<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.4 (Ruby 2.6.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-emu-eap-arpa-02" category="std" consensus="true" submissionType="IETF" updates="9140" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.13.0 -->
  <front>
    <title abbrev="eap.arpa">The eap.arpa domain and EAP provisioning</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-emu-eap-arpa-02"/>
    <author initials="A." surname="DeKok" fullname="Alan DeKok">
      <organization>InkBridge Networks</organization>
      <address>
        <email>aland@inkbridgenetworks.com</email>
      </address>
    </author>
    <date year="2024" month="August" day="12"/>
    <area>Internet</area>
    <workgroup>EMU Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 53?>

<t>This document defines the eap.arpa domain as a way for EAP peers to
signal to EAP servers that they wish to obtain limited, and
unauthenticated, network access.  EAP peers signal which kind of access is required via certain pre-defined identifiers which use the Network Access Identifier (NAI) format of RFC7542.  A table of
identifiers and meanings is defined.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-emu-eap-arpa/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        EMU Working Group mailing list (<eref target="mailto:emut@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/emut/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/emut/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/freeradius/eap-arpa.git"/>.</t>
    </note>
  </front>
  <middle>
    <?line 60?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>In most uses, EAP <xref target="RFC3748"/> requires that the EAP peer have a known
identity.  However, when the peer does not already have an identity,
this requirement creates a bootstrapping problem.  It may not be
possible for the device to obtain network access without credentials.
However, credentials are usually required in order to obtain network
access.  As a result, the device is unprovisioned, and unable to be
provisioned.</t>
      <t>This specification addresses that problem.  It creates a framework by
which clients can submit predefined credentials to a server in order to
obtain limited network access.  At the same time, servers can know in
advance that these credentials are only to be used for provisioning,
and that unrestricted network access should not be granted.</t>
      <t>The device can either use the EAP channel itself for provisioning, as
with TEAP <xref target="RFC7170"/>, or the EAP server can give the device access to
a limited captive portal such as with <xref target="RFC8952"/>.  Once the device is
provisioned, it can use those provisioned credentials to obtain full
network access.</t>
      <t>The identifiers used here are generically referred to as "EAP
Provisioning Identifiers" (EPI).  The choice of "Provisioning
Identifiers for EAP" (PIE) was considered and rejected.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
      </t>
    </section>
    <section anchor="concepts">
      <name>Concepts</name>
      <t>A device which has no device-specific credentials can use a predefined
identifier in Network Access Identifier (NAI) format <xref target="RFC7542"/>.  The
NAI is composed of two portions, the utf8-username, and the utf8-realm
domain.  For simplicity here, we refer to these as the "username" and
"realm" fields.</t>
      <t>The realm is chosen to be non-routable, so that the EAP packet
exchange is not normally sent across an Authentication, Authorization,
and Accounting (AAA) proxy framework as defined in <xref target="RFC7542"/> Section
3.  Instead, the packets generally remains local to the EAP server.</t>
      <t>This specification does not, however, forbid routing of realms in the
"eap.arpa" domain.  The use of "eap.arpa" means that any such routing
does not happen automatically.  Instead, it routing of that domain
must be explicitly configured locally, and be done with full consent
of all parties which need to authenticate NAIs in that domain.</t>
      <t>If the EAP
server implements this standard, then it can proceed with the full EAP
conversation.  If the EAP server does not implement this standard,
then it MUST reply with an EAP Failure, as per <xref target="RFC3748"/> Section
4.2.
We note that this specification is fully compatible with all existing
EAP implementations, so its is fail-safe.  When presented with a peer
wishing to use this specification, existing implementations will
return EAP Failure, and will not otherwise misbehave.</t>
      <t>We now discuss the NAI format in more detail.  We first discuss the
eap.arpa realm, and second the use and purpose of the username field.</t>
      <section anchor="the-eaparpa-realm">
        <name>The eap.arpa realm</name>
        <t>This document defines the "eap.arpa" domain as being used for
provisioning within EAP.  A similar domain has previously been used
for EAP-NOOB <xref target="RFC9140"/>, as "eap-noob.arpa".  This document extends
that concept, and standardizes the practices surrounding it,</t>
        <t>NOTE: the "arpa" domain is controlled by the IAB.  Allocation of
"eap.arpa" requires agreement from the IAB.</t>
      </section>
      <section anchor="the-realm-field">
        <name>The realm field</name>
        <t>The sub-domain in realm is assigned via the EAP Provisioning
Identifier Registry which is defined in <xref target="registry"/>. The sub-domain
MUST follow the domain name conventions specified in <xref target="RFC1034"/>.</t>
        <t>It is RECOMMENDED that the first sub-domain of "eap.arpa" use the EAP
method name, as defined in the IANA Extensible Authentication Protocol
(EAP) Registry, sub-table "Method Types".  However, that registry does
not follow the domain name conventions specified in <xref target="RFC1034"/>, so it
is not possible to make a "one-to-one" mapping between the Method Type
name and the subdomain.</t>
        <t>Where it is not possible to make a direct mapping between the EAP
Method Type name (e.g. "TEAP"), and a sub-domain
(e.g. "teap.eap.arpa"), the name used in the realm registry SHOULD be
similar enough to allow the average reader to understand which EAP
Method Type is being used.</t>
        <t>Additional sub-domains are permitted, which permit vendors and Service
delivery organizations (SDOs) the ability to self-assign a delegated
range of identifiers which cannot conflict with other identifiers.</t>
        <t>Any realm defined in this registry (e.g. "teap.eap.arpa") also
implicitly defines a subdomain "v." (e.g. "v.teap.eap.arpa").  Vendors
can self-allocate within the "v." subdomain, using domains which they
own.  For example, 3GPP specifications could self-allocate and use the
realm "3gpp.org.v.teap.arpa".</t>
      </section>
      <section anchor="the-username-field">
        <name>The username field</name>
        <t>The username field is dependent on the EAP method being used for
provisioning. For example, <xref target="RFC9140"/> uses the username "noob". Other
EAP methods MAY omit the username as RECOMMENDED in <xref target="RFC7542"/>.  The
username of "anonymous" is NOT RECOMMENDED for specifications using
this format, even though it is permitted by <xref target="RFC7542"/>.</t>
        <t>The username field is assigned via the EAP Provisioning Identifier
Registry which is defined in <xref target="registry"/>.  The username field MAY be
empty, or else hold a fixed value. While <xref target="RFC7542"/> recommends
omitting the username portion for user privacy, the names are defined
in public specifications.  User privacy is therefore not needed here,
and the username field can be publicly visible.</t>
      </section>
      <section anchor="operational-considerations">
        <name>Operational Considerations</name>
        <t>Haviong defined the format and contents of NAIs in the eap.arpa realm,
we now need to define how those NAIs are used by EAP supplicants and
EAP peers.</t>
        <section anchor="eap-supplicants">
          <name>EAP Supplicants</name>
          <t>An EAP supplicant signals that it wishes a certain kind of
provisioning by using a particular NAI, along with an associated EAP
method.  The meaning of the NAI, and behavior of the supplicant are
defined by a separate specification which defines the NAI.</t>
          <t>The NAI used by the supplicant MUST match the EAP method.  NAIs in the
eap.arpa domain MUST NOT be used for EAP methods which do not have an
entry in the "EAP Provisioning Identifiers" registry.</t>
          <t>EAP supplicants MUST NOT allow these NAIs to be configured directly by
end users.  Instead the user (or some other process) chooses a
provisioning method, and the EAP supplicant then chooses a pre-defined NAI
which matches that provisioning method.</t>
        </section>
        <section anchor="eap-peers">
          <name>EAP Peers</name>
          <t>Implementations MUST check that the NAI matches the EAP method
being used.  Mis-matched NAIs MUST result in an EAP Failure.</t>
          <t>For example, an NAI of "@tls.eap.arpa" MUST NOT be used for any EAP
method other than EAP-TLS.</t>
          <t>Implementations MUST treat supplicants using a provisioning NAI as
untrusted, and untrustworthy.  Implementations MUST place supplicants
using a provisioning NAI into a limited network, such as a captive
portal.</t>
          <t>Implementations SHOULD give supplicants access which is limited in
duration.  The provisioning process should be fairly quick, and of the
order of seconds to tens of seconds in duration.  Provisioning times
longer than that likely indicate an issue.</t>
          <t>Implementations SHOULD give supplicants access which is limited in
scope.  The provisioning process likely does not need to download
large amounts of data, and likely does not need access to a large
number of services.  The provisioning networks SHOULD allow only
traffic which is necessary for the operation of the named provisioning
method.</t>
          <t>Implementations SHOULD use functionality such as the RADIUS Filter-Id
attribute (<xref section="5.11" sectionFormat="comma" target="RFC2865"/>) to set packet filters for the
supplicant being provisioned.  For ease of administration, the
Filter-Id name could simply be the NAI, or a similar name.  Such
consistency aids with operational considerations when managing complex
networks.</t>
          <t>Implementations SHOULD rate-limit provisioning attempts.  A
misbehaving supplicant should be blocked temporarily, or even
permanently. Implementations SHOULD limit the total number of
supplicants being provisioned at the same time.  There is no
requirement to allow all supplicants to connect without limit.</t>
        </section>
      </section>
      <section anchor="notes-on-aaa-routability">
        <name>Notes on AAA Routability</name>
        <t>When we say that the eap.arpa domain is not routable in an AAA proxy
framework, we mean that the domain does not exist, and will never
resolve to anything for dynamic DNS lookups as defined in
<xref target="RFC7585"/>.  In addition, administrators will not have statically
configuered AAA proxy routes for this domain.</t>
        <t>In order to avoid spurious DNS lookups, RADIUS servers supporting
<xref target="RFC7585"/> SHOULD perform filtering in the domains which are sent to
DNS.  Specifically, names in the "eap.arpa" domain SHOULD NOT be
looked up in DNS.</t>
      </section>
    </section>
    <section anchor="overview">
      <name>Overview</name>
      <t>For EAP-TLS, both <xref target="RFC5216"/> Section 2.1.1 and <xref target="RFC9190"/> provide
for "peer unauthenticated access".  However, those documents define no
way for a peer to signal that it is requesting such access.  The
presumption is that the peer connects with some value for the EAP
Identity, but without using a client certificate.  The EAP server is
then supposed to determine that the peer is requesting unauthenticated
access, and take the appropriate steps to limit authorization.</t>
      <t>There appears to be no EAP peer or server implementations which
support such access, since there is no defined way to perform any of
the steps required.  i.e. to signal that this access is desired, and
then limit access.</t>
      <t>The Wi-Fi Alliance has defined an unauthenticated EAP-TLS method,
using a vendor-specific EAP type as part of HotSpot 2.0r2 <xref target="HOTSPOT"/>.
However, there appears to be little or no deployments of this
specification.</t>
      <t>EAP-NOOB <xref target="RFC9140"/> takes this process a step further.  It defines both
a way to signal that provisioning is desired, and also a way to
exchange provisioning information within EAP-NOOB.  That is, there is
no need for the device to obtain limited network access, as all of the
provisioning is done inside of the EAP-NOOB protocol.</t>
      <t>TEAP <xref target="RFC7170"/> provides for provisioning via an unauthenticated TLS
tunnel.  That document provides for a server unauthenticated
provisioning mode, but the inner TLS exchange requires that both end
authenticate each other.  There are ways to provision a certificate,
but the peer must still authenticate itself to the server.</t>
      <section anchor="taxonomy-of-provisioning-types">
        <name>Taxonomy of Provisioning Types</name>
        <t>There are two scenarios where provisioning can be done.  The first is
where provisioning is done within the EAP type, as with EAP-NOOB
<xref target="RFC9140"/>.  The second is where EAP is used to obtain limited
network access (e.g. as with a captive portal).  That limited network
access is then used to run Internet Protocol (IP) based provisioning
over more complex protocols.</t>
        <section anchor="rationale-for-provisioning-over-eap">
          <name>Rationale for Provisioning over EAP</name>
          <t>It is often useful to do all provisioning inside of EAP, because the EAP / AAA
admin does not have control over the network.  It is not always
possible to define a captive portal where provisioning can be done.
As a result, we need to be able to perform provisioning via EAP, and
not via some IP protocol.</t>
        </section>
      </section>
    </section>
    <section anchor="interaction-with-existing-eap-types">
      <name>Interaction with existing EAP types</name>
      <t>As the provisioning identifier is used within EAP, it necessarily has
interactions with, and effects on, the various EAP types.  This
section discusses those effects in more detail.</t>
      <t>Some EAP methods require shared credentials such as passwords in order
to succeed.  For example, both EAP-MSCHAPv2 (PEAP) and EAP-PWD
<xref target="RFC5931"/> perform cryptographic exchanges where both parties
knowing a shared password.  Where password-based methods are used, the
password MUST be the same as the provisioning identifier.</t>
      <t>This requirement also applies to TLS-based EAP methods such as TTLS
and PEAP.  Where the TLS-based EAP method provides for an inner
identity and inner authentication method, the credentials used there
MUST be the provisioning identifier for both the inner identity, and
any inner password.</t>
      <t>It is RECOMMENDED that provisioning be done via a TLS-based EAP methods.
TLS provides for authentication of the EAP server, along with security
and confidentiality of any provisioning data exchanged in the tunnel.
Similarly if provisioning is done in a captive portal outside of EAP,
EAP-TLS permits the EAP peer to run a full EAP authentication session
while having nothing more than a few certification authorities (CAs)
locally configured.</t>
      <section anchor="eap-tls">
        <name>EAP-TLS</name>
        <t>This document defines an identifier "portal@tls.eap.arpa", which is
the first step towards permitted unauthenticated client provisioning
in EAP-TLS.  The purpose of the identifier is to allow EAP peers to
signal EAP servers that they wish to obtain a "captive portal" style
network access.</t>
        <t>This identifier signals the EAP server that the peer wishes to obtain
"peer unauthenticated access" as per <xref target="RFC5216"/> Section 2.1.1 and
<xref target="RFC9190"/>.</t>
        <t>An EAP server which agrees to authenticate this request MUST ensure
that the device is placed into a captive portal with limited network
access.  Implementations SHOULD limit both the total amount of data
transferred by devices in the captive portal, and SHOULD also limit the
total amount of time a device spends within the captive portal.</t>
        <t>Further details of the captive portal architecture can be found in
<xref target="RFC8952"/>.</t>
        <t>The remaining question is how the EAP peer verifies the identity of
the EAP server.  The device SHOULD ignore the EAP server certificate
entirely, as the servers identity does not matter.  Any verification
of servers can be done at the HTTPS layer when the device access the
captive portal.  Where possible the device SHOULD warn the end user
that the provided certificate is unchecked, and untrusted.</t>
        <t>However, since the device likely is configured with web CAs (otherwise
the captive portal would also be unauthenticated), EAP peers MAY use
the CAs available for the web in order to validate the EAP server
certificate.  If the presented certificate passes validation, the
device does not need to warn the end user that the provided
certificate is untrusted.</t>
        <t>It is possible to also use TLS-PSK with EAP-TLS for this provisioning.
In which case, the PSK identity MUST the same as the EAP Identifier,
and the PSK MUST be the provisioning identifier.</t>
      </section>
      <section anchor="tls-based-eap-methods">
        <name>TLS-based EAP methods</name>
        <t>Other TLS-based EAP methods such as TTLS and PEAP can use the same
method as defined for EAP-TLS above.  The only difference is that the
inner identity and password is also the provisioning identifier.</t>
        <t>Is is RECOMMENDED that provisioning methods use EAP-TLS in preference
to any other TLS-based EAP methods.  As the credentials for other
methods are predefined and known in advance, those methods offer little
benefit over EAP-TLS.</t>
      </section>
      <section anchor="eap-noob">
        <name>EAP-NOOB</name>
        <t>It is RECOMMENDED that server implementations of EAP-NOOB accept both
identities "noob@eap-noob.arpa" and "@noob.eap.arpa" as synonyms.</t>
        <t>It is RECOMMENDED that EAP-NOOB peers use "@noob.eap.arpa" first, and
if that does not succeed, use "noob@eap-noob.arpa"</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>Three IANA actions are required.  The first two are registry updates
for "eap.arpa".  The second is the creation of a new registry.</t>
      <section anchor="arpa-updates">
        <name>.arpa updates</name>
        <t>IANA is instructed to update the ".ARPA Zone Management" registry with
the following entry:</t>
        <t>DOMAIN</t>
        <ul empty="true">
          <li>
            <t>eap.arpa</t>
          </li>
        </ul>
        <t>USAGE</t>
        <ul empty="true">
          <li>
            <t>For provisioning within the Extensible Authentication Protocol framework.</t>
          </li>
        </ul>
        <t>REFERENCE</t>
        <ul empty="true">
          <li>
            <t>THIS-DOCUMENT</t>
          </li>
        </ul>
        <t>IANA is instructed to update the "Special-Use Domain Names" registry as follows:</t>
        <t>NAME</t>
        <ul empty="true">
          <li>
            <t>eap.arpa</t>
          </li>
        </ul>
        <t>REFERENCE</t>
        <ul empty="true">
          <li>
            <t>THIS-DOCUMENT</t>
          </li>
        </ul>
        <section anchor="domain-name-reservation-considerations">
          <name>Domain Name Reservation Considerations</name>
          <t>This section answers the questions which are required by Section 5 of <xref target="RFC6761"/>.  At a high level, these new domain names are used in certain situations in EAP.  The domain names are never seen by users, and they do not appear in any networking protocol other than EAP.</t>
          <ol spacing="normal" type="1"><li>Users:</li>
          </ol>
          <ul empty="true">
            <li>
              <t>User are not expected to recognise these names as special or use them differently from other domain names.  The use of these names in EAP is invisible to end users.</t>
            </li>
          </ul>
          <ol spacing="normal" type="1"><li>Application Software:</li>
          </ol>
          <ul empty="true">
            <li>
              <t>EAP servers and clients are expected to make their software recognize these names as special and treat them differently.  This document discusses that behavor.</t>
              <t>EAP supplicants should recognize these names as special, and should refuse to allow users to enter them in any interface.</t>
              <t>EAP servers and RADIUS servers should recognize the ".arpa" domain as special, and refuse to do dynamic DNS lookups (<xref target="RFC7585"/>) for it.</t>
            </li>
          </ul>
          <ol spacing="normal" type="1"><li>Name Resolution APIs and Libraries:</li>
          </ol>
          <ul empty="true">
            <li>
              <t>Writers of these APIs and libraries are not expected to recognize these names or treat them differently.</t>
            </li>
          </ul>
          <ol spacing="normal" type="1"><li>Caching DNS Servers:</li>
          </ol>
          <ul empty="true">
            <li>
              <t>Writers of caching DNS servers are not expected to recognize these names or treat them differently.</t>
            </li>
          </ul>
          <ol spacing="normal" type="1"><li>Authoritative DNS Servers:</li>
          </ol>
          <ul empty="true">
            <li>
              <t>Writers of authoritative DNS servers are not expected to recognize these names or treat them differently.</t>
            </li>
          </ul>
          <ol spacing="normal" type="1"><li>DNS Server Operators:</li>
          </ol>
          <ul empty="true">
            <li>
              <t>These domain names have minimal impact on DNS server operators.  They should never be used in DNS, or in any networking protocol outside of EAP.</t>
              <t>Some DNS servers may receive lookups for this domain, if EAP or RADIUS servers are configured to do dynamic DNS lookups for realms as defined in <xref target="RFC7585"/>, and where those servers are not updated to ignore the ".arpa" domain.  When queried for the "eap.arpa" domain, DNS servers SHOULD return an NXDOMAIN error.</t>
              <t>If they try to configure their authoritative DNS as authoritative for this reserved name, compliant name servers do not need to do anything special.  They can accept the domain or reject it.  Either behavior will have no impact on this specification.</t>
            </li>
          </ul>
          <ol spacing="normal" type="1"><li>DNS Registries/Registrars:</li>
          </ol>
          <ul empty="true">
            <li>
              <t>DNS Registries/Registrars should deny requests to register this reserved domain name.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="registry">
        <name>EAP Provisioning Identifiers Registry</name>
        <t>IANA is instructed to add the following new registry to the "Extensible Authentication Protocol (EAP) Registry" group.</t>
        <t>Assignments in this registry are done via "Expert Review" as described in <xref target="RFC8126"/> Section 4.5.  Guidelines for experts is provided in <xref target="guidelines"/>.</t>
        <t>The contents of the registry are as follows.</t>
        <t>Title</t>
        <ul empty="true">
          <li>
            <t>EAP Provisioning Identifiers</t>
          </li>
        </ul>
        <t>Registration Procedure(s)</t>
        <ul empty="true">
          <li>
            <t>Expert review</t>
          </li>
        </ul>
        <t>Reference</t>
        <ul empty="true">
          <li>
            <t>THIS-DOCUMENT</t>
          </li>
        </ul>
        <t>Registry</t>
        <ul empty="true">
          <li>
            <t>NAI</t>
            <ul empty="true">
              <li>
                <t>The Network Access Identifier in <xref target="RFC7542"/> format.  Names are lowercase, and are listed in sorted order.</t>
              </li>
            </ul>
            <t>Method Type</t>
            <ul empty="true">
              <li>
                <t>The EAP method name, taken from the "Description" field of the EAP "Method Types" registry.</t>
              </li>
            </ul>
            <t>Reference</t>
            <ul empty="true">
              <li>
                <t>Reference where this identifier was defined.</t>
              </li>
            </ul>
          </li>
        </ul>
        <section anchor="initial-values">
          <name>Initial Values</name>
          <t>The following table gives the initial values for this table.</t>
          <t>NAI,Method-Type,Description,Reference</t>
          <t>@noob.eap.arpa,EAP-NOOB,RFC9140 and THIS-DOCUMENT
portal@tls.eap.arpa,EAP-TLS,RFC9190 and THIS-DOCUMENT</t>
        </section>
      </section>
      <section anchor="guidelines">
        <name>Guidelines for Designated Experts</name>
        <t>The following text gives guidelines for Designated Experts who review
allocation requests for this registry.</t>
        <section anchor="nais">
          <name>NAIs</name>
          <t>The intent is for the NAI to contain both a reference to the EAP
Method Type, and a description of the purpose of the NAI.  For
example, with an EAP Method Type "name", and a purpose "action", the
NAI SHOULD be of the form "action@foo.eap.arpa".</t>
          <t>The NAI MUST satisfy the requirements of the <xref section="2.2" sectionFormat="comma" target="RFC7542"/>
format.  The utf8-username portion MAY be empty.  The utf8-username
portion MUST NOT be "anonymous".  The NAI MUST end with "eap.arpa".
The NAI SHOULD NOT contain more than one subdomain.</t>
          <t>The sub-domain of the NAI field should correspond to the EAP Method
Type name.  Care should be taken so that the domain name conventions
specified in <xref target="RFC1034"/> are followed.</t>
          <t>The NAIs in this registry are case-insensitive.  While <xref target="RFC7542"/>
notes that similar identifiers of different case can be considered to
be different, for simplicity this registry requires that all entries
MUST be lowercase.</t>
          <t>Identifiers MUST be unique when compared in a case-insensitive
fashion.  While <xref target="RFC7542"/> notes that similar identifiers of
different case can be considered to be different, this registry is
made simpler by requiring case-insensitivity.</t>
          <t>Entries in the registry shuld be short.  NAIs defined here will
generally be sent in a RADIUS packet in the User-Name attribute
(<xref target="RFC2865"/> Section 5.1).  That specification recommends that
implementations should support User-Names of at least 63 octets.  NAI
length considerations are further discussed in <xref target="RFC7542"/> Section
2.3, and any allocations in this registry needs to take those
limitations into consideration.</t>
          <t>Implementations are likely to support a total NAI length of 63 octets.
Lengths between 63 and 253 octets may work.  Lengths of 254 octets or
more will not work with RADIUS <xref target="RFC2865"/>.</t>
        </section>
      </section>
      <section anchor="method-type">
        <name>Method Type</name>
        <t>Values in "Method Type" field of this registry MUST be taken from the
IANA EAP Method Types registry or else it MUST be an Expanded Type
which usually indicates a vendor specific EAP method.</t>
        <t>The EAP Method Type MUST provide an MSK and EMSK as defined in
<xref target="RFC3748"/>.  Failure to provide these keys means that the method will
not be usable within an authentication framework which requires those
methods, such as with IEEE 802.1X.</t>
      </section>
      <section anchor="designated-experts">
        <name>Designated Experts</name>
        <t>For registration requests where a Designated Expert should be
consulted, the responsible IESG area director should appoint the
Designated Expert.  But in order to allow for the allocation of values
prior to the RFC being approved for publication, the Designated Expert
can approve allocations once it seems clear that an RFC will be
published.</t>
        <t>The Designated expert will post a request to the EMU WG mailing list
(or a successor designated by the Area Director) for comment and
review, including an Internet-Draft or reference to external
specification.  Before a period of 30 days has passed, the Designated
Expert will either approve or deny the registration request and
publish a notice of the decision to the EAP WG mailing list or its
successor, as well as informing IANA.  A denial notice must be
justified by an explanation, and in the cases where it is possible,
concrete suggestions on how the request can be modified so as to
become acceptable should be provided.</t>
      </section>
      <section anchor="vendor-self-assignment">
        <name>Vendor Self Assignment</name>
        <t>This registry provides for vendor self-assignment within the NAI
space.  Any NAI defined in this registry also implicitly defines a
subdomain "v." for vendor or SDO self-allocation.  For example, an NAI
"action@foo.eap.arpa" uses a realm "foo.eap.arpa".  Vendors and SDOs
can self-allocate in this space, under the "v." subdomain,
"v.foo.eap.arpa".</t>
        <t>Any domain name which is registered as a Fully Qualified Domain Name
(FQDN) within the DNS can use that name within the "v." subdomain.
For example, 3GPP specifications could self-allocate the realm
""@3gpp.org.v.foo.arpa", and then use any utf8-username within that
realm.</t>
        <t>Note that the right to use a self-allocated name is tied to the
ownership of the corresponding subdomain.  If an entity loses the
right to use a domain name, the right to use that domain name within
the "v." self-allocation space is immediately revoked.</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>The EAP Identity field is generally publicly visible to parties who
can observe the EAP traffic.  As the names given here are in a public
specification, there is no privacy implication to exposing those names
within EAP.  The entire goal of this specification is in fact to make
those names public, so that unknown (and private) parties can publicly
(and anonymously) declare what kind of network access they desire.</t>
      <t>However, there are many additional privacy concerns around this
specification.  Most EAP traffic is sent over RADIUS <xref target="RFC2865"/>.  The
RADIUS Access-Request packets typically contain large amounts of
information such as MAC addresses, device location, etc.</t>
      <t>This specification does not change RADIUS or EAP, and as such does not
change which information is publicly available, or is kept private.
Those issues are dealt with in other specifications.</t>
      <t>However, this specification can increase privacy by allowing devices
to anonymously obtain network access, and then securely obtain
credentials.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This specification defines a framework which permits unknown,
anonymous, and unauthenticated devices to request and to obtain
network access.  As such, it is critical that network operators
provide limited access to those devices.</t>
      <t>Future specifications which define an NAI within this registry, should
give detailed descriptions of what kind of network access is to be
provided.</t>
      <section anchor="on-path-attackers-and-impersonation">
        <name>On-Path Attackers and Impersonation</name>
        <t>In most EAP use-cases, the server identity is validated (usually
through a certificate), or the EAP method allows the TLS tunnel to be
cryptographically bound to the inner application data.  For the
methods outlined here, the use of public credentials, and/or skipping
server validation allows "on-path" attacks to succeed where they would
normally fail</t>
        <t>EAP supplicants and peers MUST assume that all data sent over an EAP
session is visible to attackers, and can be modified by them.</t>
        <t>The methods defined here SHOULD only be used to bootstrap initial
network access.  All subsequence application-layer traffic SHOULD be
full authenticated and secured with systems such as IPSec or TLS.</t>
      </section>
      <section anchor="provisioning-is-unauthenticated">
        <name>Provisioning is Unauthenticated</name>
        <t>We note that this specification allows for unauthenticated supplicants
to obtain network access, however limited.  As with any
unauthenticated process, it can be abused.  Implementations should
take care to limit the use of the provisioning network.</t>
      </section>
      <section anchor="privacy-considerations-1">
        <name>Privacy Considerations</name>
        <t>The NAIs used here are contained in a public registry, and therefore
do not have to follow the username privacy recommendations of
<xref section="2.4" sectionFormat="comma" target="RFC7542"/>.  However, there may be other personally
identifying information contained in EAP or AAA packets.  This
situation is no different from normal EAP authentication, and thus
has no additional positive or negative implications for privacy.</t>
      </section>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Mohit Sethi provided valuable insight that using subdomains was better
and more informative than the original method, which used only the
utf8-username portion of the NAI.</t>
    </section>
    <section anchor="changelog">
      <name>Changelog</name>
      <ul spacing="normal">
        <li>00 - initial version</li>
      </ul>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC1034">
          <front>
            <title>Domain names - concepts and facilities</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised basic definition of The Domain Name System. It obsoletes RFC-882. This memo describes the domain style names and their used for host address look up and electronic mail forwarding. It discusses the clients and servers in the domain name system and the protocol used between them.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1034"/>
          <seriesInfo name="DOI" value="10.17487/RFC1034"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC3748">
          <front>
            <title>Extensible Authentication Protocol (EAP)</title>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="L. Blunk" initials="L." surname="Blunk"/>
            <author fullname="J. Vollbrecht" initials="J." surname="Vollbrecht"/>
            <author fullname="J. Carlson" initials="J." surname="Carlson"/>
            <author fullname="H. Levkowetz" initials="H." role="editor" surname="Levkowetz"/>
            <date month="June" year="2004"/>
            <abstract>
              <t>This document defines the Extensible Authentication Protocol (EAP), an authentication framework which supports multiple authentication methods. EAP typically runs directly over data link layers such as Point-to-Point Protocol (PPP) or IEEE 802, without requiring IP. EAP provides its own support for duplicate elimination and retransmission, but is reliant on lower layer ordering guarantees. Fragmentation is not supported within EAP itself; however, individual EAP methods may support this. This document obsoletes RFC 2284. A summary of the changes between this document and RFC 2284 is available in Appendix A. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3748"/>
          <seriesInfo name="DOI" value="10.17487/RFC3748"/>
        </reference>
        <reference anchor="RFC5216">
          <front>
            <title>The EAP-TLS Authentication Protocol</title>
            <author fullname="D. Simon" initials="D." surname="Simon"/>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="R. Hurst" initials="R." surname="Hurst"/>
            <date month="March" year="2008"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides support for multiple authentication methods. Transport Layer Security (TLS) provides for mutual authentication, integrity-protected ciphersuite negotiation, and key exchange between two endpoints. This document defines EAP-TLS, which includes support for certificate-based mutual authentication and key derivation.</t>
              <t>This document obsoletes RFC 2716. A summary of the changes between this document and RFC 2716 is available in Appendix A. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5216"/>
          <seriesInfo name="DOI" value="10.17487/RFC5216"/>
        </reference>
        <reference anchor="RFC7542">
          <front>
            <title>The Network Access Identifier</title>
            <author fullname="A. DeKok" initials="A." surname="DeKok"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>In order to provide inter-domain authentication services, it is necessary to have a standardized method that domains can use to identify each other's users. This document defines the syntax for the Network Access Identifier (NAI), the user identifier submitted by the client prior to accessing resources. This document is a revised version of RFC 4282. It addresses issues with international character sets and makes a number of other corrections to RFC 4282.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7542"/>
          <seriesInfo name="DOI" value="10.17487/RFC7542"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC9140">
          <front>
            <title>Nimble Out-of-Band Authentication for EAP (EAP-NOOB)</title>
            <author fullname="T. Aura" initials="T." surname="Aura"/>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <author fullname="A. Peltonen" initials="A." surname="Peltonen"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP) provides support for multiple authentication methods. This document defines the EAP-NOOB authentication method for nimble out-of-band (OOB) authentication and key derivation. The EAP method is intended for bootstrapping all kinds of Internet-of-Things (IoT) devices that have no preconfigured authentication credentials. The method makes use of a user-assisted, one-directional, out-of-band (OOB) message between the peer device and authentication server to authenticate the in-band key exchange. The device must have a nonnetwork input or output interface, such as a display, microphone, speaker, or blinking light, that can send or receive dynamically generated messages of tens of bytes in length.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9140"/>
          <seriesInfo name="DOI" value="10.17487/RFC9140"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="HOTSPOT" target="https://www.wi-fi.org/discover-wi-fi/passpoint">
          <front>
            <title>Passpoint</title>
            <author initials="W.-F." surname="Alliance" fullname="Wi-Fi Alliance">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC2865">
          <front>
            <title>Remote Authentication Dial In User Service (RADIUS)</title>
            <author fullname="C. Rigney" initials="C." surname="Rigney"/>
            <author fullname="S. Willens" initials="S." surname="Willens"/>
            <author fullname="A. Rubens" initials="A." surname="Rubens"/>
            <author fullname="W. Simpson" initials="W." surname="Simpson"/>
            <date month="June" year="2000"/>
            <abstract>
              <t>This document describes a protocol for carrying authentication, authorization, and configuration information between a Network Access Server which desires to authenticate its links and a shared Authentication Server. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2865"/>
          <seriesInfo name="DOI" value="10.17487/RFC2865"/>
        </reference>
        <reference anchor="RFC7170">
          <front>
            <title>Tunnel Extensible Authentication Protocol (TEAP) Version 1</title>
            <author fullname="H. Zhou" initials="H." surname="Zhou"/>
            <author fullname="N. Cam-Winget" initials="N." surname="Cam-Winget"/>
            <author fullname="J. Salowey" initials="J." surname="Salowey"/>
            <author fullname="S. Hanna" initials="S." surname="Hanna"/>
            <date month="May" year="2014"/>
            <abstract>
              <t>This document defines the Tunnel Extensible Authentication Protocol (TEAP) version 1. TEAP is a tunnel-based EAP method that enables secure communication between a peer and a server by using the Transport Layer Security (TLS) protocol to establish a mutually authenticated tunnel. Within the tunnel, TLV objects are used to convey authentication-related data between the EAP peer and the EAP server.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7170"/>
          <seriesInfo name="DOI" value="10.17487/RFC7170"/>
        </reference>
        <reference anchor="RFC8952">
          <front>
            <title>Captive Portal Architecture</title>
            <author fullname="K. Larose" initials="K." surname="Larose"/>
            <author fullname="D. Dolson" initials="D." surname="Dolson"/>
            <author fullname="H. Liu" initials="H." surname="Liu"/>
            <date month="November" year="2020"/>
            <abstract>
              <t>This document describes a captive portal architecture. Network provisioning protocols such as DHCP or Router Advertisements (RAs), an optional signaling protocol, and an HTTP API are used to provide the solution.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8952"/>
          <seriesInfo name="DOI" value="10.17487/RFC8952"/>
        </reference>
        <reference anchor="RFC9190">
          <front>
            <title>EAP-TLS 1.3: Using the Extensible Authentication Protocol with TLS 1.3</title>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods. This document specifies the use of EAP-TLS with TLS 1.3 while remaining backwards compatible with existing implementations of EAP-TLS. TLS 1.3 provides significantly improved security and privacy, and reduced latency when compared to earlier versions of TLS. EAP-TLS with TLS 1.3 (EAP-TLS 1.3) further improves security and privacy by always providing forward secrecy, never disclosing the peer identity, and by mandating use of revocation checking when compared to EAP-TLS with earlier versions of TLS. This document also provides guidance on authentication, authorization, and resumption for EAP-TLS in general (regardless of the underlying TLS version used). This document updates RFC 5216.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9190"/>
          <seriesInfo name="DOI" value="10.17487/RFC9190"/>
        </reference>
        <reference anchor="RFC7585">
          <front>
            <title>Dynamic Peer Discovery for RADIUS/TLS and RADIUS/DTLS Based on the Network Access Identifier (NAI)</title>
            <author fullname="S. Winter" initials="S." surname="Winter"/>
            <author fullname="M. McCauley" initials="M." surname="McCauley"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This document specifies a means to find authoritative RADIUS servers for a given realm. It is used in conjunction with either RADIUS over Transport Layer Security (RADIUS/TLS) or RADIUS over Datagram Transport Layer Security (RADIUS/DTLS).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7585"/>
          <seriesInfo name="DOI" value="10.17487/RFC7585"/>
        </reference>
        <reference anchor="RFC5931">
          <front>
            <title>Extensible Authentication Protocol (EAP) Authentication Using Only a Password</title>
            <author fullname="D. Harkins" initials="D." surname="Harkins"/>
            <author fullname="G. Zorn" initials="G." surname="Zorn"/>
            <date month="August" year="2010"/>
            <abstract>
              <t>This memo describes an Extensible Authentication Protocol (EAP) method, EAP-pwd, which uses a shared password for authentication. The password may be a low-entropy one and may be drawn from some set of possible passwords, like a dictionary, which is available to an attacker. The underlying key exchange is resistant to active attack, passive attack, and dictionary attack. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5931"/>
          <seriesInfo name="DOI" value="10.17487/RFC5931"/>
        </reference>
        <reference anchor="RFC6761">
          <front>
            <title>Special-Use Domain Names</title>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <author fullname="M. Krochmal" initials="M." surname="Krochmal"/>
            <date month="February" year="2013"/>
            <abstract>
              <t>This document describes what it means to say that a Domain Name (DNS name) is reserved for special use, when reserving such a name is appropriate, and the procedure for doing so. It establishes an IANA registry for such domain names, and seeds it with entries for some of the already established special domain names.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6761"/>
          <seriesInfo name="DOI" value="10.17487/RFC6761"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
