<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 2.6.10) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-emu-eap-arpa-06" category="std" consensus="true" submissionType="IETF" updates="9140" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.24.0 -->
  <front>
    <title abbrev="eap.arpa">The eap.arpa domain and EAP provisioning</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-emu-eap-arpa-06"/>
    <author initials="A." surname="DeKok" fullname="Alan DeKok">
      <organization>InkBridge Networks</organization>
      <address>
        <email>aland@inkbridgenetworks.com</email>
      </address>
    </author>
    <date year="2025" month="January" day="29"/>
    <area>Internet</area>
    <workgroup>EMU Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 52?>

<t>This document defines the eap.arpa domain as a way for Extensible Authentication Protocol (EAP) peers to
signal to EAP servers that they wish to obtain limited, and
unauthenticated, network access.  EAP peers signal which kind of access is required via certain pre-defined identifiers which use the Network Access Identifier (NAI) format of RFC 7542.  A table of
identifiers and meanings is defined, which includes entries for RFC 9140.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-emu-eap-arpa/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        EMU Working Group mailing list (<eref target="mailto:emut@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/emut/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/emut/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/freeradius/eap-arpa.git"/>.</t>
    </note>
  </front>
  <middle>
    <?line 59?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>In most uses, EAP <xref target="RFC3748"/> requires that the EAP peer have
pre-provisioned credentials.  Without credentials, the device cannot
obtain network access in order to be provisioned with credentials.
This limitation creates a bootstrapping problem.</t>
      <t>This specification addresses that problem.  It creates a framework by
which clients can submit predefined provisioning credentials to a server in order to
obtain limited network access.  At the same time, servers can know in
advance that these credentials are to be used only for provisioning,
and that unrestricted network access should not be granted.</t>
      <t>The device can either use the EAP channel itself for provisioning, as
with TEAP <xref target="RFC7170"/>, or the EAP server can give the device access to
a limited captive portal such as with <xref target="RFC8952"/>.  Once the device is
provisioned, it can use those provisioned credentials to obtain full
network access.</t>
      <t>The pre-defined credentials use a generic identity format.
Identifiers in this space are generically referred to as "EAP
Provisioning Identifiers" (EPI).  The choice of "Provisioning
Identifiers for EAP" (PIE) was considered and rejected.</t>
      <t>Since the identity is predefined, there is little benefit to defining
pre-defined passwords.  Where supported by the underlying EAP method,
this specification provides for password-less access.  Where passwords
are required, the password is defined to be the same as the identity.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
      </t>
    </section>
    <section anchor="concepts">
      <name>Concepts</name>
      <t>A device which has no device-specific credentials can use a predefined
identifier in Network Access Identifier (NAI) format <xref target="RFC7542"/>.  The
NAI is composed of two portions, the utf8-username, and the utf8-realm
domain.  For simplicity here, we refer to these as the "username" and
"realm" fields.</t>
      <t>The realm is chosen to be independent of, and unused by, any existing
organization, and thus to be usable by all organizations.  The realm is
one which should not be automatically proxied by any
Authentication, Authorization, and Accounting (AAA) proxy framework as
defined in <xref section="3" sectionFormat="comma" target="RFC7542"/>.  The realm is also one which will
not return results for <xref target="RFC7585"/> dynamic discovery.</t>
      <t>This specification does not, however, forbid routing of packets for
realms in the "eap.arpa" domain.  Instead, it leaves such routing up
to individual organizations.</t>
      <t>We note that this specification is fully compatible with all existing
EAP implementations, so it is fail-safe.  When presented with a peer
wishing to use this specification, existing implementations will
return EAP Failure, and will not otherwise misbehave.</t>
      <section anchor="the-eaparpa-realm">
        <name>The eap.arpa realm</name>
        <t>This document defines the "eap.arpa" domain as being used for
provisioning within EAP.  A similar domain has previously been used
for EAP-NOOB <xref target="RFC9140"/>, as "eap-noob.arpa".  This document extends
that concept, and standardizes the practices surrounding it,</t>
        <t>NOTE: the "arpa" domain is controlled by the IAB.  Allocation of
"eap.arpa" requires agreement from the IAB.</t>
      </section>
      <section anchor="the-realm-field">
        <name>The realm field</name>
        <t>The subdomain in the "eap.arpa" realm is assigned via the EAP Provisioning
Identifier Registry which is defined in <xref target="registry"/>. The subdomain
MUST follow the domain name conventions specified in <xref target="RFC1034"/>.</t>
        <t>It is RECOMMENDED that the first subdomain of "eap.arpa" use the EAP
method name, as defined in the IANA Extensible Authentication Protocol
(EAP) Registry, sub-registry "Method Types".  However, that registry does
not follow the domain name conventions specified in <xref target="RFC1034"/>, so it
is not possible to make a "one-to-one" mapping between the Method Type
name and the subdomain.</t>
        <t>Where it is not possible to make a direct mapping between the EAP
Method Type name (e.g. "TEAP" for the Tunneled EAP method), and a subdomain
(e.g. "teap.eap.arpa"), the name used in the realm registry SHOULD be
similar enough to allow the average reader to understand which EAP
Method Type is being used.</t>
        <t>Additional subdomains are permitted in the realm, which permit vendors and
Standards Development organizations (SDOs) the ability to self-assign
a delegated range of identifiers which cannot conflict with other
identifiers.</t>
        <t>Any realm defined in this registry (e.g. "teap.eap.arpa") also
implicitly defines a subdomain "v." (e.g. "v.teap.eap.arpa").  Vendors
or SDOs can self-allocate within the "v." subdomain, using domains
which they own.  For example, An "example.com" company could self-allocate
and use the realm "example.com.v.teap.eap.arpa".</t>
      </section>
      <section anchor="the-username-field">
        <name>The username field</name>
        <t>The username field is dependent on the EAP method being used for
provisioning. For example, <xref target="RFC9140"/> uses the username "noob". Other
EAP methods MAY omit the username as RECOMMENDED in <xref target="RFC7542"/>.  The
username of "anonymous" is NOT RECOMMENDED for specifications using
this format, even though it is permitted by <xref target="RFC7542"/>.</t>
        <t>The username field is assigned via the EAP Provisioning Identifier
Registry which is defined in <xref target="registry"/>.  The username field MAY be
empty, or else hold a fixed value. While <xref target="RFC7542"/> recommends
omitting the username portion for user privacy, the names here are defined
in public specifications.  User privacy is therefore not needed for provisioning identifiers,
and the username field can be publicly visible.</t>
      </section>
      <section anchor="operation">
        <name>Operation</name>
        <t>Having defined the format and contents of NAIs in the eap.arpa realm,
we now describe how those NAIs are used by EAP supplicants and
EAP peers to signal provisioning information.</t>
        <section anchor="eap-peer">
          <name>EAP Peer</name>
          <t>An EAP peer signals that it wishes a certain kind of
provisioning by using a predefined NAI, along with an associated EAP
method.  The meaning of the NAI, and behavior of the supplicant are
defined by a separate specification.  That specification will
typically define both the NAI, and the EAP method or methods which are used for
provisioning.</t>
          <t>The NAI used by the peer MUST be taken from an entry in the "EAP
Provisioning Identifiers" registry, and the EAP method used with that
NAI MUST match the corresponding EAP method from that same entry.</t>
          <t>EAP peers MUST NOT allow these NAIs to be configured directly by
end users.  Instead the user (or some other process) chooses a
provisioning method, and the peer then chooses a predefined NAI
which matches that provisioning method.</t>
          <t>When all goes well, running EAP with the provisioning NAI results in
new authentication credentials being provisioned.  The peer then drops
its network connection, and re-authenticates using the newly
provisioned credentials.</t>
          <t>There are a number of ways in which provisioning can fail.  One way is
when the server does not implement the provisioning method.  EAP peers
therefore MUST track which provisioning methods have been tried, and
not repeat the same method to the same EAP server when receiving a
an EAP Nak.  EAP peers MUST rate limit attempts at provisioning, in order to
avoid overloading the server.</t>
          <t>Another way for the provisioning method to fail is when the new credentials do
not result in network access.  It is RECOMMENDED that peers
immediately try to gain network access using the new credentials, as
soon as they have been provisioned.  That process allows errors to be
quickly discovered and addressed.</t>
          <t>An EAP peer may have been provisioned with temporary credentials.
It SHOULD therefore attempt to provision new credentials before the
current set expires.  Unfortunately, any re-provisioning process with
EAP will involve the device dropping off from the "full" network, in
order to connect to the provisioning network.  It is therefore
RECOMMENDED that re-provisioning methods be provided which can be used
when the device has full network access.  See <xref target="specifications"/> for
additional discussion on this topic.</t>
        </section>
        <section anchor="eap-servers">
          <name>EAP Servers</name>
          <t>An EAP session begins with the server receiving an initial
EAP-Request/Identity message.  An EAP server supporting this
specification MUST examining the identity to see if it uses the
eap.arpa realm.  Identities in the eap.arpa realm are specific to
provision.  Processing of all other identities is unchanged by this specificatipon.</t>
          <t>If the server receives a malformed NAI in the eap.arpa domain, it MUST
reply with an EAP Failure, as per <xref section="4.2" sectionFormat="comma" target="RFC3748"/>.
Otherwise, the NAI is examined to determine which provisioning method
is being requested by the peer.</t>
          <t>Tf the server does not recognize the NAI requested by the peer, it
MUST reply with an EAP NAK of type zero (0).  This reply indicates
that the requested provisioning method is not available.  The server
also MUST reply with a NAK of type zero (0) as per <xref section="5.3.1" sectionFormat="comma" target="RFC3748"/>, wif the peer proposes an EAP method which is not supported by
the server, or is not recognized as being valid for that provisioning
method.  The peer can then take any remedial action which it
determines to be appropriate.</t>
          <t>Once the server accepts the provisioning method, it then replies with
an EAP method which MUST match the one proposed by the supplicant in
the NAI.  The EAP process then proceeds as per the EAP state machine
outlined in <xref target="RFC3748"/>.</t>
          <t>Implementations MUST treat peers using a provisioning NAI as
untrusted, and untrustworthy.  Once a peer is authenticated, it MUST
be placed into a limited network, such as a captive portal.  The
limited network MUST NOT permit general network access.
Implementations should be aware of methods which bypass simple
blocking, such as tunneling data over DNS.</t>
          <t>A secure provisioning network is one where only the expected traffic
is allowed, and all other traffic is blocked.  The alternative of
blocking only selected "bad" traffic results in substantial security
failures.  As most provisioning methods permit unauthenticated devices
to gain network access, these methods have a substantial potential for
abuse by malicious actors.  As a result, the limited network needs to
be designed assuming that it will be abused by malicious actoes.</t>
          <t>A limited network SHOULD also limit the duration of network access by
devices being provisioned.  The provisioning process should be fairly
quick, and in the order of seconds to tens of seconds in duration.
Provisioning times longer than this likely indicate an issue, and it
may be useful to block the problematic device from the network.</t>
          <t>A limited network SHOULD also limit the amount of data being
transferred by devices being provisioned, and SHOULD limit the network
services which are available to those devices.  The provisioning
process generally does not need to download large amounts of data, and
similarly does not need access to a large number of services.</t>
          <t>Servers SHOULD rate-limit provisioning attempts.  A misbehaving peer
can be blocked temporarily, or even permanently. Implementations
SHOULD limit the total number of peers being provisioned at the same
time.  We note that there is no requirement to allow all peers to
connect without limit.  Instead, poeers are provisioned at the
discretion of the network being accessed, which may permit or deny
those devices based on reasons which are not explained to those
devices.</t>
          <t>Implementations SHOULD use functionality such as the RADIUS Filter-Id
attribute (<xref section="5.11" sectionFormat="comma" target="RFC2865"/>) to set packet filters for the
peer being provisioned.  For ease of administration, the Filter-Id
name could simply be the provisioning NAI, or a similar name.  Such
consistency aids with operational considerations when managing complex
networks.</t>
        </section>
      </section>
      <section anchor="other-considerations">
        <name>Other Considerations</name>
        <t>Implementations MUST NOT permit EAP method negotiation with
provisioning credentials.  That is, when a provisioning NAI is used,
any EAP NAK sent by a server MUST contain only EAP type zero (0).
Similarly, when an EAP peer uses a provisioning NAI and receives an
EAP NAK, the contents MUST be ignored.</t>
        <t>While a server may support multiple provisioning methods, there is no
way in EAP to negotiate which provisioning method can be used.  It is
also expected that the provisioning methods will be specific to a
particular type of device.  That is, a device is likely to support
only one provisioning method.</t>
        <t>As a result, there is no need to require a method for negotiating
provisioning methods.</t>
      </section>
      <section anchor="specifications">
        <name>Considerations for Provisioning Specifications</name>
        <t>The operational considerations discussed above have a number of
impacts on specifications which define provisioning methods.</t>
        <section anchor="negotiation">
          <name>Negotiation</name>
          <t>Specifications which define provisioning for an EAP method SHOULD
provide a method-specific process by which implementations can
negotiate a mutually acceptable provisioning method.</t>
          <t>For the reasons noted above, however, we cannot make this suggestion
mandatory.  If it is not possible for a provisioning method to define
any negotiation, then that limitation should not be a barrier to
publishing the specification.</t>
        </section>
        <section anchor="renewal-of-credentials">
          <name>Renewal of Credentials</name>
          <t>Where a provisioning method is expected to create credentials which do
not expire, the specification SHOULD state this explicitly.</t>
          <t>Where credentials expire, it is RECOMMENDED that specifications
provide guidance on how the credentials are to be updated.  For
example, an EAP method could permit re-provisioning to be done as part
of a normal EAP authentication, using the currently provisioned
credentials.</t>
          <t>It is RECOMMENDED that the provisioning methods provide for a method
which can be used without affecting network access.  A specification
could define provisioning endpoints such as Enrollment over Secure
Transport (EST) <xref target="RFC7030"/>, or Automatic Certificate Management
Environment (ACME) <xref target="RFC8555"/>.  The provisioning endpoints could be
available both on the provisioning network, and on the provisioned
(i.e. normal) network.  Such an architecture means that devices can be
re-provisioned without losing network access.</t>
        </section>
      </section>
      <section anchor="notes-on-aaa-routability">
        <name>Notes on AAA Routability</name>
        <t>When we say that the eap.arpa domain is not routable in an AAA proxy
framework, we mean that the domain does not exist, and will never
resolve to anything for dynamic discovery as defined in
<xref target="RFC7585"/>.  In addition, administrators will not have statically
configured AAA proxy routes for this domain.</t>
        <t>In order to avoid spurious DNS lookups, RADIUS servers supporting
<xref target="RFC7585"/> SHOULD perform filtering in the domains which are sent to
DNS.  Specifically, names in the "eap.arpa" domain SHOULD NOT be
looked up in DNS.</t>
      </section>
    </section>
    <section anchor="overview">
      <name>Overview</name>
      <t>In this section, we provide background on the existing functionality,
and describe why it was necessary to define provisioning methods for
EAP.</t>
      <section anchor="review-of-existing-functionality">
        <name>Review of Existing Functionality</name>
        <t>For EAP-TLS, both <xref target="RFC5216"/> Section 2.1.1 and <xref target="RFC9190"/> provide
for "peer unauthenticated access".  However, those documents define no
way for a peer to signal that it is requesting such access.  The
presumption is that the peer connects with some value for the EAP
Identity, but without using a client certificate.  The EAP server is
then supposed to determine that the peer is requesting unauthenticated
access, and take the appropriate steps to limit authorization.</t>
        <t>There appears to be no EAP peer or server implementations which
support such access, since there is no defined way to perform any of
the steps required.  i.e. to signal that this access is desired, and
then limit access.</t>
        <t>Wi-Fi Alliance has defined an unauthenticated EAP-TLS method,
using a vendor-specific EAP type as part of HotSpot 2.0r2 <xref target="HOTSPOT"/>.
However, there appears to be few deployments of this specification.</t>
        <t>EAP-NOOB <xref target="RFC9140"/> takes this process a step further.  It defines both
a way to signal that provisioning is desired, and also a way to
exchange provisioning information within EAP-NOOB.  That is, there is
no need for the device to obtain limited network access, as all of the
provisioning is done inside of the EAP-NOOB protocol.</t>
        <t>Tunnel Extensible Authentication Protocol (TEAP) <xref target="RFC7170"/> provides for provisioning via an unauthenticated TLS
tunnel.  That document provides for a server unauthenticated
provisioning mode, but the inner TLS exchange requires that both end
authenticate each other.  There are ways to provision a certificate,
but the peer must still authenticate itself to the server with
pre-existing credentials.</t>
      </section>
      <section anchor="taxonomy-of-provisioning-types">
        <name>Taxonomy of Provisioning Types</name>
        <t>There are two scenarios where provisioning can be done.  The first is
where provisioning is done within the EAP type, as with EAP-NOOB
<xref target="RFC9140"/>.  The second is where EAP is used to obtain limited
network access (e.g. as with a captive portal).  That limited network
access is then used to run IP based provisioning
over more complex protocols.</t>
        <section anchor="rationale-for-provisioning-over-eap">
          <name>Rationale for Provisioning over EAP</name>
          <t>It is often useful to do all provisioning inside of EAP, because the EAP / AAA
admin does not have control over the network.  It is not always
possible to define a captive portal where provisioning can be done.
As a result, we need to be able to perform provisioning via EAP, and
not via some IP protocol.</t>
        </section>
      </section>
    </section>
    <section anchor="interaction-with-existing-eap-types">
      <name>Interaction with existing EAP types</name>
      <t>As the provisioning identifier is used within EAP, it necessarily has
interactions with, and effects on, the various EAP types.  This
section discusses those effects in more detail.</t>
      <t>Some EAP methods require shared credentials such as passwords in order
to succeed.  For example, both EAP-MSCHAPv2 (PEAP) and EAP-PWD
<xref target="RFC5931"/> perform cryptographic exchanges where both parties
knowing a shared password.  Where password-based methods are used, the
password MUST be the same as the provisioning identifier.</t>
      <t>This requirement also applies to TLS-based EAP methods such as EAP Tunneled Transport Layer Security (EAP-TTLS)
and Protected Extensible Authentication Protocol (PEAP).  Where the TLS-based EAP method provides for an inner
identity and inner authentication method, the credentials used there
MUST be the provisioning identifier for both the inner identity, and
any inner password.</t>
      <t>It is RECOMMENDED that provisioning be done via a TLS-based EAP methods.
TLS provides for authentication of the EAP server, along with security
and confidentiality of any provisioning data exchanged in the tunnel.
Similarly, if provisioning is done in a captive portal outside of EAP,
EAP-TLS permits the EAP peer to run a full EAP authentication session
while having nothing more than a few certificate authorities (CAs)
locally configured.</t>
      <section anchor="eap-tls">
        <name>EAP-TLS</name>
        <t>This document defines an identifier "portal@tls.eap.arpa", which is
the first step towards enabling unauthenticated client provisioning
in EAP-TLS.  The purpose of the identifier is to allow EAP peers to
signal EAP servers that they wish to obtain a "captive portal" style
network access.</t>
        <t>This identifier signals the EAP server that the peer wishes to obtain
"peer unauthenticated access" as per <xref section="2.1.1" sectionFormat="comma" target="RFC5216"/> and
<xref target="RFC9190"/>.</t>
        <t>An EAP server which agrees to authenticate this request MUST ensure
that the device is placed into a captive portal with limited network
access.  Implementations SHOULD limit both the total amount of data
transferred by devices in the captive portal, and SHOULD also limit the
total amount of time a device spends within the captive portal.</t>
        <t>Further details of the captive portal architecture can be found in
<xref target="RFC8952"/>.</t>
        <t>The remaining question is how the EAP peer verifies the identity of
the EAP server.  The device SHOULD ignore the EAP server certificate
entirely, as the server's identity does not matter.  Any verification
of systems can be done by the device after it obtains network access,
such as HTTPS.</t>
        <t>However, since the device likely is configured with web CAs
(otherwise, the captive portal would also be unauthenticated),
provisioning methods could use those CAs within an EAP method in order
to allow the peer to authenticate the EAP server.</t>
        <t>It is also possible to use TLS-PSK with EAP-TLS for this provisioning.
In which case, the Pre-Shared Key (PSK) identity MUST the same as the EAP Identifier,
and the PSK MUST be the provisioning identifier.</t>
      </section>
      <section anchor="tls-based-eap-methods">
        <name>TLS-based EAP methods</name>
        <t>Other TLS-based EAP methods such as TTLS and PEAP can use the same
method as defined for EAP-TLS above.  The only difference is that the
inner identity and password is also the provisioning identifier.</t>
        <t>It is RECOMMENDED that provisioning methods use EAP-TLS in preference
to any other TLS-based EAP methods.  As the credentials for other
methods are predefined and known in advance, those methods offer little
benefit over EAP-TLS.</t>
      </section>
      <section anchor="eap-noob">
        <name>EAP-NOOB</name>
        <t>It is RECOMMENDED that server implementations of Nimble out-of-band authentication for EAP (EAP-NOOB) accept both
identities "noob@eap-noob.arpa" and "@noob.eap.arpa" as synonyms.</t>
        <t>It is RECOMMENDED that EAP-NOOB peers use "@noob.eap.arpa" first, and
if that does not succeed, use "noob@eap-noob.arpa"</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>Three IANA actions are required.  The first two are registry updates
for "eap.arpa".  The second is the creation of a new registry.</t>
      <section anchor="arpa-updates">
        <name>.arpa updates</name>
        <t>IANA is instructed to update the ".ARPA Zone Management" registry with
the following entry:</t>
        <t>DOMAIN</t>
        <ul empty="true">
          <li>
            <t>eap.arpa</t>
          </li>
        </ul>
        <t>USAGE</t>
        <ul empty="true">
          <li>
            <t>For provisioning within the Extensible Authentication Protocol framework.</t>
          </li>
        </ul>
        <t>REFERENCE</t>
        <ul empty="true">
          <li>
            <t>THIS-DOCUMENT</t>
          </li>
        </ul>
        <t>IANA is instructed to update the "Special-Use Domain Names" registry as follows:</t>
        <t>NAME</t>
        <ul empty="true">
          <li>
            <t>eap.arpa</t>
          </li>
        </ul>
        <t>REFERENCE</t>
        <ul empty="true">
          <li>
            <t>THIS-DOCUMENT</t>
          </li>
        </ul>
        <section anchor="domain-name-reservation-considerations">
          <name>Domain Name Reservation Considerations</name>
          <t>This section answers the questions which are required by Section 5 of <xref target="RFC6761"/>.  At a high level, these new domain names are used in certain situations in EAP.  The domain names are never seen by users, and they do not appear in any networking protocol other than EAP.</t>
          <ol spacing="normal" type="1"><li>
              <t>Users:<br/>
User are not expected to recognize these names as special or use them differently from other domain names.  The use of these names in EAP is invisible to end users.</t>
            </li>
            <li>
              <t>Application Software:<br/>
EAP servers and clients are expected to make their software recognize these names as special and treat them differently.  This document discusses that behavior.<br/>
EAP supplicants should recognize these names as special, and should refuse to allow users to enter them in any interface.<br/>
EAP servers and RADIUS servers should recognize the "eap.arpa" domain as special, and refuse to do dynamic discovery (<xref target="RFC7585"/>) for it.</t>
            </li>
            <li>
              <t>Name Resolution APIs and Libraries:<br/>
Writers of these APIs and libraries are not expected to recognize these names or treat them differently.</t>
            </li>
            <li>
              <t>Caching DNS Servers:<br/>
Writers of caching DNS servers are not expected to recognize these names or treat them differently.</t>
            </li>
            <li>
              <t>Authoritative DNS Servers:<br/>
Writers of authoritative DNS servers are not expected to recognize these names or treat them differently.</t>
            </li>
            <li>
              <t>DNS Server Operators:<br/>
These domain names have minimal impact on DNS server operators.  They should never be used in DNS, or in any networking protocol outside of EAP.<br/>
Some DNS servers may receive lookups for this domain, if EAP or RADIUS servers are configured to do dynamic discovery for realms as defined in <xref target="RFC7585"/>, and where those servers are not updated to ignore the ".arpa" domain.  When queried for the "eap.arpa" domain, DNS servers SHOULD return an NXDOMAIN error.<br/>
If they try to configure their authoritative DNS as authoritative for this reserved name, compliant name servers do not need to do anything special.  They can accept the domain or reject it.  Either behavior will have no impact on this specification.</t>
            </li>
            <li>
              <t>DNS Registries/Registrars:<br/>
DNS Registries/Registrars should deny requests to register this reserved domain name.</t>
            </li>
          </ol>
        </section>
      </section>
      <section anchor="registry">
        <name>EAP Provisioning Identifiers Registry</name>
        <t>IANA is instructed to add the following new registry to the "Extensible Authentication Protocol (EAP) Registry" group.</t>
        <t>Assignments in this registry are done via "Expert Review" as described in <xref target="RFC8126"/> Section 4.5.  Guidelines for experts is provided in <xref target="guidelines"/>.</t>
        <t>The contents of the registry are as follows.</t>
        <t>Title</t>
        <ul empty="true">
          <li>
            <t>EAP Provisioning Identifiers</t>
          </li>
        </ul>
        <t>Registration Procedure(s)</t>
        <ul empty="true">
          <li>
            <t>Expert review</t>
          </li>
        </ul>
        <t>Reference</t>
        <ul empty="true">
          <li>
            <t>THIS-DOCUMENT</t>
          </li>
        </ul>
        <t>Registry</t>
        <ul empty="true">
          <li>
            <t>NAI</t>
            <ul empty="true">
              <li>
                <t>The Network Access Identifier in <xref target="RFC7542"/> format.  Names are stored as DNS A-Labels <xref section="2.3.2.1" sectionFormat="comma" target="RFC5890"/>, and are compared via the domain name comparison rules defined in <xref target="STD13"/>.</t>
              </li>
            </ul>
            <t>Method Type</t>
            <ul empty="true">
              <li>
                <t>The EAP method name, taken from the "Description" field of the EAP "Method Types" registry.</t>
              </li>
            </ul>
            <t>Reference</t>
            <ul empty="true">
              <li>
                <t>Reference where this identifier was defined.</t>
              </li>
            </ul>
          </li>
        </ul>
        <section anchor="initial-values">
          <name>Initial Values</name>
          <t>The following table gives the initial values for this table.</t>
          <t>NAI,Method-Type,Description,Reference</t>
          <t>@noob.eap.arpa,EAP-NOOB,<xref target="RFC9140"/> and THIS-DOCUMENT
portal@tls.eap.arpa,EAP-TLS,<xref target="RFC9190"/> and THIS-DOCUMENT</t>
        </section>
      </section>
      <section anchor="guidelines">
        <name>Guidelines for Designated Experts</name>
        <t>The following text gives guidelines for Designated Experts who review
allocation requests for this registry.</t>
        <section anchor="nais">
          <name>NAIs</name>
          <t>The intent is for the NAI to contain both a reference to the EAP
Method Type, and a description of the purpose of the NAI.  For
example, with an EAP Method Type "name", and a purpose "action", the
NAI SHOULD be of the form "action@foo.eap.arpa".</t>
          <t>The NAI MUST satisfy the requirements of the <xref section="2.2" sectionFormat="comma" target="RFC7542"/>
format.  The utf8-username portion MAY be empty.  The utf8-username
portion MUST NOT be "anonymous".  The NAI MUST end with "eap.arpa".</t>
          <t>NAIs in the registry SHOULD NOT contain more than one subdomain.  NAIs
with a leading "v." subdomain MUST NOT be registered.  That subdomain
is reserved for vendor and SDO extensions.</t>
          <t>The subdomain of the NAI field should correspond to the EAP Method
Type name.  Care should be taken so that the domain name conventions
specified in <xref target="RFC1034"/> are followed.</t>
          <t>The NAIs in this registry are case-insensitive.  While <xref target="RFC7542"/>
notes that similar identifiers of different case can be considered to
be different, for simplicity this registry requires that all entries
MUST be lowercase.</t>
          <t>Identifiers MUST be unique when compared in a case-insensitive
fashion.  While <xref target="RFC7542"/> notes that similar identifiers of
different case can be considered to be different, this registry is
made simpler by requiring case-insensitivity.</t>
          <t>Entries in the registry should be short.  NAIs defined here will
generally be sent in a RADIUS packet in the User-Name attribute
(<xref target="RFC2865"/> Section 5.1).  That specification recommends that
implementations should support User-Names of at least 63 octets.  NAI
length considerations are further discussed in <xref target="RFC7542"/> Section
2.3, and any allocations in this registry needs to take those
limitations into consideration.</t>
          <t>Implementations are likely to support a total NAI length of 63 octets.
Lengths between 63 and 253 octets may work.  Lengths of 254 octets or
more will not work with RADIUS <xref target="RFC2865"/>.</t>
        </section>
      </section>
      <section anchor="method-type">
        <name>Method Type</name>
        <t>Values in "Method Type" field of this registry MUST be taken from the
IANA EAP Method Types registry or else it MUST be an Expanded Type
which usually indicates a vendor specific EAP method.</t>
        <t>The EAP Method Type MUST provide an MSK and EMSK as defined in
<xref target="RFC3748"/>.  Failure to provide these keys means that the method will
not be usable within an authentication framework which requires those
methods, such as with IEEE 802.1X.</t>
      </section>
      <section anchor="designated-experts">
        <name>Designated Experts</name>
        <t>For registration requests where a Designated Expert should be
consulted, the responsible IESG area director should appoint the
Designated Expert.</t>
        <t>The Designated Expert will post a request to the EMU WG mailing list
(or a successor designated by the Area Director) for comment and
review, including an Internet-Draft or reference to external
specification.  Before a period of 30 days has passed, the Designated
Expert will either approve or deny the registration request and
publish a notice of the decision to the EAP WG mailing list or its
successor, as well as informing IANA.  A denial notice must be
justified by an explanation, and in the cases where it is possible,
concrete suggestions on how the request can be modified so as to
become acceptable should be provided.</t>
      </section>
      <section anchor="organization-self-assignment">
        <name>Organization Self Assignment</name>
        <t>This registry allows organizations to request allocations from this
registry, but explicit allocations are not always required.  Any NAI
defined in this registry also implicitly defines a subdomain "v.".
Organizations can self-allocate in this space, under the "v."
subdomain, e.g. "local@example.com.v.tls.eap.arpa".</t>
        <t>An organization which has registed a Fully Qualified Domain Name
(FQDN) within the DNS can use that name within the "v." subdomain.</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>The EAP Identity field is generally publicly visible to parties who
can observe the EAP traffic.  As the names given here are in a public
specification, there is no privacy implication to exposing those names
within EAP.  The entire goal of this specification is in fact to make
those names public, so that unknown (and private) parties can publicly
(and anonymously) declare what kind of network access they desire.</t>
      <t>However, there are many additional privacy concerns around this
specification.  Most EAP traffic is sent over RADIUS <xref target="RFC2865"/>.  The
RADIUS Access-Request packets typically contain large amounts of
information such as MAC addresses, device location, etc.</t>
      <t>This specification does not change RADIUS or EAP, and as such does not
change which information is publicly available, or is kept private.
Those issues are dealt with in other specifications, such as
<xref target="I-D.ietf-radext-deprecating-radius"/>.</t>
      <t>However, this specification can increase privacy by allowing devices
to anonymously obtain network access, and then securely obtain
credentials.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This specification defines a framework which permits unknown,
anonymous, and unauthenticated devices to request and to obtain
network access.  As such, it is critical that network operators
provide limited access to those devices.</t>
      <t>Future specifications which define an NAI within this registry, should
give detailed descriptions of what kind of network access is to be
provided.</t>
      <section anchor="on-path-attackers-and-impersonation">
        <name>On-Path Attackers and Impersonation</name>
        <t>In most EAP use-cases, the server identity is validated (usually
through a certificate), or the EAP method allows the TLS tunnel to be
cryptographically bound to the inner application data.  For the
methods outlined here, the use of public credentials, and/or skipping
server validation allows "on-path" attacks to succeed where they would
normally fail</t>
        <t>EAP peers and servers MUST assume that all data sent over an EAP
session is visible to attackers, and can be modified by them.</t>
        <t>The methods defined here MUST only be used to bootstrap initial
network access.  Once a device has been provisioned, it gains network
access via the provisioned credentials, and any network access
policies can be applied.</t>
      </section>
      <section anchor="provisioning-is-unauthenticated">
        <name>Provisioning is Unauthenticated</name>
        <t>We note that this specification allows for unauthenticated supplicants
to obtain network access, however limited.  As with any
unauthenticated process, it can be abused.  Implementations should
take care to limit the use of the provisioning network.</t>
        <t>Section <xref target="eap-servers"/> describes a number of methods which can be
used to secure the provisioning network.  In summary:</t>
        <ul spacing="normal">
          <li>
            <t>allow only traffic which is needed for the current provisioning
method.  All other traffic should be blocked.  Most notable, DNS has
been used to exfiltrate network traffic, so DNS recursors SHOULD NOT
be made available on the provisioning network.</t>
          </li>
          <li>
            <t>limit the services available on the provisioning network to only
those services which are needed for provisioning.</t>
          </li>
          <li>
            <t>limit the number of devices which can access the provisioning
network at the same time.</t>
          </li>
          <li>
            <t>for any one device, rate limit its' access the provisioning network.</t>
          </li>
          <li>
            <t>for a device which has accessed the provisioning network, limit the
total amount of time which it is allowed to remain on the network</t>
          </li>
          <li>
            <t>for a device which has accessed the provisioning network, limit the
total amount of data which it is allowed to transfer through the network.</t>
          </li>
        </ul>
      </section>
      <section anchor="privacy-considerations-1">
        <name>Privacy Considerations</name>
        <t>The NAIs used here are contained in a public registry, and therefore
do not have to follow the username privacy recommendations of
<xref section="2.4" sectionFormat="comma" target="RFC7542"/>.  However, there may be other personally
identifying information contained in EAP or AAA packets.  This
situation is no different from normal EAP authentication, and thus
has no additional positive or negative implications for privacy.</t>
      </section>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Mohit Sethi provided valuable insight that using subdomains was better
and more informative than the original method, which used only the
utf8-username portion of the NAI.</t>
    </section>
    <section anchor="changelog">
      <name>Changelog</name>
      <ul spacing="normal">
        <li>
          <t>00 - initial version</t>
        </li>
      </ul>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC3748">
          <front>
            <title>Extensible Authentication Protocol (EAP)</title>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="L. Blunk" initials="L." surname="Blunk"/>
            <author fullname="J. Vollbrecht" initials="J." surname="Vollbrecht"/>
            <author fullname="J. Carlson" initials="J." surname="Carlson"/>
            <author fullname="H. Levkowetz" initials="H." role="editor" surname="Levkowetz"/>
            <date month="June" year="2004"/>
            <abstract>
              <t>This document defines the Extensible Authentication Protocol (EAP), an authentication framework which supports multiple authentication methods. EAP typically runs directly over data link layers such as Point-to-Point Protocol (PPP) or IEEE 802, without requiring IP. EAP provides its own support for duplicate elimination and retransmission, but is reliant on lower layer ordering guarantees. Fragmentation is not supported within EAP itself; however, individual EAP methods may support this. This document obsoletes RFC 2284. A summary of the changes between this document and RFC 2284 is available in Appendix A. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3748"/>
          <seriesInfo name="DOI" value="10.17487/RFC3748"/>
        </reference>
        <reference anchor="RFC5216">
          <front>
            <title>The EAP-TLS Authentication Protocol</title>
            <author fullname="D. Simon" initials="D." surname="Simon"/>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="R. Hurst" initials="R." surname="Hurst"/>
            <date month="March" year="2008"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides support for multiple authentication methods. Transport Layer Security (TLS) provides for mutual authentication, integrity-protected ciphersuite negotiation, and key exchange between two endpoints. This document defines EAP-TLS, which includes support for certificate-based mutual authentication and key derivation.</t>
              <t>This document obsoletes RFC 2716. A summary of the changes between this document and RFC 2716 is available in Appendix A. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5216"/>
          <seriesInfo name="DOI" value="10.17487/RFC5216"/>
        </reference>
        <reference anchor="RFC7542">
          <front>
            <title>The Network Access Identifier</title>
            <author fullname="A. DeKok" initials="A." surname="DeKok"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>In order to provide inter-domain authentication services, it is necessary to have a standardized method that domains can use to identify each other's users. This document defines the syntax for the Network Access Identifier (NAI), the user identifier submitted by the client prior to accessing resources. This document is a revised version of RFC 4282. It addresses issues with international character sets and makes a number of other corrections to RFC 4282.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7542"/>
          <seriesInfo name="DOI" value="10.17487/RFC7542"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC9140">
          <front>
            <title>Nimble Out-of-Band Authentication for EAP (EAP-NOOB)</title>
            <author fullname="T. Aura" initials="T." surname="Aura"/>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <author fullname="A. Peltonen" initials="A." surname="Peltonen"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP) provides support for multiple authentication methods. This document defines the EAP-NOOB authentication method for nimble out-of-band (OOB) authentication and key derivation. The EAP method is intended for bootstrapping all kinds of Internet-of-Things (IoT) devices that have no preconfigured authentication credentials. The method makes use of a user-assisted, one-directional, out-of-band (OOB) message between the peer device and authentication server to authenticate the in-band key exchange. The device must have a nonnetwork input or output interface, such as a display, microphone, speaker, or blinking light, that can send or receive dynamically generated messages of tens of bytes in length.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9140"/>
          <seriesInfo name="DOI" value="10.17487/RFC9140"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <referencegroup anchor="STD13" target="https://www.rfc-editor.org/info/std13">
          <reference anchor="RFC1034" target="https://www.rfc-editor.org/info/rfc1034">
            <front>
              <title>Domain names - concepts and facilities</title>
              <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
              <date month="November" year="1987"/>
              <abstract>
                <t>This RFC is the revised basic definition of The Domain Name System. It obsoletes RFC-882. This memo describes the domain style names and their used for host address look up and electronic mail forwarding. It discusses the clients and servers in the domain name system and the protocol used between them.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="13"/>
            <seriesInfo name="RFC" value="1034"/>
            <seriesInfo name="DOI" value="10.17487/RFC1034"/>
          </reference>
          <reference anchor="RFC1035" target="https://www.rfc-editor.org/info/rfc1035">
            <front>
              <title>Domain names - implementation and specification</title>
              <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
              <date month="November" year="1987"/>
              <abstract>
                <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="13"/>
            <seriesInfo name="RFC" value="1035"/>
            <seriesInfo name="DOI" value="10.17487/RFC1035"/>
          </reference>
        </referencegroup>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="HOTSPOT" target="https://www.wi-fi.org/discover-wi-fi/passpoint">
          <front>
            <title>Passpoint</title>
            <author initials="W.-F." surname="Alliance" fullname="Wi-Fi Alliance">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC2865">
          <front>
            <title>Remote Authentication Dial In User Service (RADIUS)</title>
            <author fullname="C. Rigney" initials="C." surname="Rigney"/>
            <author fullname="S. Willens" initials="S." surname="Willens"/>
            <author fullname="A. Rubens" initials="A." surname="Rubens"/>
            <author fullname="W. Simpson" initials="W." surname="Simpson"/>
            <date month="June" year="2000"/>
            <abstract>
              <t>This document describes a protocol for carrying authentication, authorization, and configuration information between a Network Access Server which desires to authenticate its links and a shared Authentication Server. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2865"/>
          <seriesInfo name="DOI" value="10.17487/RFC2865"/>
        </reference>
        <reference anchor="RFC7170">
          <front>
            <title>Tunnel Extensible Authentication Protocol (TEAP) Version 1</title>
            <author fullname="H. Zhou" initials="H." surname="Zhou"/>
            <author fullname="N. Cam-Winget" initials="N." surname="Cam-Winget"/>
            <author fullname="J. Salowey" initials="J." surname="Salowey"/>
            <author fullname="S. Hanna" initials="S." surname="Hanna"/>
            <date month="May" year="2014"/>
            <abstract>
              <t>This document defines the Tunnel Extensible Authentication Protocol (TEAP) version 1. TEAP is a tunnel-based EAP method that enables secure communication between a peer and a server by using the Transport Layer Security (TLS) protocol to establish a mutually authenticated tunnel. Within the tunnel, TLV objects are used to convey authentication-related data between the EAP peer and the EAP server.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7170"/>
          <seriesInfo name="DOI" value="10.17487/RFC7170"/>
        </reference>
        <reference anchor="RFC8952">
          <front>
            <title>Captive Portal Architecture</title>
            <author fullname="K. Larose" initials="K." surname="Larose"/>
            <author fullname="D. Dolson" initials="D." surname="Dolson"/>
            <author fullname="H. Liu" initials="H." surname="Liu"/>
            <date month="November" year="2020"/>
            <abstract>
              <t>This document describes a captive portal architecture. Network provisioning protocols such as DHCP or Router Advertisements (RAs), an optional signaling protocol, and an HTTP API are used to provide the solution.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8952"/>
          <seriesInfo name="DOI" value="10.17487/RFC8952"/>
        </reference>
        <reference anchor="RFC9190">
          <front>
            <title>EAP-TLS 1.3: Using the Extensible Authentication Protocol with TLS 1.3</title>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods. This document specifies the use of EAP-TLS with TLS 1.3 while remaining backwards compatible with existing implementations of EAP-TLS. TLS 1.3 provides significantly improved security and privacy, and reduced latency when compared to earlier versions of TLS. EAP-TLS with TLS 1.3 (EAP-TLS 1.3) further improves security and privacy by always providing forward secrecy, never disclosing the peer identity, and by mandating use of revocation checking when compared to EAP-TLS with earlier versions of TLS. This document also provides guidance on authentication, authorization, and resumption for EAP-TLS in general (regardless of the underlying TLS version used). This document updates RFC 5216.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9190"/>
          <seriesInfo name="DOI" value="10.17487/RFC9190"/>
        </reference>
        <reference anchor="RFC7585">
          <front>
            <title>Dynamic Peer Discovery for RADIUS/TLS and RADIUS/DTLS Based on the Network Access Identifier (NAI)</title>
            <author fullname="S. Winter" initials="S." surname="Winter"/>
            <author fullname="M. McCauley" initials="M." surname="McCauley"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This document specifies a means to find authoritative RADIUS servers for a given realm. It is used in conjunction with either RADIUS over Transport Layer Security (RADIUS/TLS) or RADIUS over Datagram Transport Layer Security (RADIUS/DTLS).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7585"/>
          <seriesInfo name="DOI" value="10.17487/RFC7585"/>
        </reference>
        <reference anchor="RFC7030">
          <front>
            <title>Enrollment over Secure Transport</title>
            <author fullname="M. Pritikin" initials="M." role="editor" surname="Pritikin"/>
            <author fullname="P. Yee" initials="P." role="editor" surname="Yee"/>
            <author fullname="D. Harkins" initials="D." role="editor" surname="Harkins"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport. This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates. It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7030"/>
          <seriesInfo name="DOI" value="10.17487/RFC7030"/>
        </reference>
        <reference anchor="RFC8555">
          <front>
            <title>Automatic Certificate Management Environment (ACME)</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman-Andrews"/>
            <author fullname="D. McCarney" initials="D." surname="McCarney"/>
            <author fullname="J. Kasten" initials="J." surname="Kasten"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names. Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate. As of this writing, this verification is done through a collection of ad hoc mechanisms. This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance. The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8555"/>
          <seriesInfo name="DOI" value="10.17487/RFC8555"/>
        </reference>
        <reference anchor="RFC5931">
          <front>
            <title>Extensible Authentication Protocol (EAP) Authentication Using Only a Password</title>
            <author fullname="D. Harkins" initials="D." surname="Harkins"/>
            <author fullname="G. Zorn" initials="G." surname="Zorn"/>
            <date month="August" year="2010"/>
            <abstract>
              <t>This memo describes an Extensible Authentication Protocol (EAP) method, EAP-pwd, which uses a shared password for authentication. The password may be a low-entropy one and may be drawn from some set of possible passwords, like a dictionary, which is available to an attacker. The underlying key exchange is resistant to active attack, passive attack, and dictionary attack. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5931"/>
          <seriesInfo name="DOI" value="10.17487/RFC5931"/>
        </reference>
        <reference anchor="RFC6761">
          <front>
            <title>Special-Use Domain Names</title>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <author fullname="M. Krochmal" initials="M." surname="Krochmal"/>
            <date month="February" year="2013"/>
            <abstract>
              <t>This document describes what it means to say that a Domain Name (DNS name) is reserved for special use, when reserving such a name is appropriate, and the procedure for doing so. It establishes an IANA registry for such domain names, and seeds it with entries for some of the already established special domain names.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6761"/>
          <seriesInfo name="DOI" value="10.17487/RFC6761"/>
        </reference>
        <reference anchor="RFC5890">
          <front>
            <title>Internationalized Domain Names for Applications (IDNA): Definitions and Document Framework</title>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <date month="August" year="2010"/>
            <abstract>
              <t>This document is one of a collection that, together, describe the protocol and usage context for a revision of Internationalized Domain Names for Applications (IDNA), superseding the earlier version. It describes the document collection and provides definitions and other material that are common to the set. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5890"/>
          <seriesInfo name="DOI" value="10.17487/RFC5890"/>
        </reference>
        <reference anchor="I-D.ietf-radext-deprecating-radius">
          <front>
            <title>Deprecating Insecure Practices in RADIUS</title>
            <author fullname="Alan DeKok" initials="A." surname="DeKok">
              <organization>InkBridge Networks</organization>
            </author>
            <date day="26" month="November" year="2024"/>
            <abstract>
              <t>   RADIUS crypto-agility was first mandated as future work by RFC 6421.
   The outcome of that work was the publication of RADIUS over TLS (RFC
   6614) and RADIUS over DTLS (RFC 7360) as experimental documents.
   Those transport protocols have been in wide-spread use for many years
   in a wide range of networks.  They have proven their utility as
   replacements for the previous UDP (RFC 2865) and TCP (RFC 6613)
   transports.  With that knowledge, the continued use of insecure
   transports for RADIUS has serious and negative implications for
   privacy and security.

   The recent publication of the "BlastRADIUS" exploit has also shown
   that RADIUS security needs to be updated.  It is no longer acceptable
   for RADIUS to rely on MD5 for security.  It is no longer acceptable
   to send device or location information in clear text across the wider
   Internet.  This document therefore deprecates many insecure practices
   in RADIUS, and mandates support for secure TLS-based transport
   layers.  We also discuss related security issues with RADIUS, and
   give recommendations for practices which increase both security and
   privacy.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-radext-deprecating-radius-05"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAKuNmmcAA7V963IbV5Lm//MUNfCPITcAWJItXxQbbtMS1Wa0JbFFety7
OxsbBeCArFGhCl1VII12+F32WebJJr+8nEsBkDWxs/5jiqw6lzx5Mr+81mw2
c0M11P5FcXvvC19u52W3LYtVuymrpiibVXF5cV1su/ah6qu2qZo7Vy4WnX94
ER52q3bZlBsaYtWV62FW+WE985vdjB6Y4YHZk6/cbrsqB9+/KL59+uUT5/qB
hv4/Zd029NrQ7byrth3/1A/Pnjz59skzV3a+fFFcNYPvGj+4x7sXxeWbn4tf
2u4DraL4c9futu7DY3xk9grTu2U5vCj6YeX63WJT9Vj17X5L01xd3r52blu9
KOi/z4pl2RS73hdl15X74qxaF2VdF3vfnxdtV9yX/X1x7zvvimJoly/wB/qx
b7uh8+v+BQ+x8utyVw89PWF/32/kz/inK3fDfdu9cG5WVA398mJevPJ/aT/Q
g0Kwi5oWYb9quzts5sMPXbW688VbPzzSXjGqp8OoX9D6iGjfV82HBT/R6APz
Zbtxrmm7TTlUD/4FvfD+9ctvnn79pf74xddffqM/Pn/29Cv98evnXz4Lzz6z
3+J4aMFVs07H+/Hd7c31u1v8SP8pw0yuy77ftlUzTOT3tt1C/pMt/lLNXle0
0boqm6WXv8nY4cHbv92+KO6HYdu/+Pzzx8fH+WM1W1dzosfnq6pftg++m/Gv
Pt/ajLLYZ9989dx28/TrJ7abb58/C7v5Frt58M2O93EHpmE+on8IUYlRh+/B
spgPj1TD/W7xolh33nflqtr1nxsfz+lvdJazWVEu+qErl/Sv2/uqp9uy3G18
M4AhqsYTPxy7S31RFo/EarT74vLXwTd9tah9cUFUo3cr4lti1eK6a4nf2ro4
o4t3XmxpFeAv11d3TVmD03Ahe9898B/uywGz7YvHihiW/touBsxWV5tq8Ksp
rrDbNWWcBL9U1inK5dL3/byQS85T6TyP99XyvqCbtiratT5X0FY7//dd1flV
8VCVxdJ3PNm28zPZ+qqoVphnXWEsGQSXDARRhi4uZLCr8GBx9vbi6ly5AtPR
yRVgT1rYRTGUoFK7dunIEEwbX0Ie8bJ09qlOWTXLereig6A3uor+D5pjVLD3
XM5wU61WtXfuMwiQrl3tlqC/c1dNsWn7Acvup0yY337TS/T777b/SPlAOhIZ
D96BFEFaEjmWRCssu6xB5l+IudrdkP52yoOs/EO19JBJTTs4PcP8lGhTJCJW
NBGd8sIX6SyPNG42lfAlM4GwFf0R8pdYcNG2A7h3u4UYpVGIvJu5cnK/9Usi
sfJiuVrRVnvbrT1bFFdDMuC6o4vOC13sndB/WVe0kp5lLIthvOyNRVJtkq4a
GyuVtdPdupynD7n3Qk6ip3WQcNr4abgfWMCHpn2k4Vy5eoAICidHbJlOTvpG
KUsnT1zf1HJV09VOHRiPB9g1RBpiruXhioqeDrmm37YDhrvrStJQKyZxetKF
p1OjDdr9ACMt74kDfF1UQ+/r9eH8JEUcH/ZtYExIvt9/n0Jp2ShKQsxxRxI8
5TBdIRG1DPRcllsI+mJLyo2ufr+jEyRpxfPwFJCov/9OhH4n9AujVb1L2HBK
yw5qlRi9z5l0dNJ6qOtdXbvRiQqlUqmSvstKu4D+I+qrvBn2Kj7m7ioREzT+
IGxdYu90wvoaqfo93eW17yDLwHd9MSHSueuUN5OhJiSPr6/OiQZY2vK+xfZJ
VE3SF7K5WcxfXNOL11eX5yT5iRtbkvnE0zQl+Kjz/+aXwhk3lVE27IeWHe8M
S4kOBKdTG0j9EmM19KcBa+dnMH1KMahKoumKxQ6/2++2OGH622LPU+0aWku9
x07BNRtPZ7aauuFQEPAxrlSO2sizGpwULqFMEqYFfgvaQoSc/S0R2Hrjwu0t
+4wIc4jnW99tqqat27u9MMYHqDvMUUze/HxzO5nK/4u37/jn95d//fnq/eUr
/Hzz48VPP4UfnD5x8+O7n396FX+Kb7589+bN5dtX8jL9tsh+5SZvLv7HhHVq
MXl3fXv17u3FT5PAZQEGRFFSAZvSsYDqdHWJhMuuWkBNNsUPL6///f8+/ZKu
2D8Byzx9+i3pF/kHwBv945F0tszG0kj+CW3vSHr7koUkQCtdYJLz0CUlC5/H
hqHr3P33P9VE5WL21Z++cyDly5bYbDsQNL2wKywCm+AuiSv93cwOP7t2AS8n
bJnoZKzlEzW8iC3S7yxT6EQd/RVMQUB227LwXRc0EgskYj/Vkbth/c2MVtAB
WApZwq9JGdUbJ0iLxnxNbNpXm21dLXGVQAyCBl5uPI5GxL9y28QGnTBamvBg
k4IWXq9MGPHveI2Qa0043pXf+gb7pDXLmnYN64/FHv/cF/7Xqh9wOQleEl75
B18oW/2uDyqHUQ5dTJxn+mivIscW4EiW6qHlaoYgXgvELrKNbuyvlVx1WoXL
QeaUQWfbZauhQ2t3DZZanF1cXJzzEPtEuzP/Kshr4iFOixvP0Kn4ws4zUosY
hyR9WPFjBWFP66Ubsesa+l/P9hPEym+//YlH/OY5cf5qT+dBDGj4f38coKxa
D74dpgUxvafnphhqUZFsJZiFrRAnkez/4GUSxwtTvUAHbxh9UgTWuWr6wZei
y2pPkK4XhWgDktFJR0YHX5FE3JXjw3LuF48VBZhxsGb6BXTenrmdfoVzZ1WL
kw/cAoEMBvYQKKXeAqIlrQoDkOky68u1F7nLCJy4cjAoWDIidbAJsGZasKjk
8WKmYcLxZHJUekxYzGuactfpvcMfme9aqCWaxhOc7hceEBgy+7PcmyC38yO2
0sFB4GouPNMblwlHl6FG7LLihbGNQHe9qkke6suQZkSRh6rd9UTohfcsulZO
dfLs7bt3PwgHwyAAeoL+h53XtO1CVsKsnC7Yw2YjxcYHuxRJKuRgb0bZrap/
6H62MA5JkoJ3OuIc4haQeJg6qKDLF7LpbMMs/mCI1HXU0FcXP2B/dd0q85AZ
lNAqGCPlHVmrvMh1127Cq+Ek5D6yQBNxRqDc5j24CvHy9jAG1dYzbHkC7xTv
/R1xUrc3CyyqeJrhf/3vs886fYAwVLYCx7p7TfsmmM7YUhYGgQySPGAKcKRy
biJ+nj75gtQkbfOKb0Wiq6N5tq46MubifoHZ4l4T7O0E/xSqXbL1C0HfXnyC
3e7EbjdyTDH1zPZOQEUmgUeqB4v9aHKLFxyeg2BjQfn/QBeVF65iEUnKtJeF
kzTYlB+gyCckmWdDO6P/Teh3YhEuSInjwmDKZLWO5zWlG+gJgSfIlI/gxEQr
4tLlcHQKUD6ZRrZ35ud382Jyy/h5rZbN7Q6mkV8lYPVc7l+ZcJO+OuCMwzmf
C4LgsVmg6JkKqweqKxpceGcCxTft7o79KmU4B5JxXXnHL6s1zkCahYBy/3hT
VSrNiGQXq1WFw2NrS1cuFugWYHcYRks0v4b8taCjX7XiBXE3Knv64hUxUt1u
WQxkSqk4u3n1rj+XxS+qGpCIVg0LcyZ3nIzBFZH2Dt6hgszVO7ZtDl054p8A
960JWg2ibFgHpN4ZbLDZK3GzW8QOJCX28YNixOAMupHwNjWRnHExeZhP7P2H
+WgEulT/IvQhyFVg5+KG4N2KJPWmP1jyYbAw9pSOCAelZ6L+DPawEaxWaOl/
LaEtCUbRWvQf8MJORKc30O1AZtmc7DoweSO0Sd+djzcSpbfB01SA578TcRuQ
aLhZek0+pkrn+Y4SpcgeMIHYNtkE6pHE1js+8jhBX5BhVLTgzez5MhfKKWwM
2D88DMlcNm2z35DanmBLIwOMJUGGX3o5LTFZxbogSPPAooUvrkileKlIr6Yr
OEXLP9R8iW3j/jOa78h5MulI5PjNdtizG8fXxCX3bQ3Btq5+xTLKekdY75f7
isRqsgHiI2KdDcMSUJ+RXHYCakIx6fBLgibVQ7ncR4HYs3nEwidYdQQodwu6
gSNq0/p/TsbAVtktQYMz6C0aT5bh6sBtlUoSc6EdkAGXFG5NnpguPt4mLSLX
4B0dYSn+2R/LB76g5kCAjhe7EgMDQ7HrkbiJrMoA9XMsOnWPWPBjYQY57Ad1
WfFboIaaceJR220hkUqMDKkb/eUQpOIyz3dsAZS24R18JiwEVE7CMTqN5V11
sFYDu/FZ2plvXV3wOfylVYmYSo1xrJz0Yd0qPqaFgpHbZcViPUIcZUP1n7Ox
fe/17QbCgmB8RUeof4h7B1mCDQjLkiTctuwgUDNG4QloP7nhwxbFsN+qhSrj
FAtSH/n8I9lFCzEhIxcsnM2BKJPrDGeCnR2DcdCZQSY8TQRIGkHJ8MA2uLem
CD7u/+sCojuySJ6PiY6DZH8Gz0gcIOqDGLMjpL5txRRIXlXEDnLhMvCSaCeR
w8y3FSGIcan4DqCNq7sdvIqCs2Dy7J0XddP10agN1644gyRtIXTZBU1UhMfm
HN6NFlK/zPlNXYNh50xSwN/4wogRVXHy/pP4wXhIgY/ixbqDMf/o63padAT1
jExKVZ+/Dgqb94BQX+MfizIH5KnvSvRf4ozWKxD3serabe8qGs180UTWRhwb
U/XWztIomqoeEaP+sd67U2Ef5kqVsGXR7DYLz3frsdyzeFJolwVFiDdh47PL
3XPUsAIWUcys/n3zfkTb/ZBO4cYHfnJRZDNnIZD54dgi7NbBqBcbGrE0DSmK
E2fryyT0ogwt7jX5VRKN4NUTe/qK5XdJeoD//Lb8kAUgeVEsUzg+UZSkuEk1
EosNo1hIGiIqH9qKZAVNVLflyg5GpmY8Koxu8dcTdMLaQXdotkBt8FbKTKtW
dw/uKw7idBIeO2aOCvkr0tcriGS6ppA+NOXdkWhfxl15wLDsXd+2jbov98kB
jTlcSMbjsfDoC991baeSw/19Vy0/QBSrl03jEhb2Y0sl0VWb8sRcekfpmNqu
pC1l3E/EULsqMp6eKZYRhjmg80KepbfcckfCk9i793DDbOHzABaBjh12DdNS
vK1p9FWvPO8eC3QiTUjSVM1DW+dxMdz/rWjDdXSiTOCpm9jRgONcCMGqfDB2
z6bVFwIrhJ27A6YYr9hunUV4gaeC8WXRySgKdPnweGGth7x44z2D0BzJsS/e
ldEMBQvsOFlGzAcsuiVVnYCXG42p/vYZHGUaYf09sAhpAX59QXqy6aPY1uuf
3Hw4nSqcMU5k9t7/fef74fMrC3wRJO3Jvobjq0kFiMav5FqQOMzRBYsNmDEc
CstDaWzs0r/XQFhm1bgcEuKs5HnkCxxFjSzBQ2yEhE44OHr5WjhNARV78Vni
VMmgdKsbRHjvDJzk/tgtY8Wr9SHZWMFuyhqYUvTrwQrNfKUdghSOhDNCRooD
cw8uW0QxrSF68L+cs1X0zry6U0NmWLsQV2J2Kz9wVM6fVhwuOD06OeEckUEt
ro9qM9g0d031Dx8mPzoAtiq+w8Otvr34C6NX+F7+4bu2OHtybv5ceRoOfFbj
LngK4yzHNIM6t8oHoiJiNYogZPGO4xwHizm6jtPkd8/nX8yfwnH3WK0jzqLV
bAVjNSluDNYmlpXGdl0kKpuT1Yisq+hcJ7uyWqlCHKnX3FbghUAAMVga2KvH
4pZ1WV2Uwj+6psEF/jCQWm6xjQ56j04+5BHo2UNaQcWfUMvM1YPgBzJFvMrz
Y/QYoW6EnpR+gXkSe4bkufKY7lOTHSVHQgIr9A+/6u3UDPf3AxDKplze0yZd
uxvqLDAm2UK4zaOwikIub3AgseNG6Ja0/K7hhEjFXIX+k+T7cL+3bAwJ9bDT
Is/xMkEARVKXS14cJ9iM0mimIeGjHGWCqINmnHYT7BH1RnJKRXmgeg62ruFK
MMMjJCldjNywW+yRISCBW+8Wdbv8wDjP1jewA5iN/3IoGewVr97eAKUQIxFG
OK6FQRsJQQKFcySdJeevW86+AABekwB2lYIkI3eU4foEu3GxqmA/lDVSTzlN
Eja6LVkm6X0tE0wW5WoSBolWC7yO8BpDFcoGSFm5tYhpzmvqJRXtKEBQ6o9y
+xQQ9O44rJyq+Zhh+zJbyLYdBIEJRFjAZUk3h7RPtURADXe97XR5pW5HFMWY
Uxq+OaQoFwAq6lKjI95tREWby4MIDa5YmNWez+XZoXwwuIJKlrxiKTAe2nUW
KRsjapKMSpzT9uAx7Bj5lo6mI0OPYbPwiGphAYU0JZ0iWfgs9BAoSn9Fj9ri
5rmbASlrfQG/DQuYUvFXXX3wiaZi3ES00xAsCVngcQGEBP1YzoL/TIgiVQ/p
AAYRA6g1cPrpRC03yAzAZvjiMfUc8XPTawLVYl+cJK0sVweOY+qMDhqAX4zO
naBjBVvDKaejHzkmZ8ekYqjeRyQB/mO00j42MAuLuuzubDu97UcMWo34HLwe
EuYgOfn1aMHb2pHApeBY9wn7dSabzXjKjFmOWlvInAkGz6AifJUxwaCqavUL
w7GNa182dENrUgEjEesOqDy0yOiLKxadc3BGRWLGO7Aj8gryPAbNPmtaizqL
v8ECYxCWIVfZTKNHTXfl9aS5FduWHy07f2QVDrZI5+0WJ8yiC5cjidm+uAcq
DYlKhLcBgRKuKRalZHQCxvec3BB4DedMmqAuDdnymyYojihwJTGk4prQvJhP
MDKClqL1vr94dfXzTfG6gn6YXa0cnXtXLXZEzjPJc0HqesTdz+dPCfedi6Ey
aMZKsebXe3NYOFb0x0QXR3Boj2x5rGABIcFXXFdYTlyHBo85OAU1u7fsuzH8
YIYrQ2IF3oMxSXt0nMVIB9ks90VZrdTUa81DT/xmeY6WSgIgRUxb3rFvqwVF
f3WhfEEc/KxoX2YvnkBPCfRI4F/j71rSWuppJnR4KsvYHCNVP5WVHcFeFWeZ
rhCr2AeDAgk25vVm1MqrQcCB8wqg8vFobnS4G5MrNlviUNmZ53QM/djdaIZf
43QFU3Uka4TDXNqkVtvOiysV8aGwPtwLNQyKDSnpioh5FEtM0/vt2NsoqyR+
NLp+xNJLPRPm8hCLKGIsM7KOQhlDAIltDQ90Scb+cgf2Y5pCXPO1TE+wjKnI
pjBxiWTXjg9FbYAjrucxgAkizhSHijoY3+qsp1sROE2Uz8F2hKFzVuYXM6V/
k8cxfxs5aH6XWMZHbpV6bCA2FwSFDcoFWY8gOsEnYN9x0FROUgMwJ7fwWfE2
3inScJ86Braam2YiM536swI1Y56p6fBFCKKOLj5xmIucSAPshh3rerEcGSwc
P+PX6u010Q+dpiRLsgYfrfZCMlbEM7O7u/M9b36DHAtCvbC6rtbHcl1406dc
ykIlFiaJmJqqMQ1WTio1RlmdpLy6rhInN8dGNaXvfhxzkyN7TyjoEVmJ6+Jl
lHmWpHN8hezbsYvaamVH5orVwxbHtzhgp4dLMN0otjHTEKpVEjlColA6rg1V
HXeY52wb+OduV624koOmvNeknBOVHFx1qCrShSSHnDtFHapGGbtjZZwVZAg8
ACWEyhrXDNHdmocpR7m10XOvbmtJxzV97fLY0EdS146bfUoEYTh1tR04iAP0
IpsTGCOxhmPVTE5fJ3Q4dqN9s+Kquz6AnMsGiYqSagRVc8Pmt7uFTcD65uzy
5vbccnqffGEVKheWpFy89N0gc/viDbABX3d32TxUXdvwyGcXL99c2iDfPH/+
POQXn1jdUg01Fy0IDi9rQswx54Cl1+cP0CmdVXNSNHLM54lD/4YpQHq8W96T
6bQc4HZAKF2DnIY55TDcqBwsIOK2P3ImrDjetggu0oouLi6K9/SwpmxppPQR
KH0fmWRcZmjePn6x9lwiIGNxPrcL+dws9LDwOJYOEQwgTg5OM34hLGlLvURP
WvgAh3uT+Qc523kSpUsTvNkYKCz+ME1RK8JTIb+YlRrkiSQNuCTWHbbEe/UG
kzljVzMTr5KKOQkQ9ttdx46FV29v6BDaD7stgQiF61Y0FgMN2ZpNvJGkgB9e
4bkkeyTkS62LXmwkBy9VEVV+DTQouTenMtGLWJkCNsJSac+7LV4Qnxdh5gfY
n/6RNyoqywLWjyF6RPpj+eGOc5CNzUPOd2bASGJOSIh5vN+zcwaFIR7cWUqs
8iOogR1GSMlmPn7vsTYookub73U6n6hmRIBuf7qZykVl3ylqlEFttY2ezZ/O
nzIPam7at8hN091xRvdEwPTIESZ3apRjy1ahJnQbcxrmVRXuhV+s3ladVFr6
6mUjIgZNkMJJigT8HVn2lWT4RxnOjnOxh9VS4rwLzugKoWhknlj8i0ixi6az
uYelopKzglRqJh5rK5nk2H4j/NuPAzX5kvL9jGjnzFnI+R4CiDIXPl1Jv2Wn
iMbo03KSmPDARUoWAWjaaPgg+0TXPC47wN1xZrUkdJ7SiWjUIMB0Ey44PYSS
9WICZxH+ZXzC67QyNCIZS/XR8fLViSXO8FR2lufABNVNmpDOS9o59morQY3U
iA+Vw0N5nZ2oJPFGDBxsR8UZuDk/tsPNlsTgs/mT7hnxv9bhI7KQMPUhrdce
qW3but1vLBnusPhDkowOaiH4wHt5PiQPMCFJXnSYTWw8S8zFxXWlnUFK1zwh
LiesuBjtNYJmEhc9mUSXVHzwilMb0FjCmeVm10pNw4Oq+AOneNmLt38tfpbx
uoH+Kja+zCEVCLfVtH8wPYcnPqm0/5ZrBJLy3VGFZboApKAeYStiKScBESNF
KFTJxgregPEdzyV4u/IieDhwTsN2mKEI55LXvbOwJv516ZAERZaaDS6ySXOe
OM8py/QoUzk2dTatJJnsUK4xAABkg2tFtCUXaU6ROHr8LKi0HFwjgbr8tW3a
DSRCboBzCUaam4WKw37pm5IQQq/RooOsLDUGVPhKcYmkZo2fNsZJUs3tik9D
ebXxkUsuYIgsI26gmUidvKx+qUOOHlVQa3K8zTIO7J0by4zug4tCkOWezdXt
muLqWt2omfOdwf8GaTrq1gsXwnwI79V94Q9dIPwyVJ8aQe16kEk1nLFqxa2c
iwS7hvQicaxflmn9/OeAhY7RZISxDCK1uEomTcMglqPD0f0azOrSChbFCGMS
/hF/5L4lZBv7UO1soQ3TVwfXnbdmWXb4BUOGq+tU2nwmfW8s8I5jDpfA+Kxn
F9eB6ZMW7fbRXBTpysa4Ib6qRsZX76o4lbCUyHDPxiWMFfEGPJQCrsP8mnPh
FJcGn1WvUMwGqBphIkIryHp07qbdpPm1QYUX/X3ZjfoBmE0aSs9DYqBjV+AS
Afxx5QZLMNy+Nzcvf7y4fnhWnF2zUNaWR7PrX14p+n/+7RdPIaH1tJbdfju0
d125JagSBKTdUh6XPZdEfXSeEGWvy7YlHpTLz+Ru2W4txXkq+sjq5kMS831e
Ln/idK1mNg3YiNrdShYFkYeEvM6dUjuY+fS7UHYVjfufyr3Z/Ih8nDHEoZHO
2YSAmhNn0qeoQqZ6oAd2c2xJI53WiIpyIcNLYrHQWqMsYEsgGfuIRLRxg6eU
qqfuCWYNmeoyURXwOm4qMKf8PpzxSd9Onsqv3iVW88ePY+6ginMK5LuMqCQk
/iR1ACG1QAsk1pWSAZSDN6vZ52viKK9xdghyK9pIIxrV+rjOq5pDgUnWTCq6
neFicbz1YQNmgEHplJLUeOhls2xDeL5q9n2zO6UVb8RG8kZLHgBZpYmvSU0V
Tsg7e3nRnzuUZ0k9tvkWBDnoAk/VLYMJI4NMZJffD6T4gi0f2hGxYWalqEDS
Q/vINXuENhb1EQvM7L1M2Sr8pTWZG2zXwdCz48/legjNprUq1kbqk3pIlcUk
P8MJLX5f+2PtWmjCZPpY1ZIZqLkJqqUuYT73UTs+S5uDi2Ba5C4CEtG4iImT
YJ7kpmoKOjtmUCwt9EkB5nAfbWLNJm16ODWjeyxEmvKEqjEywJ07jqwANo7H
k8XEDCJG4vZ53sWpjAu9nvkqsqyLPJ3DjQdHwD8G0nqUEfYpbB1lhTn3WuxA
Vde98d+IDpmHVLHRmv1Q7AyMfYWswwb8XrgL4pYQR4r594NkoHMEj+V9Yszc
j2etN0T3pHSQSOmYKxPp4DBcJ9nkfWJo/HMfpwqwcoNkjo7TlPe6LPWkIzVk
T/d806eY0PIPrRMTod0OYEu4vx8bpc6U8I+3t9dw+AWLPzhCbCjLFOrTWiBm
w0e/KEjIubPQqGF67Kge2XHObIIAQn4Dz6dHw5zqbY+9nmge45o8wJLCsVhG
bXJ+dAmzQzQVyitLUTlmha68vvlLNKSgTYITOC8Mu2pCEr2R4JrMxhuBZX8h
2XdGQ53HU5Y8zRHOwspiTVisZMQqPgFFqEF6TMU7ybn+AzgGjMX3+pp7hYVO
W5q4o+RO3FHr6GGVkKdeC46LrypC351vRKSZlHM5uuHp0sZNfBQf3+SnwB7b
GjZgK5ROgromJ+EFzcA8jos4BXGM7LBnKUlP0XRSnYYdAZlz7wttCme+YXul
BWm01ZazVltmr7IGDhCBzfdTez7h5URxarXhvoa7YdauaW9wieUQRw9P4DVm
Oddot7jcksICLsv+Pm9fIk2qvudfxOAC+kPtucb6I7HH6NzSDGV/OBBjGYG+
nKvO/idvyehsck3lzSNrY+sV7TTG+T6396Sa5U9mbaZtxDKvC9w18kctv9YW
sxISiGX0Y2+K8ksAziUXHtkocq4SUbMBHS8ICKehR3YWJ5c/S/hmfvH++qL4
n5DyMZgZa0bFUcUYkPt5SNiS/vDCuVfv3lxcvXXuu9hQ1/18c/HnS/zq9dgb
mHqT/ti6CsG+eeHc+8vXl+8v377kgW9/vLqZvXr38mc6+NtP2SEHr8p69jOd
6SsJUb1FBCvZJGqQeHs9bevtxZvLfFMfmx+eomTU4r3HzZHdHDJJjHQRA/aP
AmJ9wA1pBC70KyXlG7LtcOxi23/19VdP2eN2QaZxcV/dEXJDGw3LkwZrJH1X
ksJw+o2VaPfVsNOLHXoS3d77wxc5fopSpEYquFEObzW1ABbig4qt3ThfhEGB
5vzJqWpS+r1oWeLYp3Ouy0dXYscF+klmY0jryMpqeqv9LzUowI2sTJ1sgm5A
7gInDsuc6Y5iMwPFf2FMTR5jdtIqfiwgFiQ792xeXEgVhiSOtOsBNQHYQGqa
sMGqvUSxp3Q/mqjjK1Qyy+t/vEcmdqdVq9k2D9o9pb4quLy1Kn5uS0w6AmjK
zh/Nrs2i7OE1U9sgEVNGyDSIh3JjPMDet3XJiW8H5BnHro8s5Xh7rWxRcTXE
hYeB/LM0Ds61gwRc6Ri/mIfr2tY7PsqL6ytZ2E/VArnLnrnyF7K4sbzAKeGx
2h77TzAtMN7xQ3Tuy3nxkqty7jjGr3nZozUskycCMf9Lpn8+t956g5SFnF5E
efDcf+1SviJ2ibNrC41WlnHLY2QCir3kyMJAXpPkDiJhIK5LkxGl9uMWEstS
1VisLaJgpHek8uwjMizzBs3/9V/F5ZtSAemrmgVrqRrjHA/2QOFGoL1zfhHK
LuuMcIqzMaA2BcxbfqUcrykw6qEEThyflCaaYZrEyJyMmwtyBg+pKdTRhyjl
we2cZmSwigJpxUcy/+3fBDJILTdkgpSMhnLysG0Vj4eMVvajXwa6dqx4vbVB
46hOhVI5zhy3NamqivUVMRNIxYqxCIwURa1DVIlMdDS/Lbgu4FIaIYfGI5z+
w/zYtAkrHg1hfz3nHWkTHpIjn+uPpXD6yT8a96JewPw+vdw0POLHBEkuSwD/
p3oC9bEd3m+h/c/vp2BWubI2NoYNU0RqIc/JJ/eMt7kn0u+eE53hkZNcgING
XNz5x1zQNAvd8kGzdyZyKZKmteK3efoszdD5ck5Sr/jzju5zza7RNUdaME5f
VCFlMfRDugtPnqvvJ+3aM9z7fG0RVuJpfHsAAPJj1HfWkymQZ+lXdB/O+nN+
VbbYeUmeeh9MzkNcaqTEn9DV5Dv33XcMe063us2bXFlb6kLQsmSFDW0nVbhg
zovZT+XCk+Gq0aZvvn0yTTybX8yfSU0wW4gaaC2tA/9wP+4LiD9WPWpddrUf
SbR/url99RRdWrGPrLlf2FdaUcESIGmYw1z4irmBE520RW4afcj7GyZWFSaM
hObpwj+DZM2dyI9RIGss+UraBhT/guQpid0nl0byHe+4aELCNPI0p1olqoOf
m8NCuZrKcmdY7jTZ2TThidzynZpxPE1TZnA2OeccCQdMLdctzWM7fBOiZXSX
XnHtpGQT6bX6LblFvx9Qwv86KCHu/nCkx/vWrkIZG40GgZhohsRC/owbEMm8
Fd/dogqFSlzDInqI7SP2apdFcO2YRBt1SbRejqt4DsZao0CH1GtnKd1p9X/a
eXHCfZ1taBtnIt6FicRXsdzQ+tHm4FivPvf9um2zxny3ukl2+vVEsX69V8EV
Qq1BmB3plPwMfRZcEA1sR6XdrUPbNukNV3BvuGMPuvCgVUYtfNpFT98Ja/WN
OoYn6XbSRmnjZpgY0w4yxtWgLmIP0EK4QXNNai8NePLGitkKTcXGNjWxgWeq
c8FQkicn4YxX76QLL2S+debOWrsa94lgUg0fW28lnKdc4kLTUVrJS5bOodxX
RB+7O/ME6XELVneqBSsLbLmX4QMQkdhjJQzf9IygAfYHVMaAcdTxDykhZpJa
cV7apxOxIrMCeECLQCTfHtCCbHtsKn0VY7v0fGV55hc3qZaPqoTAOXbXYS64
FJO12N93TUXCRMrfgvbSEHG+Y7cu+/uqbY7tvPjDnbtP2HmR7zzfatW7TUlG
iXQg6OCkkd1Ldk+2Vvk6waV+X2Z8eSIT0U/doDckaGPWd9wPL1YtLzRdnAmj
xowWgurocO3M2N4O5aTujCmEatIEkD2fPw0pXnmFTuwXyYR0Y8e0rtvyb8OM
YrByR/R+KL76omgJvHIZM1BR7Zs7fIAmL1Bj3rdIYShWG8Eja31CQEeFdMM9
8Ntl9Kjlh2RNBSwxGeW6sXyql6BstpQjVbxY20G5INFdQqOQILon2nbcrfuJ
f9mHBsb0J6z52XN7hI1WTSuzh2mIZ8+/tAdIabEYDSUODCNZdOqhJycqhkYK
1JxgH5AlxVoZFEupdaTvIVSeNLPOdWXyljUh1R4inLTWADHQbr2uxD7uJHV4
oZ9OyGwusszmUI93m4lfUdI8R6gOJFVx8xfJw+IfRkUksbtKYS2NQnbpyrwj
H/y+T6tycH2sT4x9gyB+diFGLcchmPDxA9ltIgvBdqF8NvtkztXl5WXxzROC
7X+T8zsEXVL70KVGSgBcj1qpd/BWFCpcgr2rB/uwimg3MQ2vLm/+DPa2pts4
CHmv3HKZFJ//weB6MoeTMp9u0YWkDNkRpkXxOb4/83fUICBr2ow7k5TjHZtF
XI0fBtTw9wXW9krXJr5EkUncwNUJFJ3qJ7y0X1j+iT9xHyRgEpiA4FDtxl1I
f9B2c8gcqVq+Hl88KVZISL7XjEGjYdy5S3eu32ji2gc0eZH+Aqmwz46Pt6Bl
mlwlOOh3giRav5T85wSFjOjHXjPij0BASRX2yIbuNR+ejV26v1zCR6uBjaMT
cfI08ce/0f8Fj/D3P6TDQZN87CNkdvQhc1FbJWuQfQoeQxcGn9TB9mnFpe1Y
teymXcmMPX9MiTHGEi69pEI3akVzCWjxf9KtnDRCvS6iwyLkMBpQkj6GeYNz
LdXmA0h0h4o7UuuxeSuSza0qNXvYXHmSA5zGHJHfATV3spU5x8Q/oWf53L3L
ln3Ylzz7YNVUGsuL3U2vu6RLuTQ/59S170ddxNMMNEmBSomVfPBHUTgMo9f8
RZK/kiyXQ0xice7s9V9fvT1PI49wW8Tsg1Kdgyd7qnO28rX2jD6M5qV5FfiO
lzXhjtBo3BOa5b3k2MJ85b4p7YJthnCxtN1SzBEQLzes4iZ2vGawJcPnwiPv
BxAaXm9izIrlzrbVYt/WXPIu+zQJdic5RcVdW9bHC3HEI1isS+kmicCWS0bU
9U2DJbJrJH3hjHMzsLTBnweCgBhGMHcmkErNwXp/DiFUc1UGRrLvO46qByQc
ydU6ad7REMi2YZQWu0caffirKB1fJk70OuzTSDR5A2WSHFHB4VyrJD4CgqTC
Tv8gDjfrGhk+7hP7SpuxOu7149JqIlPYby5exq8cTkM+VRs+jzMsP/7loULr
Y3R1krKhSFYTd+xRp4/aJyrjaqo+sngoXbbefR/gO9dTxncdwRfcB6rXnu1l
rR9igAnM2iqvmw/wBPnsV7NXc/5Ab0eGzq/DbOW3pIm5mcVMPnfKqDM584Ot
Lzn9GikU/IE/OfmFSmZOH44tyBLWK45+1TLEvxtt4RYeHNXJfxbzzY8nBOTH
EyTwGMJZurFeIiRx6RKtyd7RfmqZimmSCpxxMizLGxDcuhoskWy8tJo4ezrE
0kJXA8sYjQ2n8tZXSLvkVMqPNfNAeIiMlyCKEy01VfXr+JOQkrrpV6m3jU2V
j8mFyhoHj9R3M7suif8uhgG3UQPTZHLRj22j7UOu9LOquPikN2YMPbSJhCZJ
JV8+5MaUTP8ztTBIInb8SYeseOw8++6lJcAJRBiklkDz1nXlWfWG2N0iqVr1
GTeC9oKYR+atFo8AOIcEMev4KN+WG2ImhH45Ie/Y3Kw+BxD/UHGTYac71l1y
HousedI2sy3RcgITn4gp3xeQfKrgJufPH+IkpTsBUjToLNOW8ZxnoLE6Nq64
6Z6PLhzO8I9CVxynzlr44gCipi3tWOWCjPGewPqNGhBGn8zTwUvgnEMLEuMw
7Du0oRvwwU3SBpdJj+Nx52m+ZHdp+qzVsFl05ERX9uhsyGd12xYoLjRw0FoZ
5fTrUbHDz6Oayj/8+JseM3+NYyRokoQSF3Pwx9JSO9aYtBBxo87v/fhDz1a/
Gz7MGrosHklEV+nAXpWltlCJjeRims/xTtfogCfOJ0T4kgbR5yF+2Gfd7/PW
n9otw3hDu3menI27RxBHb0pOoftvmkMjvT0VVcT+uPGjJGzzaC/xrLSiiI3y
Lw7afkazJXb/ZBBDRy2aGoAYdXJF/Nac4EP0iOBe9naOOiaDObzVYad9G+P8
b9/d8jAFeyJjI5OP9DCZgwLxqEJHxU96mTUZ0Q3fuQ+pDaOGjCc+6zKaN56t
6cx4thFYjukeGHz0DWceXIq9pIWXDDpNPw1AevyfTw2dEUcKoQ++eGqNBE++
PE2qJoqDogyum7CWx0VsHytYQUIS9gkBkU3/35bC8vzEUqxspDANmqzIxNpp
24z91szQAf0rwjYnviq8g++jaMd7zRXhdA58XiF+0C5Gu3T+4J0OadLuaPDs
SzYKRnaJdkPVD5oI9ABu0BjBftxQINuF5hBxTxmxKELpqiV3Ws+JEGNg78JH
+kDZJ16dflw3tZdaiXcU0k5OcnAS49LaADBZGPxeLAFXCbBJajEdzpv2no76
hsRWFTMsEOvWtj99dXc/qMHYS9OS8KW5R1alKF/hGgZ2SAfaPGiMD0fUdtVd
hRVbHaV5ff0qdFJ2x0OXSayWPz3Mxk/d3uESPHlSzGJ8ns6KIeJsNuNuNe4/
AJX8z1WWhAAA

-->

</rfc>
