<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-wing-opsawg-authenticating-network-01" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.2 -->
  <front>
    <title abbrev="Resolver-based Network Identity">Asserting Wireless Network Connections Using DNS Revolvers' Identities</title>
    <seriesInfo name="Internet-Draft" value="draft-wing-opsawg-authenticating-network-01"/>
    <author initials="D." surname="Wing" fullname="Dan Wing">
      <organization>Citrix</organization>
      <address>
        <email>danwing@gmail.com</email>
      </address>
    </author>
    <author initials="T." surname="Reddy" fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <date year="2022" month="November" day="06"/>
    <workgroup>Operations and Management Area Working Group</workgroup>
    <keyword>network</keyword>
    <keyword>security</keyword>
    <abstract>
      <t>This document describes how a host uses the encrypted DNS server identity to reduce
an attacker's capabilities if the attacker is emulating a wireless network.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://example.com/LATEST"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-wing-opsawg-authenticating-network/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        OPSAWG Working Group mailing list (<eref target="mailto:opsawg@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/opsawg/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/opsawg/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/danwing/authenticating-network"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>When a user connects to a wireless network the user
or their device want to be sure the connection is to the expected
network, as different networks provide different services in terms of
performance, security, access to split-horizon DNS servers, and so on.  Although 802.1X provides layer 2
security for both Ethernet and Wi-Fi networks, 802.1X is not widely deployed
-- and often applications are
unaware if the underlying network was protected with 802.1X.</t>
      <t>An attacker can operate a rogue WLAN access point
with the same SSID and WPA-PSK as a victim's network <xref target="Evil-Twin"/>.  Also,
there are many deployments (for example, coffee shops and bars) that offer free Wi-Fi connectivity
as a customer incentive.  Since these businesses are not
Internet service providers, they are often unwilling and/or
unqualified to perform advanced (sometimes, complex) configuration on their network.  In
addition, customers are generally unwilling to do complicated
provisioning on their devices just to obtain free Wi-Fi.  This leads
to a popular deployment technique -- a network protected using a
shared and public Pre-Shared Key (PSK) that is printed on a sandwich
board at the entrance, on a chalkboard on the wall or on a menu.  The
PSK is used in a cryptographic handshake, defined in <xref target="IEEE802.11"/>,
called the "4-way handshake" to prove knowledge of the PSK and derive
traffic encryption keys for bulk wireless data. The same deployement
technique is typically used in residential or small office/home office
networks. If the PSK for the wireless authentication is
the same for all devices that connect to the same WLAN, the shared key
will be available to all nodes, including attackers, so it is possible
to mount an active on-path attack.</t>
      <t>This document describes how a wireless client can utilize
network-advertised encrypted DNS servers to ensure that the attacker has no
more visibility to the client's DNS traffic than the legitimate
network. In cases where the local network provides its own encrypted
DNS server, the client can even ensure it has re-connected to the same
network, offering the client enough information to positively detect a
significant change in the encrypted DNS server configuration -- a
strong indicator of an attacker operating the network.</t>
      <t>The proposed
mechanism is also useful in deployments using Opportunistic Wireless
Encryption <xref target="RFC8110"/> and in LTE/5G mobile networks where the long-term
key in the SIM card on the UE can be compromised (Section 1 of <xref target="AKA"/>).</t>
      <t>The theory of operation is described mainly from the perspective of a host that connects to a network. Further interactions may be considered
to seek for specific actions from a user (e.g., consent, validation). Whether and how such interactions are supported is implementation-specific and are, as such,
out of scope.</t>
      <t>The document assumes that the host supports at least one encrypted DNS scheme (e.g., DNS over TLS or DNS over HTTPS).</t>
      <t>The current version of the specification focuses on wirless networks. The applicability to other network types may be assessed in future versions.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="theory-of-operation">
      <name>Theory of Operation</name>
      <t>A host connects to a network and obtains network-related information via DHCPv4, DHCPv6, or RA.
The network indicates its encrypted DNS server using either <xref target="DNR"/> or <xref target="DDR"/>. If the host supports an encrypted DNS scheme that is advertised by the network, the host then connects
to at least one of the designated encrypted DNS servers, completes the TLS handshake, and performs public key validation of
the presented certificate following conventional procedures.</t>
      <t>The host can associate the network name with the encrypted DNS server's
identity that was learned via <xref target="DNR"/> or <xref target="DDR"/>. The type of the network name is
dependent on the access technology to which the host is attached.
For networks based on IEEE 802.11, the network name will be the SSID of
the network and the PSK. The PSK is used along with SSID to uniquely identify the network to deal with common Wi-Fi names such as
"Airport WiFi" or "Hotel WiFi" or "Guest" but are distinct networks with different PSK. The combination of SSID and PSK is useful
in deployments where the same Wi-Fi name is used in many locations around the world, such as branch offices of a corporation.
It is also useful in Wi-Fi deployments that have multiple Basic Service Set Identifiers (BSSIDs) where 802.11r coordinates session keys amongst access points.
However, in deployments using Opportunistic Wireless Encryption, the network name will be the SSID of the network
and BSSID. For 3GPP access-based networks, it
is the Public Land-based Mobile Network (PLMN) Identifier of the access network, and for 3GPP2 access,
the network name is the Access-Network Identifier (see <xref target="RFC7839"/>).</t>
      <t>If DDR is used for discovery, the host would have to perform verified discovery as per Section 4.2 of <xref target="DDR"/>
and the encrypted DNS server identity will be the encrypted DNS server's IP address.</t>
      <t>If DNR is used, the encrypted DNS server identity will be the Authentication Domain Name (ADN).</t>
      <t>If this is the first time the host connects to that encrypted DNS server, the hosts follows <xref target="DNR"/> or <xref target="DDR"/> validation procedures,
which will authenticate and authorize that encrypted DNS server's identity.</t>
      <t>Better authentication can be performed by verifying the encrypted DNS
server's certificate with the identity provided in an extended Wi-Fi
QR code (<xref target="qr"/>), consulting a crowd-sourced database, reputation
system, or -- perhaps best -- using a matching SSID and SubjectAltName
described in <xref target="avoid-tofu"/>.</t>
      <t>After this step, the relationship of SSID, PSK, encrypted resolver
discovery mechanism, and SubjectAltName are stored on the host.</t>
      <t>For illustrative purposes, <xref target="example"/> provides an example of the data stored for
two Wi-Fi networks, "Example WiFi 1" and "Example WiFi 2" (showing hashed
PSK),</t>
      <figure anchor="example">
        <name>An Example of Data Stored for Two WiFi Networks</name>
        <artwork><![CDATA[
{
  "networks": [
    {
      "SSID": "Example WiFi 1",
      "PSK-ID": 12,
      "Discovery": "DNR",
      "Encrypted DNS": "resolver1.example.com"
    },
    {
      "SSID": "Example WiFi 2",
      "PSK-ID": 42,
      "Discovery": "DDR",
      "Encrypted DNS": [
           "8.8.8.8",
           "1.1.1.1"
      ]
    }
  ]
}
]]></artwork>
      </figure>
      <t>For illustrative purposes, <xref target="example2"/> provides an example of the data stored for
two 3GPP2 networks,</t>
      <figure anchor="example2">
        <name>An Example of Data Stored for Two 3GPP2 Networks</name>
        <artwork><![CDATA[
{
  "networks": [
    {
      "realm": "ims.mnc015.mcc234.3gppnetwork.org",
      "Discovery": "DNR",
      "Encrypted DNS": "resolver2.example.com"
    },
    {
      "realm": "ims.mnc016.mcc235.3gppnetwork.org",
      "Discovery": "DDR",
      "Encrypted DNS": [
           "8.8.8.8",
           "1.1.1.1"
      ]
    }
  ]
}
]]></artwork>
      </figure>
      <t>If this is not the first time the host connects to this same SSID, then the Wi-Fi
network name, PSK identifier, encrypted resolver disovery mechanism, and
encrypted DNS server's identity should all match for this
re-connection.  If the encrypted DNS server's identity differs, this
indicates a different network than expected -- either a different
network (that happens to also use the same SSID), change of the
network's encrypted DNS server identity, or an Evil Twin
attack. The host and/or the user can then take appropriate actions.
Additionally, in a mobile network, the UE can send the discovered encrypted resolver's
identity securely to the Mobile Core Network to assist it in identifying
compromised base stations <xref target="NIST.SP.800-187"/>. It complements existing techniques
<xref target="TR33.809"/> used to identify fake base stations.</t>
    </section>
    <section anchor="avoid-tofu">
      <name>Avoiding Trust on First Use</name>
      <t>Trust on First Use can be avoided if the SSID name and DNS server's
Subject Alt Name match.  Unfortunately such a constraint disallows
vanity SSID names.  Also, social engineering attacks gain additional
information if the network's physical address
(123-Main-Street.example.net) or name (John-Jones.example.net) is
included as part of the SSID.  Thus the only safe SSID name provides
no information to assist social engineering attacks such as a customer
number (customer-123.example.net), assuming the customer number can
safely be disclosed to neighbors.  Such attacks are not a concern in
deployments where the network name purposefully includes the business
name or address (e.g., Public WiFi hotspots;
123-Main-Street.example.com, coffee-bar.example.com).</t>
      <t>The Extensible Authentication Protocol (EAP), defined in <xref target="RFC3748"/>,
provides a standard mechanism for support of multiple authentication
methods.  EAP-TLS <xref target="RFC5216"/> specifies an EAP authentication method
with certificate-based mutual authentication utilizing the TLS
handshake protocol for cryptographic algorithms and protocol version
negotiation and establishment of shared secret keying material. 
Many other EAP methods such as Flexible Authentication via Secure Tunneling (EAP-
FAST) <xref target="RFC4851"/>, Tunneled Transport Layer Security (EAP-TTLS)
<xref target="RFC5281"/>, the Tunnel Extensible Authentication Protocol (TEAP)
<xref target="RFC7170"/>, as well as vendor-specific EAP methods such as the
Protected Extensible Authentication Protocol (PEAP) [PEAP], depend on
TLS and EAP-TLS. In networks that use the EAP-TLS method or an EAP method 
that depends on TLS, if the SSID name matches one of the subjectAltName entries 
in the EAP-TLS server certificate, Trust on First Use can be avoided. 
It is especially useful in deployments where the endpoint is
not managed using an MDM. For instance, it can be used during the
device registration process (e.g., using Over-The-Air (OTA) enrollment [OTA] to 
provision the device with a certificate and configuration profile) or 
in networks (e.g., emergency services as discussed in Section 2.1.5 of <xref target="RFC9190"/>) 
where client authentication is not required or in networks that use
password to authorize the client to access the network (e.g., using password 
authenticated key exchange with TLS).</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The network-designated resolver may or may not be local to the network.
DDR is useful in deployments where the local network cannot be upgraded
to host a encrypted resolver and the CPE cannot be upgraded to support DNR.
For example, DDR is typically used to discover the ISP's encrypted resolver
or a public encrypted resolver. The encrypted resolver discovered using DNR may
be a public encrypted resolver or hosted by the local network or by the ISP.
The mechanism specified in this document does not assist the client to
identity if the network-designated resolver is hosted by the local network.
However, it significantly reduces the attacker's capabilities if the attacker
is emulating a network (that is, operating a look-alike network).</t>
      <t>More and more content delivery networks, sensitive domains and
endpoints are migrating to TLS 1.3 and ECH.  If the attacker's network
conveys the same encrypted revolver's identity as the legitimate
network, it will not have any visibility into the private and
sensitive information about the target domain. However, the attacker's
network will still have visibility into the traffic metadata like
the destination IP address, sequence of packet lengths, inter-
arrival times, etc.</t>
      <t>The network authentication mechanism relies upon an attacker's inability
to obtain an application PKI certificate for the victim's configured encrypted DNS
server.</t>
      <t>Neither a plain-text PSK nor hash of the PSK is necessary for the
mechanism described in this document; rather, an implementation can
use a key identifier.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="DNR" target="https://www.ietf.org/archive/id/draft-ietf-add-dnr-13.txt">
          <front>
            <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dan Wing" initials="D." surname="Wing">
              <organization>Citrix Systems, Inc.</organization>
            </author>
            <author fullname="Neil Cook" initials="N." surname="Cook">
              <organization>Open-Xchange</organization>
            </author>
            <author fullname="Tommy Jensen" initials="T." surname="Jensen">
              <organization>Microsoft</organization>
            </author>
            <date day="13" month="August" year="2022"/>
            <abstract>
              <t>   The document specifies new DHCP and IPv6 Router Advertisement options
   to discover encrypted DNS resolvers (e.g., DNS-over-HTTPS, DNS-over-
   TLS, DNS-over-QUIC).  Particularly, it allows a host to learn an
   authentication domain name together with a list of IP addresses and a
   set of service parameters to reach such encrypted DNS resolvers.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-dnr-13"/>
        </reference>
        <reference anchor="DDR" target="https://www.ietf.org/archive/id/draft-ietf-add-ddr-10.txt">
          <front>
            <title>Discovery of Designated Resolvers</title>
            <author fullname="Tommy Pauly" initials="T." surname="Pauly">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Eric Kinnear" initials="E." surname="Kinnear">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Patrick McManus" initials="P." surname="McManus">
              <organization>Fastly</organization>
            </author>
            <author fullname="Tommy Jensen" initials="T." surname="Jensen">
              <organization>Microsoft</organization>
            </author>
            <date day="5" month="August" year="2022"/>
            <abstract>
              <t>   This document defines Discovery of Designated Resolvers (DDR), a
   mechanism for DNS clients to use DNS records to discover a resolver's
   encrypted DNS configuration.  An encrypted DNS resolver discovered in
   this manner is referred to as a "Designated Resolver".  This
   mechanism can be used to move from unencrypted DNS to encrypted DNS
   when only the IP address of a resolver is known.  This mechanism is
   designed to be limited to cases where unencrypted DNS resolvers and
   their designated resolvers are operated by the same entity or
   cooperating entities.  It can also be used to discover support for
   encrypted DNS protocols when the name of an encrypted DNS resolver is
   known.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-ddr-10"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="Evil-Twin" target="https://en.wikipedia.org/wiki/Evil_twin_(wireless_networks)">
          <front>
            <title>Evil twin (wireless networks)</title>
            <author initials="" surname="Wikipedia" fullname="Wikipedia">
              <organization/>
            </author>
            <date year="2022" month="June"/>
          </front>
        </reference>
        <reference anchor="IEEE802.11" target="https://en.wikipedia.org/wiki/IEEE_802.11">
          <front>
            <title>IEEE802.11</title>
            <author initials="" surname="Wikipedia" fullname="Wikipedia">
              <organization/>
            </author>
            <date year="2022" month="August"/>
          </front>
        </reference>
        <reference anchor="TR33.809" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3539">
          <front>
            <title>Study on 5G Security Enhancement against False Base Stations</title>
            <author initials="" surname="3GPP" fullname="3GPP">
              <organization/>
            </author>
            <date year="2022" month="June"/>
          </front>
        </reference>
        <reference anchor="NIST.SP.800-187" target="https://developer.apple.com/library/archive/documentation/NetworkingInternet/Conceptual/iPhoneOTAConfiguration/OTASecurity/OTASecurity.html">
          <front>
            <title>Over-the-Air Profile Delivery Concepts</title>
            <author initials="" surname="OTA" fullname="OTA">
              <organization/>
            </author>
            <date year="2018" month="April"/>
          </front>
        </reference>
        <reference anchor="RFC8792" target="https://www.rfc-editor.org/info/rfc8792">
          <front>
            <title>Handling Long Lines in Content of Internet-Drafts and RFCs</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen">
              <organization/>
            </author>
            <author fullname="E. Auerswald" initials="E." surname="Auerswald">
              <organization/>
            </author>
            <author fullname="A. Farrel" initials="A." surname="Farrel">
              <organization/>
            </author>
            <author fullname="Q. Wu" initials="Q." surname="Wu">
              <organization/>
            </author>
            <date month="June" year="2020"/>
            <abstract>
              <t>This document defines two strategies for handling long lines in width-bounded text content.  One strategy, called the "single backslash" strategy, is based on the historical use of a single backslash ('\') character to indicate where line-folding has occurred, with the continuation occurring with the first character that is not a space character (' ') on the next line.  The second strategy, called the "double backslash" strategy, extends the first strategy by adding a second backslash character to identify where the continuation begins and is thereby able to handle cases not supported by the first strategy.  Both strategies use a self-describing header enabling automated reconstitution of the original content.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8792"/>
          <seriesInfo name="DOI" value="10.17487/RFC8792"/>
        </reference>
        <reference anchor="RFC8110" target="https://www.rfc-editor.org/info/rfc8110">
          <front>
            <title>Opportunistic Wireless Encryption</title>
            <author fullname="D. Harkins" initials="D." role="editor" surname="Harkins">
              <organization/>
            </author>
            <author fullname="W. Kumari" initials="W." role="editor" surname="Kumari">
              <organization/>
            </author>
            <date month="March" year="2017"/>
            <abstract>
              <t>This memo specifies an extension to IEEE Std 802.11 to provide for opportunistic (unauthenticated) encryption to the wireless media.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8110"/>
          <seriesInfo name="DOI" value="10.17487/RFC8110"/>
        </reference>
        <reference anchor="RFC7839" target="https://www.rfc-editor.org/info/rfc7839">
          <front>
            <title>Access-Network-Identifier Option in DHCP</title>
            <author fullname="S. Bhandari" initials="S." surname="Bhandari">
              <organization/>
            </author>
            <author fullname="S. Gundavelli" initials="S." surname="Gundavelli">
              <organization/>
            </author>
            <author fullname="M. Grayson" initials="M." surname="Grayson">
              <organization/>
            </author>
            <author fullname="B. Volz" initials="B." surname="Volz">
              <organization/>
            </author>
            <author fullname="J. Korhonen" initials="J." surname="Korhonen">
              <organization/>
            </author>
            <date month="June" year="2016"/>
            <abstract>
              <t>This document specifies the format and mechanism that is to be used for encoding Access-Network Identifiers in DHCPv4 and DHCPv6 messages by defining new Access-Network-Identifier options and sub-options.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7839"/>
          <seriesInfo name="DOI" value="10.17487/RFC7839"/>
        </reference>
        <reference anchor="RFC3748" target="https://www.rfc-editor.org/info/rfc3748">
          <front>
            <title>Extensible Authentication Protocol (EAP)</title>
            <author fullname="B. Aboba" initials="B." surname="Aboba">
              <organization/>
            </author>
            <author fullname="L. Blunk" initials="L." surname="Blunk">
              <organization/>
            </author>
            <author fullname="J. Vollbrecht" initials="J." surname="Vollbrecht">
              <organization/>
            </author>
            <author fullname="J. Carlson" initials="J." surname="Carlson">
              <organization/>
            </author>
            <author fullname="H. Levkowetz" initials="H." role="editor" surname="Levkowetz">
              <organization/>
            </author>
            <date month="June" year="2004"/>
            <abstract>
              <t>This document defines the Extensible Authentication Protocol (EAP), an authentication framework which supports multiple authentication methods.  EAP typically runs directly over data link layers such as Point-to-Point Protocol (PPP) or IEEE 802, without requiring IP.  EAP provides its own support for duplicate elimination and retransmission, but is reliant on lower layer ordering guarantees.  Fragmentation is not supported within EAP itself; however, individual EAP methods may support this.  This document obsoletes RFC 2284.  A summary of the changes between this document and RFC 2284 is available in Appendix A.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3748"/>
          <seriesInfo name="DOI" value="10.17487/RFC3748"/>
        </reference>
        <reference anchor="RFC5216" target="https://www.rfc-editor.org/info/rfc5216">
          <front>
            <title>The EAP-TLS Authentication Protocol</title>
            <author fullname="D. Simon" initials="D." surname="Simon">
              <organization/>
            </author>
            <author fullname="B. Aboba" initials="B." surname="Aboba">
              <organization/>
            </author>
            <author fullname="R. Hurst" initials="R." surname="Hurst">
              <organization/>
            </author>
            <date month="March" year="2008"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides support for multiple authentication methods.  Transport Layer Security (TLS) provides for mutual authentication, integrity-protected ciphersuite negotiation, and key exchange between two endpoints.  This document defines EAP-TLS, which includes support for certificate-based mutual authentication and key derivation.</t>
              <t>This document obsoletes RFC 2716.  A summary of the changes between this document and RFC 2716 is available in Appendix A.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5216"/>
          <seriesInfo name="DOI" value="10.17487/RFC5216"/>
        </reference>
        <reference anchor="RFC4851" target="https://www.rfc-editor.org/info/rfc4851">
          <front>
            <title>The Flexible Authentication via Secure Tunneling Extensible Authentication Protocol Method (EAP-FAST)</title>
            <author fullname="N. Cam-Winget" initials="N." surname="Cam-Winget">
              <organization/>
            </author>
            <author fullname="D. McGrew" initials="D." surname="McGrew">
              <organization/>
            </author>
            <author fullname="J. Salowey" initials="J." surname="Salowey">
              <organization/>
            </author>
            <author fullname="H. Zhou" initials="H." surname="Zhou">
              <organization/>
            </author>
            <date month="May" year="2007"/>
            <abstract>
              <t>This document defines the Extensible Authentication Protocol (EAP) based Flexible Authentication via Secure Tunneling (EAP-FAST) protocol.  EAP-FAST is an EAP method that enables secure communication between a peer and a server by using the Transport Layer Security (TLS) to establish a mutually authenticated tunnel. Within the tunnel, Type-Length-Value (TLV) objects are used to convey authentication related data between the peer and the EAP server.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4851"/>
          <seriesInfo name="DOI" value="10.17487/RFC4851"/>
        </reference>
        <reference anchor="RFC5281" target="https://www.rfc-editor.org/info/rfc5281">
          <front>
            <title>Extensible Authentication Protocol Tunneled Transport Layer Security Authenticated Protocol Version 0 (EAP-TTLSv0)</title>
            <author fullname="P. Funk" initials="P." surname="Funk">
              <organization/>
            </author>
            <author fullname="S. Blake-Wilson" initials="S." surname="Blake-Wilson">
              <organization/>
            </author>
            <date month="August" year="2008"/>
            <abstract>
              <t>EAP-TTLS is an EAP (Extensible Authentication Protocol) method that encapsulates a TLS (Transport Layer Security) session, consisting of a handshake phase and a data phase.  During the handshake phase, the server is authenticated to the client (or client and server are mutually authenticated) using standard TLS procedures, and keying material is generated in order to create a cryptographically secure tunnel for information exchange in the subsequent data phase.  During the data phase, the client is authenticated to the server (or client and server are mutually authenticated) using an arbitrary authentication mechanism encapsulated within the secure tunnel.  The encapsulated authentication mechanism may itself be EAP, or it may be another authentication protocol such as PAP, CHAP, MS-CHAP, or MS-CHAP-V2.  Thus, EAP-TTLS allows legacy password-based authentication protocols to be used against existing authentication databases, while protecting the security of these legacy protocols against eavesdropping, man-in-the-middle, and other attacks.  The data phase may also be used for additional, arbitrary data exchange.  This memo  provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5281"/>
          <seriesInfo name="DOI" value="10.17487/RFC5281"/>
        </reference>
        <reference anchor="RFC7170" target="https://www.rfc-editor.org/info/rfc7170">
          <front>
            <title>Tunnel Extensible Authentication Protocol (TEAP) Version 1</title>
            <author fullname="H. Zhou" initials="H." surname="Zhou">
              <organization/>
            </author>
            <author fullname="N. Cam-Winget" initials="N." surname="Cam-Winget">
              <organization/>
            </author>
            <author fullname="J. Salowey" initials="J." surname="Salowey">
              <organization/>
            </author>
            <author fullname="S. Hanna" initials="S." surname="Hanna">
              <organization/>
            </author>
            <date month="May" year="2014"/>
            <abstract>
              <t>This document defines the Tunnel Extensible Authentication Protocol (TEAP) version 1.  TEAP is a tunnel-based EAP method that enables secure communication between a peer and a server by using the Transport Layer Security (TLS) protocol to establish a mutually authenticated tunnel.  Within the tunnel, TLV objects are used to convey authentication-related data between the EAP peer and the EAP server.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7170"/>
          <seriesInfo name="DOI" value="10.17487/RFC7170"/>
        </reference>
        <reference anchor="RFC9190" target="https://www.rfc-editor.org/info/rfc9190">
          <front>
            <title>EAP-TLS 1.3: Using the Extensible Authentication Protocol with TLS 1.3</title>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson">
              <organization/>
            </author>
            <author fullname="M. Sethi" initials="M." surname="Sethi">
              <organization/>
            </author>
            <date month="February" year="2022"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods. This document specifies the use of EAP-TLS with TLS 1.3 while remaining backwards compatible with existing implementations of EAP-TLS. TLS 1.3 provides significantly improved security and privacy, and reduced latency when compared to earlier versions of TLS. EAP-TLS with TLS 1.3 (EAP-TLS 1.3) further improves security and privacy by always providing forward secrecy, never disclosing the peer identity, and by mandating use of revocation checking when compared to EAP-TLS with earlier versions of TLS. This document also provides guidance on authentication, authorization, and resumption for EAP-TLS in general (regardless of the underlying TLS version used). This document updates RFC 5216.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9190"/>
          <seriesInfo name="DOI" value="10.17487/RFC9190"/>
        </reference>
        <reference anchor="AKA" target="https://www.ietf.org/archive/id/draft-ietf-emu-aka-pfs-08.txt">
          <front>
            <title>Forward Secrecy for the Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA' FS)</title>
            <author fullname="Jari Arkko" initials="J." surname="Arkko">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Karl Norrman" initials="K." surname="Norrman">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Vesa Torvinen" initials="V." surname="Torvinen">
              <organization>Ericsson</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson</organization>
            </author>
            <date day="23" month="October" year="2022"/>
            <abstract>
              <t>   Many different attacks have been reported as part of revelations
   associated with pervasive surveillance.  Some of the reported attacks
   involved compromising the smart card supply chain, such as attacking
   SIM card manufacturers and operators in an effort to compromise
   shared secrets stored on these cards.  Since the publication of those
   reports, manufacturing and provisioning processes have gained much
   scrutiny and have improved.  However, the danger of resourceful
   attackers for these systems is still a concern.  Always assuming
   breach such as key compromise and minimizing the impact of breach are
   essential zero-trust principles.

   This specification updates RFC 9048, the EAP-AKA' authentication
   method, with an optional extension.  Similarly, this specification
   also updates the earlier version of the EAP-AKA' specification in RFC
   5448.  The extension, when negotiated, provides Forward Secrecy for
   the session key generated as a part of the authentication run in EAP-
   AKA'.  This prevents an attacker who has gained access to the long-
   term pre-shared secret in a SIM card from being able to decrypt any
   past communications.  In addition, if the attacker stays merely a
   passive eavesdropper, the extension prevents attacks against future
   sessions.  This forces attackers to use active attacks instead.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-emu-aka-pfs-08"/>
        </reference>
      </references>
    </references>
    <section anchor="qr">
      <name>Extending WiFi QR Code</name>
      <t>This section is non-normative and merely explains how extending the Wi-Fi QR code could work.</t>
      <t>QR codes come with their
own security risks, most signficant that an attacker can place their own QR code over a legitimate QR code.</t>
      <t>Several major smartphone operating systems support a QR code with the following format for the SSID "example" with WPA-PSK "password",</t>
      <artwork><![CDATA[
  WIFI:T:WPA;S:example;P:password;;
]]></artwork>
      <t>This could be extended to add a field containing the identity of the encrypted DNS server.
As several DNS servers can be included in the QR code with "D:", each DNS server with its own identity
using <xref target="RFC8792"/> line folding,</t>
      <artwork><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

  WIFI:T:WPA;S:example;P:password; \
  D:ns1.example.net,D:ns.example.com;;
]]></artwork>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This document was inspired by both Paul Wouters and Tommy Pauly during review of other documents.</t>
      <t>Thanks to Mohamed Boucadair for the review.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
