<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.6.4 (Ruby 2.6.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-richardson-emu-eap-onboarding-03" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.13.1 -->
  <front>
    <title abbrev="EAP-onboarding">EAP defaults for devices that need to onboard</title>
    <seriesInfo name="Internet-Draft" value="draft-richardson-emu-eap-onboarding-03"/>
    <author initials="A." surname="Dekok" fullname="Alan DeKok">
      <organization>FreeRADIUS</organization>
      <address>
        <email>aland@freeradius.org</email>
      </address>
    </author>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <date year="2023" month="April" day="02"/>
    <area>Internet</area>
    <workgroup>anima Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document describes a method by which an unconfigured device can
use EAP to join a network on which further device onboarding, network
attestation or other remediation can be done.
While RFC 5216 supports EAP-TLS without a client certificate, that document defines no method by which unauthenticated EAP-TLS can be used.
This draft addresses that issue.
First, by defining the @eap.arpa domain, and second by showing how it
can be used to provide quarantined network access for onboarding unauthenticated devices.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-richardson-emu-eap-onboarding/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        anima Working Group mailing list (<eref target="mailto:anima@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/anima/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/mcr/eap-onboarding.git"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>There are a multitude of situations where a network device needs to join a new (wireless) network but where the device does not yet have the right credentials for that network.  As the device does not have credentials, it cannot access networks which typically require authentication.  However, since the device does not have network access, it cannot download a new configuration which contains updated credentials.</t>
      <t>The process by which a device acquires these credentials has become known as onboarding
<xref target="I-D.irtf-t2trg-secure-bootstrapping"/>.
There are many onboarding protocols, including <xref target="RFC8995"/>, <xref target="RFC9140"/>, <xref target="dpp"/>, CSA MATTER, and OPC UA Part 21.
Some of these protocols use WiFi Public frames, or provide for provisioning as part of EAP, such as <xref target="RFC7170"/>.
Other systems require pre-existing IP connectivity in order to configure credentials for a device, which causes a circular dependancy.</t>
      <t>This document defines a method where devices can use unauthenticated EAP in order to obtain network access, albeit in a captive portal <xref target="RFC8952"/>.
Once the device is in a captive portal, it has access to the full suite of Internet Protocol (IP) technologies, and can proceed with onboarding.
We believe that the method defined here is clearer, safer, and easier to implement and deploy than alternatives.
This method also allows for multiple onboarding technologies to co-exist, and for the technologies to evolve without requiring invasive upgrades to layer-2 infrastructure.</t>
      <t>The method detailed in this document uses the unauthenticated client mode of EAP-TLS.
While <xref target="RFC5216"/> defines EAP-TLS without a client certificate, that document defines no method by which unauthenticated EAP-TLS can be used.</t>
      <t>This draft addresses that issue.
First, by defining the @eap.arpa domain, and second by showing how it can be used to provid network access for onboarding unauthenticated devices.</t>
      <t>Note that this specification does not specify the exact method used for onboarding devices!
There are many possibilities, with some methods yet to be defined.
Not all of them are enumerated here.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <t>The term <em>supplicant</em> is used to refer to the network device which is attempting to do EAP-TLS.</t>
      <t>The term <em>pledge</em> (from <xref target="RFC8995"/>) is used to refer to the network device which has successfully performed unauthenticated client mode EAP-TLS, and now has access to a network on which is may perform onboarding.</t>
    </section>
    <section anchor="protocol-details">
      <name>Protocol Details</name>
      <t>The onboarding is divided into the following phases:</t>
      <ul spacing="normal">
        <li>Discovery - the supplicant determines that a network can do onboarding,</li>
        <li>Authentication - the supplicant connects to the network as an unauthenticated device,</li>
        <li>Authorization - the network provides limited connectivity to the device/pledge,</li>
        <li>Onboarding - the device/pledge uses standard IP protocols to perform onboarding,</li>
        <li>Full network access - the device has provisioned credentials, and can proceed with normal network access.</li>
      </ul>
      <section anchor="discovery">
        <name>Discovery</name>
        <t>The network should use 802.11u to signal that it can potentially perform onboarding, by using 802.11u and indicating that it supports the realm "eap.arpa".</t>
        <t>When a supplicant which requires onboarding sees this realm, it knows that the network may be suitable for onboarding.</t>
        <t>Note that not all such networks are suitable for onboarding using the technologies that a supplicant has.
Some networks might have only a captive portal, intended for human use.
This is the "coffee shop" case.</t>
        <t>There may be multiple such networks available, and only one (or none) may be willing to onboard this particular device.
Further, the device does not necessarily trust any such network.</t>
        <t>There are situations where there may be many hundreds of networks which offer onboarding, and a supplicant device may need to try all of them until it finds a network to which it can successfully onboard.
An example of such a situation is in a large (dozens to hundreds of floors) apartment building in a downtown core, where radio signals may leak from adjacent units, reflect off glass windows, come from other floors, and even cross the street from adjacent buildings.
This document does not address this issue, but anticipates future work in 802.11u, perhaps  involving some filtering mechanism using Bloom Filters.</t>
        <t>Supplicants MUST limit their actions in the onboarding network to the action of onboarding.
If this process cannot be completed, the device MUST disconnect from the onboarding network, and try again, usually by selecting a different network.</t>
        <t>As soon as the device has been onboarded, the device MUST disconnect from the onboarding network, and use the provided configuration to authenticate and connect to a fully-capable network.</t>
      </section>
      <section anchor="authentication">
        <name>Authentication</name>
        <t>The supplicant presents itself as an unauthenticated peer, which is allowed by EAP-TLS <xref target="RFC5216"/> Section 2.1.1.
TLS 1.2 or TLS 1.3 <xref target="RFC9190"/> may be used, but TLS 1.3 or higher is RECOMMENDED.</t>
        <t>The supplicant uses an identity of onboarding@eap.arpa, and provides no TLS client certificate.  The use of the "eap.arpa" domain signals to the network that the device wishes to use unauthenticated EAP-TLS.</t>
      </section>
      <section anchor="authorization">
        <name>Authorization</name>
        <t>Upon receipt of a supplicant without any authentication, the AAA server returns instructions to the authenticator to place the new client into the quarantined or captive portal network.
The exact method is network-dependent, but it is usually done with a dedicated VLAN which has limited network access.</t>
      </section>
      <section anchor="characteristics-of-the-quarantine-network">
        <name>Characteristics of the Quarantine Network</name>
        <t>The quarantine network SHOULD be segregated at layer-two (ethernet), and should not permit ethernet frames to any destination other than a small set of specified routers.</t>
        <t>Specifically, the layer infrastructure should prevent one pledge from attempting to connect to another pledge.</t>
        <t>For some onboarding protocols such as <xref target="RFC8995"/>, only IPv6 Link-Local frames are needed.
Such a network MUST provide a Join Proxy as specified in <xref section="4" sectionFormat="comma" target="RFC8995"/>.</t>
        <t>For other onboarding protocols more capabilities may be needed, in particular there need for a DHCPv4 server may be critical for the device to believe it has connected correctly.
This is particularly the case where a normal "smartphone" or laptop system will onboard via a captive portal.</t>
        <t>Once on the quarantine network, device uses other protocols <xref target="RFC6876"/> to perform the onboarding action.</t>
      </section>
    </section>
    <section anchor="captive-portal">
      <name>Captive Portal</name>
      <t>While this document imposes no requirements on the rest of the network, captive portals <xref target="RFC8952"/> have been used for almost two decades.
The administration and operation of captive portals is typically within the authority of administrators who are responsible for network access.
As such, this document defines additional behavior on, and requirements for, captive portals, so long as those changes materially benefit the network access administrator.</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>Devices should take care to hide all identifying information from the onboarding network.
Any identifying information MUST be sent encrypted via a method such as TLS.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Devices using an onboarding network MUST assume that the network is untrusted.
All network traffic SHOULD be encrypted in order to prevent attackers from both eavesdropping, and from modifying any provisioning information.</t>
      <t>Similarly onboarding networks MUST assume that devices are untrusted, and could be malicious.
Networks MUST make provisions to prevent Denial of Service (DoS) attacks, such as when many devices attempt to connect at the same time.</t>
      <t>Networks MUST limit network access to onboarding protocols only.</t>
      <t>Networks SHOULD also limit the bandwidth used by any device which is being onboarded.</t>
      <t>The configuration information is likely to be small (megabytes at most), and it is reasonable to require a second or two for this process to take place.</t>
      <t>Any device which cannot be onboarded within approximately 30 seconds SHOULD be disconnected.
Such a delay signals either a malicious device / network, or a misconfigured device / network.
If onboarding cannot be finished within a short timer, the device should choose another network.</t>
      <section anchor="use-of-eaparpa">
        <name>Use of eap.arpa</name>
        <t>Supplicants MUST use the "eap.arpa" domain only for onboarding and related activities.
Supplicant MUST use unauthenticated EAP-TLS.</t>
        <t>Networks which support onboarding via the "eap.arpa" domain MUST require that supplicants use unauthenticated EAP-TLS.
The use of other EAP types MUST result in rejection, and a denial of all network access.</t>
        <t>The "eap.arpa" domain MUST NOT be used in any other context, such as in an NAI <xref target="RFC7542"/>, etc. in any other protocol.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>The special-use domain "eap.arpa" should be registered in the .arpa registry (<eref target="https://www.iana.org/domains/arpa">https://www.iana.org/domains/arpa</eref>).  No A, AAAA, or PTR records are requested.</t>
      <section anchor="domain-name-reservation-considerations">
        <name>Domain Name Reservation Considerations</name>
        <t>This template is filled in, complying with <xref target="RFC6761"/> section 5.</t>
        <dl>
          <dt>Users:</dt>
          <dd>
            <t>Human users are not expected to recognize this name as special.</t>
          </dd>
          <dt>Application Software:</dt>
          <dd>
            <t>Only writers of network connectivity sub-systems (WiFi) are expected to see this new domain. No other software (such browsers) should care about this name.</t>
          </dd>
          <dt>Name Resolution APIs and Libraries:</dt>
          <dd>
            <t>Name Resolution APIs and Libraries do not need to mark this name as special.</t>
          </dd>
          <dt>Caching DNS Servers:</dt>
          <dd>
            <t>DNS Caches do not need to do any special processing for this name.</t>
          </dd>
          <dt>Authoritative DNS Servers:</dt>
          <dd>
            <t>Authoritative DNS servers do not need any special processing.</t>
          </dd>
        </dl>
        <t>DNS Server Operators:
; DNS Server Opreators do not need to do anything special.</t>
        <dl>
          <dt>DNS Registries/Registrars:</dt>
          <dd>
            <t>DNS Registrars presently do not registar any names in <tt>.arpa</tt>, and this name reservation will be no different.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>TBD.</t>
    </section>
    <section anchor="changelog">
      <name>Changelog</name>
      <t>01 to 02: minor edits.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="BCP14" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC5216" target="https://www.rfc-editor.org/info/rfc5216">
          <front>
            <title>The EAP-TLS Authentication Protocol</title>
            <author fullname="D. Simon" initials="D." surname="Simon">
              <organization/>
            </author>
            <author fullname="B. Aboba" initials="B." surname="Aboba">
              <organization/>
            </author>
            <author fullname="R. Hurst" initials="R." surname="Hurst">
              <organization/>
            </author>
            <date month="March" year="2008"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides support for multiple authentication methods.  Transport Layer Security (TLS) provides for mutual authentication, integrity-protected ciphersuite negotiation, and key exchange between two endpoints.  This document defines EAP-TLS, which includes support for certificate-based mutual authentication and key derivation.</t>
              <t>This document obsoletes RFC 2716.  A summary of the changes between this document and RFC 2716 is available in Appendix A.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5216"/>
          <seriesInfo name="DOI" value="10.17487/RFC5216"/>
        </reference>
        <reference anchor="RFC9190" target="https://www.rfc-editor.org/info/rfc9190">
          <front>
            <title>EAP-TLS 1.3: Using the Extensible Authentication Protocol with TLS 1.3</title>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson">
              <organization/>
            </author>
            <author fullname="M. Sethi" initials="M." surname="Sethi">
              <organization/>
            </author>
            <date month="February" year="2022"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods. This document specifies the use of EAP-TLS with TLS 1.3 while remaining backwards compatible with existing implementations of EAP-TLS. TLS 1.3 provides significantly improved security and privacy, and reduced latency when compared to earlier versions of TLS. EAP-TLS with TLS 1.3 (EAP-TLS 1.3) further improves security and privacy by always providing forward secrecy, never disclosing the peer identity, and by mandating use of revocation checking when compared to EAP-TLS with earlier versions of TLS. This document also provides guidance on authentication, authorization, and resumption for EAP-TLS in general (regardless of the underlying TLS version used). This document updates RFC 5216.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9190"/>
          <seriesInfo name="DOI" value="10.17487/RFC9190"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC6876" target="https://www.rfc-editor.org/info/rfc6876">
          <front>
            <title>A Posture Transport Protocol over TLS (PT-TLS)</title>
            <author fullname="P. Sangster" initials="P." surname="Sangster">
              <organization/>
            </author>
            <author fullname="N. Cam-Winget" initials="N." surname="Cam-Winget">
              <organization/>
            </author>
            <author fullname="J. Salowey" initials="J." surname="Salowey">
              <organization/>
            </author>
            <date month="February" year="2013"/>
            <abstract>
              <t>This document specifies PT-TLS, a TLS-based Posture Transport (PT) protocol.  The PT-TLS protocol carries the Network Endpoint Assessment (NEA) message exchange under the protection of a Transport Layer Security (TLS) secured tunnel.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6876"/>
          <seriesInfo name="DOI" value="10.17487/RFC6876"/>
        </reference>
        <reference anchor="RFC7030" target="https://www.rfc-editor.org/info/rfc7030">
          <front>
            <title>Enrollment over Secure Transport</title>
            <author fullname="M. Pritikin" initials="M." role="editor" surname="Pritikin">
              <organization/>
            </author>
            <author fullname="P. Yee" initials="P." role="editor" surname="Yee">
              <organization/>
            </author>
            <author fullname="D. Harkins" initials="D." role="editor" surname="Harkins">
              <organization/>
            </author>
            <date month="October" year="2013"/>
            <abstract>
              <t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport.  This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates.  It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7030"/>
          <seriesInfo name="DOI" value="10.17487/RFC7030"/>
        </reference>
        <reference anchor="RFC7170" target="https://www.rfc-editor.org/info/rfc7170">
          <front>
            <title>Tunnel Extensible Authentication Protocol (TEAP) Version 1</title>
            <author fullname="H. Zhou" initials="H." surname="Zhou">
              <organization/>
            </author>
            <author fullname="N. Cam-Winget" initials="N." surname="Cam-Winget">
              <organization/>
            </author>
            <author fullname="J. Salowey" initials="J." surname="Salowey">
              <organization/>
            </author>
            <author fullname="S. Hanna" initials="S." surname="Hanna">
              <organization/>
            </author>
            <date month="May" year="2014"/>
            <abstract>
              <t>This document defines the Tunnel Extensible Authentication Protocol (TEAP) version 1.  TEAP is a tunnel-based EAP method that enables secure communication between a peer and a server by using the Transport Layer Security (TLS) protocol to establish a mutually authenticated tunnel.  Within the tunnel, TLV objects are used to convey authentication-related data between the EAP peer and the EAP server.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7170"/>
          <seriesInfo name="DOI" value="10.17487/RFC7170"/>
        </reference>
        <reference anchor="RFC7542" target="https://www.rfc-editor.org/info/rfc7542">
          <front>
            <title>The Network Access Identifier</title>
            <author fullname="A. DeKok" initials="A." surname="DeKok">
              <organization/>
            </author>
            <date month="May" year="2015"/>
            <abstract>
              <t>In order to provide inter-domain authentication services, it is necessary to have a standardized method that domains can use to identify each other's users.  This document defines the syntax for the Network Access Identifier (NAI), the user identifier submitted by the client prior to accessing resources.  This document is a revised version of RFC 4282.  It addresses issues with international character sets and makes a number of other corrections to RFC 4282.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7542"/>
          <seriesInfo name="DOI" value="10.17487/RFC7542"/>
        </reference>
        <reference anchor="RFC8952" target="https://www.rfc-editor.org/info/rfc8952">
          <front>
            <title>Captive Portal Architecture</title>
            <author fullname="K. Larose" initials="K." surname="Larose">
              <organization/>
            </author>
            <author fullname="D. Dolson" initials="D." surname="Dolson">
              <organization/>
            </author>
            <author fullname="H. Liu" initials="H." surname="Liu">
              <organization/>
            </author>
            <date month="November" year="2020"/>
            <abstract>
              <t>This document describes a captive portal architecture. Network provisioning protocols such as DHCP or Router Advertisements (RAs), an optional signaling protocol, and an HTTP API are used to provide the solution.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8952"/>
          <seriesInfo name="DOI" value="10.17487/RFC8952"/>
        </reference>
        <reference anchor="RFC8995" target="https://www.rfc-editor.org/info/rfc8995">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin">
              <organization/>
            </author>
            <author fullname="M. Richardson" initials="M." surname="Richardson">
              <organization/>
            </author>
            <author fullname="T. Eckert" initials="T." surname="Eckert">
              <organization/>
            </author>
            <author fullname="M. Behringer" initials="M." surname="Behringer">
              <organization/>
            </author>
            <author fullname="K. Watsen" initials="K." surname="Watsen">
              <organization/>
            </author>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document specifies automated bootstrapping of an Autonomic Control Plane.  To do this, a Secure Key Infrastructure is bootstrapped.  This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline.  We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device.  The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8995"/>
          <seriesInfo name="DOI" value="10.17487/RFC8995"/>
        </reference>
        <reference anchor="RFC9140" target="https://www.rfc-editor.org/info/rfc9140">
          <front>
            <title>Nimble Out-of-Band Authentication for EAP (EAP-NOOB)</title>
            <author fullname="T. Aura" initials="T." surname="Aura">
              <organization/>
            </author>
            <author fullname="M. Sethi" initials="M." surname="Sethi">
              <organization/>
            </author>
            <author fullname="A. Peltonen" initials="A." surname="Peltonen">
              <organization/>
            </author>
            <date month="December" year="2021"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP) provides support for multiple authentication methods. This document defines the EAP-NOOB authentication method for nimble out-of-band (OOB) authentication and key derivation. The EAP method is intended for bootstrapping all kinds of Internet-of-Things (IoT) devices that have no preconfigured authentication credentials. The method makes use of a user-assisted, one-directional, out-of-band (OOB) message between the peer device and authentication server to authenticate the in-band key exchange. The device must have a nonnetwork input or output interface, such as a display, microphone, speaker, or blinking light, that can send or receive dynamically generated messages of tens of bytes in length.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9140"/>
          <seriesInfo name="DOI" value="10.17487/RFC9140"/>
        </reference>
        <reference anchor="I-D.irtf-t2trg-secure-bootstrapping" target="https://datatracker.ietf.org/doc/html/draft-irtf-t2trg-secure-bootstrapping-03">
          <front>
            <title>Terminology and processes for initial security setup of IoT devices</title>
            <author fullname="Mohit Sethi" initials="M." surname="Sethi">
              <organization>Aalto University</organization>
            </author>
            <author fullname="Behcet Sarikaya" initials="B." surname="Sarikaya">
              <organization>Denpel Informatique</organization>
            </author>
            <author fullname="Dan Garcia-Carrillo" initials="D." surname="Garcia-Carrillo">
              <organization>University of Oviedo</organization>
            </author>
            <date day="26" month="November" year="2022"/>
            <abstract>
              <t>   This document provides an overview of terms that are commonly used
   when discussing the initial security setup of Internet of Things
   (IoT) devices.  This document also presents a brief but illustrative
   survey of protocols and standards available for initial security
   setup of IoT devices.  For each protocol, we identify the terminology
   used, the entities involved, the initial assumptions, the processes
   necessary for completetion, and the knowledge imparted to the IoT
   devices after the setup is complete.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-t2trg-secure-bootstrapping-03"/>
        </reference>
        <reference anchor="dpp" target="https://www.wi-fi.org/downloads-registered-guest/Device_Provisioning_Protocol_Draft_Technical_Specification_Package_v0_0_23_0.zip/31255">
          <front>
            <title>Device Provisioning Protocol Specification</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
          <format type="pdf" target="https://github.com/kcdtv/wpa3/blob/master/Device_Provisioning_Protocol_Specification_v1.0.pdf"/>
        </reference>
        <reference anchor="RFC6761" target="https://www.rfc-editor.org/info/rfc6761">
          <front>
            <title>Special-Use Domain Names</title>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire">
              <organization/>
            </author>
            <author fullname="M. Krochmal" initials="M." surname="Krochmal">
              <organization/>
            </author>
            <date month="February" year="2013"/>
            <abstract>
              <t>This document describes what it means to say that a Domain Name (DNS name) is reserved for special use, when reserving such a name is appropriate, and the procedure for doing so.  It establishes an IANA registry for such domain names, and seeds it with entries for some of the already established special domain names.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6761"/>
          <seriesInfo name="DOI" value="10.17487/RFC6761"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
