<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.4 (Ruby 2.6.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-dekok-emu-eap-arpa-01" category="std" consensus="true" submissionType="IETF" updates="9140" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.13.0 -->
  <front>
    <title abbrev="eap.arpa">The eap.arpa domain and EAP provisioning</title>
    <seriesInfo name="Internet-Draft" value="draft-dekok-emu-eap-arpa-01"/>
    <author initials="A." surname="DeKok" fullname="Alan DeKok">
      <organization>FreeRADIUS</organization>
      <address>
        <email>aland@freeradius.org</email>
      </address>
    </author>
    <date year="2024" month="February" day="25"/>
    <area>Internet</area>
    <workgroup>EMY Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 46?>

<t>This document defines the eap.arpa domain as a way for EAP peers to
signal to EAP servers that they wish to obtain limited, and
unauthenticated, network access.  EAP peers leverage user identifier
portion of the Network Access Identifier (NAI) format of RFC7542 in
order to describe what kind of provisioning they need.  A table of
identifiers and meanings is defined.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-dekok-emu-eap-arpa/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        EMU Working Group mailing list (<eref target="mailto:emut@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/emut/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/emut/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/freeradius/eap-arpa.git"/>.</t>
    </note>
  </front>
  <middle>
    <?line 55?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>In most uses, EAP <xref target="RFC3748"/> requires that the EAP peer have a known
identity.  However, when the peer does not already have an identity,
this requirement creates a bootstrapping problem.  It may not be
possible for the device to obtain network access without credentials.
However, credentials are usually required in order to obtain network
access.  As a result, the device is unprovisioned, and unable to be
provisioned.</t>
      <t>This specification addresses that problem.  It creates a framework by
which clients can submit predefined credentials to a server in order to
obtain limited network access.  At the same time, servers can know in
advance that these credentials are only to be used for provisioning,
and that unrestricted network access should not be granted.</t>
      <t>The device can either use the EAP channel itself for provisioning, as
with TEAP <xref target="RFC7170"/>, or the EAP server can give the device access to
a limited captive portal such as with <xref target="RFC8952"/>.  Once the device is
provisioned, it can use those provisioned credentials to obtain full
network access.</t>
      <t>The identifiers used here are generically referred to as "EAP
Provisioning Identifiers" (EPI).  The choice of "Provisioning
Identifiers for EAP" (PIE) was considered and rejected.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
      </t>
    </section>
    <section anchor="concepts">
      <name>Concepts</name>
      <t>A device which has no device-specific credentials can use a predefined
identifier in Network Access Identifier (NAI) format <xref target="RFC7542"/>.  The
NAI is composed of two portions, the utf8-username, and the utf8-realm
domain.  For simplicity here, we refer to these as the "username" and
"realm" fields.</t>
      <t>The realm is chosen to be non-routable, so that the EAP packet
exchange is not sent across an Authentication, Authorization, and
Accounting (AAA) proxy framework as defined in <xref target="RFC7542"/> Section 3.
Instead, the packets remains local to the EAP server.  If the EAP
server implements this standard, then it can proceed with the full EAP
conversation.  If the EAP server does not implement this standard,
then it MUST reply with an EAP Failure, as per <xref target="RFC3748"/> Section
4.2.</t>
      <t>We note that this specification is fully compatible with all existing
EAP implementations, so its is fail-safe.  When presented with a peer
wishing to use this specification, existing implementations will
return EAP Failure, and will not otherwise misbehave.</t>
      <t>We now discuss the NAI format in more detail.  We first discuss the
eap.arpa realm, and second the use and purpose of the username field.</t>
      <section anchor="the-eaparpa-realm">
        <name>The eap.arpa realm</name>
        <t>This document defines the "eap.arpa" domain as being used for
provisioning within EAP.  A similar domain has previously been used
for EAP-NOOB <xref target="RFC9140"/>, as "eap-noob.arpa".  This document extends
that concept, and standardizes the practices surrounding it,</t>
        <t>NOTE: the "arpa" domain is controlled by the IAB.  Allocation of
"eap.arpa" requires agreement from the IAB.</t>
      </section>
      <section anchor="the-username-field">
        <name>The username field</name>
        <t>The username field is assigned via the EAP Provisioning Identifier
Registry which is defined below.  The registry can either hold a fixed
string such as "noob", or a prefix such as "V-".  Prefixes give
vendors and Service delivery organizations (SDOs) the ability to
self-assign a delegated range of identifiers which cannot conflict
with other identifiers.</t>
        <t>The username field MUST NOT omitted.  That is, "@eap.arpa" is not a
valid identifier for the purposes of this specification.  <xref target="RFC7542"/>
recommends omitting the username portion for user privacy.  As user
privacy is not needed here, the username field can be publicly visible.</t>
      </section>
    </section>
    <section anchor="overview">
      <name>Overview</name>
      <t>For EAP-TLS, both <xref target="RFC5216"/> Section 2.1.1 and <xref target="RFC9190"/> provide
for "peer unauthenticated access".  However, those documents define no
way for a peer to signal that it is requesting such access.  The
presumption is that the peer connects with some value for the EAP
Identity, but without using a client certificate.  The EAP server is
then supposed to determine that the peer is requesting unauthenticated
access, and take the approprate steps to limit authorization.</t>
      <t>There appears to be no EAP peer or server implementations which
support such access, since there is no defined way to perform any of
the steps required.  i.e. to signal that this access is desired, and
then limit access.</t>
      <t>TBD: The Wireless Broadband Alliance (WBA) has defined an unauthenticated
EAP-TLS method, using a vendor-specific EAP type. Get link.</t>
      <t>EAP-NOOB <xref target="RFC9140"/> takes this process a step further.  It defines both
a way to signal that provisioning is desired, and also a way to
exchange provisioning information within EAP-NOOB.  That is, there is
no need for the device to obtain limited network access, as all of the
provisioning is done inside of the EAP-NOOB protocol.</t>
      <t>TEAP <xref target="RFC7170"/> provides for provisioning via an unauthenticated TLS
tunnel.  There is a server unauthenticated provisioning mode (TBD),
but the inner TLS exchange requires that both end authenticate each
other.  There are ways to provision a certificate, but the peer must
still authenticate itself to the server.</t>
      <section anchor="taxonomy-of-provisioning-types">
        <name>Taxonomy of Provisioning Types</name>
        <t>There are two scenarios where provisioning can be done.  The first is
where provisioning is done within the EAP type, as with EAP-NOOB
<xref target="RFC9140"/>.  The second is where EAP is used to obtain limited
network access (e.g. as with a captive portal).  That limited network
access is then used to run Internet Protocol (IP) based provisioning
over more complex protocols.</t>
        <section anchor="rationale-for-provisioning-over-eap">
          <name>Rationale for Provisioning over EAP</name>
          <t>It is often useful to do all provisioning inside of EAP, because the EAP / AAA
admin does not have control over the network.  It is not always
possible to define a captive portal where provisioning can be done.
As a result, we need to be able to perform provisioning via EAP, and
not via some IP protocol.</t>
        </section>
      </section>
    </section>
    <section anchor="interaction-with-existing-eap-types">
      <name>Interaction with existing EAP types</name>
      <t>As the provisioning identifer is used within EAP, it necessarily has
interactions with, and effects on, the various EAP types.  This
section discusses those effects in more detail.</t>
      <t>Some EAP methods require shared credentials such as passwords in order
to succeed.  For example, both EAP-MSCHAPv2 (PEAP) and EAP-PWD
<xref target="RFC5931"/> perform cryptographic exchanges where both parties
knowing a shared password.  Where those methods are used, the password
MUST be the same as the provisioning identifier.</t>
      <t>This requirement also applies to TLS-based EAP methods such as TTLS
and PEAP.  Where the TLS-based EAP method provides for an inner
identity and inner authentication method, the credentials used there
MUST be the provisioning identifier for both the inner identity, and
any inner password.</t>
      <t>This process ensures that most EAP methods will work for provisioning,
at the expense of potential security attacks.  TBD - discuss.</t>
      <t>It is RECOMMENDED that provisioning be done via a TLS-based EAP methods.
TLS provides for authentication of the EAP server, along with security
and confidentiality of any provisioning data exchanged in the tunnel.
Similarly if provisioning is done in a captive portal outside of EAP,
EAP-TLS permits the EAP peer to run a full EAP authentication session
while having nothing more than a few certification authorities (CAs)
locally configured.</t>
      <section anchor="eap-tls">
        <name>EAP-TLS</name>
        <t>This document defines an identifier "portal@eap.arpa", which is the
first step towards permitted unauthenticated client provisioning in
EAP-TLS.  The purpose of the identifier is to allow EAP peers to
signal EAP servers that they wish to obtain a "captive portal" style
network access.</t>
        <t>This identifier signals the EAP server that the peer wishes to obtain
"peer unauthenticated access" as per <xref target="RFC5216"/> Section 2.1.1 and
<xref target="RFC9190"/>.</t>
        <t>An EAP server which agrees to authenticate this request MUST ensure
that the device is placed into a captive portal with limited network
access.  Further details of the captive portal architecture can be
found in <xref target="RFC8952"/>.</t>
        <t>The remaining question is how the EAP peer verifies the identity of
the EAP server.  The device SHOULD ignore the EAP server certificate
entirely, as the servers identity does not matter.  Any verification
of servers can be done at the HTTPS layer when the device access the
captive portal.  Where possible the device SHOULD warn the end user
that the provided certificate is unchecked, and untrusted.</t>
        <t>However, since the device likely is configured with web CAs (otherwise
the captive portal would also be unauthenticated), EAP peers MAY use
the CAs available for the web in order to validate the EAP server
certificate.  If the presented certificate passes validation, the
device does not need to warn the end user that the provided
certificate is untrusted.</t>
      </section>
      <section anchor="tls-based-eap-methods">
        <name>TLS-based EAP methods</name>
        <t>Other TLS-based EAP methods such as TTLS and PEAP can use the same
method as defined for EAP-TLS above.  The only difference is that the
inner identity and password is also the provisioning identifier.</t>
        <t>Is is RECOMMENDED that provisioning methods use EAP-TLS in preference
to any other TLS-based EAP methods.  As the credentials for other
methods are predefined and known in advanc, those methods offer little
benefit over EAP-TLS.</t>
      </section>
      <section anchor="eap-noob">
        <name>EAP-NOOB</name>
        <t>It is RECOMMENDED that server implementations of EAP-NOOB accept both
identities "noob@eap-noob.arpa" and "noob@eap.arpa" as synonyms.</t>
        <t>It is RECOMMENDED that EAP-NOOB peers use "noob@eap.arpa" first, and
if that does not succeed, use "noob@eap-noob.arpa"</t>
        <t>@todo - what is the deployment of EAP-NOOB?  Can we even make this
recommendation?</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>Three IANA actions are required.  The first two are registry updates
for "eap.arpa".  The second is the creation of a new registry.</t>
      <section anchor="arpa-updates">
        <name>.arpa updates</name>
        <t>IANA is instructed to update the ".ARPA Zone Management" registry with
the following entry:</t>
        <t>DOMAIN</t>
        <ul empty="true">
          <li>
            <t>eap.arpa</t>
          </li>
        </ul>
        <t>USAGE</t>
        <ul empty="true">
          <li>
            <t>For provisioning within the Extensible Authentication Protocol framework.</t>
          </li>
        </ul>
        <t>REFERENCE</t>
        <ul empty="true">
          <li>
            <t>THIS-DOCUMENT</t>
          </li>
        </ul>
        <t>IANA is instructed to update the "Special-Use Domain Names" registry as follows:</t>
        <t>NAME</t>
        <ul empty="true">
          <li>
            <t>eap.arpa</t>
          </li>
        </ul>
        <t>REFERENCE</t>
        <ul empty="true">
          <li>
            <t>THIS-DOCUMENT</t>
          </li>
        </ul>
        <section anchor="domain-name-reservation-considerations">
          <name>Domain Name Reservation Considerations</name>
          <t>This section answers the questions which are required by Section 5 of <xref target="RFC6761"/>.  At a high level, these new domain names are used in certain situations in EAP.  The domain names are never seen by users, and they do not appear in any networking protocol other than EAP.</t>
          <ol spacing="normal" type="1"><li>Users:</li>
          </ol>
          <ul empty="true">
            <li>
              <t>User are not expected to recognise these names as special or use them differently from other domain names.  The use of these names in EAP is invisible to end users.</t>
            </li>
          </ul>
          <ol spacing="normal" type="1"><li>Application Software:</li>
          </ol>
          <ul empty="true">
            <li>
              <t>EAP servers and clients are expected to make their software recognize these names as special and treat them differently.  This document discusses that behavor.</t>
              <t>EAP supplicants should recognize these names as special, and should refuse to allow users to enter them in any interface.</t>
            </li>
          </ul>
          <ol spacing="normal" type="1"><li>Name Resolution APIs and Libraries:</li>
          </ol>
          <ul empty="true">
            <li>
              <t>Writers of these APIs and libraries are not expected to recognize these names or treat them differently.</t>
            </li>
          </ul>
          <ol spacing="normal" type="1"><li>Caching DNS Servers:</li>
          </ol>
          <ul empty="true">
            <li>
              <t>Writers of caching DNS servers are not expected to recognize these names or treat them differently.</t>
            </li>
          </ul>
          <ol spacing="normal" type="1"><li>Authoritative DNS Servers:</li>
          </ol>
          <ul empty="true">
            <li>
              <t>Writers of authoritative DNS servers are not expected to recognize these names or treat them differently.</t>
            </li>
          </ul>
          <ol spacing="normal" type="1"><li>DNS Server Operators:</li>
          </ol>
          <ul empty="true">
            <li>
              <t>These domain names have no impact on DNS server operators.  They should never be used in DNS, or in any networking protocol outside of EAP.</t>
              <t>If they try to configure their authoritative DNS as authoritative for this reserved name, compliant name servers do not need to do anything special.  They can accept the domain or reject it.  Either behavior will have no impact on this specification.</t>
            </li>
          </ul>
          <ol spacing="normal" type="1"><li>DNS Registries/Registrars:</li>
          </ol>
          <ul empty="true">
            <li>
              <t>DNS Registries/Registrars should deny requests to register this reserved domain name.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="eap-provisioning-identifier-registry">
        <name>EAP Provisioning Identifier Registry</name>
        <t>IANA is instructed to add the following new registry to the "Extensible Authentication Protocol (EAP) Registry" group.</t>
        <t>Assignments in this registry are done via "Expert Review" as described in <xref target="RFC8126"/> Section 4.5.</t>
        <t>The contents of the registry are as follows.</t>
        <t>Title</t>
        <ul empty="true">
          <li>
            <t>EAP Provisioning Identifiers</t>
          </li>
        </ul>
        <t>Registration Procedure(s)</t>
        <ul empty="true">
          <li>
            <t>Expert review</t>
          </li>
        </ul>
        <t>Reference</t>
        <ul empty="true">
          <li>
            <t>THIS-DOCUMENT</t>
          </li>
        </ul>
        <t>Registry</t>
        <ul empty="true">
          <li>
            <t>Name</t>
            <ul empty="true">
              <li>
                <t>The name of the identifier.  Names are listed in sorted order, case insensitive.</t>
              </li>
            </ul>
            <t>Prefix</t>
            <ul empty="true">
              <li>
                <t>A boolean true/false flag indicating if this name is a prefix.</t>
              </li>
            </ul>
            <t>Description</t>
            <ul empty="true">
              <li>
                <t>Description of the use-cases for this identifier.</t>
              </li>
            </ul>
            <t>Reference</t>
            <ul empty="true">
              <li>
                <t>Reference where this identifier was defined.</t>
              </li>
            </ul>
          </li>
        </ul>
        <section anchor="initial-values">
          <name>Initial Values</name>
          <t>The following table gives the initial values for this table.</t>
          <t>Value,Prefix,Description,Reference</t>
          <t>noob,false,EAP-NOOB,RFC9140 and THIS-DOCUMENT
portal,false,generic captive portal,THIS-DOCUMENT
V-,true,reserved for vendor self-assignment,THIS-DOCUMENT</t>
        </section>
      </section>
      <section anchor="guidelines-for-designated-experts">
        <name>Guidelines for Designated Experts</name>
        <t>Identifiers and prefixes in the "Name" field of this registry MUST
satisfy the "utf8-username" format defined in <xref target="RFC7542"/> Section 2.2.</t>
        <t>Identifiers should be unique when compared in a case-insensitive
fashion.  While <xref target="RFC7542"/> notes that similar identifiers of
different case can be considered to be different, this registry is
made simpler by requiring case-insensitivity.</t>
        <t>Identifiers and prefixes should be short.  The NAIs created from these
prefixes will generally be sent in a RADIUS packet in the User-Name
attribute (<xref target="RFC2865"/> Section 5.1).  That specification recommends
that implementations should support User-Names of at least 63 octets.
NAI length considerations are further discussed in <xref target="RFC7542"/> Section
2.3, and any allocations need to take those limitations into
consideration.</t>
        <t>Implementations are likely to support a total NAI length of 63 octets.
Lengths between 63 and 253 octets may work.  Lengths of 254 octets or
more will not work with RADIUS <xref target="RFC2865"/>.</t>
        <t>For registration requests where a Designated Expert should be
consulted, the responsible IESG area director should appoint the
Designated Expert.  The intention is that any non-prefix allocation
will be accompanied by a published RFC.  But in order to allow for the
allocation of values prior to the RFC being approved for publication,
the Designated Expert can approve allocations once it seems clear that
an RFC will be published.</t>
        <t>For allocation of a prefix, the Designated Expert should verify that
the requested prefix clearly identifies the organization requesting
the prefix, that there is a publicly available document from the
organization which describes the prefix, and that the prefix ends with
the "-" character.</t>
        <t>Once a prefix has been assigned, it is not possible to perform further
allocations in this registry which use that prefix.  All such
allocations have instead been delegated to the external organization.</t>
        <t>The Designated expert will post a request to the EMU WG mailing list
(or a successor designated by the Area Director) for comment and
review, including an Internet-Draft or reference to external
specification.  Before a period of 30 days has passed, the Designated
Expert will either approve or deny the registration request and
publish a notice of the decision to the EAP WG mailing list or its
successor, as well as informing IANA.  A denial notice must be
justified by an explanation, and in the cases where it is possible,
concrete suggestions on how the request can be modified so as to
become acceptable should be provided.</t>
        <t>A short-hand summary of the requirements follows:</t>
        <ul spacing="normal">
          <li>Identifiers and prefixes in the "Name" field of this registry MUST satisfy the "utf8-username" format defined in <xref target="RFC7542"/> Section 2.2.</li>
          <li>Names MUST be unique, compared in a case-insensitive fashion.</li>
          <li>Prefixes MUST NOT overlap with the beginning any other identifier.  That is, if the prefix "foo-" has been allocated, then an identifier of "foo-bar" MUST NOT be allocated.</li>
          <li>If the "prefix" flag is "false", then the Name field MUST NOT end with the "-" character.</li>
          <li>If the "prefix" flag is "true", then the Name field MUST end with the "-" character.</li>
        </ul>
        <section anchor="example-of-vendor-self-assignment">
          <name>Example of Vendor Self Assignment</name>
          <t>Identifiers beginning with "V-" are for vendor self-assignment.  The
name MUST begin with the string "V-", following by 1 or more digits
(0-9).  The digits used here are taken from the vendor private
enterprise number (PEN).</t>
          <t>The name MUST then contain another "-" which delineates the vendor
specific suffix namespace.  The suffix is managed and allocated by the
vendor, and does not need to be added to the registry.</t>
          <t>The suffix is text which matches the "dot-string" definition of
<xref target="RFC7542"/> Section 2.2.</t>
          <t>For example, an identifier chosen by Cisco (PEN of 9) could be:</t>
          <ul empty="true">
            <li>
              <t>V-9-foo</t>
            </li>
          </ul>
          <t>Which then creates an NAI of the form:</t>
          <ul empty="true">
            <li>
              <t>V-9-foo@eap.arpa</t>
            </li>
          </ul>
        </section>
        <section anchor="example-of-service-delivery-organization">
          <name>Example of Service Delivery Organization</name>
          <t>Service delivery organizations (SDOs) can request allocations of
prefixes for use within their SDO.  The prefix should be the name
(abbreviated where possible) of the SDO, followed by a "-" character.
The suffix is managed and allocated by the SDO, and does not need to
be added to the registry.</t>
          <t>The suffix is text which matches the "dot-string" definition of
<xref target="RFC7542"/> Section 2.2.</t>
          <t>For example, the 3rd Generation Partnership Project (3GPP) could
request a prefix "3gpp-", and then self-assign a suffix "baz", to
create an identifier:</t>
          <ul empty="true">
            <li>
              <t>3gpp-baz</t>
            </li>
          </ul>
          <t>Which then creates an NAI of the form:</t>
          <ul empty="true">
            <li>
              <t>3gpp-baz@eap.arpa</t>
            </li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>TBD.</t>
    </section>
    <section anchor="changelog">
      <name>Changelog</name>
      <ul spacing="normal">
        <li>00 - initial version</li>
        <li>01 - add "Domain Name Reservation Considerations"</li>
      </ul>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="BCP14">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC3748">
          <front>
            <title>Extensible Authentication Protocol (EAP)</title>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="L. Blunk" initials="L." surname="Blunk"/>
            <author fullname="J. Vollbrecht" initials="J." surname="Vollbrecht"/>
            <author fullname="J. Carlson" initials="J." surname="Carlson"/>
            <author fullname="H. Levkowetz" initials="H." role="editor" surname="Levkowetz"/>
            <date month="June" year="2004"/>
            <abstract>
              <t>This document defines the Extensible Authentication Protocol (EAP), an authentication framework which supports multiple authentication methods. EAP typically runs directly over data link layers such as Point-to-Point Protocol (PPP) or IEEE 802, without requiring IP. EAP provides its own support for duplicate elimination and retransmission, but is reliant on lower layer ordering guarantees. Fragmentation is not supported within EAP itself; however, individual EAP methods may support this. This document obsoletes RFC 2284. A summary of the changes between this document and RFC 2284 is available in Appendix A. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3748"/>
          <seriesInfo name="DOI" value="10.17487/RFC3748"/>
        </reference>
        <reference anchor="RFC5216">
          <front>
            <title>The EAP-TLS Authentication Protocol</title>
            <author fullname="D. Simon" initials="D." surname="Simon"/>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="R. Hurst" initials="R." surname="Hurst"/>
            <date month="March" year="2008"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides support for multiple authentication methods. Transport Layer Security (TLS) provides for mutual authentication, integrity-protected ciphersuite negotiation, and key exchange between two endpoints. This document defines EAP-TLS, which includes support for certificate-based mutual authentication and key derivation.</t>
              <t>This document obsoletes RFC 2716. A summary of the changes between this document and RFC 2716 is available in Appendix A. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5216"/>
          <seriesInfo name="DOI" value="10.17487/RFC5216"/>
        </reference>
        <reference anchor="RFC7542">
          <front>
            <title>The Network Access Identifier</title>
            <author fullname="A. DeKok" initials="A." surname="DeKok"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>In order to provide inter-domain authentication services, it is necessary to have a standardized method that domains can use to identify each other's users. This document defines the syntax for the Network Access Identifier (NAI), the user identifier submitted by the client prior to accessing resources. This document is a revised version of RFC 4282. It addresses issues with international character sets and makes a number of other corrections to RFC 4282.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7542"/>
          <seriesInfo name="DOI" value="10.17487/RFC7542"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC9140">
          <front>
            <title>Nimble Out-of-Band Authentication for EAP (EAP-NOOB)</title>
            <author fullname="T. Aura" initials="T." surname="Aura"/>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <author fullname="A. Peltonen" initials="A." surname="Peltonen"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP) provides support for multiple authentication methods. This document defines the EAP-NOOB authentication method for nimble out-of-band (OOB) authentication and key derivation. The EAP method is intended for bootstrapping all kinds of Internet-of-Things (IoT) devices that have no preconfigured authentication credentials. The method makes use of a user-assisted, one-directional, out-of-band (OOB) message between the peer device and authentication server to authenticate the in-band key exchange. The device must have a nonnetwork input or output interface, such as a display, microphone, speaker, or blinking light, that can send or receive dynamically generated messages of tens of bytes in length.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9140"/>
          <seriesInfo name="DOI" value="10.17487/RFC9140"/>
        </reference>
        <reference anchor="RFC9190">
          <front>
            <title>EAP-TLS 1.3: Using the Extensible Authentication Protocol with TLS 1.3</title>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods. This document specifies the use of EAP-TLS with TLS 1.3 while remaining backwards compatible with existing implementations of EAP-TLS. TLS 1.3 provides significantly improved security and privacy, and reduced latency when compared to earlier versions of TLS. EAP-TLS with TLS 1.3 (EAP-TLS 1.3) further improves security and privacy by always providing forward secrecy, never disclosing the peer identity, and by mandating use of revocation checking when compared to EAP-TLS with earlier versions of TLS. This document also provides guidance on authentication, authorization, and resumption for EAP-TLS in general (regardless of the underlying TLS version used). This document updates RFC 5216.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9190"/>
          <seriesInfo name="DOI" value="10.17487/RFC9190"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC2865">
          <front>
            <title>Remote Authentication Dial In User Service (RADIUS)</title>
            <author fullname="C. Rigney" initials="C." surname="Rigney"/>
            <author fullname="S. Willens" initials="S." surname="Willens"/>
            <author fullname="A. Rubens" initials="A." surname="Rubens"/>
            <author fullname="W. Simpson" initials="W." surname="Simpson"/>
            <date month="June" year="2000"/>
            <abstract>
              <t>This document describes a protocol for carrying authentication, authorization, and configuration information between a Network Access Server which desires to authenticate its links and a shared Authentication Server. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2865"/>
          <seriesInfo name="DOI" value="10.17487/RFC2865"/>
        </reference>
        <reference anchor="RFC7170">
          <front>
            <title>Tunnel Extensible Authentication Protocol (TEAP) Version 1</title>
            <author fullname="H. Zhou" initials="H." surname="Zhou"/>
            <author fullname="N. Cam-Winget" initials="N." surname="Cam-Winget"/>
            <author fullname="J. Salowey" initials="J." surname="Salowey"/>
            <author fullname="S. Hanna" initials="S." surname="Hanna"/>
            <date month="May" year="2014"/>
            <abstract>
              <t>This document defines the Tunnel Extensible Authentication Protocol (TEAP) version 1. TEAP is a tunnel-based EAP method that enables secure communication between a peer and a server by using the Transport Layer Security (TLS) protocol to establish a mutually authenticated tunnel. Within the tunnel, TLV objects are used to convey authentication-related data between the EAP peer and the EAP server.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7170"/>
          <seriesInfo name="DOI" value="10.17487/RFC7170"/>
        </reference>
        <reference anchor="RFC8952">
          <front>
            <title>Captive Portal Architecture</title>
            <author fullname="K. Larose" initials="K." surname="Larose"/>
            <author fullname="D. Dolson" initials="D." surname="Dolson"/>
            <author fullname="H. Liu" initials="H." surname="Liu"/>
            <date month="November" year="2020"/>
            <abstract>
              <t>This document describes a captive portal architecture. Network provisioning protocols such as DHCP or Router Advertisements (RAs), an optional signaling protocol, and an HTTP API are used to provide the solution.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8952"/>
          <seriesInfo name="DOI" value="10.17487/RFC8952"/>
        </reference>
        <reference anchor="RFC5931">
          <front>
            <title>Extensible Authentication Protocol (EAP) Authentication Using Only a Password</title>
            <author fullname="D. Harkins" initials="D." surname="Harkins"/>
            <author fullname="G. Zorn" initials="G." surname="Zorn"/>
            <date month="August" year="2010"/>
            <abstract>
              <t>This memo describes an Extensible Authentication Protocol (EAP) method, EAP-pwd, which uses a shared password for authentication. The password may be a low-entropy one and may be drawn from some set of possible passwords, like a dictionary, which is available to an attacker. The underlying key exchange is resistant to active attack, passive attack, and dictionary attack. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5931"/>
          <seriesInfo name="DOI" value="10.17487/RFC5931"/>
        </reference>
        <reference anchor="RFC6761">
          <front>
            <title>Special-Use Domain Names</title>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <author fullname="M. Krochmal" initials="M." surname="Krochmal"/>
            <date month="February" year="2013"/>
            <abstract>
              <t>This document describes what it means to say that a Domain Name (DNS name) is reserved for special use, when reserving such a name is appropriate, and the procedure for doing so. It establishes an IANA registry for such domain names, and seeds it with entries for some of the already established special domain names.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6761"/>
          <seriesInfo name="DOI" value="10.17487/RFC6761"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
