Skip to main content

EAP defaults for devices that need to onboard
draft-richardson-emu-eap-onboarding-03

Document Type Expired Internet-Draft (individual)
Expired & archived
Authors Alan DeKok , Michael Richardson
Last updated 2023-10-04 (Latest revision 2023-04-02)
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

This document describes a method by which an unconfigured device can use EAP to join a network on which further device onboarding, network attestation or other remediation can be done. While RFC 5216 supports EAP-TLS without a client certificate, that document defines no method by which unauthenticated EAP-TLS can be used. This draft addresses that issue. First, by defining the @eap.arpa domain, and second by showing how it can be used to provide quarantined network access for onboarding unauthenticated devices.

Authors

Alan DeKok
Michael Richardson

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)