5n/Zfw4Ls3
r+Oa10evjuLl8ev28uz0JFy+eXvWXb49a7c+5bVXo8uxrt1s5E5cPR9ZlTa1
Gk2NcdbVsqoQDrQsqyr6B070sb13ybEs7mqz1FabksIGP+Bjk4v7SqV6phEt
eLLH73kN/B5CVNnsXCycq+z54eFcu0UzHaemOHxKM7c8XFXy1eE0N9PDQlrE
36E/7LF/2GM87HFw2OPyeHw0xvZeWFnPFSJ2Lx61Wq3GKz2aafh+fpiZVZkb
mdlRreaaTlLZaN4o6377RM6FxweVLkocuynBnUyf5Fw9Lo8ejx5PXj0ejX/V
1eGr45Ozs70kWaqyYS/OKcdC4uFnCFH69T1FDQlIq9g2HEyHw2Qf41GC8B2N
hJySr1L8fFhoKwAZTaFKh7yyaa2nQBwpCoUcysR0LVYLBLOgrC1TU870HA7P
AjZRNieUzYRdyMafjS7xMgBgheAGVoW3Z03tkNXxrU6qg7g2kc7BkGwSAgLD
62tVqEz7mwQcUwVpSzVOflroXFFcCgp/YZuqAkRYRsOH63uxgh1M4yBLmmvS
LVW18zZXBx5Qe2rPdAmlS7OldVMSlmARv5i12wdZoHk2DkYkHwuZZbWyNmK2
traBsO91bd0B7cpHUehjU/E9HDSWdSUhCtxZHsDImUBGmZJFsAuzorX4R2jC
0vZMMnVFoZYp8UsjawkBS9yOdpcpyoavIZ2pt5QJ5WXsg6LQWZarJHlBGF6b
rEnJ6hQiCHNBeIWgAOpq1+BUMxMWV+wZC2Pxmvb84GYqWXYQFiuxv9K1yiHd
y3b1FH7yO5BVwruZYY84ILpDVVj6h7WeL+BLBCCpIXOvY6iPvNtYiInduRFv
0nv1AEYlR9KzYLCwhw3ed+uK8jVfIw5/aTSp2BkQiuOsD2allqo+gDXKdLcC
fO7QM/2jI6gE+8QU8zHv5cA9h/iwoqky9lxPizF7iKKBNejyNcohUxadbWIH
BqBii4gCjirxVEIMgd89KvH1678B9t++jXshgqK17odcFSCQNC7TvOGbX7+G
0vLt24H/QcXF/0DdoIuL+4n4OHl4ePfJJ8Xt3YX4PBF3snbi5Hic3JPMiEGv
U3sKE4uf9Hst7ppprlMxq1GWcTiCJObLLF7HKgSlK9oX2yG94cmGzGe9ZFQi
ScVbhiO7BugXtg2HCtZQX1AJaJ+rO3JUqZA3S+3WUBjHZngLCdAC51bsRj8d
RF/LxjIAp7pOm1wSZlaqzGSZrsfbgO2Rq4Vrn0aRN0aqtQPFBtKZKYXXVozK
fKoQp5y6qayITghCWZlHF56dsG02Ih8S7niHY54iLuQazqV3Zg3Yn220Y39G
+thRg/2ru5fCUek0uZlrciYFBKnGMQ91COt7QYfioBDWgH0GDUADnRMM5C2W
McUkQdNcIW4pf+WM/qG9lbTaG0YXVa7Y0nQfjsjNmraEdjkJyhTLhgoQToBj
DVFas/IOZszENv206Ovjw8OHkT/fQ5raWqWWJodKsbT5IKTtdLmEyHjUVHNQ
Vb86l2tVj07wEEmAdAWeI/4CXLTWgONzmAP+coPIanwN246dUE4L44tAKIix
IHNcUEX+9q0Nzv9HSf4f1WSxsyb/x2X4xrg2YiG+7dPErp7422sWV30BjYsm
Yik2Dms338DoylirpzrXjlOKU8gSqPq9LJddaESEy6fMWNxQoUS2etwteDOw
0wLtkQsp9buECMSDqgvNkbv24fak4D3AjRV7Hz/fP+wd+H/FzS1ff3r34+er
T+8u6fr+w+T6ur1Iwor7D7efry+7q+7Ni9uPH9/dXPqXcVcMbiV7Hyd/3/NO
3Lu9e7i6vZlc722HO6nitdWEQMB10kjaJFJiThF0X//8x/Epovx3CPOT4+O3
CHP/g9ox/AD+hpAxZb4OP2GsdYJqCaRhYIQJAY3aMQcBIFJMlWy+MZuvxb5L
Tk/rbdhzKkmuqZiRVBFHDUEO11yArLJoA38vLrVNDejJWox4EdFklEXJGebY
SzEtOvJGMZ2ZPkenrSYD5rO9Xyh9La63OWB967Ar5tuNTa1/7e8bXw4124pc
F5rRp19gw0m9vW47G436FYnRjAcdeEqFumMMlLWqpm5zU+P3VJk2UnmwKxWz
lkkMWdkzRYp7+c1N4fQXLzpXeW/HJYiNJufUFm+OTsbHxw1JbPW8xD4ezzwK
VcAOPhtht0Mhwq7GkmHiNiSgLjN2KIOf36vtpJhuK5kXYi9i4h7BvKLS3nO8
R+XAiPr8EajJwaWt34cJAPFM21XlqGYh15R8xAPkNFcbKDaAxjKgENO0lrBT
Aj/7tse+cEZbjzc2WCLV6O1e+sKrYh97lbh4Gd9f6Txng7Up4nUkDqkjY6P4
QI3xXe/BzrYAcQzny1rjIB62CcLlvlDjfvO11W25gVL07qIpUekAsgDojU7G
zMBuBvFASsohILB8tGEcNToARx/wGwRYTl5EQchsDzKw1p8TghFakHLE7dp2
YJxMSqpXBXOhWaDZnV4tbcxpCCP2M/OrKjk/+3rNcmNq9I6SzM3QPW107lGR
XqZuyhGcpqZmTk1GovFdTBrLGoL1PaE5MChi2c8yZcZTakedAhN9f0ygg0sK
+bQ21icFuJRCcRy+HaWIZLBjMtHfgYb4YGEScsCdL/Xuqa4Ai2AKDXE0wTaF
OjFVwe/A/DilqETPNJFP+lmAIcpS26K35AeIXoj3vIaw5b51sRVcdBlLSRON
7iP1IcUFcVBjeq6lJ34heaCfWFezEPuh+wwtLQISTSX8DMgeBD+fnxHSMYx7
G+4+2NueI3DOPKyxDYMbkTCVUxGg3g27UWiTpdusQf9vjeFudgOtpwquDGf9
t6IRJDvfeftSPOzcYbd+yfP1IOxNz7jxWY9ABBiyupRHLRjWWl8QepkKdmIV
uRMBq/LZMyW2UoQ8IS2t70gUc9jImPtk/V55ByPg8H9Cj4/HJ9Q3+8tXsVF/
i3Y4og4RTh/EcRFN8PWcMghH9pjYeEsJ3+Ui67lkopoPQqul4d7WLQ9AP8Bc
f6uBGAtBB5BTPFr1qlag8i0AbDCUthiFSFhpu/At1DO9s294oqNa7pIknytY
sAau64rHCcM6GdsfIPVwjOTjcDKZILDrJU89AQOclb5v4xSNidi9arhHrXIZ
2m8eH3nLMC2Uu2aDXA2HfYNuB18jP2vADt6t1P3bNvNo8up5DA0tsmCQv11P
bkKYUYpFpraL41wsJI2dgV0WCjCe/9hKKG7CIJgF7CRvdwrMn2iCmtdqzqfD
db7RxRqxrwi8sf5laNs8eSJIqojsOhEXhMEQZ2JJLSCNcMLsmQuAb/KFLZhq
KHZn6Mdwag1HenR9DycwKO8aeg1HSXHixdTi6m75nbjW5dPo2qSgckEeqvRU
famHvfcFMqrPABWHWFL8hUaq6BS+rLmFaEXD3fa0gzatT2lOw8J69XZKWxia
TxEghb4w5rmXiEZ4fZbjCQhzBT/Iuvxwcbc8jUEc3kX3RMGat1ONkGXcbfkZ
TZgLBXRkJK2RRS5fh2I6YFe573xTNDnd3Nnz6j24q3bVAnG6R1CUy8qZKkzt
mLi1lG2p5daEChbiUZbxxXA7BA8G/YS3ZGc+Njt9aANA9rqKjRriCynlg7gI
p9/x6UkYoaz4owqNngw0BOAFal0w5AfZUAFcBLpWuKE2tj+k80NoLn/tlACU
3GAXSpxMpTQ28tggM7SFmga8HDrMhisVfuHMzWPgnW5QTvAQyIT/Chugvbcp
iBUcZzjWoQcw0+rI2jdRY+Jz6CBaxc8iiEtpEgc+nyqoppnw+6QfmAt7btnl
AAkrcuMnvxCRhuLI9jnHO4GTpxmqxFnDLiU0gQNdxr5j10uZrsUF6ZIFW6Fv
vwyD2ABETj6RGn7WsOA8Rkj6Cjhbew4bvtzC1L/BQIhLr599kZGCYRKVQJVp
va4oq3zIB8yPyBRKGQFFw756TgXfPMpyF0fkAyUobdEbuMaHVEBKbnAI1Ca9
nhoGnKF694C9E7Y/ngbfWfKQxjmZPgF3vWmmSEChENc2qw1/iwjjU3pYmCxY
hqdd/Xl/z1REj1GvPKpsK2a3NYujdXJiq1bo9tnH3Iyh5GvTIH5vBhsV5P9W
FtvX7VKViDvKlHvAJ2HM/qW5fxl0tt1XCRop+XavFcUB3SoXPjMwwQwusJLE
1oXaFMS3ABth7czuskD1qrdB8BaPudtWQkxhgZXO4BHGF7DMTsSOhE4Vbd0S
cI83Q97cD2RNdOJJ5eswm/PVeL9A7Z+uHasuCMNCufdspVbSAhkIUZzpPtzF
GS5VISCer0a91oXoFbuH6BTiYrIpftfbtPJHtJMVdvmiCT0g66ujcJbtRXbX
WfRKe6bAXVpaqjQXFNnFTxTgsMN4LrQFb7bxJf6wA4erPpXuCU5zbnDbTm4C
ptpxiAynFAGw0oUheJSlr3WDJuWzp9qRZe9oNGOHtM3EmQJtTKo9duee1fkR
n6aS1G3b7fo8Kb8Zzj3CNKt/DsHgbql4+xgwnO22p9JvntvrPfgvIdaVsnE/
2+T8Ea1WP3s2FocvWZvzcmvSGBqmZ4SkOXf87EB+pI+u7CH6Uqy+uA4u+Km4
mVyFz5lnpyfEQZVLx8M3Y75zNbia3Ey2KgE3cMQzZT4iXYNAPRFD1Eyprse/
j4mjBf9Rxd9HU7//x/6f2GhZyvAXNrSnPaTFf3qJpu7GiMkB9UYTjv27h0/U
YPGnBM8ffqE/v+FPPmjHUhov5iqb+/IPmX+49FSLC3xu5uEvYKYA1ST5F+Sj
tpd8JwAA

-->

</rfc>
