| rfc9965v3.txt | rfc9965.txt | |||
|---|---|---|---|---|
| skipping to change at line 272 ¶ | skipping to change at line 272 ¶ | |||
| requested methods to be distinguished. The subdomain in the realm | requested methods to be distinguished. The subdomain in the realm | |||
| field is assigned via the "EAP Provisioning Identifiers" registry | field is assigned via the "EAP Provisioning Identifiers" registry | |||
| [EAPREG], which is defined in Section 5.2. The subdomain MUST follow | [EAPREG], which is defined in Section 5.2. The subdomain MUST follow | |||
| the syntax defined in [RFC7542], Section 2.2, which is a more | the syntax defined in [RFC7542], Section 2.2, which is a more | |||
| restrictive subset of the domain name conventions specified in | restrictive subset of the domain name conventions specified in | |||
| [STD13]. | [STD13]. | |||
| Where possible, the first subdomain of the eap.arpa. domain SHOULD | Where possible, the first subdomain of the eap.arpa. domain SHOULD | |||
| use the EAP method name, as defined in the "Extensible Authentication | use the EAP method name, as defined in the "Extensible Authentication | |||
| Protocol (EAP) Registry" registry group, "Method Types" registry. | Protocol (EAP) Registry" registry group, "Method Types" registry. | |||
| However, the names in the "EAP Method Type" registry [EAP-METHOD] do | However, the names in the "EAP Method Type" registry [EAPREG] do not | |||
| not follow the domain name formats specified in [STD13], so it is not | follow the domain name formats specified in [STD13], so it is not | |||
| always possible to make a one-to-one mapping between the Method Type | always possible to make a one-to-one mapping between the Method Type | |||
| name and a subdomain of the eap.arpa. domain. | name and a subdomain of the eap.arpa. domain. | |||
| Where it is not possible to make a direct mapping between the EAP | Where it is not possible to make a direct mapping between the EAP | |||
| Method Type name due to the EAP Method Type name not matching the | Method Type name due to the EAP Method Type name not matching the | |||
| [RFC7542], Section 2.2 format, the NAI that is defined in the "EAP | [RFC7542], Section 2.2 format, the NAI that is defined in the "EAP | |||
| Provisioning Identifiers" registry MUST use a realm name that is | Provisioning Identifiers" registry MUST use a realm name that is | |||
| similar enough to allow the average reader to understand which EAP | similar enough to allow the average reader to understand which EAP | |||
| Method Type is being used. | Method Type is being used. | |||
| skipping to change at line 590 ¶ | skipping to change at line 590 ¶ | |||
| authentication method, the credentials used there SHOULD be the | authentication method, the credentials used there SHOULD be the | |||
| provisioning identifier for both the inner identity and any inner | provisioning identifier for both the inner identity and any inner | |||
| password. | password. | |||
| It is RECOMMENDED that provisioning be done via a TLS-based EAP | It is RECOMMENDED that provisioning be done via a TLS-based EAP | |||
| method. TLS provides for authentication of the EAP server along with | method. TLS provides for authentication of the EAP server along with | |||
| integrity and confidentiality protection for any provisioning data | integrity and confidentiality protection for any provisioning data | |||
| exchanged in the tunnel. Similarly, if provisioning is done in a | exchanged in the tunnel. Similarly, if provisioning is done in a | |||
| captive portal outside of EAP, EAP-TLS permits the EAP peer to run a | captive portal outside of EAP, EAP-TLS permits the EAP peer to run a | |||
| full EAP authentication session while having nothing more than a few | full EAP authentication session while having nothing more than a few | |||
| Certificate Authorities (CAs) locally configured. | Certification Authorities (CAs) locally configured. | |||
| 4.1. High Level Requirements | 4.1. High Level Requirements | |||
| All provisioning methods that are specified within the | All provisioning methods that are specified within the | |||
| eap.arpa. domain MUST define a way to authenticate the server. This | eap.arpa. domain MUST define a way to authenticate the server. This | |||
| authentication can happen either at the EAP layer (as with TLS-based | authentication can happen either at the EAP layer (as with TLS-based | |||
| EAP methods) or after network access has been granted (if credentials | EAP methods) or after network access has been granted (if credentials | |||
| are provisioned over HTTPS). | are provisioned over HTTPS). | |||
| Where TLS-based EAP methods are used, implementations MUST still | Where TLS-based EAP methods are used, implementations MUST still | |||
| skipping to change at line 627 ¶ | skipping to change at line 627 ¶ | |||
| However, since the device is likely otherwise configured with web CAs | However, since the device is likely otherwise configured with web CAs | |||
| [CAB], the captive portal would also be unauthenticated provisioning | [CAB], the captive portal would also be unauthenticated provisioning | |||
| methods could use those CAs within an EAP method in order to allow | methods could use those CAs within an EAP method in order to allow | |||
| the peer to authenticate the EAP server. Further discussion of this | the peer to authenticate the EAP server. Further discussion of this | |||
| topic is better suited for the specification(s) that define a | topic is better suited for the specification(s) that define a | |||
| particular provisioning method. This issue is not discussed further | particular provisioning method. This issue is not discussed further | |||
| here, other than to say that it is technically possible. | here, other than to say that it is technically possible. | |||
| 4.2. EAP-TLS | 4.2. EAP-TLS | |||
| This document defines an NAI called "portal@tls.eap.arpa", which | This document defines an NAI "portal@tls.eap.arpa", which allows EAP | |||
| allows EAP peers to use unauthenticated EAP-TLS. The purpose of the | peers to use unauthenticated EAP-TLS. The purpose of the identifier | |||
| identifier is to allow EAP peers to signal to EAP servers that they | is to allow EAP peers to signal to EAP servers that they wish to | |||
| wish to obtain "captive portal" network access. | obtain "captive portal" network access. | |||
| This identifier signals to the EAP server that the peer wishes to | This identifier signals to the EAP server that the peer wishes to | |||
| obtain "peer unauthenticated access" as per [RFC5216], Section 2.1.1 | obtain "peer unauthenticated access" as per [RFC5216], Section 2.1.1 | |||
| and [RFC9190]. Note that peer unauthenticated access MUST provide | and [RFC9190]. Note that peer unauthenticated access MUST provide | |||
| for authentication of the EAP server, such as with a server | for authentication of the EAP server, such as with a server | |||
| certificate. Using TLS-PSK with a well-known Pre-Shared Key (PSK) | certificate. Using TLS-PSK with a well-known Pre-Shared Key (PSK) | |||
| value is generally not appropriate, as it would not provide server | value is generally not appropriate, as it would not provide server | |||
| authentication. | authentication. | |||
| An EAP server that agrees to authenticate this request MUST ensure | An EAP server that agrees to authenticate this request MUST ensure | |||
| skipping to change at line 1043 ¶ | skipping to change at line 1043 ¶ | |||
| November 1987, <https://www.rfc-editor.org/info/rfc1035>. | November 1987, <https://www.rfc-editor.org/info/rfc1035>. | |||
| 8.2. Informative References | 8.2. Informative References | |||
| [ARPAREG] IANA, ".ARPA Zone Management", | [ARPAREG] IANA, ".ARPA Zone Management", | |||
| <https://www.iana.org/domains/arpa>. | <https://www.iana.org/domains/arpa>. | |||
| [CAB] CA/Browser Forum, "CA/Browser Forum", | [CAB] CA/Browser Forum, "CA/Browser Forum", | |||
| <https://cabforum.org/>. | <https://cabforum.org/>. | |||
| [EAP-METHOD] | ||||
| IANA, "Extensible Authentication Protocol (EAP) Registry", | ||||
| <https://www.iana.org/assignments/eap-numbers>. | ||||
| [EAPREG] IANA, "Extensible Authentication Protocol (EAP) Registry", | [EAPREG] IANA, "Extensible Authentication Protocol (EAP) Registry", | |||
| <https://www.iana.org/assignments/eap-numbers>. | <https://www.iana.org/assignments/eap-numbers>. | |||
| [HOTSPOT] Wi-Fi Alliance, "Passpoint", | [HOTSPOT] Wi-Fi Alliance, "Passpoint", | |||
| <https://www.wi-fi.org/discover-wi-fi/passpoint>. | <https://www.wi-fi.org/discover-wi-fi/passpoint>. | |||
| [IEEE802.11u] | [IEEE802.11u] | |||
| IEEE, "IEEE Standard for Information Technology - | IEEE, "IEEE Standard for Information Technology - | |||
| Telecommunications and information exchange between | Telecommunications and information exchange between | |||
| systems - Local and Metropolitan networks-specific | systems - Local and Metropolitan networks-specific | |||
| requirements - Part II: Wireless LAN Medium Access Control | requirements - Part II: Wireless LAN Medium Access Control | |||
| (MAC) and Physical Layer (PHY) specifications: Amendment | (MAC) and Physical Layer (PHY) specifications: Amendment | |||
| 9: Interworking with External Networks", IEEE Std 802.11u- | 9: Interworking with External Networks", IEEE Std 802.11u- | |||
| 2011, DOI 10.1109/IEEESTD.2011.5721908, 2011, | 2011, DOI 10.1109/IEEESTD.2011.5721908, 2011, | |||
| <https://ieeexplore.ieee.org/document/5721908>. | <https://ieeexplore.ieee.org/document/5721908>. | |||
| [IEEE802.1X] | [IEEE802.1X] | |||
| IEEE, "IEEE Standard for Local and metropolitan area | IEEE, "IEEE Standard for Local and metropolitan area | |||
| networks--Port-Based Network Access Control", IEEE Std | networks--Port-Based Network Access Control", IEEE Std | |||
| 802.1X-2010, DOI 10.1109/IEEESTD.2010.5409813, 2010, | 802.1X-2020, DOI 10.1109/IEEESTD.2020.9018454, 2020, | |||
| <https://ieeexplore.ieee.org/document/5409813>. | <https://ieeexplore.ieee.org/document/5409813>. | |||
| [INSECURE-RADIUS] | [INSECURE-RADIUS] | |||
| DeKok, A., "Deprecating Insecure Practices in RADIUS", | DeKok, A., "Deprecating Insecure Practices in RADIUS", | |||
| Work in Progress, Internet-Draft, draft-ietf-radext- | Work in Progress, Internet-Draft, draft-ietf-radext- | |||
| deprecating-radius-09, 15 March 2026, | deprecating-radius-09, 15 March 2026, | |||
| <https://datatracker.ietf.org/doc/html/draft-ietf-radext- | <https://datatracker.ietf.org/doc/html/draft-ietf-radext- | |||
| deprecating-radius-09>. | deprecating-radius-09>. | |||
| [RFC2865] Rigney, C., Willens, S., Rubens, A., and W. Simpson, | [RFC2865] Rigney, C., Willens, S., Rubens, A., and W. Simpson, | |||
| End of changes. 5 change blocks. | ||||
| 12 lines changed or deleted | 8 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. | ||||