<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.31 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-emu-eap-ppt-02" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="EAP-PPT">Extensible Authentication Protocol (EAP) Using Privacy Pass Token</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-emu-eap-ppt-02"/>
    <author fullname="Paresh Sawant">
      <organization>Apple Inc.</organization>
      <address>
        <email>paresh_sawant@apple.com</email>
      </address>
    </author>
    <author fullname="Bart Brinckman">
      <organization>Cisco Systems</organization>
      <address>
        <email>bbrinckm@cisco.com</email>
      </address>
    </author>
    <date year="2026" month="February" day="19"/>
    <keyword>Internet-Draft</keyword>
    <keyword>EAP</keyword>
    <keyword>anonymous</keyword>
    <keyword>authorization</keyword>
    <keyword>Privacy Pass token</keyword>
    <abstract>
      <?line 47?>

<t>This document describes Extensible Authentication Protocol using
Privacy Pass token (EAP-PPT) Version 1. The protocol specifies
use of the Privacy Pass token for client authentication within EAP
as defined in RFC3748. Privacy Pass is a privacy preserving
authentication mechanism used for authorization, as defined
in RFC9576. EAP-PPT must be performed only in a tunnel-based EAP method.</t>
    </abstract>
  </front>
  <middle>
    <?line 56?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document specifies Extensible Authentication Protocol (EAP)
method, EAP-PPT, which uses Privacy Pass token for EAP peer
authentication; see <xref target="RFC9576"/> for more information about
Privacy Pass. EAP-PPT <bcp14>MUST</bcp14> be used inside any tunnel-based EAP
method that enables secure communication between a peer and a
server by using Transport Layer Security (TLS) Protocol
<xref target="RFC8446"/>. The tunnel-based EAP method <bcp14>MUST</bcp14> be a server authenticated TLS tunnel only.</t>
      <t>Privacy Pass tokens are unlinkable authenticators that can be used
to anonymously authorize a client <xref target="RFC9576"/>. Privacy Pass tokens are issued to peer by token issuers using an Issuance Protocol <xref target="RFC9578"/>, and therefore, peer receives the token out of band of EAP-PPT.
A client possessing such a token is able to
prove that it was able to get it issued by a trusted issuer, without allowing the
relying party redeeming the client's token (the origin) to link
it with the issuance flow.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
      </t>
      <t>Much of the terminology in this document is defined in <xref target="RFC3748"/>.</t>
      <t>Additional terms are defined below:</t>
      <dl>
        <dt>NAI:</dt>
        <dd>
          <t>Network Access Identifier <xref target="RFC7542"/></t>
        </dd>
        <dt>EAP-PPT peer:</dt>
        <dd>
          <t>This term is used for the entity acting as EAP peer.
This term is identical to term Client defined in
<xref section="2" sectionFormat="of" target="RFC9576"/>.</t>
        </dd>
        <dt>EAP-PPT server:</dt>
        <dd>
          <t>This term is used for the entity acting as EAP server.
This term is identical to term Server defined in
<xref section="2" sectionFormat="of" target="RFC9576"/>.</t>
        </dd>
        <dt>Privacy Pass token:</dt>
        <dd>
          <t>Unlinkable authenticator that can be used to anonymously
authorize a client <xref target="RFC9577"/>. This is produced as an output
of issuance protocol <xref target="RFC9578"/>.</t>
        </dd>
        <dt>Token Challenge:</dt>
        <dd>
          <t>An action by which a EAP-PPT Server requests EAP-PPT peer
to present Privacy Pass Token for one of the presented challenges.</t>
        </dd>
        <dt>Token Redemption:</dt>
        <dd>
          <t>An action by which a peer presents a Privacy Pass token to a
EAP-PPT Server in EAP-PPT Protocol. See <xref section="2.2" sectionFormat="of" target="RFC9577"/>.</t>
        </dd>
        <dt>Identity provider:</dt>
        <dd>
          <t>An entity that is responsible for authentication of end-user devices
with the prupose of granting them access to a network resource.</t>
        </dd>
      </dl>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="motivation">
      <name>Motivation</name>
      <t>EAP is predominantly used for authentication of users and devices
trying to join a network. Its security and extensibility capabilities
makes it a popular choice in implementing secure network access.
EAP is one of the most preferred authentication mechanisms used for
secure wireless LAN access using <xref target="IEEE-802.11"/> standard, wired LAN
access using <xref target="IEEE-802.1X"/> and Virtual Private Network (VPN) access.
EAP is also used for secure network access for students and guests
in academia, see <xref target="RFC7593"/>.</t>
      <t>One goal of privacy is to protect individual's identity and personal
information from eavesdropers, intermediaries and recipients
in the network communication. An individual's privacy may get
compromized when network access is attempted using EAP as an
authentication mechanism. The various privacy-specific threats
are described in <xref section="5.2" sectionFormat="of" target="RFC6973"/>.</t>
      <t>Typical approaches for authorizing clients, such as through the use
of a permanent identity or service provider generated pseudo identity,
are not privacy-friendly since they allow servers to track clients
across sessions and interactions. This means service providers,
identity providers, employers, or school/university administrators
can track the individuals.</t>
      <t>The goal of this specification is to protect an individual from the
<xref section="5.2" sectionFormat="of" target="RFC6973"/> in public and enterprise environments.
EAP-PPT can be leveraged for authorization based on
anonymous-credential authentication mechanisms. EAP-PPT takes a
different approach: instead of carrying linkable state carrying
information to servers, such as permanent identity or pseudonym,
EAP peer presents Privacy Pass tokens that attest to this information.
These tokens are anonymous in the sense that a given token cannot be
linked to the protocol instance in which that token was initially
issued.</t>
      <t><xref target="RFC9577"/> specifies the authentication scheme using Privacy Pass
token over HTTP. <xref target="RFC9577"/> mainly serves use cases where access to
restricted services require anonymous client authorization. Since
<xref target="RFC9577"/> functions at the application layer of a networking stack,
it justifies a need of a protocol that can offer the similar
functionality for the lower layers. EAP-PPT, performed inside a 
server-authenticated TLS tunnel offers anonymous network access to 
wired and wireless networks at those lower layers. Since EAP-PPT method 
provides unilateral authentication, it can be used together with responder
authentication based on public key signatures in <xref target="RFC7296"/> protocol. 
<xref target="RFC7296"/> is a component of IPsec used for performing mutual 
authentication and establishing and maintaining Security Associations. 
<xref target="RFC7296"/> is widely used to implement remote access VPN service in 
public and enterprise environments, so EAP-PPT can be used to provide 
anonymous VPN services to clients.</t>
      <t>In summary, EAP-PPT provides a solution for networks that wish to offer
anonymous network access to users and devices, protecting their privacy, 
while still being able to authorize them based on the possession of valid
token that proves that a trusted attestation was performed based on the 
policies they defined for network access.</t>
    </section>
    <section anchor="architecture-model">
      <name>Architecture Model</name>
      <t><xref target="arch"/> shows network architectural model for EAP-PPT.</t>
      <figure anchor="arch">
        <name>EAP-PPT Architectural Model</name>
        <artwork><![CDATA[
+----------+      +----------+      +----------+      +----------+
|          |      |          |      |          |      |          |
|   Peer   |<---->|  Authen- |<---->|   EAP    |<---->|  EAP-    |
|          |      |  ticator |      |  Server  |      |  PPT     |
|          |      |          |      |          |      |  Server  |
+----------+      +----------+      +----------+      +----------+
]]></artwork>
      </figure>
      <t>The entities depicted in <xref target="arch"/> are logical entities and may or
may not correspond to separate network components. For example, the
EAP Server and EAP-PPT Server might be a single entity; the
authenticator and EAP Server might be a single entity; or the
functions of the authenticator, EAP Server, and EAP-PPT Server might
be combined into a single physical device. For example, typical
<xref target="IEEE-802.11"/> deployments place the authenticator in an access point
(AP) while a RADIUS Server may provide the Tunneled EAP Method and
EAP-PPT method Server components. The above diagram illustrates the
division of labor among entities in a logical manner and shows how a
distributed system might be constructed; however, actual systems might
be organized differently.</t>
    </section>
    <section anchor="protocol">
      <name>Protocol</name>
      <section anchor="overview">
        <name>Overview</name>
        <t>A tunnel-based EAP method supports authentication in two phases after
the initial EAP Identity request/response exchange. In the first phase,
it uses a TLS <xref target="RFC8446"/> handshake to provide an authenticated key
exchange and to establish a protected tunnel. The EAP peer and server
that are configured to perform the peer authentication using EAP-PPT
method, <bcp14>MUST</bcp14> establish the TLS tunnel without peer authentication.
EAP server <bcp14>MUST NOT</bcp14> send CertificateRequest to the TLS client during
the TLS handshake, when peer authentication is desired using EAP-PPT
method. TLS-PSK cipher suites <xref section="9.2" sectionFormat="of" target="RFC8446"/> <bcp14>MUST NOT</bcp14> be used.</t>
        <t>The second phase of the authentication begins after the TLS tunnel is
established. Any EAP method that fulfils the requirements specified
in <xref target="RFC6678"/> is called tunnel-based EAP method.</t>
        <t>A peer supporting EAP-PPT <bcp14>MUST NOT</bcp14> send its username or any other
permanent identifiers in the first and subsequent EAP-Response/Identity
messages. EAP-Response/Identity message <bcp14>MUST</bcp14> contain only an anonymous NAI 
as per RFC 7542 Section 2.4 in order to route the authentication request
to the right AAA system.</t>
        <t>EAP-PPT authentication <bcp14>MUST</bcp14> be performed inside the server
authenticated TLS tunnel established by the tunnel-based EAP method.</t>
        <t>During the EAP-PPT authentication, the server challenges the peer to
present a Privacy Pass token, and the Peer responds with a Privacy Pass
token. Upon a successful verification of the token, the redemption of
the token is deemed successful. EAP-PPT uses JavaScript Object Notation
(JSON) <xref target="RFC8259"/> to encode the challenges, responses, results and
errors. Encapsulation of EAP-PPT method can be supported by any tunnel-
based EAP methods e.g. Protected EAP <xref target="PEAP"/>, Tunneled Transport Layer
Security EAP (TTLS) <xref target="RFC5281"/>, EAP Flexible Authentication via
Secure Tunneling (EAP-FAST) <xref target="RFC4851"/> and Tunnel Extensible
Authentication Protocol (TEAP) <xref target="RFC7170"/>.</t>
        <t>Optionally, the Privacy Pass token <bcp14>MAY</bcp14> also carry extensions<br/>
(<xref target="I-D.draft-ietf-privacypass-auth-scheme-extensions"/>) with
additional metadata relevant to the EAP-PPT Server. An example of an
extension that could be useful in EAP-PPT is token expiration, since
tokens may be issued with a limited lifetime for security reasons. An
expiration extension is described in <xref target="I-D.draft-hendrickson-privacypass-expiration-extension"/>.</t>
      </section>
      <section anchor="successful-authentication">
        <name>Successful Authentication</name>
        <t><xref target="authsuccess"/> shows an example of basic, successful authentication
exchange in EAP-PPT. At the minimum, EAP-PPT uses two roundtrips to
authenticate and authorize the Peer. As in other EAP schemes, an
identity request/response message pair is usually exchanged first.
As specified in <xref target="RFC3748"/> the initial identity request is not
required, and <bcp14>MAY</bcp14> be bypassed in cases where the EAP-PPT Server can
presume the identity.</t>
        <t>After obtaining the identity, the EAP-PPT Server constructs
EAP-Request/PPT-Challenge message with a set of token Challenges
and sends it to the EAP-PPT peer. EAP-Request/PPT-Challenge message
encodes the set of token Challenges in JSON <xref target="RFC8259"/> format.</t>
        <t>On receiving EAP-Request/PPT-Challenge message, the EAP-PPT peer
looks at the each token Challenge and looks up the most suitable
Privacy Pass token. If EAP-PPT Peer successfully finds the Privacy Pass
token, it constructs EAP-Response/PPT-Challenge message containing the
Privacy Pass token, and send it to the EAP-PPT server.
EAP-Response/PPT-Challenge message encodes the response data in JSON
<xref target="RFC8259"/> format.</t>
        <t>The EAP-PPT server verifies the received Privacy Pass token in the
EAP-Response/PPT-Challenge message. After a successful token
Redemption, the EAP-PPT server sends EAP-Success.</t>
        <t>EAP-PPT Server verifies the Privacy Pass token using a procedure
called token Redemption <xref section="2.2" sectionFormat="of" target="RFC9577"/>.</t>
        <figure anchor="authsuccess">
          <name>EAP-PPT Successful Authentication</name>
          <artwork><![CDATA[
+----------+                                     +----------+
|          |                                     |          |
| EAP-PPT  |                                     | EAP-PPT  |
|  Peer    |                                     |  Server  |
|          |                                     |          |
+----------+                                     +----------+
     |                                                 |
     |             EAP-Request/Identity                |
     |<------------------------------------------------|
     |                                                 |
     |                                                 |
     |        EAP-Response/Identity (User's NAI)       |
     |------------------------------------------------>|
     |                                                 |
     |                                                 |
     |       EAP-Request/PPT-Challenge (challenges)    |
     |<------------------------------------------------|
     |                                                 |
     |                                                 |
     |        EAP-Response/PPT-Challenge (token)       |
     |------------------------------------------------>|
     |                                                 |
     |                                            +----------+
     |                                            | token    |
     |                                            | redeemed |
     |                                            |          |
     |                                            +----------+
     |                 EAP-Success                     |
     |<------------------------------------------------|
     |                                                 |
     |                                                 |
]]></artwork>
        </figure>
      </section>
      <section anchor="failed-authentication">
        <name>Failed Authentication</name>
        <t><xref target="authfail"/> shows how EAP-PPT server rejects the peer when
token redemption fails. EAP-PPT Server sends
EAP-Request/PPT-Error message containing the error information
like error code and error description as described in <xref target="errorcodes"/>. 
The error information is encoded in JSON <xref target="RFC8259"/> format. 
EAP-PPT peer responds to EAP-Request/PPT-Error with 
EAP-Response/PPT-Error without any data.</t>
        <figure anchor="authfail">
          <name>EAP-PPT Authentication Failure</name>
          <artwork><![CDATA[
+----------+                                     +----------+
|          |                                     |          |
| EAP-PPT  |                                     | EAP-PPT  |
|  Peer    |                                     |  Server  |
|          |                                     |          |
+----------+                                     +----------+
     |                                                 |
     |             EAP-Request/Identity                |
     |<-------------------------------------------------
     |                                                 |
     |                                                 |
     |        EAP-Response/Identity (User's NAI)       |
     |------------------------------------------------>|
     |                                                 |
     |                                                 |
     |       EAP-Request/PPT-Challenge (challenges)    |
     |<------------------------------------------------|
     |                                                 |
     |                                                 |
     |        EAP-Response/PPT-Challenge (token)       |
     |------------------------------------------------>|
     |                                                 |
     |                                            +----------+
     |                                            | failed   |
     |                                            | to       |
     |                                            | redeem   |
     |                                            | token    |
     |                                            +----------+
     |         EAP-Request/PPT-Error (error)           |
     |<------------------------------------------------|
     |                                                 |
     |                                                 |
     |             EAP-Response/PPT-Error              |
     |------------------------------------------------>|
     |                                                 |
     |                                                 |
     |                   EAP-Failure                   |
     |<------------------------------------------------|
     |                                                 |
     |                                                 |

]]></artwork>
        </figure>
      </section>
      <section anchor="remediation">
        <name>Remediation</name>
        <t>An EAP-PPT server <bcp14>MAY</bcp14> successfully validate a token, but fail
to validate metadata carried in an extension. The EAP-PPT server
<bcp14>MAY</bcp14> require different or more recently generated metadata, for
example. In this case the EAP-PPT server <bcp14>MAY</bcp14> reject, or
conditionally accept an EAP-PPT Authentication.</t>
        <t>As shown in <xref target="remediate"/>, after successful token redemption,
the  EAP-PPT server <bcp14>MAY</bcp14> respond with a PPT error message containing
error information like an error code and error description
(see <xref target="errorcodes"/>). to inform the EAP-PPT peer of the metadata
validation issue. In this case, the EAP-PPT server <bcp14>MAY</bcp14> respond with 
an EAP-Failure or EAP-Success message, depending on the metadata
specific policies set on the EAP-PPT server side. Since the peer 
proves the authenticity of issuance of token by providing
cryptographically correct token, the EAP-PPT server <bcp14>MAY</bcp14> decide to 
authorize the Peer conditionally.</t>
        <t>The EAP-PPT server <bcp14>MAY</bcp14> optionally also include a session-timeout value
in the PPT-Error, informing the EAP-PPT peer how long the session will
be permitted  in order for the EAP-Peer to remediate and request a new
token from its issuer. If the session-timeout attribute is included in
the PPT-Error (see <xref target="errorcodes"/>), the AAA server <bcp14>MUST</bcp14> also include 
a RADIUS Session-Timeout attribute (see <xref section="5.27" sectionFormat="of" target="RFC2865"/>) 
with the same value in the Access-Accept RADIUS message to the authenticator
(e.g., Network Access Server or IKEv2 Responder)). The EAP-PPT peer
responds to the EAP-Request/PPT-Error with EAP-Response/PPT-Error
without any data. The EAP-PPT peer <bcp14>MAY</bcp14> use the allotted
session time to fetch a new token by contacting its attester. After 
getting a new token issued, the EAP-PPT peer may subsequently re-authenticate.</t>
        <figure anchor="remediate">
          <name>EAP-PPT Authentication Success with remediation</name>
          <artwork><![CDATA[
+----------+                                     +----------+
|          |                                     |          |
| EAP-PPT  |                                     | EAP-PPT  |
|  Peer    |                                     |  Server  |
|          |                                     |          |
+----------+                                     +----------+
     |                                                 |
     |             EAP-Request/Identity                |
     |<------------------------------------------------|
     |                                                 |
     |                                                 |
     |        EAP-Response/Identity (User's NAI)       |
     |------------------------------------------------>|
     |                                                 |
     |                                                 |
     |       EAP-Request/PPT-Challenge (challenges)    |
     |<------------------------------------------------|
     |                                                 |
     |                                                 |
     |        EAP-Response/PPT-Challenge (token)       |
     |------------------------------------------------>|
     |                                                 |
     |                                            +----------+
     |                                            | token    |
     |                                            | redeemed |
     |                                            | with     |
     |                                            | invalid  |
     |                                            | extension|
     |                                            | metadata |
     |                                            +----------+
     |         EAP-Request/PPT-Error (error)           |
     |<------------------------------------------------|
     |                                                 |
     |                                                 |
     |             EAP-Response/PPT-Error              |
     |------------------------------------------------>|
     |                                                 |
     |                                                 |
     |                   EAP-Success                   |
     |<------------------------------------------------|
     |                                                 |
     |                                                 |

]]></artwork>
        </figure>
      </section>
      <section anchor="privacy">
        <name>Privacy</name>
        <t>The fundamental building block of privacy in EAP-PPT is use of Privacy
Pass token, which is unlinkable authenticator, for authorization of the
Peer. EAP-PPT peer selects an issuer to get a token issued from, using
Issuance Protocol <xref target="RFC9578"/>. The Issuer generates a token response
based on the token request, which is returned to the Client (generally
via the Attester). Upon receiving the token response, the EAP-PPT peer
computes a token from the token challenge and token response. This
token can be validated by anyone with the per-Issuer key but cannot be
linked to the content of the token request or token response.</t>
        <t>If the EAP-PPT peer has a token, it includes it in a response to a
challenge from EAP-PPT server. This token <bcp14>SHOULD</bcp14> be sent only once in
reaction to a challenge; peers <bcp14>SHOULD NOT</bcp14> send tokens more than once,
even if they receive duplicate or redundant challenges.</t>
        <t>The EAP-PPT server validates that the token was generated by the
expected Issuer and has not already been redeemed for the corresponding
token challenge. Mechanism to prevent double-spending of tokens is out
of scope of EAP-PPT method.</t>
        <t><xref section="4" sectionFormat="of" target="RFC9576"/> discusses deployement models in detail. It is
<bcp14>RECOMMENDED</bcp14> to use a deployment model that guarantees EAP peer-server,
Issuer-EAP peer, and Attester-EAP server unlinkability. Mechanisms for
enforcing non-collusion are out of scope of EAP-PPT method.</t>
        <t>EAP-PPT peer <bcp14>MAY</bcp14> opt for token Caching by getting multiple tokens
issued from a single token challenge structure
(<xref section="2.1.1" sectionFormat="of" target="RFC9577"/>). This improves privacy by separating
the time of token issuance from the time of token redemption.
Optionally, the peer <bcp14>MAY</bcp14> use a vaiant of Privacy Pass Issuance<br/>
(<xref target="I-D.draft-ietf-privacypass-batched-tokens"/>) to get more tokens
issued and cached at a time.</t>
        <t>EAP peer and server <bcp14>MUST</bcp14> send anonymous Network Access Identifiers
(NAIs) (<xref section="2.4" sectionFormat="of" target="RFC7542"/>) in the first and subsequent EAP-
Response/Identity messages. EAP peer <bcp14>MUST NOT</bcp14> send its username (or
any other permanent identifiers) in the Identity Response. Following
<xref target="RFC7542"/>, it is <bcp14>RECOMMENDED</bcp14> to omit the username (i.e., the NAI
is @realm), but other constructions such as a fixed username (e.g.,
anonymous@realm) is allowed. Note that the NAI <bcp14>MUST</bcp14> be a UTF-8 string
as defined by the grammar in <xref section="2.2" sectionFormat="of" target="RFC7542"/>.</t>
        <t>During TLS hanshake in the first phase, EAP peer <bcp14>MUST</bcp14> send a
Certificate message containing no certificates as described in
<xref section="4.4.2" sectionFormat="of" target="RFC8446"/>, if CertificateRequest message is
received. Many client certificates contain an identity such as an
email address, and therefore, this document forbids client
authentication during first phase.</t>
        <t>It is desired to support fast reconnect (<xref section="7.2.1" sectionFormat="of" target="RFC3748"/>)
by shortening the TLS conversation using session resumption mechanism
(<xref section="2.1.2" sectionFormat="of" target="RFC5216"/>)
during the first phase. EAP peer presents an identifier that was issued
previously by the server, to attempt the session resumption. When a peer
attempts to resume a TLS session using such an identifier it allows
the EAP server to detect peer's revisit to the network. Similarly,
use of Protected Access Credential (PAC) in EAP-FAST method
(<xref section="3.2.2" sectionFormat="of" target="RFC4851"/>) can potentially help the server
determine peer's presence across session resumptions. This document
recommends use of session resumption to be limited to the current
association to the network. The EAP peer <bcp14>MUST</bcp14> perform full TLS handshake
durist the first phase after every new association to the network.
For example, an EAP peer can continue to resume TLS sessions during the
re-authentications as long as the client device is associated to same
access point of the secure wireless LAN <xref target="IEEE-802.11"/>, so session resumption
<bcp14>MUST</bcp14> be used only on the same Authenticator as for the original session.</t>
      </section>
      <section anchor="key-material-generation">
        <name>Key Material Generation</name>
        <t>The keys generated by this protocol, MSK and EMSK, are each in 64
octets in length. The protocol uses TLS exporter interface <xref target="RFC5705"/>
to generate the key material. The output of the exporter is intended
to be associated with the TLS session established in the first phase,
a unique label string, and a context. Type is the value of the EAP Type
field defined in <xref section="2" sectionFormat="of" target="RFC3748"/>, and it contributes to the
context value. For EAP-PPT, the Type value is 0x39. Context value is
constructed by concatenating Type value with Privacy Pass token value
that was sent in EAP-Response/PPT-Challenge message. Key material <bcp14>MUST</bcp14>
be generated by the EAP-PPT peer after receiving EAP Success from the
EAP-PPT server.</t>
        <artwork><![CDATA[
Type = 0x39
Context = Type || token
Key_Material = TLS_Exporter("EXPORTER_EAP_PPT_Key_Material",
                            Context, 128)
]]></artwork>
        <t>The MSK and EMSK are dervied from the Key_Material as described in
<xref section="7.10" sectionFormat="of" target="RFC3748"/>.</t>
        <artwork><![CDATA[
MSK = Key_Material(0, 63)
EMSK = Key_Material(64, 127)
]]></artwork>
        <t>TLS_Exporter function is defined in <xref section="4" sectionFormat="of" target="RFC5705"/></t>
      </section>
      <section anchor="channel-binding">
        <name>Channel Binding</name>
        <t><xref target="RFC6677"/> defines channel bindings for EAP which solve the "lying NAS" and
the "lying provider" problems, using a process in which the EAP peer gives
information about the characteristics of the service provided by
the authenticator to the Authentication, Authorization, and Accounting (AAA) 
server protected within the EAP authentication method. This allows the server
to verify the authenticator is providing information to the peer that is 
consistent with the information received from this authenticator as well as 
the information stored about this authenticator.</t>
        <t>EAP-PPT server can optionally request channel binding information to the EAP-
PPT peer after a successful redemption of the token sent in EAP-Response/PPT-
Challenge mesage. EAP-PPT server uses EAP-Request/PPT-Channel-Binding message
to request the channel binding information to the peer. EAP-PPT server <bcp14>MUST</bcp14>
send EAP-Request/PPT-Channel-Binding message after a successful redemption of
the token and before sending EAP-Success message. EAP-PPT peer <bcp14>MUST</bcp14> send
channel binding information in EAP-Response/PPT-Channel-Binding message in
response to EAP-Request/PPT-Channel-Binding message. EAP-PPT <bcp14>MUST</bcp14> send
the channel-binding information as defined in <xref section="5.3" sectionFormat="of" target="RFC6677"/>.</t>
        <t>EAP-Request/PPT-Channel-Binding message is optional, and therefore EAP-PPT
server may skip it when the EAP server has already received the information
through EAP methods executed before EAP-PPT.</t>
      </section>
    </section>
    <section anchor="message-format">
      <name>Message Format</name>
      <section anchor="packet-format">
        <name>Packet Format</name>
        <t>EAP-PPT Packet Format is shown below.</t>
        <figure anchor="header">
          <name>EAP-PPT Header</name>
          <artwork><![CDATA[
0                   1                   2                   3   
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Code      |  Identifier   |            Length             |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Type      |    Subtype    |             Data             
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+                                                                

]]></artwork>
        </figure>
        <t>Code
      1 for request, 2 for response.</t>
        <t>Identifier
      The Identifier field is one octet and aids in matching
      responses with requests.  The Identifier field <bcp14>MUST</bcp14> be
      changed for each request packet and <bcp14>MUST</bcp14> be echoed in
      each response packet.</t>
        <t>Length
      The Length field is two octets and indicates the length
      of the EAP packet including the Code, Identifier, Length,
      Type, Subtype, and Data fields.</t>
        <t>Type
      57 (EAP-PPT)</t>
        <t>Subtype
      Message subtypes as defined in <xref target="subtype"/></t>
        <t>Data
      Data in JSON <xref target="RFC8259"/> format.</t>
      </section>
      <section anchor="subtypes">
        <name>Subtypes</name>
        <table anchor="subtype">
          <name>EAP-PPT Subtypes</name>
          <thead>
            <tr>
              <th align="left">Subtype</th>
              <th align="left">Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">1</td>
              <td align="left">A PPT-Challenge request or PPT-Challenge response.</td>
            </tr>
            <tr>
              <td align="left">2</td>
              <td align="left">A PPT-Error request or PPT-Error response.</td>
            </tr>
            <tr>
              <td align="left">3</td>
              <td align="left">A PPT-Channel-Binding request or PPT-Channel-Binding response.</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="messages">
        <name>Messages</name>
        <t>This section specifies the messages used in EAP-PPT.</t>
        <section anchor="eap-requestppt-challenge">
          <name>EAP-Request/PPT-Challenge</name>
          <t>The Server sends this message to the peer after successfully
learning the identity of the peer. The purpose of this message
is to present multiple token challenges to the peer and receive
a Privacy Pass token for one of the challenges from the peer.
This message is sent with subtype 1 (<xref target="subtype"/>) and data is
encoded in JSON <xref target="RFC8259"/> format as shown in <xref target="challenges"/>
below -</t>
          <table anchor="challenges">
            <name>Token Challenges</name>
            <thead>
              <tr>
                <th align="left">Key</th>
                <th align="left">Type</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">challenges</td>
                <td align="left">array</td>
                <td align="left">Array of one or more objects. Each element is an object that contains keys that are part the challenge. This is a required parameter.</td>
              </tr>
            </tbody>
          </table>
          <table anchor="challengekeys">
            <name>Token Challenge Keys</name>
            <thead>
              <tr>
                <th align="left">Key</th>
                <th align="left">Type</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">challenge</td>
                <td align="left">string</td>
                <td align="left">A string that contains a base64url token challenge value, encoded per <xref target="RFC4648"/>. This document follows the default padding behavior described in <xref section="3.2" sectionFormat="of" target="RFC4648"/>, so the base64url value <bcp14>MUST</bcp14> include padding. The token structure is defined in <xref section="2.2.1" sectionFormat="of" target="RFC9577"/>. This key is based on the challenge parameter defined in <xref section="2.1.2" sectionFormat="of" target="RFC9577"/>. This is a required parameter.</td>
              </tr>
              <tr>
                <td align="left">token-key</td>
                <td align="left">string</td>
                <td align="left">AA string that contains a base64url-encoded public key for use with the issuance protocol indicated by the challenge key. This key is based on the token-key parameter defined in <xref section="2.1.2" sectionFormat="of" target="RFC9577"/>. This parameter <bcp14>MAY</bcp14> be omitted in deployments where peers are able to retrieve the Issuer key using an out-of-band mechanism.</td>
              </tr>
              <tr>
                <td align="left">extension-types</td>
                <td align="left">array</td>
                <td align="left">An array of ExtensionType that the EAP-PPT server is requesting the token to bind to. ExtensionType is defined in Section 3 of I-D.draft-ietf-privacypass-auth-scheme-extensions. This parameter is meaningful only if the Issuer, EAP-PPT peer and server have an out-of-band agreement to bind the extension to the token. This is an optional parameter.</td>
              </tr>
            </tbody>
          </table>
          <t>EAP-Request/PPT-Challenge Message carries JSON key "challenges"
which is a JSON array of JSON objects. Each element in
"challenges" is a JSON object that contains two keys i.e.
"challenge" and "token-key", and optionally an array of
"extension-types" as well, as shown in <xref target="challengekeys"/>.</t>
          <t>Example EAP-Request/PPT-Challenge Data -</t>
          <figure anchor="pptchallenge">
            <artwork><![CDATA[
{
    "challenges":
    [
        {
            "challenge": "AAIADmlzc3Vlci5leGFtcGxlIIo-g6M9mAB
            dLzC-9Bn6a_TNXGAF42sShbu0zNQPpLODAA5vcmlnaW4uZXhh
            bXBsZQ==",
            "token-key": "MIIBUjA9BgkqhkiG9w0BAQowMKANMAsGCWC
            GSAFlAwQCAqEaMBgGCSqGSIb3DQEBCDALBglghkgBZQMEAgKi
            AwIBMAOCAQ8AMIIBCgKCAQEAyxrta2qV9bHOATpM_KsluUsuZ
            KIwNOQlCn6rQ8DfOowSmTrxKxEZCNS0cb7DHUtsmtnN2pBhKi
            7pA1I-beWiJNawLwnlw3TQz-Adj1KcUAp4ovZ5CPpoK1orQwy
            B6vGvcte155T8mKMTknaHl1fORTtSbvm_bOuZl5uEI7kPRGGi
            KvN6qwz1cz91l6vkTTHHMttooYHGy75gfYwOUuBlX9mZbcWE7
            KC-h6-814ozfRex26noKLvYHikTFxROf_ifVWGXCbCWy7nqR0
            zq0mTCBz_kl0DAHwDhCRBgZpg9IeX4PwhuLoI8h5zUPO9wDSo
            1Kpur1hLQPK0C2xNLfiJaXwIDAQAB"
        },
        {
            "challenge": "AAEADmlzc3Vlci5leGFtcGxlIIo-g6M9mA
            BdLzC-9Bn6a_TNXGAF42sShbu0zNQPpLODAA5vcmlnaW4uZXh
            hbXBsZQ==",
            "token-key": "67H-0zgxA2HAjQx1dpaWcSluBemaF9eSbf
            wopT-r1In6wPgryoYkmmaPOlv6s3TJ"  
            "extension-types":
            [
                1,5,6
            ]
        }
    ]
}
]]></artwork>
          </figure>
        </section>
        <section anchor="eap-responseppt-challenge">
          <name>EAP-Response/PPT-Challenge</name>
          <t>The peer sends this message to the server in response to a valid
EAP-Request/PPT-Challenge Message. Sending this Message indicates
that the peer was able to look up a Privacy Pass token for one of
the received challenges. This message is sent with subtype 1
(<xref target="subtype"/>) and data is encoded in JSON <xref target="RFC8259"/> format as
shown in <xref target="challengeresponse"/>.</t>
          <table anchor="challengeresponse">
            <name>Token Challenge Response Keys</name>
            <thead>
              <tr>
                <th align="left">Key</th>
                <th align="left">Type</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">token</td>
                <td align="left">string</td>
                <td align="left">A string that contains base64url-encoded token structure value per <xref section="2.2.1" sectionFormat="of" target="RFC9577"/>. This is a required parameter.</td>
              </tr>
              <tr>
                <td align="left">extensions</td>
                <td align="left">string</td>
                <td align="left">A string that contains base64url-encoded extension structure (Section 3 of .draft-ietf-privacypass-auth-scheme-extensions). This is an optional parameter.</td>
              </tr>
            </tbody>
          </table>
          <t>The peer <bcp14>MUST</bcp14> send empty token string when it fails to find
a valid token for one of the received challenges. On receiving
an empty token string in this message, the server <bcp14>MUST</bcp14> send 
EAP-Failure message to the peer.</t>
          <t>Example EAP-Response/PPT-Challenge Data -</t>
          <figure anchor="pptchallengeresponse">
            <artwork><![CDATA[
{
    "token": "AAEADmlzc4Vlci5leGFtcGxlIIo-g6M9mABdLzC-1Bn6a_TNX
    GAF52sShbu0zNQPpLODAA5vcmlnaW4uZXhhbXBsCB=="
}
]]></artwork>
          </figure>
        </section>
        <section anchor="eap-requestppt-error">
          <name>EAP-Request/PPT-Error</name>
          <t>The server sends this message to the peer when token
redemption fails. The purpose of this message is to report
redemption failure to the peer along with relevant information
that may be useful to the peer. This message is sent with
subtype 2 (<xref target="subtype"/>) and data is encoded in JSON <xref target="RFC8259"/>
format as shown in <xref target="error"/>.</t>
          <table anchor="error">
            <name>Error Keys</name>
            <thead>
              <tr>
                <th align="left">Key</th>
                <th align="left">Type</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">code</td>
                <td align="left">number</td>
                <td align="left">An error code that describes the reason for the redemption failure. The range is 1-100. This key is required.</td>
              </tr>
              <tr>
                <td align="left">description</td>
                <td align="left">string</td>
                <td align="left">Human-readable UTF-8 text providing additional information, used to assist the user of the client device in understanding the error. This is an optional key.</td>
              </tr>
              <tr>
                <td align="left">session-timeout</td>
                <td align="left">number</td>
                <td align="left">Time in second after which the session is terminated by the authenticator. This is an optional key.</td>
              </tr>
            </tbody>
          </table>
          <t>Example EAP-Request/PPT-Error Data -</t>
          <figure anchor="ppterror">
            <artwork><![CDATA[
{
    "code": 1,
    "description": "invalid token format"
}
]]></artwork>
          </figure>
          <section anchor="errorcodes">
            <name>Error Codes</name>
            <table anchor="errorcode">
              <name>Error Codes</name>
              <thead>
                <tr>
                  <th align="left">Code</th>
                  <th align="left">Description</th>
                </tr>
              </thead>
              <tbody>
                <tr>
                  <td align="left">1</td>
                  <td align="left">This code indicates a failure in validating the token data. This may occur due to incorrect formatting or encoding of the data.</td>
                </tr>
                <tr>
                  <td align="left">2</td>
                  <td align="left">This code indicates redemption failure. This is a fatal error, and only way for the peer to recover from this failure is to retry the EAP-PPT authentication with new token.</td>
                </tr>
                <tr>
                  <td align="left">3</td>
                  <td align="left">This code means the EAP-PPT server is unable to perform the token redemption at the moment. This can be used by the client to retry spending the token later.</td>
                </tr>
                <tr>
                  <td align="left">4</td>
                  <td align="left">This code indiates the server detected a double spend of the token. This is a fatal error, and only way for the  peer to recover from this failure is to retry the EAP-PPT authentication with a new token.</td>
                </tr>
                <tr>
                  <td align="left">5</td>
                  <td align="left">This code indicates undefined failure. The client <bcp14>MAY</bcp14> choose to the spend the same oken later.</td>
                </tr>
                <tr>
                  <td align="left">6</td>
                  <td align="left">This code indicates token redemption success with an unexpected extension parameter value. This is a fatal error, and only way for the peer to recover from this failure is to retry the EAP-PPT authentication with a new token, binding to expected extension parameter value.</td>
                </tr>
                <tr>
                  <td align="left">7</td>
                  <td align="left">This code indicates token redemption success with an unexpected extension parameter value. However, the server side policy makes this a non-fatal error, and therefore, the peer is authorized unconditionally.</td>
                </tr>
                <tr>
                  <td align="left">8</td>
                  <td align="left">This code indicates token Redemption success with an unexpected extension parameter value. However, the server side policy makes this a non-fatal error, and therefore the peer is authorized conditionally. The condition here is - an authorization for limited time. The limited time authorization is indicated by sending session-timeout parameter along with the error code.</td>
                </tr>
                <tr>
                  <td align="left">9-80</td>
                  <td align="left">Reserved</td>
                </tr>
                <tr>
                  <td align="left">81-100</td>
                  <td align="left">Vendor Specific Errors.</td>
                </tr>
              </tbody>
            </table>
          </section>
        </section>
        <section anchor="eap-responseppt-error">
          <name>EAP-Response/PPT-Error</name>
          <t>The peer sends this message as an acknowledgement to the
server in response to a valid EAP-Request/PPT-Error Message.
This message is sent with subtype 2 (<xref target="subtype"/>) and it does
not carry data.</t>
        </section>
        <section anchor="eap-requestppt-channel-binding">
          <name>EAP-Request/PPT-Channel-Binding</name>
          <t>EAP-PPT server sends this message to the peer after a successful
redemption of the token received in EAP-Response/PPT-Challenge
message. The purpose of this message is to request channel
binding information to the peer. This message is sent with
subtype 3 (<xref target="subtype"/>) and and it does not carry data.</t>
        </section>
        <section anchor="eap-responseppt-channel-binding">
          <name>EAP-Response/PPT-Channel-Binding</name>
          <t>The peer sends this message as an in response to a EAP-Request/
PPT-Channel-Binding Message. This message is sent with subtype 3
(<xref target="subtype"/>) and the data field contains channel-binding message
as defined in <xref section="5.3" sectionFormat="of" target="RFC6677"/>.
EAP-PPT server <bcp14>MAY</bcp14> send EAP-Failure message if the channel-binding
data is not found valid or satisfactory, depending on the server
side policy.</t>
        </section>
      </section>
    </section>
    <section anchor="errorhandling">
      <name>Error Handling</name>
      <section anchor="client-failure-scenarios">
        <name>Client Failure Scenarios</name>
        <section anchor="eap-ppt-peer-found-no-valid-token-for-token-challenge">
          <name>EAP-PPT peer found no valid token for token challenge</name>
          <t>If on receipt of an EAP-Request/PPT-Challenge, the EAP-PPT peer cannot present
a valid token matching for one of the received token challenges, then the 
EAP-PPT peer <bcp14>MUST</bcp14> respond with an empty token string in the
EAP-Response/PPT-Challenge message. In this case, the EAP-PPT server <bcp14>MUST</bcp14>
terminate the conversation by sending an EAP Failure packet.</t>
        </section>
        <section anchor="eap-ppt-peer-found-no-token-with-valid-extension-types-for-token-challenge">
          <name>EAP-PPT peer found no token with valid extension-types for token challenge</name>
          <t>If on receipt of an EAP-Request/PPT-Challenge, the EAP-PPT peer cannot present
a valid token bound to the extension-type(s) requested by the EAP-PPT server for 
one of the received token challenges, then the EAP-PPT peer <bcp14>MUST</bcp14> respond with
an empty token string in the EAP-Response/PPT-Challenge message. 
In this case, the EAP-PPT server <bcp14>MUST</bcp14> terminate the conversation by sending 
an EAP Failure packet.</t>
        </section>
      </section>
      <section anchor="server-failure-scenarios">
        <name>Server Failure Scenarios</name>
        <section anchor="eap-ppt-server-found-no-valid-token-challenge-for-user-nai">
          <name>EAP-PPT server found no valid token challenge for user NAI</name>
          <t>If on receipt of a EAP Identity Response the EAP-PPT server does not have 
a token challenge for the user's NAI, the EAP-PPT server <bcp14>MUST</bcp14> terminate the
conversation by responding with an EAP Failure packet.</t>
        </section>
        <section anchor="eap-ppt-server-is-unable-to-validate-token-data">
          <name>EAP-PPT server is unable to validate token data</name>
          <t>If on receipt of an EAP-Response/PPT-Challenge, the EAP-PPT server is
unable to validate the token data presented by the EAP-PPT peer (due to 
incorrect data, formatting or encoding), the EAP-PPT server <bcp14>MUST</bcp14> respond with
an EAP-Request/PPT-Error with error code 1 (see <xref target="errorcodes"/>). The 
EAP-PPT peer <bcp14>MUST</bcp14> subsequently acknowledge the error with an 
EAP-Response/PPT-Error message, after which the EAP-PPT server <bcp14>MUST</bcp14> respond
with EAP Failure as shown in <xref target="authfail"/>.</t>
        </section>
        <section anchor="eap-ppt-server-token-redemption-failure">
          <name>EAP-PPT server token redemption failure</name>
          <t>If on receipt of an EAP-Response/PPT-Challenge, the EAP-PPT server
token redemption fails, the EAP-PPT server <bcp14>MUST</bcp14> respond with an
EAP-Request/PPT-Error with error code 2 (see <xref target="errorcodes"/>).
The EAP-PPT peer <bcp14>MUST</bcp14> subsequently acknowledge the error with an
EAP-Response/PPT-Error, after which the EAP-PPT server <bcp14>MUST</bcp14> respond with 
EAP Failure as shown in <xref target="authfail"/>. The EAP-PPT peer <bcp14>MUST NOT</bcp14> use this
token in subsequent authentication.</t>
        </section>
        <section anchor="eap-ppt-server-temporary-failure">
          <name>EAP-PPT server temporary failure</name>
          <t>If the EAP-PPT server is (temporarily) unable to perform token redemption,
and it receives an EAP-Response/PPT-Challenge, the EAP-PPT server <bcp14>MUST</bcp14> 
respond with an EAP-Request/PPT-Error with error code 3 (see <xref target="errorcodes"/>).
The EAP-PPT peer <bcp14>MUST</bcp14> subsequently acknowledge the the error with an 
EAP-Response/PPT-Error message, after which the EAP-PPT server <bcp14>MUST</bcp14> respond
with EAP Failure as shown in <xref target="authfail"/>. The EAP-PPT peer <bcp14>MAY</bcp14> use this token
in subsequent authentication.</t>
        </section>
        <section anchor="eap-ppt-server-detected-double-spend">
          <name>EAP-PPT server detected double spend</name>
          <t>The EAP-PPT server <bcp14>MAY</bcp14> implement double spend detection, to ensure a token
is only used once. If the EAP-PPT server implementing double spend detection
detects double spend of a token sent in an an EAP-Response/PPT-Challenge, 
the EAP-PPT server <bcp14>MUST</bcp14> respond with an EAP-Request/PPT-Error with error code 4
(see <xref target="errorcodes"/>). The EAP-PPT peer <bcp14>MUST</bcp14> subsequently acknowledge the error 
with an EAP-Response/PPT-Error message, after which the EAP-PPT server <bcp14>MUST</bcp14>
respond with EAP Failure as shown in <xref target="authfail"/>. The EAP-PPT peer <bcp14>MUST NOT</bcp14>
use this token in subsequent authentication.</t>
        </section>
        <section anchor="eap-ppt-server-undefined-failure">
          <name>EAP-PPT server undefined failure</name>
          <t>If the EAP-PPT server is experiencing an undefined failure, when receiving
an EAP-Response/PPT-Challenge, the EAP-PPT server <bcp14>MUST</bcp14> respond with an 
EAP-Request/PPT-Error with error code 5 (see <xref target="errorcodes"/>). The EAP-PPT peer
<bcp14>MUST</bcp14> subsequently acknowledge the error with an EAP-Response/PPT-Error message,
after which the EAP-PPT server <bcp14>MUST</bcp14> respond with EAP Failure as shown 
in <xref target="authfail"/>. The EAP-PPT peer <bcp14>MAY</bcp14> use this token in subsequent 
authentication.</t>
        </section>
        <section anchor="eap-ppt-server-token-redemption-success-with-unexpected-extension-value">
          <name>EAP-PPT server token redemption success with unexpected extension value</name>
          <t>If on receipt of an EAP-Response/PPT-Challenge, the EAP-PPT server finds an
unexpected extension parameter value, the EAP-PPT server <bcp14>MAY</bcp14> deem this to be a
fatal error. In this case the EAP-PPT server <bcp14>MAY</bcp14> respond with an 
EAP-Request/PPT-Error with error code 6 (see <xref target="errorcodes"/>). The EAP-PPT peer 
<bcp14>MUST</bcp14> subsequently acknowledge the error with an EAP-Response/PPT-Error message,
 after which the EAP-PPT server <bcp14>MUST</bcp14> respond with EAP Failure as shown in 
<xref target="authfail"/>. The EAP-PPT peer <bcp14>MUST NOT</bcp14> use this token in subsequent
authentication.</t>
        </section>
      </section>
      <section anchor="conditional-acceptance-scenarios">
        <name>Conditional Acceptance Scenarios</name>
        <section anchor="eap-ppt-server-redemption-unexpected-extension-value-unconditional-access">
          <name>EAP-PPT server redemption, unexpected extension value, unconditional access</name>
          <t>If on receipt of a EAP-Response/PPT-Challenge, the EAP-PPT server token
redemption succeeds, but the EAP-PPT server finds an unexpected extension 
parameter value, The EAP-PPT server <bcp14>MAY</bcp14> deem this to be a recoverable error 
and allow the session to proceed unconditionally. In this case, the EAP-PPT
server <bcp14>MAY</bcp14> respond with an EAP-Request/PPT-Error with error code 7 
(see <xref target="errorcodes"/>). The EAP-PPT peer <bcp14>MUST</bcp14> subsequently acknowledge the
error with an EAP-Response/PPT-Error message, after which the EAP-PPT server 
<bcp14>MUST</bcp14> respond with EAP Success as shown in <xref target="authsuccess"/>.</t>
        </section>
        <section anchor="eap-ppt-server-redemption-unexpected-extension-value-conditional-access">
          <name>EAP-PPT server redemption, unexpected extension value, conditional access</name>
          <t>If on receipt of a EAP-Response/PPT-Challenge, the EAP-PPT server token
redemption succeeds, but the EAP-PPT server finds an unexpected extension
parameter value, The EAP-PPT server <bcp14>MAY</bcp14> deem this to be a recoverable error and
allow the session to proceed conditionally. In this case the EAP-PPT server 
<bcp14>MAY</bcp14> respond with an EAP-Request/PPT-Error with error code 8 
(see <xref target="errorcodes"/>). The EAP-PPT server <bcp14>MUST</bcp14> send a session-timeout value in 
the response message. The EAP-PPT peer <bcp14>MUST</bcp14> subsequently acknowledge the
error with an EAP-Response/PPT-Error message, after which the EAP-PPT server 
<bcp14>MUST</bcp14> respond with EAP Success as shown in <xref target="authsuccess"/>. The EAP Server <bcp14>MUST</bcp14>
include a session-timeout attribute in the RADIUS Access-Accept packet to the 
Authenticator, so it can terminate the session when the session-timeout 
condition is no longer met.</t>
          <t>An example of such condition is when the peer needs to remediate its device
to be compliant with the network access policy, or if the peer needs to get a new
token issued from the Issuer with expected extension parameter value. The length
of rgw  session timer should in principle be as short, as possible but long enough
for the device to reach compliance. For example for token issueance, if there is 
no user interaction required for issuance, a session timer of 1 minute should be 
sufficient. For remediation where user interaction is required, the session timeout 
could be more like 5 to 10 minutes.</t>
        </section>
      </section>
    </section>
    <section anchor="deployment">
      <name>Deployment Considerations</name>
      <t>EAP-PPT can be leveraged in a number of use cases and deployment models.
This section covers generic deployment recommendations to ensure end-to-end
privacy and unlinkability of tokens. This section also describes some specific
expected deployment models in which EAP-PPT can be leveraged.</t>
      <t>Although this section covers deployment of Origin, Issuer and Attester as it
relates to the EAP-PPT server, specifics on how to deploy Issuer and Attester
are not described here but can be found in <xref section="4" sectionFormat="of" target="RFC9576"/>.</t>
      <section anchor="recommendations-for-preserving-privacy">
        <name>Recommendations for preserving privacy</name>
        <section anchor="deploycollocation">
          <name>Collocating other functions with the EAP-PPT Server</name>
          <t>As discussed in <xref section="4" sectionFormat="of" target="RFC9576"/> and in <xref target="privacy"/>, it is
recommended to use a deployment model that guarantees EAP peer-server,
Issuer-EAP peer, and Attester-EAP server unlinkability. This is especially
pertinent in public use cases. In private use cases a single entity could 
deploy all functions.</t>
          <t>It is recommended to collocate the phase 1 EAP-Server with the EAP-PPT server,
as EAP-Server separation can introduce vulnerabilities as described in
<xref target="eapserver"/>.</t>
        </section>
        <section anchor="deployclientid">
          <name>Protecting client identity</name>
          <t>Please refer to the <xref target="privacy"/> section for deployment considerations that are
required to protect the client identity.</t>
        </section>
        <section anchor="separatingtime">
          <name>Separating Issuance and Verification over time</name>
          <t><xref section="3.1" sectionFormat="of" target="RFC9576"/> describes the interaction between Privacy Pass
Issuance and Verification protocols. As described, in many cases, when a Client
interacts with an Origin, a Client will obtain a token at the time of that 
interaction. In this case the time between Issuance and Verification is short 
enough to allow for correlation.</t>
          <t>In order to further reduce the probability of collusion between actors
participating in Issuance and Verification and achieve Issuer-Client and 
Origin-Client unlinkability, Issuance and Verification can be separated
over time. A client can request Issuance of one or more tokens and cache
them in secure storage. This allows separation in time between Issuance and 
Verification of the token, so time-based correlation is not possible. When 
leveraging EAP-PPT to access network resources, it is possible that the client
does not have a network interface available to perform Issuance over, so 
also for this reason caching tokens is preferred.</t>
        </section>
      </section>
      <section anchor="publiccase">
        <name>Recommendations for usage in public use cases</name>
        <t>In public use cases, a network service provider may be working with one or more
identity providers that are authenticating end-user devices using privacy pass
tokens. As described in <xref target="deploycollocation"/> it is recommended for the EAP-PPT
server to be implemented by an entity other than the Attester or Issuer, to
avoid the perception of collusion. In a public deployment scenario, the EAP-PPT
server is likely to be collocated with the network service provider, or could 
be a service that the network service provider consumes from a 3rd party 
service provider, other than the Attester or Issuer.</t>
        <t>In order to verify a token, EAP-PPT Server requires key material for the issuers
specified in the TokenChallenge. In a public use case, this information will 
have to be shared between the issuer and EAP-PPT Server. The mechanism in which
the Issuer shares this information with the EAP-PPT server is out of scope of 
this document.</t>
      </section>
      <section anchor="recommendations-for-usage-in-private-use-cases">
        <name>Recommendations for usage in private use cases</name>
        <t>It is recommended that the guidelines stipulated in <xref target="publiccase"/> are also
followed for private deployments, however in use cases where the network service 
provider is also the Attester, collocation of entities may be unavoidable.
When collocating entities, separating Issuance and Verification over time as
described in <xref target="separatingtime"/> provides additional privacy protection, as it
becomes harder for  entities to collude.</t>
      </section>
      <section anchor="recommendations-for-usage-in-federated-use-cases-openroaming">
        <name>Recommendations for usage in federated use cases (OpenRoaming)</name>
        <t>OpenRoaming, as described in <xref target="I-D.draft-tomas-openroaming"/>, is an open
federation of entities of different types, mainly targeted at providing
public Wi-Fi access. OpenRoaming defines distinct roles in its federation
architecture: Network Access Providers provide access to network resources,
and Identity Providers authenticate users for those network access providers.
Members of the federation are identified by private PKI, managed by the
Wireless Broadband Alliance (WBA). The members use these certificates to
mutually authenticate each-others and secure RADIUS over TLS (RadSec) messages
used to transport EAP conversations between Network Access Providers and Identity
Providers. A Network Access Provider discovers the authoritative Identity
Provider for a client by resolving the realm portion of the outer identity
provided by the client as described in <xref target="RFC7585"/>.</t>
        <t>OpenRoaming comprises of a privacy policy, and aims to protect en-user privacy,
however as it uses RADIUS attributes and EAP, inherently, information 
about end-users could be shared between Identity Provider and Network Access
Provider. Examples of RADIUS attributes that could expose user privacyt are
Calling-Station-Id (mac address of hte device), Chargeable-User-ID, NAS-ID (location).
{Section 8 of ?I-D.draft-tomas-openroaming}} describes the RADIUS
attributes OpenRoaming supports.  EAP-PPT can add additional privacy protection
to a federated use case such as OpenRoaming by separating the Issuance from 
Verification, so the entity performing the Authentication is not able to
willingly or unwillingly share private information.</t>
        <t>Where an OpenRoaming IDP both issues and verifies a credential, with EAP-PPT
these roles are separated. In order to implement EAP-PPT in OpenRoaming,
the Attester/Issuer would have to have an agreement with the EAP-PPT server
verifying or redeeming the token. Together they are the OpenRoaming IDP.
Alternatively, new roles could be defined in the OpenRoaming federation to 
allow Attesters/Issuers to interoperate with EAP-PPT servers within the 
OpenRoaming federation.</t>
        <t>The EAP-PPT Server could be implemented by the Network Access Provider directly,
or by an entity in the federation.</t>
      </section>
    </section>
    <section anchor="security">
      <name>Security Considerations</name>
      <section anchor="privatetoken-authentication-scheme">
        <name>PrivateToken authentication Scheme</name>
        <t>Security considerations applicable discussed in <xref section="5" sectionFormat="of" target="RFC9577"/>
are applicable to EAP-PPT.</t>
      </section>
      <section anchor="integrity-protection">
        <name>Integrity Protection</name>
        <t>Since EAP-PPT method is used for anonymous authentication of EAP
peer, it is <bcp14>REQUIRED</bcp14> to execute it within a server authenticated
TLS tunnel, provided by a tunnnel-based EAP method. When EAP-PPT
is used to authenticate IKEv2 initiator to the responder, it is
<bcp14>REQUIRED</bcp14> to use it in conjunction with a public-key-signature-
based authentication of the responder to the initiator, before
initiating the EAP-PPT authentication.</t>
      </section>
      <section anchor="eapserver">
        <name>EAP Server implementation</name>
        <t>Allowing the EAP Phase 1 conversation to be terminated at a different server 
than the EAP-Phase 2 conversation can introduce vulnerabilities if there is 
not a proper trust relationship and protection for the protocol between the 
two servers.</t>
        <t>As EAP-PPT is an identity-free credential, it mitigates loss of identity 
protection scenarios better than EAP-methods carrying identity.
Identity protection is ensured, even if the credential is exposed to an 
attacker. Offline dictionary attacks are also mitigated with EAP-PPT as the 
credential is a single-use cryptograhically signed token.</t>
        <t>Separation of Phase 1 and Phase 2 EAP server with EAP-PPT as the inner
EAP method can still introduce vulnerabilities to on-path active attacks
between these EAP Servers if there is not a proper trust relationship between
the servers, or if the protocol between the servers is not properly secured.
An attacker could intercept a token in the PPT-Challenge response, or alter
an EAP-Success or EAP-Failure message. It is important to note however that
due to the single-use identity-free nature of the credential, the longevity of
the attack is limited.</t>
        <t>Therefore, separation of the EAP-Server (Phase 1) from the EAP-PPT Server i
(Phase 2) conversation is <bcp14>NOT RECOMMENDED</bcp14>.</t>
      </section>
      <section anchor="channel-binding-1">
        <name>Channel Binding</name>
        <t><xref target="RFC6677"/> defines channel bindings for EAP which solve the "lying NAS" and
the "lying provider" problems, using a process in which the EAP peer gives
information about the characteristics of the service provided by
the authenticator to the Authentication, Authorization, and Accounting (AAA) 
server protected within the EAP authentication method. This allows the server
to verify the authenticator is providing information to the peer that is 
consistent with the information received from this authenticator as well as 
the information stored about this authenticator.</t>
        <t>When collocating the EAP and EAP-PPT servers, as recommended in <xref target="eapserver"/>,
channel binding can be implemented by leveraging a Phase 1 EAP method 
that supports Channel binding as defined in <xref target="RFC6677"/>.
It is therefore <bcp14>RECOMMENDED</bcp14> to leverage a Phase 1 EAP method that supports
Channel binding with EAP-PPT, for example TEAP <xref target="RFC7170"/>, as described in 
<xref section="3.11.4" sectionFormat="of" target="RFC7170"/>.</t>
      </section>
      <section anchor="token-redemption-server-implementation">
        <name>Token Redemption Server implementation</name>
        <t>EAP-PPT server <bcp14>MAY</bcp14> be implemented to perform token Redemption flow
with an external redemption service, configured with required keys
for redemption. In such scenario, a malicious EAP peers may generate
a lot of protocol requests to mount a denial-of-service attack on
the service. The EAP-PPT server implementation <bcp14>SHOULD</bcp14> take this
into account and <bcp14>SHOULD</bcp14> take steps to limit the requests it generates
towards the redemption service.</t>
      </section>
      <section anchor="abuse">
        <name>Abuse</name>
        <t>EAP-PPT provides anonymous network access to peers possessing valid
Privacy Pass tokens. This anonymous access can potentially be abused.
This is not a problem that is unique to EAP-PPT. Other EAP tunneled 
EAP methods or other methods that provide anonymous access, such as EAP-PSK
<xref target="RFC4764"/>, EAP-TTLS and EAP-TLS with anonymous certificates, also have
similar abuse potential.</t>
        <t>To counter such abuse, network operators may implement various abuse
mitigation techniques, such as:</t>
        <ul spacing="normal">
          <li>
            <t>Leverage the attestation: EAP-PPT relies on a token that is proof of 
 an attestation. The attestation required for network access will rely on the 
 policy of the network provider. As such the attestation policy can be designed 
 to ensure that both the device and the user meet that policy before being 
 issued a token. This can help mitigate abuse by ensuring that only
 authorized users and devices are able to obtain tokens. Further more,
 in case where abuse is detected, future attestation can be denied.</t>
          </li>
          <li>
            <t>Leverage a Layer 2 identifier: In case of a public network, it may not be 
 possible to update future attestation based on abuse detection. In this
 case a session can be blocked based on the Layer 2 identifier of the device
 (for example the MAC address). As described in <xref target="RFC9797"/>, there are 
 various levels of trust a device may have in a network. Based on the trust level,
 the device may present a Layer 2 identifier that is stable over time, or a
 randomized one. In case of EAP Authentication, devices present a stable Layer 2
 identifier that is stable across sessions within a certain timeframe. This layer 2
 identifer is used for association, so the advantage of leveraging it for abuse
 mitigation is that access can be denied at association time, before EAP authentication
 is performed.</t>
          </li>
          <li>
            <t>Leverage network-level abuse mitigation techniques: Network operators
 may have various network-level abuse mitigation techniques in place,
 such as rate-limiting, traffic filtering, and monitoring of network traffic
 to detect and mitigate abusive behavior. These techniques can be applied
 to EAP-PPT authenticated sessions. With these techniques, mitigation does not happen
 by excluding the user or device, but happens by mitigating the abuse itself.</t>
          </li>
        </ul>
      </section>
      <section anchor="security-claims">
        <name>Security Claims</name>
        <t>This section provides the security claims required by <xref target="RFC3748"/>.</t>
        <t>Auth. mechanism: Privacy Pass token</t>
        <t>Ciphersuite negotiation: No</t>
        <t>Mutual authentication: No</t>
        <t>Integrity protection: NO. However, EAP-PPT method executed within a
                      tunnel-based EAP method established TLS tunnel
                      is integrity protected. The cleartext EAP-PPT
                      messages outside the tunnel are not integrity
                      protected.</t>
        <t>Replay protection: NO. However, EAP-PPT method executed within a
                   tunnel-based EAP method established TLS tunnel is
                   replay protected. The cleartext EAP-PPT messages
                   outside the tunnel are not replay protected.</t>
        <t>Confidentiality: No. However, EAP-PPT method executed within a
                 tunnel-based EAP method established TLS tunnel
                 is encrypted.</t>
        <t>Key derivation: Yes</t>
        <t>Key strength: See <xref section="5.1" sectionFormat="of" target="RFC5216"/></t>
        <t>Dictionary attack prot.: N/A</t>
        <t>Fast reconnect: No</t>
        <t>Cryptographic binding: N/A</t>
        <t>Session independence: N/A</t>
        <t>Fragmentation: No</t>
        <t>Key Hierarchy: No</t>
        <t>Channel binding: Yes</t>
      </section>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>This section provides guidance to the Internet Assigned Numbers
Authority (IANA) regarding registration of values related to the
EAP-PPT protocol, in accordance with BCP 26 <xref target="RFC8126"/>.</t>
      <t>An EAP Method Type number will be requested for EAP-PPT.</t>
      <t>This document also calls for a registry of EAP-PPT error codes
described in <xref target="errorcodes"/>.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC3748">
          <front>
            <title>Extensible Authentication Protocol (EAP)</title>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="L. Blunk" initials="L." surname="Blunk"/>
            <author fullname="J. Vollbrecht" initials="J." surname="Vollbrecht"/>
            <author fullname="J. Carlson" initials="J." surname="Carlson"/>
            <author fullname="H. Levkowetz" initials="H." role="editor" surname="Levkowetz"/>
            <date month="June" year="2004"/>
            <abstract>
              <t>This document defines the Extensible Authentication Protocol (EAP), an authentication framework which supports multiple authentication methods. EAP typically runs directly over data link layers such as Point-to-Point Protocol (PPP) or IEEE 802, without requiring IP. EAP provides its own support for duplicate elimination and retransmission, but is reliant on lower layer ordering guarantees. Fragmentation is not supported within EAP itself; however, individual EAP methods may support this. This document obsoletes RFC 2284. A summary of the changes between this document and RFC 2284 is available in Appendix A. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3748"/>
          <seriesInfo name="DOI" value="10.17487/RFC3748"/>
        </reference>
        <reference anchor="RFC7542">
          <front>
            <title>The Network Access Identifier</title>
            <author fullname="A. DeKok" initials="A." surname="DeKok"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>In order to provide inter-domain authentication services, it is necessary to have a standardized method that domains can use to identify each other's users. This document defines the syntax for the Network Access Identifier (NAI), the user identifier submitted by the client prior to accessing resources. This document is a revised version of RFC 4282. It addresses issues with international character sets and makes a number of other corrections to RFC 4282.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7542"/>
          <seriesInfo name="DOI" value="10.17487/RFC7542"/>
        </reference>
        <reference anchor="RFC9577">
          <front>
            <title>The Privacy Pass HTTP Authentication Scheme</title>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="S. Valdez" initials="S." surname="Valdez"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <date month="June" year="2024"/>
            <abstract>
              <t>This document defines an HTTP authentication scheme for Privacy Pass, a privacy-preserving authentication mechanism used for authorization. The authentication scheme specified in this document can be used by Clients to redeem Privacy Pass tokens with an Origin. It can also be used by Origins to challenge Clients to present Privacy Pass tokens.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9577"/>
          <seriesInfo name="DOI" value="10.17487/RFC9577"/>
        </reference>
        <reference anchor="RFC9578">
          <front>
            <title>Privacy Pass Issuance Protocols</title>
            <author fullname="S. Celi" initials="S." surname="Celi"/>
            <author fullname="A. Davidson" initials="A." surname="Davidson"/>
            <author fullname="S. Valdez" initials="S." surname="Valdez"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <date month="June" year="2024"/>
            <abstract>
              <t>This document specifies two variants of the two-message issuance protocol for Privacy Pass tokens: one that produces tokens that are privately verifiable using the Issuer Private Key and one that produces tokens that are publicly verifiable using the Issuer Public Key. Instances of "issuance protocol" and "issuance protocols" in the text of this document are used interchangeably to refer to the two variants of the Privacy Pass issuance protocol.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9578"/>
          <seriesInfo name="DOI" value="10.17487/RFC9578"/>
        </reference>
        <reference anchor="RFC7296">
          <front>
            <title>Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="C. Kaufman" initials="C." surname="Kaufman"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <date month="October" year="2014"/>
            <abstract>
              <t>This document describes version 2 of the Internet Key Exchange (IKE) protocol. IKE is a component of IPsec used for performing mutual authentication and establishing and maintaining Security Associations (SAs). This document obsoletes RFC 5996, and includes all of the errata for it. It advances IKEv2 to be an Internet Standard.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="79"/>
          <seriesInfo name="RFC" value="7296"/>
          <seriesInfo name="DOI" value="10.17487/RFC7296"/>
        </reference>
        <reference anchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC7170">
          <front>
            <title>Tunnel Extensible Authentication Protocol (TEAP) Version 1</title>
            <author fullname="H. Zhou" initials="H." surname="Zhou"/>
            <author fullname="N. Cam-Winget" initials="N." surname="Cam-Winget"/>
            <author fullname="J. Salowey" initials="J." surname="Salowey"/>
            <author fullname="S. Hanna" initials="S." surname="Hanna"/>
            <date month="May" year="2014"/>
            <abstract>
              <t>This document defines the Tunnel Extensible Authentication Protocol (TEAP) version 1. TEAP is a tunnel-based EAP method that enables secure communication between a peer and a server by using the Transport Layer Security (TLS) protocol to establish a mutually authenticated tunnel. Within the tunnel, TLV objects are used to convey authentication-related data between the EAP peer and the EAP server.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7170"/>
          <seriesInfo name="DOI" value="10.17487/RFC7170"/>
        </reference>
        <reference anchor="I-D.draft-ietf-privacypass-auth-scheme-extensions">
          <front>
            <title>The PrivateToken HTTP Authentication Scheme Extensions Parameter</title>
            <author fullname="Scott Hendrickson" initials="S." surname="Hendrickson">
              <organization>Google</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare, Inc.</organization>
            </author>
            <date day="27" month="May" year="2025"/>
            <abstract>
              <t>   This document specifies new parameters for the "PrivateToken" HTTP
   authentication scheme.  This purpose of these parameters is to
   negotiate and carry extensions for Privacy Pass protocols that
   support public metadata.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-privacypass-auth-scheme-extensions-02"/>
        </reference>
        <reference anchor="RFC2865">
          <front>
            <title>Remote Authentication Dial In User Service (RADIUS)</title>
            <author fullname="C. Rigney" initials="C." surname="Rigney"/>
            <author fullname="S. Willens" initials="S." surname="Willens"/>
            <author fullname="A. Rubens" initials="A." surname="Rubens"/>
            <author fullname="W. Simpson" initials="W." surname="Simpson"/>
            <date month="June" year="2000"/>
            <abstract>
              <t>This document describes a protocol for carrying authentication, authorization, and configuration information between a Network Access Server which desires to authenticate its links and a shared Authentication Server. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2865"/>
          <seriesInfo name="DOI" value="10.17487/RFC2865"/>
        </reference>
        <reference anchor="RFC5216">
          <front>
            <title>The EAP-TLS Authentication Protocol</title>
            <author fullname="D. Simon" initials="D." surname="Simon"/>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="R. Hurst" initials="R." surname="Hurst"/>
            <date month="March" year="2008"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides support for multiple authentication methods. Transport Layer Security (TLS) provides for mutual authentication, integrity-protected ciphersuite negotiation, and key exchange between two endpoints. This document defines EAP-TLS, which includes support for certificate-based mutual authentication and key derivation.</t>
              <t>This document obsoletes RFC 2716. A summary of the changes between this document and RFC 2716 is available in Appendix A. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5216"/>
          <seriesInfo name="DOI" value="10.17487/RFC5216"/>
        </reference>
        <reference anchor="RFC5705">
          <front>
            <title>Keying Material Exporters for Transport Layer Security (TLS)</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="March" year="2010"/>
            <abstract>
              <t>A number of protocols wish to leverage Transport Layer Security (TLS) to perform key establishment but then use some of the keying material for their own purposes. This document describes a general mechanism for allowing that. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5705"/>
          <seriesInfo name="DOI" value="10.17487/RFC5705"/>
        </reference>
        <reference anchor="RFC6677">
          <front>
            <title>Channel-Binding Support for Extensible Authentication Protocol (EAP) Methods</title>
            <author fullname="S. Hartman" initials="S." role="editor" surname="Hartman"/>
            <author fullname="T. Clancy" initials="T." surname="Clancy"/>
            <author fullname="K. Hoeper" initials="K." surname="Hoeper"/>
            <date month="July" year="2012"/>
            <abstract>
              <t>This document defines how to implement channel bindings for Extensible Authentication Protocol (EAP) methods to address the "lying Network Access Service (NAS)" problem as well as the "lying provider" problem. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6677"/>
          <seriesInfo name="DOI" value="10.17487/RFC6677"/>
        </reference>
        <reference anchor="RFC4648">
          <front>
            <title>The Base16, Base32, and Base64 Data Encodings</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <date month="October" year="2006"/>
            <abstract>
              <t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes. It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4648"/>
          <seriesInfo name="DOI" value="10.17487/RFC4648"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="PEAP">
          <front>
            <title>Protected Extensible Authentication Protocol (PEAP)</title>
            <author>
              <organization>Microsoft Corporation</organization>
            </author>
            <date year="2021" month="June"/>
          </front>
        </reference>
        <reference anchor="IEEE-802.11">
          <front>
            <title>IEEE Standard for Information technology Telecommunications and information exchange between systems Local and metropolitan area networks-Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications</title>
            <author initials="" surname="IEEE" fullname="IEEE">
              <organization/>
            </author>
            <date year="2021" month="February"/>
          </front>
        </reference>
        <reference anchor="IEEE-802.1X">
          <front>
            <title>IEEE Standard for Local and Metropolitan Area Networks--Port-Based Network Access Control</title>
            <author initials="" surname="IEEE" fullname="IEEE">
              <organization/>
            </author>
            <date year="2020" month="February"/>
          </front>
        </reference>
        <reference anchor="RFC9576">
          <front>
            <title>The Privacy Pass Architecture</title>
            <author fullname="A. Davidson" initials="A." surname="Davidson"/>
            <author fullname="J. Iyengar" initials="J." surname="Iyengar"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <date month="June" year="2024"/>
            <abstract>
              <t>This document specifies the Privacy Pass architecture and requirements for its constituent protocols used for authorization based on privacy-preserving authentication mechanisms. It describes the conceptual model of Privacy Pass and its protocols, its security and privacy goals, practical deployment models, and recommendations for each deployment model, to help ensure that the desired security and privacy goals are fulfilled.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9576"/>
          <seriesInfo name="DOI" value="10.17487/RFC9576"/>
        </reference>
        <reference anchor="RFC7593">
          <front>
            <title>The eduroam Architecture for Network Roaming</title>
            <author fullname="K. Wierenga" initials="K." surname="Wierenga"/>
            <author fullname="S. Winter" initials="S." surname="Winter"/>
            <author fullname="T. Wolniewicz" initials="T." surname="Wolniewicz"/>
            <date month="September" year="2015"/>
            <abstract>
              <t>This document describes the architecture of the eduroam service for federated (wireless) network access in academia. The combination of IEEE 802.1X, the Extensible Authentication Protocol (EAP), and RADIUS that is used in eduroam provides a secure, scalable, and deployable service for roaming network access. The successful deployment of eduroam over the last decade in the educational sector may serve as an example for other sectors, hence this document. In particular, the initial architectural choices and selection of standards are described, along with the changes that were prompted by operational experience.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7593"/>
          <seriesInfo name="DOI" value="10.17487/RFC7593"/>
        </reference>
        <reference anchor="RFC6973">
          <front>
            <title>Privacy Considerations for Internet Protocols</title>
            <author fullname="A. Cooper" initials="A." surname="Cooper"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="J. Peterson" initials="J." surname="Peterson"/>
            <author fullname="J. Morris" initials="J." surname="Morris"/>
            <author fullname="M. Hansen" initials="M." surname="Hansen"/>
            <author fullname="R. Smith" initials="R." surname="Smith"/>
            <date month="July" year="2013"/>
            <abstract>
              <t>This document offers guidance for developing privacy considerations for inclusion in protocol specifications. It aims to make designers, implementers, and users of Internet protocols aware of privacy-related design choices. It suggests that whether any individual RFC warrants a specific privacy considerations section will depend on the document's content.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6973"/>
          <seriesInfo name="DOI" value="10.17487/RFC6973"/>
        </reference>
        <reference anchor="RFC6678">
          <front>
            <title>Requirements for a Tunnel-Based Extensible Authentication Protocol (EAP) Method</title>
            <author fullname="K. Hoeper" initials="K." surname="Hoeper"/>
            <author fullname="S. Hanna" initials="S." surname="Hanna"/>
            <author fullname="H. Zhou" initials="H." surname="Zhou"/>
            <author fullname="J. Salowey" initials="J." role="editor" surname="Salowey"/>
            <date month="July" year="2012"/>
            <abstract>
              <t>This memo defines the requirements for a tunnel-based Extensible Authentication Protocol (EAP) Method. This tunnel method will use Transport Layer Security (TLS) to establish a secure tunnel. The tunnel will provide support for password authentication, EAP authentication, and the transport of additional data for other purposes. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6678"/>
          <seriesInfo name="DOI" value="10.17487/RFC6678"/>
        </reference>
        <reference anchor="RFC5281">
          <front>
            <title>Extensible Authentication Protocol Tunneled Transport Layer Security Authenticated Protocol Version 0 (EAP-TTLSv0)</title>
            <author fullname="P. Funk" initials="P." surname="Funk"/>
            <author fullname="S. Blake-Wilson" initials="S." surname="Blake-Wilson"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>EAP-TTLS is an EAP (Extensible Authentication Protocol) method that encapsulates a TLS (Transport Layer Security) session, consisting of a handshake phase and a data phase. During the handshake phase, the server is authenticated to the client (or client and server are mutually authenticated) using standard TLS procedures, and keying material is generated in order to create a cryptographically secure tunnel for information exchange in the subsequent data phase. During the data phase, the client is authenticated to the server (or client and server are mutually authenticated) using an arbitrary authentication mechanism encapsulated within the secure tunnel. The encapsulated authentication mechanism may itself be EAP, or it may be another authentication protocol such as PAP, CHAP, MS-CHAP, or MS-CHAP-V2. Thus, EAP-TTLS allows legacy password-based authentication protocols to be used against existing authentication databases, while protecting the security of these legacy protocols against eavesdropping, man-in-the-middle, and other attacks. The data phase may also be used for additional, arbitrary data exchange. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5281"/>
          <seriesInfo name="DOI" value="10.17487/RFC5281"/>
        </reference>
        <reference anchor="RFC4851">
          <front>
            <title>The Flexible Authentication via Secure Tunneling Extensible Authentication Protocol Method (EAP-FAST)</title>
            <author fullname="N. Cam-Winget" initials="N." surname="Cam-Winget"/>
            <author fullname="D. McGrew" initials="D." surname="McGrew"/>
            <author fullname="J. Salowey" initials="J." surname="Salowey"/>
            <author fullname="H. Zhou" initials="H." surname="Zhou"/>
            <date month="May" year="2007"/>
            <abstract>
              <t>This document defines the Extensible Authentication Protocol (EAP) based Flexible Authentication via Secure Tunneling (EAP-FAST) protocol. EAP-FAST is an EAP method that enables secure communication between a peer and a server by using the Transport Layer Security (TLS) to establish a mutually authenticated tunnel. Within the tunnel, Type-Length-Value (TLV) objects are used to convey authentication related data between the peer and the EAP server. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4851"/>
          <seriesInfo name="DOI" value="10.17487/RFC4851"/>
        </reference>
        <reference anchor="I-D.draft-hendrickson-privacypass-expiration-extension">
          <front>
            <title>Privacy Pass Token Expiration Extension</title>
            <author fullname="Scott Hendrickson" initials="S." surname="Hendrickson">
              <organization>Google</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare, Inc.</organization>
            </author>
            <date day="24" month="January" year="2025"/>
            <abstract>
              <t>   This document describes an extension for Privacy Pass that allows
   tokens to encode expiration information.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hendrickson-privacypass-expiration-extension-03"/>
        </reference>
        <reference anchor="I-D.draft-ietf-privacypass-batched-tokens">
          <front>
            <title>Batched Token Issuance Protocol</title>
            <author fullname="Raphael Robert" initials="R." surname="Robert">
              <organization>Phoenix R&amp;D</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Thibault Meunier" initials="T." surname="Meunier">
              <organization>Cloudflare Inc.</organization>
            </author>
            <date day="20" month="October" year="2025"/>
            <abstract>
              <t>   This document specifies two variants of the Privacy Pass issuance
   protocol that allow for batched issuance of tokens.  These allow
   clients to request more than one token at a time and for issuers to
   issue more than one token at a time.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-privacypass-batched-tokens-06"/>
        </reference>
        <reference anchor="I-D.draft-tomas-openroaming">
          <front>
            <title>WBA OpenRoaming Wireless Federation</title>
            <author fullname="Bruno Tomas" initials="B." surname="Tomas">
              <organization>Wireless Broadband Alliance, Inc.</organization>
            </author>
            <author fullname="Mark Grayson" initials="M." surname="Grayson">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Necati Canpolat" initials="N." surname="Canpolat">
              <organization>Intel Corporation</organization>
            </author>
            <author fullname="Elizabeth A Cockrell" initials="B." surname="Cockrell">
              <organization>Independent</organization>
            </author>
            <author fullname="Sri Gundavelli" initials="S." surname="Gundavelli">
              <organization>Cisco Systems</organization>
            </author>
            <date day="23" month="January" year="2026"/>
            <abstract>
              <t>   This document describes the Wireless Broadband Alliance's OpenRoaming
   system.  The OpenRoaming architecture enables a seamless onboarding
   experience for devices connecting to access networks that are part of
   the federation of access networks and identity providers.  The
   primary objective of this document is to describe the protocols that
   form the foundation for this architecture, enabling providers to
   correctly configure their equipment to support interoperable
   OpenRoaming signalling exchanges.  In addition, the topic of
   OpenRoaming has been raised in different IETF working groups, and
   therefore a secondary objective is to assist those discussions by
   describing the federation organization and framework.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-tomas-openroaming-07"/>
        </reference>
        <reference anchor="RFC7585">
          <front>
            <title>Dynamic Peer Discovery for RADIUS/TLS and RADIUS/DTLS Based on the Network Access Identifier (NAI)</title>
            <author fullname="S. Winter" initials="S." surname="Winter"/>
            <author fullname="M. McCauley" initials="M." surname="McCauley"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This document specifies a means to find authoritative RADIUS servers for a given realm. It is used in conjunction with either RADIUS over Transport Layer Security (RADIUS/TLS) or RADIUS over Datagram Transport Layer Security (RADIUS/DTLS).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7585"/>
          <seriesInfo name="DOI" value="10.17487/RFC7585"/>
        </reference>
        <reference anchor="RFC4764">
          <front>
            <title>The EAP-PSK Protocol: A Pre-Shared Key Extensible Authentication Protocol (EAP) Method</title>
            <author fullname="F. Bersani" initials="F." surname="Bersani"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="January" year="2007"/>
            <abstract>
              <t>This document specifies EAP-PSK, an Extensible Authentication Protocol (EAP) method for mutual authentication and session key derivation using a Pre-Shared Key (PSK). EAP-PSK provides a protected communication channel when mutual authentication is successful for both parties to communicate over. This document describes the use of this channel only for protected exchange of result indications, but future EAP-PSK extensions may use the channel for other purposes. EAP-PSK is designed for authentication over insecure networks such as IEEE 802.11. This memo defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4764"/>
          <seriesInfo name="DOI" value="10.17487/RFC4764"/>
        </reference>
        <reference anchor="RFC9797">
          <front>
            <title>Randomized and Changing Media Access Control (MAC) Addresses: Context, Network Impacts, and Use Cases</title>
            <author fullname="J. Henry" initials="J." surname="Henry"/>
            <author fullname="Y. Lee" initials="Y." surname="Lee"/>
            <date month="June" year="2025"/>
            <abstract>
              <t>To limit the privacy issues created by the association between a device, its traffic, its location, and its user in IEEE 802 networks, client vendors and client OS vendors have started implementing Media Access Control (MAC) address randomization. This technology is particularly important in Wi-Fi networks (defined in IEEE 802.11) due to the over-the-air medium and device mobility. When such randomization happens, some in-network states may break, which may affect network connectivity and user experience. At the same time, devices may continue using other stable identifiers, defeating the purpose of MAC address randomization.</t>
              <t>This document lists various network environments and a range of network services that may be affected by such randomization. This document then examines settings where the user experience may be affected by in-network state disruption. Last, this document examines some existing frameworks that maintain user privacy while preserving user quality of experience and network operation efficiency.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9797"/>
          <seriesInfo name="DOI" value="10.17487/RFC9797"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
