<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.3.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-emu-eap-onboarding-00" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.29.0 -->
  <front>
    <title abbrev="EAP-onboarding">EAP defaults for devices that need to onboard</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-emu-eap-onboarding-00"/>
    <author initials="A." surname="Dekok" fullname="Alan DeKok">
      <organization>FreeRADIUS</organization>
      <address>
        <email>aland@freeradius.org</email>
      </address>
    </author>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <date year="2026" month="February" day="02"/>
    <area>Internet</area>
    <workgroup>anima Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 55?>

<t>This document describes a method by which an unconfigured device can
use EAP-TLS to join a network on which further device onboarding, network
attestation or other remediation can be done.
While RFC 5216 supports EAP-TLS without a client certificate, that document defines no method by which unauthenticated EAP-TLS can be used.
This draft addresses that issue.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-emu-eap-onboarding/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        emu Working Group mailing list (<eref target="mailto:emu@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/emu/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/emu/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/mcr/eap-onboarding.git"/>.</t>
    </note>
  </front>
  <middle>
    <?line 63?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>There are a multitude of situations where a network device needs to join a new (wireless) network but where the device does not yet have the right credentials for that network.
As the device does not have credentials, it cannot access networks which typically require authentication.  However, since the device does not have network access, it cannot download a new configuration which contains updated credentials.</t>
      <t>The process by which a device acquires these credentials has become known as onboarding
<xref target="I-D.irtf-t2trg-secure-bootstrapping"/>.
There are many onboarding protocols, including <xref target="RFC8995"/>, <xref target="RFC9140"/>, <xref target="dpp"/>, CSA MATTER, and OPC UA Part 21.
Some of these protocols use WiFi Public frames, or provide for provisioning as part of EAP, such as <xref target="RFC7170"/>.
Other systems require pre-existing IP connectivity in order to configure credentials for a device, which causes a circular dependancy.</t>
      <t>This document defines a method where devices can use unauthenticated EAP-TLS in order to obtain some network access, often in a captive portal <xref target="RFC8952"/>.
Once the device is on that basic network, it has access to the full suite of Internet Protocol (IP) technologies, and can proceed with onboarding.</t>
      <t>This method is clearer, safer, and easier to implement and deploy than alternatives as it does not attempt to replicate the IP layers or TCP transports over an EAP layer.</t>
      <t>This method also allows for multiple onboarding technologies to co-exist, and for the technologies to evolve without requiring invasive upgrades to the layer-2 infrastructure.</t>
      <t>The method detailed in this document uses the unauthenticated client mode of EAP-TLS.
While <xref target="RFC5216"/> defines EAP-TLS without a client certificate, that document defines no method by which unauthenticated EAP-TLS can be used.
This draft addresses that issue.</t>
      <t><xref target="I-D.ietf-emu-eap-arpa"/> has defined the @eap.arpa domain, and this document builds upon it
by showing how it can be used to provid network access for onboarding unauthenticated devices.</t>
      <t>Note that this specification does not specify the exact method used for onboarding devices!
There are many possibilities, and some new methods may come along in the future.
Not all of them are enumerated here.
This document explains how to get the wireless equivalent of a plugged in wire, but without any promises of further connectivity.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
      </t>
      <t>The term <em>supplicant</em> is used to refer to the network device which is attempting to do EAP-TLS.</t>
      <t>The term <em>pledge</em> (from <xref target="RFC8995"/>) is used to refer to the network device which has successfully performed unauthenticated client mode EAP-TLS, and now has access to a network on which is may perform onboarding.</t>
    </section>
    <section anchor="protocol-details">
      <name>Protocol Details</name>
      <t>The onboarding is divided into the following phases:</t>
      <ul spacing="normal">
        <li>
          <t>Discovery - the supplicant determines that a network can do onboarding,</t>
        </li>
        <li>
          <t>Authentication - the supplicant connects to the network as an unauthenticated device,</t>
        </li>
        <li>
          <t>Authorization - the network provides limited connectivity to the device/pledge,</t>
        </li>
        <li>
          <t>Onboarding - the device/pledge uses standard IP protocols to perform onboarding,</t>
        </li>
        <li>
          <t>Full network access - the device has provisioned credentials, and can proceed with normal network access.</t>
        </li>
      </ul>
      <section anchor="discovery">
        <name>Discovery</name>
        <t>The network should use 802.11u to signal that it can potentially perform onboarding, by using 802.11u and indicating that it supports the realm "eap.arpa".</t>
        <t>When a supplicant which requires onboarding sees this realm, it knows that the network may be suitable for onboarding.</t>
        <t>Note that not all such networks are suitable for onboarding using the technologies that a supplicant has.
Some networks might have only a captive portal, intended for a human attended device (such a laptop or smartphone).
This is the "coffee shop" case.</t>
        <t>There may be multiple such networks available, and only one (or none) may be willing to onboard this particular device.
Further, the device does not necessarily trust any such network.</t>
        <t>There are situations where there may be many hundreds of networks which offer onboarding, and a supplicant device may need to try all of them until it finds a network to which it can successfully onboard.
An example of such a situation is in a large (dozens to hundreds of floors) apartment building in a downtown core, where radio signals may leak from adjacent units, reflect off glass windows, come from other floors, and even cross the street from adjacent buildings.
This document does not address this issue, but anticipates future work in 802.11u, perhaps  involving some filtering mechanism using Bloom Filters.
There is also work such as <xref target="I-D.ietf-scim-device-model"/> that may allow the network to more clearly match.
However, these are all optimizations, allowing the pledge to find a compatible network faster.</t>
        <t>Supplicants MUST limit their actions in the onboarding network to the action of onboarding.
If this process cannot be completed, the device MUST disconnect from the onboarding network, and try again, usually by selecting a different network.</t>
        <t>As soon as the device has been onboarded, the device MUST disconnect from the onboarding network, and use the provided configuration to authenticate and connect to a fully-capable network.</t>
      </section>
      <section anchor="authentication">
        <name>Authentication</name>
        <t>The supplicant presents itself as an unauthenticated peer, which is allowed by EAP-TLS <xref target="RFC5216"/> Section 2.1.1.
TLS 1.2 or TLS 1.3 <xref target="RFC9190"/> may be used, but TLS 1.3 or higher is RECOMMENDED.</t>
        <t>The supplicant uses an identity of onboarding@eap.arpa, and provides no TLS client certificate.
The use of the "eap.arpa" domain signals to the network that the device wishes to use unauthenticated EAP-TLS.</t>
      </section>
      <section anchor="authorization">
        <name>Authorization</name>
        <t>Upon receipt of a supplicant without any authentication, the AAA server returns instructions to the authenticator to place the new client into the quarantined or captive portal network.
The exact method is network-dependent, but it is usually done with a dedicated VLAN which has limited network
access.</t>
      </section>
      <section anchor="characteristics-of-the-onboardingquarantine-network">
        <name>Characteristics of the Onboarding/Quarantine Network</name>
        <t>The quarantine network SHOULD be segregated at layer-two (ethernet), and should not permit ethernet frames to any destination other than a small set of specified routers.</t>
        <t>Specifically, the layer infrastructure should prevent one pledge from attempting to connect to another pledge on the same quarantine network.</t>
        <t>For some onboarding protocols such as <xref target="RFC8995"/>, only IPv6 Link-Local frames are needed.
Such a network MUST provide a Join Proxy as specified in <xref section="4" sectionFormat="comma" target="RFC8995"/>.</t>
        <t>For other onboarding protocols more capabilities may be needed, in particular there need for a DHCPv4 server may be critical for the device to believe it has connected correctly.
This is particularly the case where a normal "smartphone" or laptop system will onboard via a captive portal.</t>
        <t>Once on the quarantine network, device uses other protocols <xref target="RFC6876"/> to perform the onboarding action.</t>
        <t>Note that the Pledge could also wind up in this qurantine network when using client credentials which are expired, or if the Pledge is unable to provide Evidence <xref target="RFC9334"/> that it is trustworthy.
It is common for enterprises to force desktop/laptop Pledge systems into a quarantine network when it has been determined that the Pledge contains malware, or is might be considered vulnerable to current attacks.
Such quarantine networks usually provide very limited access, but do include access to apply system patches, which would remedy the vulnerability.</t>
      </section>
    </section>
    <section anchor="captive-portal">
      <name>Captive Portal</name>
      <t>While this document imposes no requirements on the rest of the network, captive portals <xref target="RFC8952"/> have been used for almost two decades.
The administration and operation of captive portals is typically within the authority of administrators who are responsible for network access.
As such, this document defines additional behavior on, and requirements for, captive portals, so long as those changes materially benefit the network access administrator.</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>Devices should take care to hide all identifying information from the onboarding network.
Any identifying information MUST be sent encrypted via a method such as TLS.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Devices using an onboarding network MUST assume that the network is untrusted.
All network traffic SHOULD be encrypted in order to prevent attackers from both eavesdropping, and from modifying any provisioning information.</t>
      <t>Similarly onboarding networks MUST assume that devices are untrusted, and could be malicious.
Networks MUST make provisions to prevent Denial of Service (DoS) attacks, such as when many devices attempt to connect at the same time.</t>
      <t>Networks MUST limit network access to onboarding protocols and captive portal access only.</t>
      <t>Networks SHOULD also limit the bandwidth used by any device which is being onboarded.</t>
      <t>Any returned configuration information from onboarding is likely to be small (megabytes at most), and it is reasonable to require a second or two for this process to take place.</t>
      <t>Any device which cannot be onboarded within approximately 30 seconds SHOULD be disconnected from the quarantine network if there is no obvious activity.
(A device with an active download of a software patch should be allowed to finish before disconnecting)</t>
      <t>An idle device should not remain connected.
Such a delay signals either a malicious device / network, or a misconfigured device / network.
If onboarding cannot be finished within a short timer, the device should choose another network.</t>
      <section anchor="use-of-eaparpa">
        <name>Use of eap.arpa</name>
        <t>Supplicants MUST use the "eap.arpa" domain only for onboarding and related activities. <xref target="I-D.ietf-emu-eap-arpa"/>
Supplicant MUST use unauthenticated EAP-TLS.</t>
        <t>Networks which support onboarding via the "eap.arpa" domain MUST require that supplicants use unauthenticated EAP-TLS.
The use of other EAP types MUST result in rejection, and a denial of all network access.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>A new entry in the "EAP Provisioning Identifiers" <xref target="I-D.ietf-emu-eap-arpa"/> is required.
It is unclear what this entry should be.</t>
      <t>Perhaps it should be @nobody.eap.arpa.
Perhaps it should be nobody@eap.arpa.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>TBD.</t>
    </section>
    <section anchor="changelog">
      <name>Changelog</name>
      <t>05: document refresh, some minor edits.
04: document updated to be in sync with draft-ietf-emu-eap-arpa.
03: refreshed so it does not expire
01 to 02: minor edits.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC5216">
          <front>
            <title>The EAP-TLS Authentication Protocol</title>
            <author fullname="D. Simon" initials="D." surname="Simon"/>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="R. Hurst" initials="R." surname="Hurst"/>
            <date month="March" year="2008"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides support for multiple authentication methods. Transport Layer Security (TLS) provides for mutual authentication, integrity-protected ciphersuite negotiation, and key exchange between two endpoints. This document defines EAP-TLS, which includes support for certificate-based mutual authentication and key derivation.</t>
              <t>This document obsoletes RFC 2716. A summary of the changes between this document and RFC 2716 is available in Appendix A. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5216"/>
          <seriesInfo name="DOI" value="10.17487/RFC5216"/>
        </reference>
        <reference anchor="RFC9190">
          <front>
            <title>EAP-TLS 1.3: Using the Extensible Authentication Protocol with TLS 1.3</title>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods. This document specifies the use of EAP-TLS with TLS 1.3 while remaining backwards compatible with existing implementations of EAP-TLS. TLS 1.3 provides significantly improved security and privacy, and reduced latency when compared to earlier versions of TLS. EAP-TLS with TLS 1.3 (EAP-TLS 1.3) further improves security and privacy by always providing forward secrecy, never disclosing the peer identity, and by mandating use of revocation checking when compared to EAP-TLS with earlier versions of TLS. This document also provides guidance on authentication, authorization, and resumption for EAP-TLS in general (regardless of the underlying TLS version used). This document updates RFC 5216.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9190"/>
          <seriesInfo name="DOI" value="10.17487/RFC9190"/>
        </reference>
        <reference anchor="I-D.ietf-emu-eap-arpa">
          <front>
            <title>The eap.arpa. domain and EAP provisioning</title>
            <author fullname="Alan DeKok" initials="A." surname="DeKok">
              <organization>InkBridge Networks</organization>
            </author>
            <date day="4" month="September" year="2025"/>
            <abstract>
              <t>   This document defines the eap.arpa. domain for use only in Network
   Access Identifiers (NAIs) as a way for Extensible Authentication
   Protocol (EAP) peers to signal to EAP servers that they wish to
   obtain limited, and unauthenticated, network access.  EAP peers
   signal which kind of access is required via certain predefined
   identifiers which use the Network Access Identifier (NAI) format of
   RFC 7542.  A table of identifiers and meanings is defined, which
   includes entries for RFC 9140.

   This document updates RFC5216 and RFC9190 to define an
   unauthenticated provisioning method.  Those specifications suggested
   that such a method has possible, but they did not define how it would
   be done.  This document also updates RFC9140 to deprecate "eap-
   noob.arpa", and replace it with "@noob.eap.arpa"

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-emu-eap-arpa-10"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC6876">
          <front>
            <title>A Posture Transport Protocol over TLS (PT-TLS)</title>
            <author fullname="P. Sangster" initials="P." surname="Sangster"/>
            <author fullname="N. Cam-Winget" initials="N." surname="Cam-Winget"/>
            <author fullname="J. Salowey" initials="J." surname="Salowey"/>
            <date month="February" year="2013"/>
            <abstract>
              <t>This document specifies PT-TLS, a TLS-based Posture Transport (PT) protocol. The PT-TLS protocol carries the Network Endpoint Assessment (NEA) message exchange under the protection of a Transport Layer Security (TLS) secured tunnel.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6876"/>
          <seriesInfo name="DOI" value="10.17487/RFC6876"/>
        </reference>
        <reference anchor="RFC7170">
          <front>
            <title>Tunnel Extensible Authentication Protocol (TEAP) Version 1</title>
            <author fullname="H. Zhou" initials="H." surname="Zhou"/>
            <author fullname="N. Cam-Winget" initials="N." surname="Cam-Winget"/>
            <author fullname="J. Salowey" initials="J." surname="Salowey"/>
            <author fullname="S. Hanna" initials="S." surname="Hanna"/>
            <date month="May" year="2014"/>
            <abstract>
              <t>This document defines the Tunnel Extensible Authentication Protocol (TEAP) version 1. TEAP is a tunnel-based EAP method that enables secure communication between a peer and a server by using the Transport Layer Security (TLS) protocol to establish a mutually authenticated tunnel. Within the tunnel, TLV objects are used to convey authentication-related data between the EAP peer and the EAP server.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7170"/>
          <seriesInfo name="DOI" value="10.17487/RFC7170"/>
        </reference>
        <reference anchor="RFC8952">
          <front>
            <title>Captive Portal Architecture</title>
            <author fullname="K. Larose" initials="K." surname="Larose"/>
            <author fullname="D. Dolson" initials="D." surname="Dolson"/>
            <author fullname="H. Liu" initials="H." surname="Liu"/>
            <date month="November" year="2020"/>
            <abstract>
              <t>This document describes a captive portal architecture. Network provisioning protocols such as DHCP or Router Advertisements (RAs), an optional signaling protocol, and an HTTP API are used to provide the solution.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8952"/>
          <seriesInfo name="DOI" value="10.17487/RFC8952"/>
        </reference>
        <reference anchor="RFC8995">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="T. Eckert" initials="T." surname="Eckert"/>
            <author fullname="M. Behringer" initials="M." surname="Behringer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document specifies automated bootstrapping of an Autonomic Control Plane. To do this, a Secure Key Infrastructure is bootstrapped. This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline. We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device. The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8995"/>
          <seriesInfo name="DOI" value="10.17487/RFC8995"/>
        </reference>
        <reference anchor="RFC9140">
          <front>
            <title>Nimble Out-of-Band Authentication for EAP (EAP-NOOB)</title>
            <author fullname="T. Aura" initials="T." surname="Aura"/>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <author fullname="A. Peltonen" initials="A." surname="Peltonen"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP) provides support for multiple authentication methods. This document defines the EAP-NOOB authentication method for nimble out-of-band (OOB) authentication and key derivation. The EAP method is intended for bootstrapping all kinds of Internet-of-Things (IoT) devices that have no preconfigured authentication credentials. The method makes use of a user-assisted, one-directional, out-of-band (OOB) message between the peer device and authentication server to authenticate the in-band key exchange. The device must have a nonnetwork input or output interface, such as a display, microphone, speaker, or blinking light, that can send or receive dynamically generated messages of tens of bytes in length.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9140"/>
          <seriesInfo name="DOI" value="10.17487/RFC9140"/>
        </reference>
        <reference anchor="I-D.ietf-scim-device-model">
          <front>
            <title>Device Schema Extensions to the SCIM model</title>
            <author fullname="Muhammad Shahzad" initials="M." surname="Shahzad">
              <organization>North Carolina State University</organization>
            </author>
            <author fullname="Hassan Iqbal" initials="H." surname="Iqbal">
              <organization>North Carolina State University</organization>
            </author>
            <author fullname="Eliot Lear" initials="E." surname="Lear">
              <organization>Cisco Systems</organization>
            </author>
            <date day="3" month="September" year="2025"/>
            <abstract>
              <t>   The initial core schema for SCIM (System for Cross-domain Identity
   Management) was designed for provisioning users.  This memo specifies
   schema extensions that enables provisioning of devices, using various
   underlying bootstrapping systems, such as Wi-fi Easy Connect, FIDO
   device onboarding vouchers, BLE passcodes, and MAC authenticated
   bypass.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-scim-device-model-18"/>
        </reference>
        <reference anchor="I-D.irtf-t2trg-secure-bootstrapping">
          <front>
            <title>Terminology and processes for initial security setup of IoT devices</title>
            <author fullname="Mohit Sethi" initials="M." surname="Sethi">
              <organization>Aalto University</organization>
            </author>
            <author fullname="Behcet Sarikaya" initials="B." surname="Sarikaya">
              <organization>Denpel Informatique</organization>
            </author>
            <author fullname="Dan Garcia-Carrillo" initials="D." surname="Garcia-Carrillo">
              <organization>University of Oviedo</organization>
            </author>
            <date day="26" month="November" year="2022"/>
            <abstract>
              <t>   This document provides an overview of terms that are commonly used
   when discussing the initial security setup of Internet of Things
   (IoT) devices.  This document also presents a brief but illustrative
   survey of protocols and standards available for initial security
   setup of IoT devices.  For each protocol, we identify the terminology
   used, the entities involved, the initial assumptions, the processes
   necessary for completetion, and the knowledge imparted to the IoT
   devices after the setup is complete.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-t2trg-secure-bootstrapping-03"/>
        </reference>
        <reference anchor="dpp" target="https://www.wi-fi.org/downloads-registered-guest/Device_Provisioning_Protocol_Draft_Technical_Specification_Package_v0_0_23_0.zip/31255">
          <front>
            <title>Device Provisioning Protocol Specification</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
          <format type="pdf" target="https://github.com/kcdtv/wpa3/blob/master/Device_Provisioning_Protocol_Specification_v1.0.pdf"/>
        </reference>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
      </references>
    </references>
    <?line 239?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
