<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 2.6.10) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-emu-eap-arpa-08" category="std" consensus="true" submissionType="IETF" updates="5216, 9140, 9190" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.24.0 -->
  <front>
    <title abbrev="eap.arpa">The eap.arpa domain and EAP provisioning</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-emu-eap-arpa-08"/>
    <author initials="A." surname="DeKok" fullname="Alan DeKok">
      <organization>InkBridge Networks</organization>
      <address>
        <email>aland@inkbridgenetworks.com</email>
      </address>
    </author>
    <date year="2025" month="July" day="06"/>
    <area>Internet</area>
    <workgroup>EMU Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 52?>

<t>This document defines the eap.arpa domain for use only in Network Access Identifiers (NAIs) as a way for Extensible Authentication Protocol (EAP) peers to
signal to EAP servers that they wish to obtain limited, and
unauthenticated, network access.  EAP peers signal which kind of access is required via certain predefined identifiers which use the Network Access Identifier (NAI) format of RFC 7542.  A table of
identifiers and meanings is defined, which includes entries for RFC 9140.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-emu-eap-arpa/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        EMU Working Group mailing list (<eref target="mailto:emut@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/emut/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/emut/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/freeradius/eap-arpa.git"/>.</t>
    </note>
  </front>
  <middle>
    <?line 59?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>In most uses, EAP <xref target="RFC3748"/> requires that the EAP peer have
pre-provisioned credentials.  Without credentials, the device cannot
obtain network access in order to be provisioned with credentials.
This limitation creates a bootstrapping problem.</t>
      <t>This specification addresses that bootstrapping problem.  It creates a
framework for predefined "well-known" provisioning credentials, and
instantiates that framework for two mechanisms.</t>
      <t>Clients can submit these predefined provisioning credentials to a server in order to
obtain limited network access.  At the same time, servers can know in
advance that these credentials are to be used only for provisioning,
and avoid granting unrestricted network access to peers which submit these credentials.</t>
      <t>The device can either use the EAP channel itself for provisioning, as
with TEAP <xref target="RFC7170"/>, or the EAP server can give the device access to
a limited captive portal such as with <xref target="RFC8952"/>.  Once the device is
provisioned, it can use those provisioned credentials to obtain full
network access.</t>
      <t>The predefined provisioning credentials use a generic identity format.
Identifiers in this space are generically referred to as "EAP
Provisioning Identifiers" (EPI).</t>
      <t>Since the identity is predefined and used only for unauthenticated network access, there is little benefit to specifying
predefined passwords.  Where supported by the underlying EAP method,
this specification provides for password-less access.  Where passwords
are required, the password is defined to be the same as the identity.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>EAP Provisioning Identifier (EPI)</t>
      <ul empty="true">
        <li>
          <t>The EAP Provisioning Identifier (EPI) is defined to be a strict
subset of the Network Access Identifier <xref target="RFC7542"/>.  The EPI is an
NAI which ends with "eap.arpa".  The domain or "realm" portion of
the NAI is defined in <xref section="2.2" sectionFormat="comma" target="RFC7542"/>, which is a more
restrictive subset of the domain name conventions specified in
<xref target="RFC1034"/>.</t>
        </li>
      </ul>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
      </t>
    </section>
    <section anchor="overview">
      <name>Overview</name>
      <t>A device which has no device-specific credentials can use a predefined
provisioning identifier in Network Access Identifier (NAI) format <xref target="RFC7542"/>.  The
NAI is composed of two portions, the utf8-username, and the utf8-realm
domain.  For simplicity here, we refer to these as the "username" and
"realm" fields.</t>
      <t>The realm is chosen to be independent of, and unused by, any existing
organization, and thus to be usable by all organizations.  The realm
needs to be one which is not automatically proxied by any existing
Authentication, Authorization, and Accounting (AAA) proxy framework as
defined in <xref section="3" sectionFormat="comma" target="RFC7542"/>.  The realm also needs to be one
which does not return results for <xref target="RFC7585"/> dynamic discovery.</t>
      <t>This specification does not, however, forbid routing of packets for
realms in the "eap.arpa" domain.  Instead, it leaves such routing up
to individual organizations.</t>
      <t>We note that this specification is fully compatible with all known
EAP implementations, so it is fail-safe.  When presented with a peer
wishing to use this specification, existing implementations will
return EAP Failure, and will not otherwise misbehave.</t>
      <section anchor="the-eaparpa-realm">
        <name>The eap.arpa realm</name>
        <t>This document defines the "eap.arpa" domain as being used for
provisioning within EAP.  A similar domain has previously been used
for EAP-NOOB <xref target="RFC9140"/>, as "eap-noob.arpa".  This document extends
that concept, and standardizes the practices surrounding it,</t>
        <t>NOTE: the "arpa" domain is controlled by the IAB.  Allocation of
"eap.arpa" requires agreement from the IAB.</t>
        <t>RFC-EDITOR: This text can be updated on publication to indicate that
the IAB has approved it.</t>
      </section>
      <section anchor="the-realm-field">
        <name>The realm field</name>
        <t>The NAIs defined by this specification use the
<xref target="RFC7542"/> "realm" field to signal the behavior being requested; in
particular, the subdomain under eap.arpa allows for different
requested methods to be distinguished.  The subdomain in the realm
field is assigned via the EAP Provisioning Identifier Registry, which
is defined in <xref target="registry"/>. The subdomain MUST follow the syntax defined in <xref section="2.2" sectionFormat="comma" target="RFC7542"/>, which is a more restrictive subset of the domain name conventions specified in <xref target="RFC1034"/>.</t>
        <t>It is RECOMMENDED that the first subdomain of "eap.arpa" use the EAP
method name, as defined in the IANA Extensible Authentication Protocol
(EAP) Registry, sub-registry "Method Types".  However, that registry does
not follow the domain name conventions specified in <xref target="RFC1034"/>, so it
is not possible to make a "one-to-one" mapping between the Method Type
name and the subdomain.</t>
        <t>Where it is not possible to make a direct mapping between the EAP
Method Type name due to the EAP Method Type name not matching the <xref section="2.2" sectionFormat="comma" target="RFC7542"/> format, the name used in the realm registry SHOULD be
similar enough to allow the average reader to understand which EAP
Method Type is being used.</t>
        <t>Additional subdomains are permitted in the realm, which permit vendors and
Standards Development organizations (SDOs) the ability to self-assign
a delegated range of identifiers which do not conflict with other
identifiers.</t>
        <t>Any realm defined in this registry (e.g. "tls.eap.arpa") also
implicitly defines a subdomain "v." (e.g. "v.tls.eap.arpa").  Vendors
or SDOs can self-allocate within the "v." subdomain, using domains
which they own.  For example, An "example.com" company could
self-allocate and use the realm "example.com.v.tls.eap.arpa".  See
<xref target="vendor-assignment"/> for more discussion of this topic.</t>
      </section>
      <section anchor="the-username-field">
        <name>The username field</name>
        <t>The username field is dependent on the EAP method being used for
provisioning. For example, <xref target="RFC9140"/> uses the username "noob". Other
EAP methods MAY omit the username as RECOMMENDED in <xref target="RFC7542"/>.  The
username of "anonymous" is NOT RECOMMENDED for specifications using
this format, even though it is permitted by <xref target="RFC7542"/>.  The name
"anonymous" is widely used in NAIs today, and we wish to avoid
confusion.</t>
        <t>The username field is assigned via the EAP Provisioning Identifier
Registry which is defined in <xref target="registry"/>.  The username field MAY be
empty, or else hold a fixed value. While <xref target="RFC7542"/> recommends
omitting the username portion for user privacy, the names here are defined
in public specifications.  User privacy is therefore not needed for provisioning identifiers,
and the username field can be publicly visible.</t>
      </section>
      <section anchor="operation">
        <name>Operation</name>
        <t>Having described the format and contents of NAIs in the eap.arpa realm
to define the EAP Provisioning Identifier (EPI), we now describe how
those EPIs are used by EAP peers and EAP peers to signal provisioning
information</t>
        <section anchor="eap-peer">
          <name>EAP Peer</name>
          <t>An EAP peer signals that it wishes a certain kind of
provisioning by using an EPI, along with an associated EAP
method.  The meaning of the EPI, and behavior of the peer, are
defined by a separate specification.  That specification will
typically define both the EPI, and the EAP method or methods which are used for
provisioning.</t>
          <t>The EPI used by the peer MUST be taken from an entry in the "EAP
Provisioning Identifiers" registry, and the EAP method used with that
NAI MUST match the corresponding EAP method from that same entry.</t>
          <t>Where an EAP peer allows local selection of a provisioning method, the
choice of EPI is defined by the provisioning method.  As a result, the
EAP peer MUST NOT have a field which lets the user identifier field be
configured directly.  Instead the user (or some other process) chooses
a provisioning method, and the peer then chooses an EPI
which matches that provisioning method.</t>
          <t>While EAP peers allow users to enter user identifiers directly for existing EAP
methods, they SHOULD NOT check whether those identfiers match any EPI.  Any user who
enters an identifier which matches an EPI will either get rejected because the server
does not support provisioning, or the user will be placed into a
captive portal.  There is no security or privacy issues with a user
manually entering an EPI as the user identifier.</t>
          <t>When all goes well, running EAP with the EPI results in
new authentication credentials being provisioned.  The peer then drops
its network connection, and re-authenticates using the newly
provisioned credentials.  The user MAY be involved in this process,
but in general provisioning results in the EAP peer automatically
gaining network access using the provisioned credentials.</t>
          <t>There are a number of ways in which provisioning can fail.  One way is
when the server does not implement the provisioning method.  EAP peers
therefore MUST track which provisioning methods have been tried, and
not repeat the same method to the same EAP server when receiving an
EAP Nak.  EAP peers MUST rate limit attempts at provisioning, in order
to avoid overloading the server.  This rate limiting SHOULD include
jitter and exponential backoff.</t>
          <t>Since there is no way to signal whether the failed provisioning is due
to a transient failure on the EAP server, or whether it is due to the
EAP server not supporting that provisioning method, EAP peers SHOULD
err on the side of long delays between retrying the same provisioning
method to an EAP server.  EAP peers MAY retry a given provisioning
method after a sufficiently long interval that the EAP server might
have implemented the provisioning method, e.g., at least a day, and
perhaps no more than a month.</t>
          <t>Another way for the provisioning method to fail is when the new
credentials do not result in network access.  It is RECOMMENDED that
when peers are provisioned with credentials, that they immediately try
to gain network access using those credentials.  That process allows
errors to be quickly discovered and addressed.</t>
          <t>An EAP peer may have been provisioned with temporary credentials or credentials that expire after some period of time (e.g., an X.509
certificate with notAfter date set).
It SHOULD therefore attempt to provision new credentials before the
current set expires.  Unfortunately, any re-provisioning process with
EAP will involve the device dropping off from the "full" network, in
order to connect to the provisioning network.  It is therefore
RECOMMENDED that re-provisioning methods be provided which can be used
when the device has full network access.  See <xref target="specifications"/> for
additional discussion on this topic.</t>
        </section>
        <section anchor="eap-servers">
          <name>EAP Servers</name>
          <t>An EAP session begins with the server receiving an initial
EAP-Request/Identity message.  An EAP server supporting this
specification MUST examine the identity to see if it uses a realm located under
eap.arpa.  If so, the identity is an EPI.  Processing of all other identities is unchanged by this specification.</t>
          <t>If the server receives a malformed EPI, it MUST
reply with an EAP Failure, as per <xref section="4.2" sectionFormat="comma" target="RFC3748"/>.
Otherwise, the EPI is examined to determine which provisioning method
is being requested by the peer.</t>
          <t>If the server does not recognize the EPI requested by the peer, it
MUST reply with an EAP Nak of type zero (0).  This reply indicates
that the requested provisioning method is not available.  The server
also MUST reply with a Nak of type zero (0) as per <xref section="5.3.1" sectionFormat="comma" target="RFC3748"/>, if the peer proposes an EAP method which is not supported by
the server, or is not recognized as being valid for that provisioning
method.  The peer can then take any remedial action which it
determines to be appropriate.</t>
          <t>Once the server accepts the provisioning method, it then replies with
an EAP method which MUST match the one associated with the EPI.  The EAP process then proceeds as per the EAP state machine
outlined in <xref target="RFC3748"/>.</t>
          <t>Implementations MUST treat peers using an EPI as
untrusted, and untrustworthy.  Once such a peer is authenticated, it MUST
be placed into a limited network, such as a captive portal.  The
limited network MUST NOT permit general network access.
Implementations should be aware of methods which bypass simple
blocking, such as tunneling data over DNS.</t>
          <t>A secure provisioning network is one where only the expected traffic
is allowed, and all other traffic is blocked.  The alternative of
blocking only selected "bad" traffic results in substantial security
failures.  As most provisioning methods permit unauthenticated devices
to gain network access, these methods have a substantial potential for
abuse by malicious actors.  As a result, the limited network needs to
be designed assuming that it will be abused by malicious actoer.</t>
          <t>A limited network SHOULD also limit the duration of network access by
devices being provisioned.  The provisioning process should be fairly
quick, and in the order of seconds to tens of seconds in duration.
Provisioning times longer than this likely indicate an issue, and it
may be useful to block the problematic device from the network.</t>
          <t>A limited network SHOULD also limit the amount of data being
transferred by devices being provisioned, and SHOULD limit the network
services which are available to those devices.  The provisioning
process generally does not need to download large amounts of data, and
similarly does not need access to a large number of services.</t>
          <t>Servers SHOULD rate-limit provisioning attempts.  A misbehaving peer
can be blocked temporarily, or even permanently. Implementations
SHOULD limit the total number of peers being provisioned at the same
time.  We note that there is no requirement to allow all peers to
connect without limit.  Instead, peers are provisioned at the
discretion of the network being accessed, which may permit or deny
those devices based on reasons which are not explained to those
devices.</t>
          <t>Peers MUST rate-limit their provisioning attempts.  If provisioning
fails, it is likely because provisioning is not available.  Retrying
provisioning repeatedly in quick succession is not likely to change
the server behavior.  Instead, it is likely to result in the peer
being blocked.  The peer SHOULD retry provisioning no more than once
every few minutes, and SHOULD perform exponential back-off on its
provisioning attempts.</t>
          <t>Implementations SHOULD use functionality such as the RADIUS Filter-Id
attribute (<xref section="5.11" sectionFormat="comma" target="RFC2865"/>) to set packet filters for the
peer being provisioned.  For ease of administration, the Filter-Id
name could simply be the EPI, or a similar name.  Such
consistency aids with operational considerations when managing complex
networks.</t>
        </section>
      </section>
      <section anchor="other-considerations">
        <name>Other Considerations</name>
        <t>Implementations MUST NOT permit EAP method negotiation with
provisioning credentials.  That is, when an EPI is used,
any EAP Nak sent by a server MUST contain only EAP method zero (0).
When an EAP peer uses an EPI and receives an EAP Nak, any
EAP methods given in that Nak MUST be ignored.</t>
        <t>While a server may support multiple provisioning methods, there is no
way in EAP to negotiate which provisioning method can be used.  It is
also expected that the provisioning methods will be specific to a
particular type of peer device.  That is, a given peer is likely to support
only one provisioning method.</t>
        <t>As a result, there is no need to require a method for negotiating
provisioning methods.</t>
      </section>
      <section anchor="specifications">
        <name>Considerations for Provisioning Specifications</name>
        <t>The operational considerations discussed above have a number of
impacts on specifications which define provisioning methods.</t>
        <section anchor="negotiation">
          <name>Negotiation</name>
          <t>Specifications which define provisioning for an EAP method SHOULD
provide a method-specific process by which implementations can
negotiate a mutually acceptable provisioning method.</t>
          <t>For the reasons noted above, however, we cannot make this suggestion
mandatory.  If it is not possible for a provisioning method to define
any negotiation, then that limitation should not be a barrier to
publishing the specification.</t>
        </section>
        <section anchor="renewal-of-credentials">
          <name>Renewal of Credentials</name>
          <t>Where a provisioning method is expected to create credentials which do
not expire, the specification SHOULD state this explicitly.</t>
          <t>Where credentials expire, it is RECOMMENDED that specifications
provide guidance on how the credentials are to be updated.  For
example, an EAP method could permit re-provisioning to be done as part
of a normal EAP authentication, using the currently provisioned
credentials.</t>
          <t>It is RECOMMENDED that the provisioning methods provide for a method
which can be used without affecting network access.  A specification
could define provisioning endpoints such as Enrollment over Secure
Transport (EST) <xref target="RFC7030"/>, or Internet X.509 Public Key Infrastructure
Certificate Management Protocol (CMP) <xref target="RFC4210"/>.  The provisioning endpoints could be
available both on the provisioning network, and on the provisioned
(i.e., normal) network.  Such an architecture means that devices can be
re-provisioned without losing network access.</t>
        </section>
      </section>
      <section anchor="notes-on-aaa-routability">
        <name>Notes on AAA Routability</name>
        <t>When we say that the eap.arpa domain is not routable in an AAA proxy
framework, we mean that the domain does not exist, and will never
resolve to anything for dynamic discovery as defined in <xref target="RFC7585"/>.
In addition, administrators will not have statically configured AAA
proxy routes for this domain.  Where routes are added for this domain,
they will generally be used to implement this specification.</t>
        <t>In order to avoid spurious DNS lookups, RADIUS servers supporting
<xref target="RFC7585"/> SHOULD perform filtering in the domains which are sent to
DNS.  Specifically, names in the "eap.arpa" domain SHOULD NOT be
looked up in DNS.</t>
      </section>
    </section>
    <section anchor="background-and-rationale">
      <name>Background and Rationale</name>
      <t>In this section, we provide background on the existing functionality,
and describe why it was necessary to define provisioning methods for
EAP.</t>
      <section anchor="review-of-existing-functionality">
        <name>Review of Existing Functionality</name>
        <t>For EAP-TLS, both <xref target="RFC5216"/> Section 2.1.1 and <xref target="RFC9190"/> provide
for "peer unauthenticated access".  However, those documents define no
way for a peer to signal that it is requesting such access.  The
presumption is that the peer connects with some value for the EAP
Identity, but without using a client certificate.  The EAP server is
then supposed to determine that the peer is requesting unauthenticated
access, and take the appropriate steps to limit authorization.</t>
        <t>There appears to be no EAP peer or server implementations which
support such access, since there is no defined way to perform any of
the steps required, i.e., to signal that this access is desired, and
then limit access.</t>
        <t>Wi-Fi Alliance has defined an unauthenticated EAP-TLS method,
using a vendor-specific EAP method as part of HotSpot 2.0r2 <xref target="HOTSPOT"/>.
However, there appears to be few deployments of this specification.</t>
        <t>EAP-NOOB <xref target="RFC9140"/> takes this process a step further.  It defines both
a way to signal that provisioning is desired, and also a way to
exchange provisioning information within EAP-NOOB.  That is, there is
no need for the device to obtain limited network access, as all of the
provisioning is done inside of the EAP-NOOB protocol.</t>
        <t>Tunnel Extensible Authentication Protocol (TEAP) <xref target="RFC7170"/> provides for provisioning via an unauthenticated TLS
tunnel.  That document provides for a server unauthenticated
provisioning mode, but the inner TLS exchange requires that both ends
authenticate each other.  There are ways to provision a certificate,
but the peer must still authenticate itself to the server with
pre-existing credentials.  As a result, any provisioning method which uses TEAP will have to address this limitation.</t>
      </section>
      <section anchor="taxonomy-of-provisioning-types">
        <name>Taxonomy of Provisioning Types</name>
        <t>There are two scenarios where provisioning can be done.  The first is
where provisioning is done within the EAP method, as with EAP-NOOB
<xref target="RFC9140"/>.  The second is where EAP is used to obtain limited
network access (e.g. as with a captive portal).  That limited network
access is then used to run IP based provisioning
over more complex protocols.</t>
        <section anchor="rationale-for-provisioning-over-eap">
          <name>Rationale for Provisioning over EAP</name>
          <t>It is often useful to do all provisioning inside of EAP, because the EAP / AAA
admin does not have control over the network.  It is not always
possible to define a captive portal where provisioning can be done.
As a result, we need to be able to perform provisioning via EAP, and
not via some IP protocol.</t>
        </section>
      </section>
    </section>
    <section anchor="interaction-with-eap-methods">
      <name>Interaction with EAP Methods</name>
      <t>As the provisioning identifier is used within EAP, it necessarily has
interactions with, and effects on, the various EAP methods.  This
section discusses those effects in more detail.</t>
      <t>Some EAP methods require shared credentials such as passwords in order
to succeed.  For example, both EAP-MSCHAPv2 (PEAP) and EAP-PWD
<xref target="RFC5931"/> perform cryptographic exchanges where both parties
knowing a shared password.  Where password-based methods are used, the
password SHOULD be the same as the provisioning identifier, as there
are few reasons to define a method-specific password.</t>
      <t>This requirement also applies to TLS-based EAP methods such as EAP Tunneled Transport Layer Security (EAP-TTLS)
and Protected Extensible Authentication Protocol (PEAP).  Where the TLS-based EAP method provides for an inner
identity and inner authentication method, the credentials used there
SHOULD be the provisioning identifier for both the inner identity, and
any inner password.</t>
      <t>It is RECOMMENDED that provisioning be done via a TLS-based EAP methods.
TLS provides for authentication of the EAP server, along with integrity
and confidentiality protection for any provisioning data exchanged in the tunnel.
Similarly, if provisioning is done in a captive portal outside of EAP,
EAP-TLS permits the EAP peer to run a full EAP authentication session
while having nothing more than a few certificate authorities (CAs)
locally configured.</t>
      <section anchor="high-level-requirements">
        <name>High Level Requirements</name>
        <t>All provisioning methods which are specified within the eap.arpa
domain MUST define a way to authenticate the server.  This
authentication can happen either at the EAP layer (as with TLS-based
EAP methods), or after network access has been granted (if credentials
are provisioned over HTTPS).</t>
        <t>Where TLS-based EAP methods are used, implementations MUST still
validate EAP server certificates in all situations other than
provisioning.  Where the provisioning method under the "eap.arpa"
domain defines that provisioning happen via another protocol such as
with HTTPS, the EAP peer MAY skip validating the EAP server
certificate.</t>
        <t>Whether or not the server certificate is ignored, the peer MUST treat
the local network as untrusted.  <xref section="6.2" sectionFormat="comma" target="RFC8952"/> has more
discussion on this topic.</t>
        <t>The ability to not validate the EAP server certificates relaxes the
requirements of <xref section="5.3" sectionFormat="comma" target="RFC5216"/> which requires that the
server certificate is always validated. .  For the provisioning case,
it is acceptable in some cases to not validate the EAP server
certificate, but only so long as there are other means to authenticate
the data which is being provisioned.</t>
        <t>However, since the device likely is configured with web CAs
(otherwise, the captive portal would also be unauthenticated),
provisioning methods could use those CAs within an EAP method in order
to allow the peer to authenticate the EAP server.  Further discussion
of this topic is better suited for the specification(s) which define a
particular provisioning method.  We do not discuss it here further,
other than to say that it is technically possible.</t>
      </section>
      <section anchor="eap-tls">
        <name>EAP-TLS</name>
        <t>This document defines an identifier "portal@tls.eap.arpa", which
allows EAP peers to use unauthenticated EAP-TLS.  The purpose of the
identifier is to allow EAP peers to signal EAP servers that they wish
to obtain a "captive portal" style network access.</t>
        <t>This identifier signals the EAP server that the peer wishes to obtain
"peer unauthenticated access" as per <xref section="2.1.1" sectionFormat="comma" target="RFC5216"/> and
<xref target="RFC9190"/>.  Note that peer unauthenticated access MUST provide for
authentication of the EAP server, such as with a server certificate.
Using TLS-PSK with a well-known PSK value is generally not
appropriate, as it would not provide server authentication.</t>
        <t>An EAP server which agrees to authenticate this request MUST ensure
that the device is placed into a captive portal with limited network
access.  Implementations SHOULD limit both the total amount of data
transferred by devices in the captive portal, and SHOULD also limit the
total amount of time a device spends within the captive portal.</t>
        <t>This method is an improvement over existing captive portals, which are
typically completely unsecured and unauthenticated.  Using peer
unauthenticated TLS for network access ensures that the EAP server is
proven to be authentic.  The use of 802.1X ensures that the link
between the EAP peer and EAP authenticator (e.g. access point) is also
secured.</t>
        <t>Further details of the captive portal architecture can be found in
<xref target="RFC8952"/>.  The captive portal can advertise support for the
"eap.arpa" domain via an 802.11u NAI realm.</t>
      </section>
      <section anchor="eap-noob">
        <name>EAP-NOOB</name>
        <t>It is RECOMMENDED that server implementations of Nimble out-of-band authentication for EAP (EAP-NOOB) accept both
identities "noob@eap-noob.arpa" and "@noob.eap.arpa" as synonyms.</t>
        <t>It is RECOMMENDED that EAP-NOOB peers use "@noob.eap.arpa" first, and
if that does not succeed, use "noob@eap-noob.arpa".</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>A number IANA actions are required.  There are two registry updates in
order to define "eap.arpa".  A new registry is created.  The
"noob@eap-noob.arpa" registry entry is deprecated.</t>
      <section anchor="arpa-updates">
        <name>.arpa updates</name>
        <t>There are two updates to the ".arpa" registry.</t>
        <t>IANA is also instructed to refuse further allocation requests which
are directly within the ".arpa" registry for any functionality related
to the EAP protocol.  Instead, new allocations related to EAP are to
be made within the new "EAP Provisioning Identifiers" registry.</t>
        <section anchor="deprecating-eap-noobarpa">
          <name>Deprecating eap-noob.arpa</name>
          <t>IANA is instructed to update the "eap-noob.arpa" entry as follows.</t>
          <t>The USAGE field is updated to add the word DEPRECATED.</t>
          <t>The REFERENCE field is updated to add a reference to THIS-DOCUMENT.</t>
        </section>
        <section anchor="defining-eaparpa">
          <name>Defining eap.arpa</name>
          <t>IANA is instructed to update the ".ARPA Zone Management" registry with
the following entry:</t>
          <t>DOMAIN</t>
          <ul empty="true">
            <li>
              <t>eap.arpa</t>
            </li>
          </ul>
          <t>USAGE</t>
          <ul empty="true">
            <li>
              <t>For provisioning within the Extensible Authentication Protocol framework.</t>
            </li>
          </ul>
          <t>REFERENCE</t>
          <ul empty="true">
            <li>
              <t>THIS-DOCUMENT</t>
            </li>
          </ul>
          <t>IANA is instructed to update the "Special-Use Domain Names" registry as follows:</t>
          <t>NAME</t>
          <ul empty="true">
            <li>
              <t>eap.arpa</t>
            </li>
          </ul>
          <t>REFERENCE</t>
          <ul empty="true">
            <li>
              <t>THIS-DOCUMENT</t>
            </li>
          </ul>
          <section anchor="domain-name-reservation-considerations">
            <name>Domain Name Reservation Considerations</name>
            <t>This section answers the questions which are required by Section 5 of <xref target="RFC6761"/>.  At a high level, these new domain names are used in certain situations in EAP.  The domain names are never seen by users, and they do not appear in any networking protocol other than EAP.</t>
            <ol spacing="normal" type="1"><li>
                <t>Users:<br/>
User are not expected to recognize these names as special or use them differently from other domain names.  The use of these names in EAP is invisible to end users.</t>
              </li>
              <li>
                <t>Application Software:<br/>
EAP servers and clients are expected to make their software recognize these names as special and treat them differently.  This document discusses that behavior.<br/>
EAP peers should recognize these names as special, and should refuse to allow users to enter them in any interface.<br/>
EAP servers and RADIUS servers should recognize the "eap.arpa" domain as special, and refuse to do dynamic discovery (<xref target="RFC7585"/>) for it.</t>
              </li>
              <li>
                <t>Name Resolution APIs and Libraries:<br/>
Writers of these APIs and libraries are not expected to recognize these names or treat them differently.</t>
              </li>
              <li>
                <t>Caching DNS Servers:<br/>
Writers of caching DNS servers are not expected to recognize these names or treat them differently.</t>
              </li>
              <li>
                <t>Authoritative DNS Servers:<br/>
Writers of authoritative DNS servers are not expected to recognize these names or treat them differently.</t>
              </li>
              <li>
                <t>DNS Server Operators:<br/>
These domain names have minimal impact on DNS server operators.  They should never be used in DNS, or in any networking protocol outside of EAP.<br/>
Some DNS servers may receive lookups for this domain, if EAP or RADIUS servers are configured to do dynamic discovery for realms as defined in <xref target="RFC7585"/>, and where those servers are not updated to ignore the ".arpa" domain.  When queried for the "eap.arpa" domain, DNS servers SHOULD return an NXDOMAIN error.<br/>
If they try to configure their authoritative DNS as authoritative for this reserved name, compliant name servers do not need to do anything special.  They can accept the domain or reject it.  Either behavior will have no impact on this specification.</t>
              </li>
              <li>
                <t>DNS Registries/Registrars:<br/>
DNS Registries/Registrars should deny requests to register this reserved domain name.</t>
              </li>
            </ol>
          </section>
        </section>
      </section>
      <section anchor="registry">
        <name>EAP Provisioning Identifiers Registry</name>
        <t>IANA is instructed to add the following new registry to the "Extensible Authentication Protocol (EAP) Registry" group.</t>
        <t>Assignments in this registry are done via "Expert Review" as described in <xref target="RFC8126"/> Section 4.5.  Guidelines for experts is provided in <xref target="guidelines"/>.</t>
        <t>The contents of the registry are as follows.</t>
        <t>Title</t>
        <ul empty="true">
          <li>
            <t>EAP Provisioning Identifiers</t>
          </li>
        </ul>
        <t>Registration Procedure(s)</t>
        <ul empty="true">
          <li>
            <t>Expert review</t>
          </li>
        </ul>
        <t>Reference</t>
        <ul empty="true">
          <li>
            <t>THIS-DOCUMENT</t>
          </li>
        </ul>
        <t>Registry</t>
        <ul empty="true">
          <li>
            <t>NAI</t>
            <ul empty="true">
              <li>
                <t>The Network Access Identifier in <xref target="RFC7542"/> format.  Names are stored as DNS A-Labels <xref section="2.3.2.1" sectionFormat="comma" target="RFC5890"/>, and are compared via the domain name comparison rules defined in <xref target="STD13"/>.</t>
              </li>
            </ul>
            <t>Method Type</t>
            <ul empty="true">
              <li>
                <t>The EAP method name, taken from the "Description" field of the EAP "Method Types" registry.</t>
              </li>
            </ul>
            <t>Reference</t>
            <ul empty="true">
              <li>
                <t>Reference where this identifier was defined.</t>
              </li>
            </ul>
          </li>
        </ul>
        <section anchor="initial-values">
          <name>Initial Values</name>
          <t>The following table gives the initial values for this table.</t>
          <table>
            <thead>
              <tr>
                <th align="left">NAI</th>
                <th align="left">Method-Type</th>
                <th align="left">Reference</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">@noob.eap.arpa</td>
                <td align="left">EAP-NOOB</td>
                <td align="left">
                  <xref target="RFC9140"/> and THIS-DOCUMENT</td>
              </tr>
              <tr>
                <td align="left">portal@tls.eap.arpa</td>
                <td align="left">EAP-TLS</td>
                <td align="left">
                  <xref target="RFC9190"/> and THIS-DOCUMENT</td>
              </tr>
            </tbody>
          </table>
        </section>
      </section>
      <section anchor="guidelines">
        <name>Guidelines for Designated Experts</name>
        <t>The following text gives guidelines for Designated Experts who review
allocation requests for this registry.</t>
        <section anchor="nais">
          <name>NAIs</name>
          <t>The intent is for the NAI to contain both a reference to the EAP
Method Type, and a description of the purpose of the NAI.  For
example, with an EAP Method Type "name", and a purpose "action", the
NAI SHOULD be of the form "action@foo.eap.arpa".</t>
          <t>The NAI MUST satisfy the requirements of the <xref section="2.2" sectionFormat="comma" target="RFC7542"/>
format.  The utf8-username portion MAY be empty.  The utf8-username
portion MUST NOT be "anonymous".  The NAI MUST end with "eap.arpa".
NAIs with any "v." subdomain MUST NOT be registered, in order to
preserve the functionality of that subdomain.</t>
          <t>NAIs in the registry SHOULD NOT contain more than one subdomain.  NAIs
with a leading "v." subdomain MUST NOT be registered.  That subdomain
is reserved for vendor and SDO extensions.</t>
          <t>The subdomain of the NAI field should correspond to the EAP Method
Type name.  Care should be taken so that the domain name conventions
specified in <xref target="RFC1034"/> are followed.</t>
          <t>The NAIs in this registry are case-insensitive.  While <xref target="RFC7542"/>
notes that similar identifiers of different case can be considered to
be different, for simplicity this registry requires that all entries
MUST be lowercase.</t>
          <t>Identifiers MUST be unique when compared in a case-insensitive
fashion.  While <xref target="RFC7542"/> notes that similar identifiers of
different case can be considered to be different, this registry is
made simpler by requiring case-insensitivity.</t>
          <t>Entries in the registry should be short.  NAIs defined here will
generally be sent in a RADIUS packet in the User-Name attribute
(<xref target="RFC2865"/> Section 5.1).  That specification recommends that
implementations should support User-Names of at least 63 octets.  NAI
length considerations are further discussed in <xref target="RFC7542"/> Section
2.3, and any allocations in this registry needs to take those
limitations into consideration.</t>
          <t>Implementations are likely to support a total NAI length of 63 octets.
Lengths between 63 and 253 octets may work.  Lengths of 254 octets or
more will not work with RADIUS <xref target="RFC2865"/>.</t>
        </section>
      </section>
      <section anchor="method-type">
        <name>Method Type</name>
        <t>Values in "Method Type" field of this registry MUST be taken from the
IANA EAP Method Types registry or else it MUST be an Expanded Type
which usually indicates a vendor specific EAP method.</t>
        <t>The EAP Method Type MUST provide an MSK and EMSK as defined in
<xref target="RFC3748"/>.  Failure to provide these keys means that the method will
not be usable within an authentication framework which requires those
methods, such as with IEEE 802.1X.</t>
      </section>
      <section anchor="designated-experts">
        <name>Designated Experts</name>
        <t>The Designated Expert will post a request to the EMU WG mailing list
(or a successor designated by the Area Director) for comment and
review, including an Internet-Draft or reference to external
specification.  Before a period of 30 days has passed, the Designated
Expert will either approve or deny the registration request and
publish a notice of the decision to the EAP Method Update (EMU) WG mailing list or its
successor, as well as informing IANA.  A denial notice must be
justified by an explanation, and in the cases where it is possible,
concrete suggestions on how the request can be modified so as to
become acceptable should be provided.</t>
      </section>
      <section anchor="vendor-assignment">
        <name>Organization Self Assignment</name>
        <t>This registry allows organizations to request allocations from this
registry, but explicit allocations are not always required.  Any NAI
defined in this registry also implicitly defines a subdomain "v.".
Organizations can self-allocate in this space, under the "v."
subdomain, e.g. "local@example.com.v.tls.eap.arpa".</t>
        <t>The purpose of self-assigned realms is for testing, and for future
expansion.  There are currently no use-cases being envisioned for
these realms, but we do not wish to forbid future expansion.</t>
        <t>An organization which has registered a Fully Qualified Domain Name
(FQDN) within the DNS can use that name within the "v." subdomain.</t>
        <t>As DNS registrations can change over time, an organization may stop
using a domain at some point.  This change is reflected in the DNS,
but is unlikely to be reflected in shipped products which use a
self-assigned realm.  There is no solution to this problem, other than
suggesting that organizations using self-assigned realms do not allow
their DNS registrations to expire.</t>
        <t>It is therefore RECOMMENDED that organizations avoid the use of
self-assigned realms.  Organizations MAY use self-assigned realms only
when no other alternative exists, and when the organization expects to
maintain operation for at least the lifetime of the devices which use
these realms.</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>The EAP Identity field is generally publicly visible to parties who
can observe the EAP traffic.  As the names given here are in a public
specification, there is no privacy implication to exposing those names
within EAP.  The entire goal of this specification is in fact to make
those names public, so that unknown (and private) parties can publicly
(and anonymously) declare what kind of network access they desire.</t>
      <t>However, there are many additional privacy concerns around this
specification.  Most EAP traffic is sent over RADIUS <xref target="RFC2865"/>.  The
RADIUS Access-Request packets typically contain large amounts of
information such as MAC addresses, device location, etc.</t>
      <t>This specification does not change RADIUS or EAP, and as such does not
change which information is publicly available, or is kept private.
Those issues are dealt with in other specifications, such as
<xref target="I-D.ietf-radext-deprecating-radius"/>.</t>
      <t>However, this specification can increase privacy by allowing devices
to anonymously obtain network access, and then securely obtain
credentials.</t>
      <t>The NAIs used here are contained in a public registry, and therefore
do not have to follow the username privacy recommendations of
<xref section="2.4" sectionFormat="comma" target="RFC7542"/>.  However, there may be other personally
identifying information contained in EAP or AAA packets.  This
situation is no different from normal EAP authentication, and thus
has no additional positive or negative implications for privacy.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This specification defines a framework which permits unknown,
anonymous, and unauthenticated devices to request and to obtain
network access.  As such, it is critical that network operators
provide limited access to those devices.</t>
      <t>Future specifications which define an NAI within this registry, should
give detailed descriptions of what kind of network access is to be
provided.</t>
      <section anchor="on-path-attackers-and-impersonation">
        <name>On-Path Attackers and Impersonation</name>
        <t>In most EAP use-cases, the server identity is validated (usually
through a certificate), or the EAP method allows the TLS tunnel to be
cryptographically bound to the inner application data.  For the
methods outlined here, the use of public credentials, and/or skipping
server validation allows "on-path" attacks to succeed where they would
normally fail</t>
        <t>EAP peers and servers MUST assume that all data sent over an EAP
session is visible to attackers, and can be modified by them.</t>
        <t>The methods defined here MUST only be used to bootstrap initial
network access.  Once a device has been provisioned, it gains network
access via the provisioned credentials, and any network access
policies can be applied.</t>
      </section>
      <section anchor="provisioning-is-unauthenticated">
        <name>Provisioning is Unauthenticated</name>
        <t>We note that this specification allows for unauthenticated EAP peers
to obtain network access, however limited.  As with any
unauthenticated process, it can be abused.  Implementations should
take care to limit the use of the provisioning network.</t>
        <t><xref target="eap-servers"/> describes a number of methods which can be
used to secure the provisioning network.  In summary:</t>
        <ul spacing="normal">
          <li>
            <t>allow only traffic which is needed for the current provisioning
method.  All other traffic should be blocked.  Most notable, DNS has
been used to exfiltrate network traffic, so DNS recursive resolvers SHOULD NOT
be made available on the provisioning network.</t>
          </li>
          <li>
            <t>limit the services available on the provisioning network to only
those services which are needed for provisioning.</t>
          </li>
          <li>
            <t>limit the number of devices which can access the provisioning
network at the same time.</t>
          </li>
          <li>
            <t>for any one device, rate limit its access the provisioning network.</t>
          </li>
          <li>
            <t>for a device which has accessed the provisioning network, limit the
total amount of time which it is allowed to remain on the network</t>
          </li>
          <li>
            <t>for a device which has accessed the provisioning network, limit the
total amount of data which it is allowed to transfer through the network.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Mohit Sethi provided valuable insight that using subdomains was better
and more informative than the original method, which used only the
utf8-username portion of the NAI.</t>
      <t>The document was further improved with reviews from Ignes Robles and
Ben Kaduk.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC3748">
          <front>
            <title>Extensible Authentication Protocol (EAP)</title>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="L. Blunk" initials="L." surname="Blunk"/>
            <author fullname="J. Vollbrecht" initials="J." surname="Vollbrecht"/>
            <author fullname="J. Carlson" initials="J." surname="Carlson"/>
            <author fullname="H. Levkowetz" initials="H." role="editor" surname="Levkowetz"/>
            <date month="June" year="2004"/>
            <abstract>
              <t>This document defines the Extensible Authentication Protocol (EAP), an authentication framework which supports multiple authentication methods. EAP typically runs directly over data link layers such as Point-to-Point Protocol (PPP) or IEEE 802, without requiring IP. EAP provides its own support for duplicate elimination and retransmission, but is reliant on lower layer ordering guarantees. Fragmentation is not supported within EAP itself; however, individual EAP methods may support this. This document obsoletes RFC 2284. A summary of the changes between this document and RFC 2284 is available in Appendix A. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3748"/>
          <seriesInfo name="DOI" value="10.17487/RFC3748"/>
        </reference>
        <reference anchor="RFC5216">
          <front>
            <title>The EAP-TLS Authentication Protocol</title>
            <author fullname="D. Simon" initials="D." surname="Simon"/>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="R. Hurst" initials="R." surname="Hurst"/>
            <date month="March" year="2008"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides support for multiple authentication methods. Transport Layer Security (TLS) provides for mutual authentication, integrity-protected ciphersuite negotiation, and key exchange between two endpoints. This document defines EAP-TLS, which includes support for certificate-based mutual authentication and key derivation.</t>
              <t>This document obsoletes RFC 2716. A summary of the changes between this document and RFC 2716 is available in Appendix A. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5216"/>
          <seriesInfo name="DOI" value="10.17487/RFC5216"/>
        </reference>
        <reference anchor="RFC7542">
          <front>
            <title>The Network Access Identifier</title>
            <author fullname="A. DeKok" initials="A." surname="DeKok"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>In order to provide inter-domain authentication services, it is necessary to have a standardized method that domains can use to identify each other's users. This document defines the syntax for the Network Access Identifier (NAI), the user identifier submitted by the client prior to accessing resources. This document is a revised version of RFC 4282. It addresses issues with international character sets and makes a number of other corrections to RFC 4282.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7542"/>
          <seriesInfo name="DOI" value="10.17487/RFC7542"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC9140">
          <front>
            <title>Nimble Out-of-Band Authentication for EAP (EAP-NOOB)</title>
            <author fullname="T. Aura" initials="T." surname="Aura"/>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <author fullname="A. Peltonen" initials="A." surname="Peltonen"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP) provides support for multiple authentication methods. This document defines the EAP-NOOB authentication method for nimble out-of-band (OOB) authentication and key derivation. The EAP method is intended for bootstrapping all kinds of Internet-of-Things (IoT) devices that have no preconfigured authentication credentials. The method makes use of a user-assisted, one-directional, out-of-band (OOB) message between the peer device and authentication server to authenticate the in-band key exchange. The device must have a nonnetwork input or output interface, such as a display, microphone, speaker, or blinking light, that can send or receive dynamically generated messages of tens of bytes in length.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9140"/>
          <seriesInfo name="DOI" value="10.17487/RFC9140"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <referencegroup anchor="STD13" target="https://www.rfc-editor.org/info/std13">
          <reference anchor="RFC1034" target="https://www.rfc-editor.org/info/rfc1034">
            <front>
              <title>Domain names - concepts and facilities</title>
              <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
              <date month="November" year="1987"/>
              <abstract>
                <t>This RFC is the revised basic definition of The Domain Name System. It obsoletes RFC-882. This memo describes the domain style names and their used for host address look up and electronic mail forwarding. It discusses the clients and servers in the domain name system and the protocol used between them.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="13"/>
            <seriesInfo name="RFC" value="1034"/>
            <seriesInfo name="DOI" value="10.17487/RFC1034"/>
          </reference>
          <reference anchor="RFC1035" target="https://www.rfc-editor.org/info/rfc1035">
            <front>
              <title>Domain names - implementation and specification</title>
              <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
              <date month="November" year="1987"/>
              <abstract>
                <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="13"/>
            <seriesInfo name="RFC" value="1035"/>
            <seriesInfo name="DOI" value="10.17487/RFC1035"/>
          </reference>
        </referencegroup>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="HOTSPOT" target="https://www.wi-fi.org/discover-wi-fi/passpoint">
          <front>
            <title>Passpoint</title>
            <author initials="W.-F." surname="Alliance" fullname="Wi-Fi Alliance">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC2865">
          <front>
            <title>Remote Authentication Dial In User Service (RADIUS)</title>
            <author fullname="C. Rigney" initials="C." surname="Rigney"/>
            <author fullname="S. Willens" initials="S." surname="Willens"/>
            <author fullname="A. Rubens" initials="A." surname="Rubens"/>
            <author fullname="W. Simpson" initials="W." surname="Simpson"/>
            <date month="June" year="2000"/>
            <abstract>
              <t>This document describes a protocol for carrying authentication, authorization, and configuration information between a Network Access Server which desires to authenticate its links and a shared Authentication Server. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2865"/>
          <seriesInfo name="DOI" value="10.17487/RFC2865"/>
        </reference>
        <reference anchor="RFC7170">
          <front>
            <title>Tunnel Extensible Authentication Protocol (TEAP) Version 1</title>
            <author fullname="H. Zhou" initials="H." surname="Zhou"/>
            <author fullname="N. Cam-Winget" initials="N." surname="Cam-Winget"/>
            <author fullname="J. Salowey" initials="J." surname="Salowey"/>
            <author fullname="S. Hanna" initials="S." surname="Hanna"/>
            <date month="May" year="2014"/>
            <abstract>
              <t>This document defines the Tunnel Extensible Authentication Protocol (TEAP) version 1. TEAP is a tunnel-based EAP method that enables secure communication between a peer and a server by using the Transport Layer Security (TLS) protocol to establish a mutually authenticated tunnel. Within the tunnel, TLV objects are used to convey authentication-related data between the EAP peer and the EAP server.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7170"/>
          <seriesInfo name="DOI" value="10.17487/RFC7170"/>
        </reference>
        <reference anchor="RFC8952">
          <front>
            <title>Captive Portal Architecture</title>
            <author fullname="K. Larose" initials="K." surname="Larose"/>
            <author fullname="D. Dolson" initials="D." surname="Dolson"/>
            <author fullname="H. Liu" initials="H." surname="Liu"/>
            <date month="November" year="2020"/>
            <abstract>
              <t>This document describes a captive portal architecture. Network provisioning protocols such as DHCP or Router Advertisements (RAs), an optional signaling protocol, and an HTTP API are used to provide the solution.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8952"/>
          <seriesInfo name="DOI" value="10.17487/RFC8952"/>
        </reference>
        <reference anchor="RFC9190">
          <front>
            <title>EAP-TLS 1.3: Using the Extensible Authentication Protocol with TLS 1.3</title>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods. This document specifies the use of EAP-TLS with TLS 1.3 while remaining backwards compatible with existing implementations of EAP-TLS. TLS 1.3 provides significantly improved security and privacy, and reduced latency when compared to earlier versions of TLS. EAP-TLS with TLS 1.3 (EAP-TLS 1.3) further improves security and privacy by always providing forward secrecy, never disclosing the peer identity, and by mandating use of revocation checking when compared to EAP-TLS with earlier versions of TLS. This document also provides guidance on authentication, authorization, and resumption for EAP-TLS in general (regardless of the underlying TLS version used). This document updates RFC 5216.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9190"/>
          <seriesInfo name="DOI" value="10.17487/RFC9190"/>
        </reference>
        <reference anchor="RFC7585">
          <front>
            <title>Dynamic Peer Discovery for RADIUS/TLS and RADIUS/DTLS Based on the Network Access Identifier (NAI)</title>
            <author fullname="S. Winter" initials="S." surname="Winter"/>
            <author fullname="M. McCauley" initials="M." surname="McCauley"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This document specifies a means to find authoritative RADIUS servers for a given realm. It is used in conjunction with either RADIUS over Transport Layer Security (RADIUS/TLS) or RADIUS over Datagram Transport Layer Security (RADIUS/DTLS).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7585"/>
          <seriesInfo name="DOI" value="10.17487/RFC7585"/>
        </reference>
        <reference anchor="RFC7030">
          <front>
            <title>Enrollment over Secure Transport</title>
            <author fullname="M. Pritikin" initials="M." role="editor" surname="Pritikin"/>
            <author fullname="P. Yee" initials="P." role="editor" surname="Yee"/>
            <author fullname="D. Harkins" initials="D." role="editor" surname="Harkins"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport. This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates. It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7030"/>
          <seriesInfo name="DOI" value="10.17487/RFC7030"/>
        </reference>
        <reference anchor="RFC4210">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate Management Protocol (CMP)</title>
            <author fullname="C. Adams" initials="C." surname="Adams"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="T. Kause" initials="T." surname="Kause"/>
            <author fullname="T. Mononen" initials="T." surname="Mononen"/>
            <date month="September" year="2005"/>
            <abstract>
              <t>This document describes the Internet X.509 Public Key Infrastructure (PKI) Certificate Management Protocol (CMP). Protocol messages are defined for X.509v3 certificate creation and management. CMP provides on-line interactions between PKI components, including an exchange between a Certification Authority (CA) and a client system. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4210"/>
          <seriesInfo name="DOI" value="10.17487/RFC4210"/>
        </reference>
        <reference anchor="RFC5931">
          <front>
            <title>Extensible Authentication Protocol (EAP) Authentication Using Only a Password</title>
            <author fullname="D. Harkins" initials="D." surname="Harkins"/>
            <author fullname="G. Zorn" initials="G." surname="Zorn"/>
            <date month="August" year="2010"/>
            <abstract>
              <t>This memo describes an Extensible Authentication Protocol (EAP) method, EAP-pwd, which uses a shared password for authentication. The password may be a low-entropy one and may be drawn from some set of possible passwords, like a dictionary, which is available to an attacker. The underlying key exchange is resistant to active attack, passive attack, and dictionary attack. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5931"/>
          <seriesInfo name="DOI" value="10.17487/RFC5931"/>
        </reference>
        <reference anchor="RFC6761">
          <front>
            <title>Special-Use Domain Names</title>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <author fullname="M. Krochmal" initials="M." surname="Krochmal"/>
            <date month="February" year="2013"/>
            <abstract>
              <t>This document describes what it means to say that a Domain Name (DNS name) is reserved for special use, when reserving such a name is appropriate, and the procedure for doing so. It establishes an IANA registry for such domain names, and seeds it with entries for some of the already established special domain names.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6761"/>
          <seriesInfo name="DOI" value="10.17487/RFC6761"/>
        </reference>
        <reference anchor="RFC5890">
          <front>
            <title>Internationalized Domain Names for Applications (IDNA): Definitions and Document Framework</title>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <date month="August" year="2010"/>
            <abstract>
              <t>This document is one of a collection that, together, describe the protocol and usage context for a revision of Internationalized Domain Names for Applications (IDNA), superseding the earlier version. It describes the document collection and provides definitions and other material that are common to the set. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5890"/>
          <seriesInfo name="DOI" value="10.17487/RFC5890"/>
        </reference>
        <reference anchor="I-D.ietf-radext-deprecating-radius">
          <front>
            <title>Deprecating Insecure Practices in RADIUS</title>
            <author fullname="Alan DeKok" initials="A." surname="DeKok">
              <organization>InkBridge Networks</organization>
            </author>
            <date day="25" month="May" year="2025"/>
            <abstract>
              <t>   RADIUS crypto-agility was first mandated as future work by RFC 6421.
   The outcome of that work was the publication of RADIUS over TLS (RFC
   6614) and RADIUS over DTLS (RFC 7360) as experimental documents.
   Those transport protocols have been in wide-spread use for many years
   in a wide range of networks.  They have proven their utility as
   replacements for the previous UDP (RFC 2865) and TCP (RFC 6613)
   transports.  With that knowledge, the continued use of insecure
   transports for RADIUS has serious and negative implications for
   privacy and security.

   The recent publication of the "BlastRADIUS" exploit has also shown
   that RADIUS security needs to be updated.  It is no longer acceptable
   for RADIUS to rely on MD5 for security.  It is no longer acceptable
   to send device or location information in clear text across the wider
   Internet.  This document therefore deprecates many insecure practices
   in RADIUS, and mandates support for secure TLS-based transport
   layers.  We also discuss related security issues with RADIUS, and
   give recommendations for practices which increase both security and
   privacy.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-radext-deprecating-radius-06"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
