<?xml version="1.0" encoding="UTF-8"?><?rfc linefile="1:/tmp/CGI7856.1"?><?rfc linefile="1:/tmp/CGI7856.1"?><?rfc linefile="1:/tmp/CGI11813.1"?><?rfc linefile="1:/tmp/CGI11813.1"?>
<!-- automatically generated by xml2rfc v1.32 on 2008-01-23T17:35:47Z -->
<!-- automatically generated by xml2rfc v1.32 on 2008-01-23T17:35:47Z -->
<!-- automatically generated by xml2rfc v1.32 on 2008-01-22T19:59:10Z -->
<!-- automatically generated by xml2rfc v1.32 on 2008-01-22T19:59:10Z -->
<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
    <!--
-->
    <!--
-->

    <!--
-->
    <!--
-->
    <!--
-->
    <!--
-->
    <!--
-->
    <!--
-->
    <!--
-->
    <!--
-->
    <!--
-->

    <!--
-->
    <!--
-->
    <!--
-->
    <!--
-->
    <!--
-->
    <!--
-->
    <!--
-->

]>

<rfc number="5113" category="info">
<?rfc rfcedstyle="yes"?>
<?rfc toc="yes"?>
<?rfc tocappendix="yes"?>
<?rfc symrefs="yes"?>
<?rfc subcompact="no"?>

<front>

<title abbrev="Network Discovery and SP">Network Discovery and Selection Problem</title>

<author initials="J" surname="Arkko" fullname="Jari Arkko">
<organization>Ericsson</organization>
<address>
<postal>
<street/>
<city>Jorvas</city> <code>02420</code>
<country>Finland</country>
</postal>
<email>jari.arkko@ericsson.com</email>
</address>
</author>

<author initials="B" surname="Aboba" fullname="Bernard Aboba">
<organization>Microsoft</organization>
<address>
<postal>
<street>One Microsoft Way</street>
<city>Redmond, WA</city>
<code>98052</code>
<country>USA</country>
</postal>
<email>bernarda@microsoft.com</email>
</address>
</author>

<author initials="J" surname="Korhonen, Ed." fullname="Jouni Korhonen">
<organization>TeliaSonera</organization>
<address>
<postal>
<street>Teollisuuskatu 13</street>
<city>Sonera</city>
<code>FIN-00051</code>
<country>Finland</country>
</postal>
<email>jouni.korhonen@teliasonera.com</email>
</address>
</author>

<author initials="F" surname="Bari" fullname="Farooq Bari">
<organization>AT&T</organization>
<address>
<postal>
<street>7277 164th Avenue N.E.</street>
<city>Redmond</city>
<code>WA  98052</code>
<country>USA</country>
</postal>
<email>farooq.bari@att.com</email>
</address>
</author>



<date month= "January" year="2008" />

<area>Internet</area>
<workgroup>Extensible Authentication Protocol (EAP)</workgroup>
<keyword>Extensible Authentication Protocol (EAP)</keyword>
<keyword>Authentication, Authorization, and Accounting</keyword>
<keyword>Realm</keyword>
<keyword>Discovery</keyword>
<keyword>Selection</keyword>

<abstract>

<t>When multiple access networks are available,
   users may have difficulty in selecting which network
   to connect to and how to authenticate with that network.
   This document defines the network discovery and
   selection problem, dividing it into multiple sub-problems.
   Some constraints on potential solutions are outlined, and
   the limitations of several solutions (including existing ones)
   are discussed.</t>

</abstract>

</front>
<middle>

<section title="Introduction">

<t>Today, network access clients are typically pre-configured   
   with a list of access networks and corresponding identities   
   and credentials.  However, as network access mechanisms   
   and operators have proliferated, it has become increasingly   
   likely that users will encounter networks for which no 
   pre-configured settings are available, yet which offer 
   desired services and the ability to successfully authenticate    
   with the user's home realm.  It is also possible that 
   pre-configured settings will not be adequate in some situations. 
   In such a situation, users can have difficulty in determining 
   which network to connect to, and how to authenticate to that
   network.
</t> 

<t>The problem arises when any of the following conditions are
   true:
</t>

<list style='symbols'>

   <t>Within a single network, more than one network attachment point 
      is available, and the attachment points differ in their roaming 
      arrangements, or access to services.  While the link layer 
      capabilities of a point of attachment may be advertised, 
      higher-layer capabilities, such as roaming arrangements,
      end-to-end quality of service, or Internet access 
      restrictions, may not be.  As a result, a user may have 
      difficulty determining which services are 
      available at each network attachment point, and which 
      attachment points it can successfully authenticate to.  
      For example, it is possible that a roaming agreement will 
      only enable a user to authenticate to the home realm from 
      some points of attachment, but not others.  Similarly, it 
      is possible that access to the Internet may be restricted 
      at some points of attachment, but not others, or that
      end-to-end quality of service may not be available in all
      locations. In these situations, the network access client 
      cannot assume that all points of attachment within a network 
      offer identical capabilities.
   </t>
   <t>Multiple networks are available for which the user has no 
      corresponding pre-configuration. The user may not 
      have pre-configured an identity and associated credentials 
      for use with a network, yet it is possible that the 
      user's home realm is reachable from that network, 
      enabling the user to successfully authenticate.  
      However, unless the roaming arrangements are advertised,
      the network access client cannot determine a priori whether 
      successful authentication is likely.  In this situation,
      it is possible that the user will need to try multiple
      networks in order to find one to which it can successfully
      authenticate, or it is possible that the user will not be 
      able  to obtain access at all, even though successful 
      authentication is feasible.
   </t>


   <t>The user has multiple sets of credentials.  Where no      
      pre-configuration exists, it is possible that the user will
      not be able to determine which credentials to use with which
      attachment point, or even whether any credentials it possesses
      will allow it to authenticate successfully.  An
      identity and associated credentials can be usable for authentication
      with multiple networks, and not all of these networks will be
      pre-configured.  For example, the user could have one set of
      credentials from  a public service provider and  another set
      from an employer, and a network might enable authentication
      with one or more of these credentials.  Yet, without
      pre-configuration, multiple unsuccessful authentication attempts
      could be needed for each attachment point in order to determine
      what credentials are usable, wasting valuable time and
      resulting in user frustration.  In order to choose between multiple
      attachment points, it can be helpful to provide additional
      information to enable the correct credentials to be determined.
   </t>
   <t>There are multiple potential roaming paths between the visited
      realm and the user's home realm, and service parameters or pricing
      differs between them.  In this situation, there could be multiple
      ways for the user to successfully authenticate using the same
      identity and credentials, yet the cost of each approach might
      differ. In this case, the access network may not be
      able to determine the roaming path that best matches the user's
      preferences.  This can lead to the user being charged more than
      necessary, or not obtaining the desired services.  For example,
      the visited access realm could have both a direct relationship
      with the home realm and an indirect relationship through a roaming
      consortium.  Current Authentication, Authorization, and Accounting
      (AAA) protocols may not be able to route the access request to the
      home AAA sever purely based on the realm within the Network Access
      Identifier (NAI) <xref target="RFC4282"/>.  In addition, payload
      packets can be
      routed or tunneled differently, based on the roaming relationship
      path.  This may have an impact on the available services or their
      pricing.
   </t>

</list>

   <t>In <xref target='def' />, the network discovery and selection problem
      is defined and divided into sub-problems. Some solution
      constraints are outlined in <xref target='constr'/>.  <xref target='concl'/>
      provides conclusions and suggestions for future work. <xref target='existing'/>
      discusses existing solutions to portions of the problem.</t>

  <section title="Terminology Used in This Document">

   <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
      "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
      document are to be interpreted as described in <xref target="RFC2119"/>.
   </t>

    <list style="hanging">
      <t hangText="Authentication, Authorization, and Accounting
        (AAA)"><vspace blankLines="1"/>
        AAA protocols with EAP support include Remote Authentication
        Dial-In User Service (RADIUS) <xref target="RFC3579"/> and
        Diameter <xref target="RFC4072"          />.
      </t>

      <t hangText="Access Point (AP)"><vspace blankLines="1" />
         An entity that has station functionality and
         provides access to distribution services via the wireless medium (WM)
         for associated stations.
      </t>

      <t hangText="Access Technology Selection"><vspace blankLines="1" />
         This refers to the selection
         between access technologies, e.g., 802.11, Universal Mobile
         Telecommunications System (UMTS), WiMAX. The selection
         will be dependent upon the access technologies supported
         by the device and the availability of networks supporting those
         technologies.
      </t>

      <t hangText="Bearer Selection"><vspace blankLines="1" />
         For some access technologies (e.g., UMTS),
         there can be a possibility for delivery of a service (e.g., voice) by
         using either a circuit-switched or packet-switched bearer.
         Bearer selection refers to selecting one of the bearer types for
         service delivery. The decision can be based on support of the bearer
         type by the device and the network as well as user subscription and
         operator preferences.
      </t>
      
      <t hangText="Basic Service Set (BSS)"><vspace blankLines="1" />
         A set of stations controlled by a single
         coordination function.
      </t>      
      
      <t hangText="Decorated NAI"><vspace blankLines="1" />
         A NAI specifying a source route.  See Section 2.7 of RFC 4282 <xref target="RFC4282"/>
         for more information.
      </t>
      
      <t hangText="Extended Service Set (ESS)"><vspace blankLines="1" />
         A set of one or more interconnected basic
         service sets (BSSs) with the same Service Set Identifier (SSID) and
         integrated local area networks (LANs), which appears as a single BSS
         to the logical link control layer at any station associated with one
         of those BSSs. This refers to a mechanism that a node uses to
         discover the networks that are reachable from a given access network.
      </t>
      

      <t hangText="Network Access Identifier (NAI)"><vspace blankLines="1" />
         The Network Access Identifier (NAI) <xref target="RFC4282"/> is the user identity submitted
         by the client during network access authentication.  In roaming,
         the purpose of the NAI is to identify the user as well as to
         assist in the routing of the authentication request.  Please note
         that the NAI may not necessarily be the same as the user's e-mail
         address or the user identity submitted in an application layer
         authentication.
      </t>

      <t hangText="Network Access Server (NAS)"><vspace blankLines="1" />
         The device that peers connect to in order to obtain access to the
         network.  In Point-to-Point Tunneling Protocol (PPTP) terminology,
         this is referred to as the PPTP Access Concentrator (PAC), and in
         Layer 2 Tunneling Protocol (L2TP) terminology, it is referred to as the L2TP Access
         Concentrator (LAC).  In IEEE 802.11, it is referred to as an
         Access Point (AP).</t>

      <t hangText="Network Discovery"><vspace blankLines="1" />
         The mechanism used to discover available networks. The discovery
         mechanism may be passive or active, and depends on the access
         technology.  In passive network discovery, the node listens for
         network announcements; in active network discovery, the node
         solicits network announcements.  It is possible for an access
         technology to utilize both passive and active network discovery
         mechanisms.</t>

      <t hangText="Network Selection"><vspace blankLines="1" />
         Selection of an operator/ISP for network access.  Network selection
         occurs prior to network access authentication.</t>

      <t hangText="Realm"><vspace blankLines="1" />
         The realm portion of an NAI <xref target="RFC4282"/>.
      </t>

      <t hangText="Realm Selection"><vspace blankLines="1" />
         The selection of the realm (and corresponding NAI) used to access the
         network. A realm can be reachable from more than one access network 
         type, and selection of a realm may not enable network capabilities.</t>

      <t hangText="Roaming Capability"><vspace blankLines="1" />
         Roaming capability can be loosely defined as the ability to use
         any one of multiple Internet Service Providers (ISPs), while
         maintaining a formal, customer-vendor relationship with only one.
         Examples of cases where roaming capability might be required
         include ISP "confederations" and ISP-provided corporate network
         access support.
      </t>

      <t hangText="Station (STA)"><vspace blankLines="1" />
         A device that contains an IEEE 802.11 conformant
         medium access control (MAC) and physical layer (PHY) interface to the
         wireless medium (WM).
      </t>

    </list>
  </section>
</section>

<section anchor='def' title='Problem Definition'>

   <t>The network discovery and selection problem can be broken down into
      multiple sub-problems.  These include:</t>

<list style='symbols'>

<!--vspace blankLines='1'/-->
   <t>Discovery of points of attachment.  This involves the discovery
      of points of attachment in the vicinity, as well as their
      capabilities.</t>

<!--vspace blankLines='1'/-->
   <t>Identifier selection.  This involves selection of the
      NAI (and credentials) used to authenticate to the selected
      point of attachment.</t>

<!--vspace blankLines='1'/-->
   <t>AAA routing. This involves routing of the AAA
      conversation back to the home AAA server, based on the realm
      of the selected NAI.</t>

<!--vspace blankLines='1'/-->
   <t>Payload routing.  This involves the routing of data packets, in
      the situation where mechanisms more advanced than destination-based
      routing are required.  While this problem is interesting, it is not
      discussed further in this document.</t>

<!--vspace blankLines='1'/-->
   <t>Network capability discovery.  This involves discovering the
      capabilities of an access network, such as whether certain
      services are reachable through the access network and the
      charging policy.</t>
</list>

  <t>Alternatively, the problem can be divided into discovery,
     decision, and selection components. The AAA routing problem, for
     instance, involves all components: discovery (which mediating networks
     are available), decision (choosing the "best" one), and selection
     (selecting which mediating network to use) components.</t>

<section title='Discovery of Points of Attachment' anchor="dopoa">

<t>Traditionally, the discovery of points of attachment has been handled
   by out-of-band mechanisms or link or network layer advertisements.
</t>

<t>RFC 2194 <xref target="RFC2194"/> describes the pre-provisioning of dial-up roaming
   clients, which typically included a list of potential phone numbers
   updated by the provider(s) with which the client had a contractual
   relationship.  RFC 3017 <xref target="RFC3017"/> describes the IETF Proposed
   Standard for the Roaming Access eXtensible Markup Language (XML)
   Document Type Definition (DTD).  This covers not only the
   attributes of the Points of Presence (PoP) and Internet Service
   Providers (ISPs), but also hints on the appropriate NAI to be used
   with a particular PoP. The XML DTD supports dial-in and X.25
   access,  but has extensible address and media type fields.
</t>
<t>As access networks and the points of attachment have proliferated,
   out-of-band pre-configuration has become increasingly difficult.
   For  networks with many points of attachment, keeping a complete
   and up-to-date list of points of attachment can be difficult.  As
   a result, wireless network access clients typically only attempt to
   pre-configure information relating to access networks, rather than
   individual points of attachment.
</t>
<t>In IEEE 802.11 Wireless Local Area Networks (WLAN), the Beacon and
   Probe Request/Response mechanism
   provides a way for Stations to discover Access Points (AP) and the
   capabilities of those APs.
   The IEEE 802.11 specification <xref target="IEEE.802.11-2003"/> provides
   support for both passive (Beacon) and active (Probe Request/Response)
   discovery mechanisms; <xref target='Fixingapsel'/> studied the
   effectiveness of these mechanisms.
</t>
<t>Among the Information Elements
   (IE) included within the Beacon and Probe Response is the 
   Service Set Identifier (SSID), a
   non-unique identifier of the network to which an AP is
   attached.  The Beacon/Probe facility therefore enables network
   discovery, as well as the discovery of points of attachment and
   the capabilities of those points of attachment.
</t>


<t>The Global System for Mobile Communications (GSM) specifications also
   provide for discovery of points of attachment, as does the Candidate
   Access Router Discovery (CARD) <xref target="RFC4066"/> protocol
   developed by the IETF SEAMOBY Working Group (WG). 

</t>
<t>Along with discovery of points of attachment, the capabilities of access
   networks are also typically discovered.  These may include:
</t>

<t><list style="symbols">
   <t>Access network name (e.g., IEEE 802.11 SSID)</t>

   <t>Lower layer security mechanism (e.g., IEEE 802.11 Wired
   Equivalent Privacy (WEP) vs. Wi-Fi Protected Access 2 (WPA2))</t>

   <t>Quality of service capabilities (e.g., IEEE 802.11e support)</t>

   <t>Bearer capabilities (e.g., circuit-switched, packet-switched, or
      both)</t>
</list></t> 

<t>Even though pre-configuration of access networks scales better
   than pre-configuration of points of attachment, where many
   access networks can be used to authenticate to a home realm,
   providing complete and up-to-date information on each
   access network can be challenging. 
</t>
<t>In such a situation, network access client configuration can
   be minimized by providing information relating to
   each home realm, rather than each access network.  One way
   to enable this is for an access network to support "virtual
   Access Points" (virtual APs), and for each point of attachment
   to support virtual APs corresponding to each reachable home realm.
</t>

<t>While a single IEEE 802.11 network may only utilize a single SSID,
   it may cover a wide geographical area, and as a result, may be segmented,
   utilizing multiple prefixes.  It is possible that a single SSID
   may be advertised on multiple channels, and may support multiple
   access mechanisms (including Universal Access Method (UAM) and
   IEEE 802.1X <xref target="IEEE.8021X-2004"/>) may differ between
   points of attachment.  A single SSID may
   also support dynamic VLAN access
   as described in <xref target="RFC3580"/>, or may support authentication to multiple
   home AAA servers supporting different realms.  As a result, users
   of a single point of attachment, connecting to the same SSID, may
   not have the same set of services available.</t>



</section>

<section title='Identity Selection'>

<t>As networks proliferate, it becomes more and more likely that a
   user may have multiple identities and credential sets, available for
   use in different situations.  For example, the user may have an
   account with one or more Public WLAN providers, a corporate WLAN,
   and one or more wireless Wide Area Network (WAN) providers.</t>

<t>Typically, the user will choose an identity and corresponding credential
   set based on the selected network, perhaps with additional
   assistance provided by the chosen authentication mechanism.  For example,
   if Extensible Authentication Protocol - Transport Layer Security (EAP-TLS)
   is the authentication mechanism used with a particular
   network, then the user will select the appropriate EAP-TLS client
   certificate based, in part, on the list of trust anchors provided by
   the EAP-TLS server.</t>

<t>However, in access networks where roaming is enabled, the mapping
   between an access network and an identity/credential set may not be
   one to one.  For example, it is possible for multiple identities
   to be usable on an access network, or for a given identity to
   be usable on a single access network, which may or may not be
   available.</t>

<t>Figure 1 illustrates a situation where a user identity may
   not be usable on a potential access network.  In this case,
   access network 1 enables access to users within the realm
   "isp1.example.com", whereas access network
   3 enables access to users within the realm "corp2.example.com";
   access network 2 enables access to users within both realms.</t>

<figure><artwork>
       ?  ?                 +---------+       +------------------+
        ?                   | Access  |       |                  |
        O_/             _-->| Network |------>|"isp1.example.com"|
       /|              /    |    1    |    _->|                  |
        |              |    +---------+   /   +------------------+
      _/ \_            |                 /
                       |    +---------+ /
User "subscriber@isp1. |    | Access  |/
  example.com"      -- ? -->| Network |
also known as          |    |    2    |\
  "employee123@corp2.  |    +---------+ \
  example.com"         |                 \
                       |    +---------+   \_  +-------------------+
                       \_   | Access  |     ->|                   |
                         -->| Network |------>|"corp2.example.com"|
                            |   3     |       |                   |
                            +---------+       +-------------------+

      Figure 1: Two credentials, three possible access networks
</artwork></figure>

<t>In this situation, a user only possessing an identity within the
   "corp2.example.com" realm can only successfully authenticate to
   access networks 2 or 3;  a user possessing an identity within the
   "isp1.example.com" realm can only successfully authenticate to
   access networks 1 or 2; a user possessing identities within both
   realms can connect to any of the access networks.  The question
   is: how does the user figure out which access networks it can
   successfully authenticate to, preferably prior to choosing a
   point of attachment?</t>

<t>Traditionally, hints useful in identity selection have been
   provided out-of-band.  For example, the XML DTD, described in
   <xref target="RFC3017"/>, enables a client to select between potential
   points of attachment as well as to select the NAI and credentials
   to use in authenticating with it.</t>

<t>Where all points of attachment within an access network enable
   authentication utilizing a set of realms, selection of an access
   network provides knowledge of the identities that a client
   can use to successfully authenticate.  For example, in an
   access network, the set of supported realms corresponding
   to network name can be pre-configured.</t>

<t>In some cases, it may not be possible to determine the available access 
   networks prior to authentication.  For example, <xref target="IEEE.8021X-2004"/> 
   does not support network discovery on IEEE 802 wired networks, so 
   that the peer cannot determine which access network it has connected 
   to prior to the initiation of the EAP exchange.</t>


<t>It is also possible for hints to be embedded within credentials.  In
   <xref target="RFC4334"/>, usage hints are provided within certificates used for
   wireless authentication.  This involves extending the client's
   certificate to include the SSIDs with which the certificate can be
   used.</t>

<t>However, there may be situations in which an access network may
   not accept a static set of realms at every point of attachment.  For
   example, as part of a roaming agreement, only points of attachment
   within a given region or country may be made available.  In these
   situations, mechanisms such as hints embedded within credentials or
   pre-configuration of access network to realm mappings may not be
   sufficient.  Instead, it is necessary for the client to discover usable
   identities dynamically.</t>

<t>This is the problem that RFC 4284 <xref target="RFC4284"/> attempts to solve, using the
   EAP-Request/Identity to communicate a list of supported realms.
   However, the problems inherent in this approach are many, as
   discussed in <xref target="existingietf"/>.
</t>
<t> 
   Note that identity selection also implies selection of different
   credentials, and potentially, selection of different EAP authentication
   methods. In some situations this may imply serious security vulnerabilities.
   These are discussed in depth in <xref target="securitycon"/>.
</t>

</section>

<section title='AAA Routing' anchor="aaarouting2">

<t>Once the identity has been selected, the AAA infrastructure needs
   to route the access request back to the home AAA server.  Typically,
   the routing is based on the Network Access Identifier (NAI) defined
   in <xref target="RFC4282"/>.</t>

<t>Where the NAI does not encode a source route, the routing of
   requests is determined by the AAA infrastructure.  As described in
   <xref target="RFC2194"/>, most roaming implementations are relatively simple,
   relying on a static realm routing table that determines the next hop
   based on the NAI realm included in the User-Name attribute within the
   Access-Request.
   Within RADIUS, the IP address of the home AAA server is typically
   determined based on static mappings of realms to IP addresses
   maintained within RADIUS proxies.</t>

<t>Diameter <xref target="RFC3588"/> supports mechanisms for intra- and inter-domain
   service discovery, including support for DNS as well as
   service discovery protocols such as Service Location Protocol
   version 2 (SLPv2) <xref target="RFC2608"/>. As a result,
   it may not be necessary to configure static tables mapping realms
   to the IP addresses of Diameter agents.  However, while this
   simplifies maintenance of the AAA routing infrastructure, it does
   not necessarily simplify roaming-relationship path selection.</t>

<t>As noted in RFC 2607 <xref target="RFC2607"/>, RADIUS proxies are deployed not only
   for routing purposes, but also to mask a number of inadequacies in
   the RADIUS protocol design, such as the lack of standardized
   retransmission behavior and the need for shared secret provisioning
   between each AAA client and server.</t>

<t>Diameter <xref target="RFC3588"/> supports certificate-based authentication
   (using either TLS or IPsec) as well as Redirect functionality,
   enabling a Diameter client to obtain a referral to the
   home server from a Diameter redirect server, so that the client
   can contact the home server directly.  In situations in which
   a trust model can be established, these Diameter capabilities can
   enable a reduction in the length of the roaming relationship path.</t>

<t>However, in practice there are a number of pitfalls. In order
   for certificate-based authentication to enable communication
   between a Network Access Server (NAS) or local proxy and the
   home AAA server, trust anchors
   need to be configured, and certificates need to be selected.
   The AAA server certificate needs to chain to a trust anchor
   configured on the AAA client, and the AAA client certificate
   needs to chain to a trust anchor configured on the AAA
   server.  Where multiple potential roaming relationship paths are
   available, this will reflect itself in multiple certificate choices,
   transforming the path selection problem into a certificate selection
   problem.  Depending on the functionality supported within the
   certificate selection implementation, this may not
   make the problem easier to solve.  For example, in order to provide
   the desired control over the roaming path, it may be necessary to
   implement custom certificate selection logic, which may be difficult
   to introduce within a certificate handling implementation designed
   for general-purpose usage.</t>

<t>As noted in <xref target="RFC4284"/>, it is also possible to utilize an NAI for
   the purposes of source routing.  In this case, the client provides
   guidance to the AAA infrastructure as to how it would like the
   access request to be routed.  An NAI including source-routing
   information is said to be "decorated"; the decoration format is
   defined in <xref target="RFC4282"/>.</t>

<t>When decoration is utilized, the EAP peer provides the decorated
   NAI within the EAP-Response/Identity, and as described in <xref target="RFC3579"/>,
   the NAS copies the decorated NAI included in the EAP-Response/Identity
   into the User-Name attribute included within the access request.
   As the access request transits the roaming relationship path,
   AAA proxies determine the next hop based on the realm included
   within the User-Name attribute, in the process, successively removing
   decoration from the NAI included in the User-Name attribute.
   In contrast, the decorated NAI included within the EAP-Response/Identity
   encapsulated in the access request remains untouched.  As a result,
   when the access request arrives at the AAA home server, the decorated
   NAI included in the EAP-Response/Identity may differ from the NAI
   included in the User-Name attribute (which may have some or all of
   the decoration removed).  For the purpose of identity verification,
   the EAP server utilizes the NAI in the User-Name attribute, rather than
   the NAI in the EAP-Response/Identity.</t>

<t>Over the long term, it is expected that the need for NAI
   "decoration" and source routing will disappear.  This is somewhat
   analogous to the evolution of email delivery.  Prior
   to the widespread proliferation of the Internet, it was necessary to
   gateway between SMTP-based mail systems and alternative delivery
   technologies, such as Unix-to-Unix CoPy Protocol (UUCP) and FidoNet.  Prior to the implementation
   of email gateways utilizing MX RR routing, email address-based
   source-routing was used extensively.  However, over time the need
   for email source-routing disappeared.</t>

   <section title="The Default Free Zone" anchor="defaultfree">

   <t>AAA clients on the edge of the network, such as NAS devices and
      local AAA proxies, typically maintain a default realm route,
      providing a default next hop for realms not otherwise taken into
      account within the realm routing table.  This permits devices with
      limited resources to maintain a small realm routing table.
      Deeper within the AAA infrastructure, AAA proxies may be maintained
      with a "default free" realm table, listing next hops for all known
      realms, but not providing a default realm route.</t>

   <t>While dynamic realm routing protocols are not in use within AAA
      infrastructure today, even if such protocols were to be introduced,
      it is likely that they would be deployed solely within the core
      AAA infrastructure, but not on NAS devices, which are typically
      resource constrained.</t>

   <t>Since NAS devices do not maintain a full realm routing table, they
      do not have knowledge of all the realms reachable from the local
      network.  The situation is analogous to that of Internet hosts or
      edge routers that do not participate in the BGP mesh.  In order
      for an Internet host to determine whether it can reach a destination
      on the Internet, it is necessary to send a packet to the destination.</t>

   <t>Similarly, when a user provides an NAI to the NAS, the NAS does not know
      a priori whether or not the realm encoded in the NAI is reachable; it
      simply forwards the access request to the next hop on the roaming
      relationship path.  Eventually, the access request reaches the
      "default free" zone, where a core AAA proxy determines whether
      or not the realm is reachable.  As described in 
      <xref target="RFC4284"/>,
      where EAP authentication is in use, the core AAA proxy can send
      an Access-Reject, or it can send an Access-Challenge encapsulating
      an EAP-Request/Identity containing "realm hints" based on the content
      of the "default free" realm routing table.</t>

   <t>There are a number of intrinsic problems with this approach.  Where
      the "default free" routing table is large, it may not fit within
      a single EAP packet, and the core AAA proxy may not have a mechanism
      for selecting the most promising entries to include.  Even where the
      "default free" realm routing table would fit within a single
      EAP-Request/Identity packet, the core AAA router may not choose to
      include all entries, since the list of realm routes could be
      considered confidential information not appropriate for disclosure
      to hosts seeking network access.  Therefore, it cannot be
      assumed that the list of "realm hints" included within the
      EAP-Request/Identity is complete.  Given this, a NAS or local
      AAA proxy snooping the EAP-Request/Identity cannot rely on it to
      provide a complete list of reachable realms.  The "realm hint"
      mechanism described in [RFC4284] is not a dynamic routing protocol.</t>
   </section>

   <section title="Route Selection and Policy">

   <t>Along with lack of a dynamic AAA routing protocol, today's AAA
      infrastructure lacks mechanisms for route selection and policy.
      As a result, multiple routes may exist to a destination
      realm, without a mechanism for the selection of a preferred route.</t>

   <t>In Figure 2, Roaming Groups 1 and 2 both include a route to the
      realm "a.example.com".  However, these realm routes are not
      disseminated to the NAS along with associated metrics, and,
      as a result, there is no mechanism for implementation of dynamic
      routing policies (such as selection of realm routes by shortest path,
      or preference for routes originating at a given proxy).</t>

<figure><artwork>
                                    +---------+
                                    |         |----> "a.example.com"
                                    | Roaming |
                   +---------+      | Group 1 |
                   |         |----->| Proxy   |----> "b.example.com"
user "joe@         | Access  |      +---------+
 a.example.com"--->| Provider|
                   |   NAS   |      +---------+
                   |         |----->|         |----> "a.example.com"
                   +---------+      | Roaming |
                                    | Group 2 |
                                    | Proxy   |----> "c.example.com"
                                    +---------+

             Figure 2: Multiple routes to a destination realm
</artwork></figure>

   <t>In the example in Figure 2, access through Roaming Group 1 may be less
      expensive than access through Roaming Group 2, and as a result
      it would be desirable to prefer Roaming Group 1 as a next
      hop for an NAI with a realm of "a.example.com".  However, the
      only way to obtain this result would be to manually configure the
      NAS realm routing table with the following entries:</t>

<figure><artwork>
   Realm            Next Hop
   -----            --------
   b.example.com    Roaming Group 1
   c.example.com    Roaming Group 2
   Default          Roaming Group 1
</artwork></figure>

   <t>While manual configuration may be practical in situations where
      the realm routing table is small and entries are static,
      where the list of supported realms change frequently, or the preferences
      change dynamically, manual configuration will not be manageable.</t>
   </section>

   <section title="Source Routing">

   <t>Due to the limitations of current AAA routing mechanisms, there are
      situations in which NAI-based source routing is used to influence
      the roaming relationship path.  However, since the AAA
      proxies on the roaming relationship path are constrained by existing
      relationships, NAI-based source routing is not source routing in the
      classic sense; it merely suggests preferences that the AAA proxy can
      choose not to accommodate.</t>

   <t>Where realm routes are set up as the result of
      pre-configuration and dynamic route establishment is not
      supported, if a realm route does not exist, then NAI-based source
      routing cannot establish it.  Even where dynamic route establishment
      is possible, such as where the AAA client and server support
      certificate-based authentication, and AAA servers are discoverable
      (such as via the mechanisms described in [RFC3588]), an AAA proxy may
      choose not to establish a realm route by initiating the discovery
      process based on a suggestion in an NAI-based source route.</t>

   <t>Where the realm route does exist, or the AAA proxy is capable of
      establishing it dynamically, the AAA proxy may choose not to
      authorize the client to use it.</t>

   <t>While, in principle, source routing can provide users with
      better control over AAA routing decisions, there are a number
      of practical problems to be overcome.  In order to enable
      the client to construct optimal source routes, it is necessary
      for it to be provided with a complete and up-to-date
      realm routing table.  However, if a solution to this problem were
      readily available, then it could be applied to the AAA routing
      infrastructure, enabling the selection of routes without
      the need for user intervention.</t>

   <t>As noted in <xref target="Eronen04"/>, only a limited number of parameters can
      be updated dynamically.  For example, quality of service or
      pricing information typically will be pre-provisioned or made
      available on the web rather than being updated on a continuous
      basis.   Where realm names are communicated dynamically,
      the "default free" realm list is unlikely to be provided in full
      since this table could be quite large.  Given the constraints on
      the availability of information, the construction of
      source routes typically needs to occur in the face of incomplete
      knowledge.</t>

   <t>In addition, there are few mechanisms available to audit whether
      the requested source route is honored by the AAA infrastructure.
      For example, an access network could advertise a realm route to
      "costsless.example.com", while instead routing the access-request
      through "costsmore.example.com". 

      While the decorated NAI would
      be made available to the home AAA server in the EAP-Response/Identity,
      the home AAA server might have a difficult time verifying that the
      source route requested in the decorated NAI was actually honored
      by the AAA infrastructure. Similarly, it could be difficult to
      determine whether quality of service (QoS) or other routing requests were actually
      provided as requested.  To some extent, this problem may be
      addressed as part of the business arrangements between roaming
      partners, which may provide minimum service-level guarantees.</t>


   <t>Given the potential issues with source routing, conventional
      AAA routing mechanisms are to be preferred wherever possible.
      Where an error is encountered, such as an attempt to authenticate
      to an unreachable realm, "realm hints" can be provided as
      described <xref target="RFC4284"/>.  However, this approach has severe
      scalability limitations, as outlined in <xref target="existingietf"/>.</t>
   </section> 

</section>

<!-- //////////////////////////////////////////////////////// -->


<section anchor='info' title='Network Capabilities Discovery'>

  <t>Network capability discovery focuses on discovery of
     the services offered by networks, not just the
     capabilities    of individual points of attachment.
     By acquiring additional information on access network
     characteristics, it is possible   for users to make a
     more informed access decision. These characteristics
     may include:
  </t>

  <list style="symbols">
    <t>Roaming relationships between the
       access network provider and other network providers and
       associated costs. Where the network access client is not
       pre-configured with an identity and credentials corresponding
       to a local access network, it will need to be able to determine
       whether one or more home realms are reachable from an access
       network  so that successful authentication can be possible.
    </t>

    <t>EAP authentication methods.  While the EAP authentication
       methods supported by a home realm can only be determined by
       contacting the home AAA server, it is possible that the
       local realm will also support one or more EAP methods.
       For example, a user may be able to utilize EAP-SIM (Extensible
       Authentication Protocol - Subscriber
       Identity Module) to
       authenticate to the access network directly, rather than
       having to authenticate to the home network.
    </t>

    <t>End-to-end quality of service capability.  While local
       quality of service capabilities are typically advertised
       by the access network (e.g., support for Wi-Fi Multimedia (WMM)), the availability
       of end-to-end QoS services may not be advertised.
    </t>

    <t>Service parameters, such as the existence of middleboxes or
       firewalls. If the network access client is not made aware
       of the Internet access that it will receive on connecting to
       a point of attachment, it is possible that the user may not
       be able to access the desired services.
    </t>
  </list>

  <t>Reference <xref target='IEEE.11-04-0624'/> classifies the
     possible steps at which   
     IEEE 802.11 networks can acquire this information:
  </t>

  <list style="symbols">
    <t>Pre-association</t>
    <t>Post-association (or pre-authentication)</t>
    <t>Post-authentication</t>
  </list>

  <t> In the interest of minimizing connectivity delays, all of
      the information required for network selection (including both
      access network capabilities and global characteristics) needs to
      be provided prior to authentication.
  </t> 

  <t>By the time authentication occurs, the node has
     typically selected the access network, the NAI to be used to
     authenticate, as well as the point of attachment.  Should it learn
     information during the authentication process that would cause it to
     revise one or more of those decisions, the node will need to select a
     new network, point of attachment, and/or identity, and then go
     through the authentication process all over again.  Such a process is
     likely to be both time consuming and unreliable.
  </t>
</section>

</section>

<!-- //////////////////////////////////////////////////////////// -->

<section anchor='constr' title='Design Issues'>
  <t>   The following factors should be taken into consideration while
   evaluating solutions to the problem of network selection and discovery.</t>

  <section title="AAA Routing">
    <t>Solutions to the AAA routing issues discussed in <xref target="aaarouting2"/> need
       to apply to a wide range of AAA messages, and should not restrict
       the introduction of new AAA or access network functionality.  For
       example, AAA routing mechanisms should work for access requests
       and responses as well as accounting requests and responses and
       server-initiated messages.  Solutions should not restrict the
       development of new AAA attributes, access types, or performance
       optimizations (such as fast handoff support).</t>
  </section>

  <section title="Backward Compatibility">
    <t>Solutions need to maintain backward compatibility.  In particular:</t>

    <t><list style="symbols">
     <t>Selection-aware clients need to interoperate with legacy NAS
        devices and AAA servers.</t>

     <t>Selection-aware AAA infrastructure needs to interoperate with
        legacy clients and NAS devices.</t>
    </list></t>

    <t>For example, selection-aware clients should not transmit packets larger
       than legacy NAS devices or AAA servers can handle.  Where protocol
       extensions are required, changes should be required to as few
       infrastructure elements as possible.  For example, extensions that
       require upgrades to existing NAS devices will be more difficult to
       deploy than proposals that are incrementally deployable based on
       phased upgrades of clients or AAA servers.</t>
  </section> 

  <section anchor='effcon' title="Efficiency Constraints">
    <t>Solutions should be efficient as measured by channel
       utilization, bandwidth consumption, handoff delay, and energy
       utilization.  Mechanisms that depend on multicast
       frames need to be designed with care since multicast frames
       are often sent at the lowest supported rate and therefore consume
       considerable channel time as well as energy on the part of
       listening nodes.  Depending on the deployment, it is possible
       for bandwidth to be constrained both on the link, as well as
       in the backend AAA infrastructure.  As a result, chatty
       mechanisms such as keepalives or periodic probe packets are
       to be avoided.  Given the volume handled by AAA servers,
       solutions should also be conscious of adding to the load,
       particularly in cases where this could enable denial-of-service attacks.  For example, it would be a bad idea for
       a NAS to attempt to obtain an updated realm routing table
       by periodically sending probe EAP-Response/Identity packets

       to the AAA infrastructure in order to obtain "realm hints"
       as described in <xref target="RFC4284"/>.  Not only would this add significant
       load to the AAA infrastructure (particularly in cases where
       the AAA server was already overloaded, thereby dropping
       packets resulting in retransmission by the NAS), but it
       would also not provide the NAS with a complete realm
       routing table, for reasons described in 
       <xref target="aaarouting2"/>.</t>

   <t>Battery consumption is a significant constraint for handheld
      devices.  Therefore, mechanisms that require significant
      increases in packets transmitted, or the fraction of time
      during which the host needs to listen (such as proposals
      that require continuous scanning), are to be discouraged.
      In addition, the solution should not significantly impact
      the time required to complete network attachment.</t>
  </section>

  <section title="Scalability">

<t>Given limitations on frame sizes and channel utilization, it is
   important that solutions scale less than linearly in terms of the
   number of networks and realms supported.  For example, solutions such
   as <xref target="RFC4284"/> increase the size of advertisements in
   proportion to the
   number of entries in the realm routing table.  This approach does not
   scale to support a large number of networks and realms. 
</t>
<t>
   Similarly, approaches that utilize separate Beacons for each 
   "virtual AP" introduce additional Beacons in proportion to the 
   number of networks being advertised.  While such an approach 
   may minimize the pre-configuration required for network access 
   clients, the proliferation of "virtual APs" can result in 
   high utilization of the wireless medium.  For example, the
   802.11 Beacon is sent only at a rate within the basic rate set, which
   typically consists of the lowest supported rates, or perhaps only the
   lowest supported rate.  As a result, "virtual AP" mechanisms that
   require a separate Beacon for each "virtual AP" do not scale well.
</t>


<t>For example, with a Beacon interval of 100 Time Units (TUs) or
   102.4 ms (9.8 Beacons/second), twenty 802.11b "virtual APs"
   each announcing their own Beacon of 170 octets would result
   in a channel utilization of 37.9 percent.   The calculation can be
   verified as follows:
</t>
<t><list style="hanging">
   <t hangText="1.">A single 170-octet Beacon sent at 1 Mbps will
      utilize the channel for 1360 us (1360 bits @ 1 Mbps);</t>

   <t hangText="2.">Adding 144 us for the Physical Layer Convergence
      Procedure (PLCP)
      long preamble (144 bits @ 1 Mbps), 48 us for the PLCP header
      (48 bits @ 1 Mbps),  10 us for the Short Interframe Space (SIFS),
      50 us for the Distributed Interframe Space (DIFS), and 320 us for the
      average minimum Contention Window without backoff
      (CWmin/2 * aSlotTime = 32/2 * 20 us)  implies that a single
      Beacon will utilize an 802.11b channel for 1932 us;</t>

   <t hangText="3.">Multiply the channel time per Beacon by 196
      Beacons/second, and we
      obtain a channel utilization of 378672 us/second = 37.9 percent.</t>
</list></t>   

<t>In addition, since Beacon/Probe
   Response frames are sent by each AP over the wireless medium,
   stations can only discover APs within range, which implies
   substantial coverage overlap for roaming to occur without
   interruption.  Another issue with the Beacon and Probe
   Request/Response mechanism is that it is either insecure or
   its security can be assured only as part of authenticating
   to the network (e.g., verifying the advertised capabilities
   within the 4-way handshake).</t>

<t>A number of enhancements have been proposed to the Beacon/Probe
   Response mechanism in order to improve scalability and performance
   in roaming scenarios.  These include allowing APs to announce
   capabilities of neighbor APs as well as their own <xref target="IEEE.802.11k"/>.
   More scalable mechanisms for support of "virtual APs" within
   IEEE 802.11 have also been proposed <xref target="IEEE.802.11v"/>;
   generally these proposals
   collapse multiple "virtual AP" advertisements into a single 
   advertisement.</t>

<t>Higher-layer mechanisms can also be used to improve
   scalability since, by running over IP, they can utilize facilities,
   such as fragmentation, that may not be available at the link layer.
   For example, in IEEE 802.11, Beacon frames cannot use fragmentation
   because they are multicast frames.
</t>

  </section>

  <section title="Static Versus Dynamic Discovery">
   <t>"Phone-book" based approaches such as <xref target="RFC3017"/> can provide information
      for automatic selection decisions.  While this approach has been
      applied to wireless access, it typically can only be used successfully
      within a single operator or limited roaming partner deployment.  For 
      example,
      were a "Phone-Book" approach to attempt to incorporate information
      from a large number of roaming partners, it could become
      quite difficult to keep the information simultaneously comprehensive
      and up to date.  As noted in <xref target="Priest04"/> and
      <xref target="GROETING"/>, a large fraction of current
      WLAN access points operate on the default SSID, which may make it
      difficult to distinguish roaming partner networks by SSID.
      In any case, in wireless networks, dynamic discovery
      is a practical requirement since a node needs to know which APs
      are within range before it can connect.</t>
  </section>

   <section title="Security">
   <t>Network discovery and selection mechanisms may introduce
      new security vulnerabilities.  As noted in <xref target="defaultfree"/>,
      network
      operators may consider the AAA routing table to be confidential
      information, and therefore may not wish to provide it to
      unauthenticated peers via the mechanism described in RFC 4284.
      While the peer could provide a list of the realms it supports, with
      the authenticator choosing one, this approach raises privacy
      concerns.  Since identity selection occurs prior to authentication,
      the peer's supported realms would be sent in cleartext, enabling
      an attacker to determine the realms for which a potential victim
      has credentials.  This risk can be mitigated by restricting peer
      disclosure.  For example, a peer may only disclose additional
      realms in situations where an initially selected identity 
      has proved unusable.</t>

   <t>Since network selection occurs prior to authentication, it  
      is typically
      not possible to secure mechanisms for network discovery or
      identity selection, although it may be possible to provide for
      secure confirmation after authentication is complete.  As an
      example, some parameters discovered during network discovery
      may be confirmable via EAP Channel Bindings;  others may be
      confirmed in a subsequent Secure Association Protocol
      handshake.</t>

   <t>However, there are situations in which advertised
      parameters may not be confirmable.  This could lead to
      "bidding down" vulnerabilities. Section 7.8 of <xref target="RFC3748"/>
      states:
   </t>

   <t><list style="hanging">
      <t>Within or associated with each authenticator, it is not 
         anticipated
         that a particular named peer will support a choice of 
         methods.  This
         would make the peer vulnerable to attacks that negotiate 
         the least
         secure method from among a set.  Instead, for each named 
         peer, there
         SHOULD be an indication of exactly one method used to 
         authenticate
         that peer name.  If a peer needs to make use of different
         authentication methods under different circumstances, 
         then distinct
         identities SHOULD be employed, each of which identifies 
         exactly one
         authentication method.</t>
      </list>
   </t>

  <t>In practice,  where the authenticator  operates in "pass-through"
     mode, the EAP method negotiation  will occur between the EAP peer
     and  server, and therefore the  peer  will need  to associate  a
     single EAP  method with a  given EAP server.  Where  multiple EAP
     servers and  corresponding identities  may be reachable  from the
     same  selected   network,  the  EAP  peer   may  have  difficulty
     determining which identity  (and corresponding EAP method) should
     be used. Unlike network selection, which may be securely
     confirmed within a Secure Association Protocol handshake,
     identity selection hints provided within the EAP-Request/Identity
     are not secured.</t>

  <t>As a result, where  the identity selection mechanism described in
     RFC 4284 is used, the "hints" provided could be used by an attacker
     to convince the victim to select an identity corresponding to an EAP
     method offering lesser security (e.g., EAP MD5-Challenge).  One way
     to mitigate this risk is for the peer to only utilize EAP methods
     satisfying  the <xref  target="RFC4017"/>  security requirements,
     and for the peer to
     select the identity corresponding to the strongest authentication
     method where a choice is available.
  </t>
  </section>

  <section title="Management">
  <t>From an operational point of view, a network device in control of
     network advertisement and providing "realm hints" for guiding the
     network discovery and selection, should at least offer a management
     interface capable of providing status information for operators.
     Status information, such as counters of each selected network and used
     realm, and when RFC 4284 is used, the count of delivered "realm hints"
     might interest operators. Especially the information related to
     realms that fall into the "default free zone" or the "AAA fails to 
     route" are of interest.
  </t>

  <t>Larger deployments would benefit from a management interface
     that allow full remote configuration capabilities, for example, of "realm hints"
     in case of RFC 4284-conforming network devices. While changes to
     "realm hints" and realm routing information are not expected to be
     frequent, centralized remote management tends to lower the frequency
     of misconfigured devices.
  </t>
  </section>



</section>

<!-- //////////////////////////////////////////////////////////////// -->

<section anchor='concl' title='Conclusions'>

   <t>This document describes the network selection and discovery problem.
      In the opinion of the authors, the major findings are as follows:
   </t>

   <t><list style="symbols">
     <t>There is a need for additional work on access network discovery, 
        identifier selection, AAA routing, and payload routing.</t>

     <t>Credential selection and AAA routing are aspects of the same problem,
        namely identity selection.</t>

     <t>When considering selection among a large number of potential
        access networks and points of attachment, the issues described in
        the document become much harder to solve in an automated way,
        particularly if there are constraints on handoff latency.</t>

     <t>The proliferation of network discovery technologies within
        IEEE 802, IETF, and 3rd Generation Partnership Project (3GPP) has the potential to become a
        significant problem going forward.  Without a unified approach,
        multiple non-interoperable solutions may be deployed.</t>

     <t>New link-layer designs should include efficient distribution
        of network and realm information as a design requirement.</t>

     <t>It may not be possible to solve all aspects of the problem for
        legacy NAS devices on existing link layers.  Therefore, a phased
        approach may be more realistic.  For example, a partial solution
        could be made available for existing link layers, with a more
        complete solution requiring support for link layer extensions.</t>
     </list></t>
 
   <t>With respect to specific mechanisms for access
        network discovery and selection:</t>

   <t><list style="symbols">
     <t>Studies such as <xref target="MACScale"/> and <xref target="Velayos"/>,
        as well as the calculations described in <xref target="dopoa"/>, demonstrate
        that the IEEE 802.11 Beacon/Probe Response mechanism has substantial
        scaling issues in situations where a new Beacon is used for each
        "virtual AP".  As a result, a single channel is, in 
        practice, limited to less
        than twenty Beacon announcements with IEEE 802.11b.

        <vspace blankLines='1'/>
        The situation is improved substantially with successors, such as
        IEEE 802.11a, that enable additional channels, thus potentially
        increasing the number of potential virtual APs.

        <vspace blankLines='1'/>
        However, even with these enhancements, it is not feasible to advertise
        more than 50 different networks, and probably less in most 
        circumstances.
        <vspace blankLines='1'/>
        As a result, there appears to be a need to enhance the scalability of
        IEEE 802.11 network advertisements.</t>

     <t>Work is underway in IEEE 802.1, IEEE 802.21, and IEEE
        802.11u <xref target="IEEE.802.11u"/> to provide enhanced
        discovery functionality.  Similarly,
        IEEE 802.1af <xref target="IEEE.802.1af"/> has discussed
        the addition
        of network discovery functionality to
        IEEE 802.1X <xref target="IEEE.8021X-2004"/>.  However, neither
        IEEE 802.1AB <xref target="IEEE.802.1ab"/> nor IEEE 802.1af is
        likely to support fragmentation of network advertisement frames so that
        the amount of data that can be transported will be limited.
     </t>

     <t>While IEEE 802.11k <xref target="IEEE.802.11k"/> provides support
        for the Neighbor Report,
        this only provides for gathering of information on neighboring
        802.11 APs, not points of attachment supporting other link layers.
        Solution to this problem would appear to require coordination
        across IEEE 802 as well as between standards bodies.</t>

     <t>Given that EAP does not support fragmentation of EAP-Request/
        Identity packets, the volume of "realm hints" that can be fit with
        these packets is limited.  In addition, within IEEE 802.11,
        EAP packets can only be exchanged within State 3 (associated
        and authenticated).  As a result, use of EAP for realm discovery
        may result in significant delays.
        The extension of the realm advertisement mechanism 
        defined in <xref target="RFC4284"/> to handle advertisement of realm
        capability information 
        (such as  QoS provisioning) is not recommended due to semantic and packet 
        size limitations <xref target="GROETING"/>.
        As a result,  we believe that extending the mechanism described in 
        <xref target="RFC4284"/> for  discovery of realm capabilities is inappropriate.
        
        Instead, we believe it is more appropriate for this
        functionality to be handled within the link layer so that the
        information can be available early in the handoff process.</t>

     <t>Where link-layer approaches are not available, higher-layer approaches
        can be considered.  A limitation of higher-layer solutions is that 
        they
        can only optimize the movement of already connected hosts, but
        cannot address scenarios where network discovery is required for
        successful attachment.
        <vspace blankLines='1'/>
        Higher-layer alternatives worth considering include the SEAMOBY CARD
        protocol <xref target="RFC4066"/>, which enables advertisement of network device
        capabilities over IP, and Device Discovery Protocol (DDP)
        <xref target="MARQUES"/>, which provides functionality equivalent to
        IEEE 802.1AB using ASN.1 encoded advertisements sent to a
        link-local scope multicast address.</t>
   </list></t>
</section>


<section title='Security Considerations' anchor="securitycon">

<t>All aspects of the network discovery and selection problem are
   security related. The security issues and requirements have been
   discussed in the previous sections.
</t>

<t>The security requirements for network discovery depend on the type
   of information being discovered. Some of the parameters may have a
   security impact, such as the claimed name of the network to which the user
   tries to attach. Unfortunately, current EAP methods do not always
   make the verification of such parameters possible. EAP methods, such as
   Protected EAP (PEAP) <xref target='JOSEFSSON'/> and EAP-IKEv2 <xref
   target='IKEV2' />, may make this possible, however.
   There is even an
   attempt to provide a backward-compatible extension to older methods
   <xref target='ARKKO'/>.</t>

<t>The security requirements for network selection depend on whether the
   selection is considered a mandate or a hint.  In general, treating network
   advertisements as a hint is a more secure approach, since it reduces
   access client vulnerability to forged network advertisements.  For example, 
   "realm hints" may be ignored by an EAP peer if they are incompatible with the
   security policy corresponding to a selected access network.
</t>

<t>Similarly, network access clients may refuse to connect to a point of
   attachment if the advertised security capabilities do not match
   those that have been pre-configured.  For example, if an IEEE 802.11
   access client has been pre-configured to require WPA2 enterprise
   support within an access network, it may refuse to connect to 
   access points advertising support for WEP. 
</t>
<t>  
   Where the use of methods that do not satisfy the security requirements
   of <xref target="RFC4017"/> is allowed, it may be possible for an attacker to trick a
   peer into using an insecure EAP method, leading to the compromise of
   long-term credentials.  This can occur either where a network is
   pre-configured to allow use of an insecure EAP method, or where connection
   without pre-configuration is permitted using such methods.
</t>
<t>
   For example, an attacker can spoof a network advertisement,
   possibly downgrading the advertised security capabilities.   
   The rogue access point would then attempt to negotiate an 
   insecure EAP method.   Such an attack can be prevented if 
   the peer refuses to connect to access points not meeting its
   security requirements, which would include requiring use of
   EAP methods satisfying the <xref target="RFC4017"/> requirements.
</t>
<t>
   Support for secure discovery could potentially protect against
   spoofing of network advertisements, enabling verifiable
   information to guide connection decisions.   However, development
   of these mechanisms requires solving several difficult engineering
   and deployment problems. 
</t>
<t>
   Since discovery is a prerequisite for authentication,  it is not
   possible to protect initial discovery using dynamic keys derived
   in the authentication process.   On the other hand, integrity
   protection of network advertisements utilizing symmetric keys or
   digital signatures would require pre-configuration.
</t>

</section>

</middle>
<back>

<references title="Informative References">
	<?rfc linefile="1:http://xml.resource.org/public/rfc/bibxml/reference.RFC.2119.xml"?>

<reference anchor='RFC2119'>

<front>
<title abbrev='RFC Key Words'>Key words for use in RFCs to Indicate Requirement Levels</title>
<author initials='S.' surname='Bradner' fullname='Scott Bradner'>
<organization>Harvard University</organization>
<address>
<postal>
<street>1350 Mass. Ave.</street>
<street>Cambridge</street>
<street>MA 02138</street></postal>
<phone>- +1 617 495 3864</phone>
<email>sob@harvard.edu</email></address></author>
<date year='1997' month='March' />
<area>General</area>
<keyword>keyword</keyword>
<abstract>
<t>
   In many standards track documents several words are used to signify
   the requirements in the specification.  These words are often
   capitalized.  This document defines these words as they should be
   interpreted in IETF documents.  Authors who follow these guidelines
   should incorporate this phrase near the beginning of their document:

<list>
<t>
      The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
      NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED",  "MAY", and
      "OPTIONAL" in this document are to be interpreted as described in
      RFC 2119.
</t></list></t>
<t>
   Note that the force of these words is modified by the requirement
   level of the document in which they are used.
</t></abstract></front>

<seriesInfo name='BCP' value='14' />
<seriesInfo name='RFC' value='2119' />
<format type='TXT' octets='4723' target='ftp://ftp.isi.edu/in-notes/rfc2119.txt' />
<format type='HTML' octets='17491' target='http://xml.resource.org/public/rfc/html/rfc2119.html' />
<format type='XML' octets='5777' target='http://xml.resource.org/public/rfc/xml/rfc2119.xml' />
</reference>
<?rfc linefile="1411:/tmp/CGI11813.1"?>
	<?rfc linefile="1:http://xml.resource.org/public/rfc/bibxml/reference.RFC.1035.xml"?>

<reference anchor='RFC1035'>

<front>
<title abbrev='Domain Implementation and Specification'>Domain names - implementation and specification</title>
<author initials='P.' surname='Mockapetris' fullname='P. Mockapetris'>
<organization>USC/ISI</organization>
<address>
<postal>
<street>4676 Admiralty Way</street>
<city>Marina del Rey</city>
<region>CA</region>
<code>90291</code>
<country>US</country></postal>
<phone>+1 213 822 1511</phone></address></author>
<date year='1987' day='1' month='November' /></front>

<seriesInfo name='STD' value='13' />
<seriesInfo name='RFC' value='1035' />
<format type='TXT' octets='125626' target='ftp://ftp.isi.edu/in-notes/rfc1035.txt' />
</reference>
<?rfc linefile="1412:/tmp/CGI11813.1"?>
	<?rfc linefile="1:http://xml.resource.org/public/rfc/bibxml/reference.RFC.3588.xml"?>

<reference anchor='RFC3588'>

<front>
<title>Diameter Base Protocol</title>
<author initials='P.' surname='Calhoun' fullname='P. Calhoun'>
<organization /></author>
<author initials='J.' surname='Loughney' fullname='J. Loughney'>
<organization /></author>
<author initials='E.' surname='Guttman' fullname='E. Guttman'>
<organization /></author>
<author initials='G.' surname='Zorn' fullname='G. Zorn'>
<organization /></author>
<author initials='J.' surname='Arkko' fullname='J. Arkko'>
<organization /></author>
<date year='2003' month='September' />
<abstract>
<t>The Diameter base protocol is intended to provide an Authentication, Authorization and Accounting (AAA) framework for applications such as network access or IP mobility.  Diameter is also intended to work in both local Authentication, Authorization &amp;amp; Accounting and roaming situations.  This document specifies the message format, transport, error reporting, accounting and security services to be used by all Diameter applications.  The Diameter base application needs to be supported by all Diameter implementations. [STANDARDS TRACK]</t></abstract></front>

<seriesInfo name='RFC' value='3588' />
<format type='TXT' octets='341261' target='ftp://ftp.isi.edu/in-notes/rfc3588.txt' />
</reference>
<?rfc linefile="1413:/tmp/CGI11813.1"?>
	<?rfc linefile="1:http://xml.resource.org/public/rfc/bibxml/reference.RFC.3017.xml"?>

<reference anchor='RFC3017'>

<front>
<title>XML DTD for Roaming Access Phone Book</title>
<author initials='M.' surname='Riegel' fullname='M. Riegel'>
<organization /></author>
<author initials='G.' surname='Zorn' fullname='G. Zorn'>
<organization /></author>
<date year='2000' month='December' />
<abstract>
<t>This document defines the syntax as well as the semantics of the information to be included in the phone book for roaming applications. [STANDARDS TRACK]</t></abstract></front>

<seriesInfo name='RFC' value='3017' />
<format type='TXT' octets='59762' target='ftp://ftp.isi.edu/in-notes/rfc3017.txt' />
</reference>
<?rfc linefile="1414:/tmp/CGI11813.1"?>
	<?rfc linefile="1:http://xml.resource.org/public/rfc/bibxml/reference.RFC.3748.xml"?>

<reference anchor='RFC3748'>

<front>
<title>Extensible Authentication Protocol (EAP)</title>
<author initials='B.' surname='Aboba' fullname='B. Aboba'>
<organization /></author>
<author initials='L.' surname='Blunk' fullname='L. Blunk'>
<organization /></author>
<author initials='J.' surname='Vollbrecht' fullname='J. Vollbrecht'>
<organization /></author>
<author initials='J.' surname='Carlson' fullname='J. Carlson'>
<organization /></author>
<author initials='H.' surname='Levkowetz' fullname='H. Levkowetz'>
<organization /></author>
<date year='2004' month='June' />
<abstract>
<t>This document defines the Extensible Authentication Protocol (EAP), an authentication framework which supports multiple authentication methods.  EAP typically runs directly over data link layers such as Point-to-Point Protocol (PPP) or IEEE 802, without requiring IP.  EAP provides its own support for duplicate elimination and retransmission, but is reliant on lower layer ordering guarantees.  Fragmentation is not supported within EAP itself; however, individual EAP methods may support this.  This document obsoletes RFC 2284.  A summary of the changes between this document and RFC 2284 is available in Appendix A. [STANDARDS TRACK]</t></abstract></front>

<seriesInfo name='RFC' value='3748' />
<format type='TXT' octets='157994' target='ftp://ftp.isi.edu/in-notes/rfc3748.txt' />
</reference>
<?rfc linefile="1415:/tmp/CGI11813.1"?>
	<?rfc linefile="1:http://xml.resource.org/public/rfc/bibxml/reference.RFC.4334.xml"?>

<reference anchor='RFC4334'>

<front>
<title>Certificate Extensions and Attributes Supporting Authentication in Point-to-Point Protocol (PPP) and Wireless Local Area Networks (WLAN)</title>
<author initials='R.' surname='Housley' fullname='R. Housley'>
<organization /></author>
<author initials='T.' surname='Moore' fullname='T. Moore'>
<organization /></author>
<date year='2006' month='February' />
<abstract>
<t>This document defines two Extensible Authentication Protocol (EAP) extended key usage values and a public key certificate extension to carry Wireless LAN (WLAN) System Service identifiers (SSIDs).  This document obsoletes RFC 3770. [STANDARDS TRACK]</t></abstract></front>

<seriesInfo name='RFC' value='4334' />
<format type='TXT' octets='20739' target='ftp://ftp.isi.edu/in-notes/rfc4334.txt' />
</reference>
<?rfc linefile="1416:/tmp/CGI11813.1"?>
	<?rfc linefile="1:http://xml.resource.org/public/rfc/bibxml/reference.RFC.4282.xml"?>

<reference anchor='RFC4282'>

<front>
<title>The Network Access Identifier</title>
<author initials='B.' surname='Aboba' fullname='B. Aboba'>
<organization /></author>
<author initials='M.' surname='Beadles' fullname='M. Beadles'>
<organization /></author>
<author initials='J.' surname='Arkko' fullname='J. Arkko'>
<organization /></author>
<author initials='P.' surname='Eronen' fullname='P. Eronen'>
<organization /></author>
<date year='2005' month='December' />
<abstract>
<t>In order to provide roaming services, it is necessary to have a standardized method for identifying users.  This document defines the syntax for the Network Access Identifier (NAI), the user identity submitted by the client during network authentication. "Roaming" may be loosely defined as the ability to use any one of multiple Internet Service Providers (ISPs), while maintaining a formal, \%customer-vendor relationship with only one.  Examples of where roaming capabilities might be required include ISP "confederations" and \%ISP-provided corporate network access support.  This document is a revised version of RFC 2486, which originally defined NAIs.  Enhancements include international character set and privacy support, as well as a number of corrections to the original RFC. [STANDARDS TRACK]</t></abstract></front>

<seriesInfo name='RFC' value='4282' />
<format type='TXT' octets='34421' target='ftp://ftp.isi.edu/in-notes/rfc4282.txt' />
</reference>
<?rfc linefile="1417:/tmp/CGI11813.1"?>
	<?rfc linefile="1:http://xml.resource.org/public/rfc/bibxml/reference.RFC.3280.xml"?>

<reference anchor='RFC3280'>

<front>
<title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
<author initials='R.' surname='Housley' fullname='R. Housley'>
<organization /></author>
<author initials='W.' surname='Polk' fullname='W. Polk'>
<organization /></author>
<author initials='W.' surname='Ford' fullname='W. Ford'>
<organization /></author>
<author initials='D.' surname='Solo' fullname='D. Solo'>
<organization /></author>
<date year='2002' month='April' />
<abstract>
<t>This memo profiles the X.509 v3 certificate and X.509 v2 Certificate Revocation List (CRL) for use in the Internet. [STANDARDS TRACK]</t></abstract></front>

<seriesInfo name='RFC' value='3280' />
<format type='TXT' octets='295556' target='ftp://ftp.isi.edu/in-notes/rfc3280.txt' />
</reference>
<?rfc linefile="1418:/tmp/CGI11813.1"?>
	<?rfc linefile="1:http://xml.resource.org/public/rfc/bibxml/reference.RFC.4072.xml"?>

<reference anchor='RFC4072'>

<front>
<title>Diameter Extensible Authentication Protocol (EAP) Application</title>
<author initials='P.' surname='Eronen' fullname='P. Eronen'>
<organization /></author>
<author initials='T.' surname='Hiller' fullname='T. Hiller'>
<organization /></author>
<author initials='G.' surname='Zorn' fullname='G. Zorn'>
<organization /></author>
<date year='2005' month='August' />
<abstract>
<t>The Extensible Authentication Protocol (EAP) provides a standard mechanism for support of various authentication methods.  This document defines the Command-Codes and AVPs necessary to carry EAP packets between a Network Access Server (NAS) and a back-end authentication server. [STANDARDS TRACK]</t></abstract></front>

<seriesInfo name='RFC' value='4072' />
<format type='TXT' octets='79965' target='ftp://ftp.isi.edu/in-notes/rfc4072.txt' />
</reference>
<?rfc linefile="1419:/tmp/CGI11813.1"?>
	<?rfc linefile="1:http://xml.resource.org/public/rfc/bibxml/reference.RFC.3579.xml"?>

<reference anchor='RFC3579'>

<front>
<title>RADIUS (Remote Authentication Dial In User Service) Support For Extensible Authentication Protocol (EAP)</title>
<author initials='B.' surname='Aboba' fullname='B. Aboba'>
<organization /></author>
<author initials='P.' surname='Calhoun' fullname='P. Calhoun'>
<organization /></author>
<date year='2003' month='September' />
<abstract>
<t>This document defines Remote Authentication Dial In User Service (RADIUS) support for the Extensible Authentication Protocol (EAP), an authentication framework which supports multiple authentication mechanisms.  In the proposed scheme, the Network Access Server (NAS) forwards EAP packets to and from the RADIUS server, encapsulated within EAP-Message attributes.  This has the advantage of allowing the NAS to support any EAP authentication method, without the need for method- specific code, which resides on the RADIUS server.  While EAP was originally developed for use with PPP, it is now also in use with IEEE 802.  This memo provides information for the Internet community.</t></abstract></front>

<seriesInfo name='RFC' value='3579' />
<format type='TXT' octets='104469' target='ftp://ftp.isi.edu/in-notes/rfc3579.txt' />
</reference>
<?rfc linefile="1420:/tmp/CGI11813.1"?>
	<?rfc linefile="1:http://xml.resource.org/public/rfc/bibxml/reference.RFC.2194.xml"?>

<reference anchor='RFC2194'>

<front>
<title>Review of Roaming Implementations</title>
<author initials='B.' surname='Aboba' fullname='Bernard Aboba'>
<organization>Microsoft Corporation</organization>
<address>
<postal>
<street>One Microsoft Way</street>
<city>Redmond</city>
<region>WA</region>
<code>98052</code>
<country>US</country></postal>
<phone>+1 206 936 6605</phone>
<email>bernarda@microsoft.com</email></address></author>
<author initials='J.' surname='Lu' fullname='Juan Lu'>
<organization>AimQuest Corporation</organization>
<address>
<postal>
<street>1381 McCarthy Boulevard</street>
<city>Milpitas</city>
<region>CA</region>
<code>95035</code>
<country>US</country></postal>
<phone>+1 408 273 2730 x2762</phone>
<email>juanlu@aimnet.net</email></address></author>
<author initials='J.' surname='Alsop' fullname='John Alsop'>
<organization>i-Pass Alliance Inc.</organization>
<address>
<postal>
<street>650 Castro Street</street>
<street>Suite 280</street>
<city>Mountain View</city>
<region>CA</region>
<code>94041</code>
<country>US</country></postal>
<phone>+1 415 968 2200</phone>
<facsimile>+1 415 968 2266</facsimile>
<email>jalsop@ipass.com</email></address></author>
<author initials='J.' surname='Ding' fullname='James Ding'>
<organization>Asiainfo</organization>
<address>
<postal>
<street>13355 Noel Road</street>
<street>#1340</street>
<city>Dallas</city>
<region>TX</region>
<code>75240</code>
<country>US</country></postal>
<phone>+1 214 788 4141</phone>
<facsimile>+1 214 788 0729</facsimile>
<email>ding@bjai.asiainfo.com</email></address></author>
<author initials='W.' surname='Wang' fullname='Wei Wang'>
<organization>Merit Network, Inc.</organization>
<address>
<postal>
<street>4251 Plymouth Road</street>
<street>Suite C</street>
<city>Ann Arbor</city>
<region>MI</region>
<code>48105-2785</code>
<country>US</country></postal>
<phone>+1 313 764 2874</phone>
<email>weiwang@merit.edu</email></address></author>
<date year='1997' month='September' />
<abstract>
<t>This document reviews the design and functionality of existing roaming implementations. "Roaming capability" may be loosely defined as the ability to use any one of multiple Internet service providers (ISPs), while maintaining a formal, customer-vendor relationship with only one. Examples of cases where roaming capability might be required include ISP "confederations" and ISP-provided corporate network access support.</t></abstract></front>

<seriesInfo name='RFC' value='2194' />
<format type='TXT' octets='81533' target='ftp://ftp.isi.edu/in-notes/rfc2194.txt' />
</reference>
<?rfc linefile="1421:/tmp/CGI11813.1"?>
	<?rfc linefile="1:http://xml.resource.org/public/rfc/bibxml/reference.RFC.2607.xml"?>

<reference anchor='RFC2607'>

<front>
<title abbrev='Proxy Chaining and Policy in Roaming'>Proxy Chaining and Policy Implementation in Roaming</title>
<author initials='B.' surname='Aboba' fullname='Bernard Aboba'>
<organization>Microsoft Corporation</organization>
<address>
<postal>
<street>One Microsoft Way</street>
<city>Redmond</city>
<region>WA</region>
<code>98052</code>
<country>US</country></postal>
<phone>+1 425 936 6605</phone>
<email>bernarda@microsoft.com</email></address></author>
<author initials='J.' surname='Vollbrecht' fullname='John R. Vollbrecht'>
<organization>Merit Network, Inc.</organization>
<address>
<postal>
<street>4251 Plymouth Rd.</street>
<city>Ann Arbor</city>
<region>MI</region>
<code>48105-2785</code>
<country>US</country></postal>
<phone>+1 313 763 1206</phone>
<email>jrv@merit.edu</email></address></author>
<date year='1999' month='June' />
<abstract>
<t>This document describes how proxy chaining and policy implementation can be supported in roaming systems. The mechanisms described in this document are in current use.</t>
<t>However, as noted in the security considerations section, the techniques outlined in this document are vulnerable to attack from external parties as well as susceptible to fraud perpetrated by the roaming partners themselves. As a result, such methods are not suitable for wide-scale deployment on the Internet.</t></abstract></front>

<seriesInfo name='RFC' value='2607' />
<format type='TXT' octets='33271' target='ftp://ftp.isi.edu/in-notes/rfc2607.txt' />
</reference>
<?rfc linefile="1422:/tmp/CGI11813.1"?>
	<?rfc linefile="1:http://xml.resource.org/public/rfc/bibxml/reference.RFC.2608.xml"?>

<reference anchor='RFC2608'>

<front>
<title>Service Location Protocol, Version 2</title>
<author initials='E.' surname='Guttman' fullname='Erik Guttman'>
<organization>Sun Microsystems</organization>
<address>
<postal>
<street>Bahnstr. 2</street>
<city>Waibstadt</city>
<region />
<code>74915</code>
<country>DE</country></postal>
<phone>+49 7263 911701</phone>
<email>Erik.Guttman@sun.com</email></address></author>
<author initials='C.' surname='Perkins' fullname='Charles Perkins'>
<organization>Sun Microsystems</organization>
<address>
<postal>
<street>901 San Antonio Road</street>
<city>Mountain View</city>
<region>CA</region>
<code>94040</code>
<country>US</country></postal>
<phone>+1 650 786 6464</phone>
<email>cperkins@sun.com</email></address></author>
<author initials='J.' surname='Veizades' fullname='John Veizades'>
<organization>@Home Network</organization>
<address>
<postal>
<street>425 Broadway Street</street>
<city>Redwood City</city>
<region>CA</region>
<code>94063</code>
<country>US</country></postal>
<phone>+1 650 569 5243</phone>
<email>veizades@home.net</email></address></author>
<author initials='M.' surname='Day' fullname='Michael Day'>
<organization>Vinca Corporation.</organization>
<address>
<postal>
<street>1201 North 800 East</street>
<city>Orem</city>
<region>UT</region>
<code>84097</code>
<country>US</country></postal>
<phone>+1 801 376 5083</phone>
<email>mday@vinca.com</email></address></author>
<date year='1999' month='June' />
<abstract>
<t>The Service Location Protocol provides a scalable framework for the discovery and selection of network services.  Using this protocol, computers using the Internet need little or no static configuration of network services for network based applications.  This is especially important as computers become more portable, and users
 less tolerant or able to fulfill the demands of network system administration.</t></abstract></front>

<seriesInfo name='RFC' value='2608' />
<format type='TXT' octets='129475' target='ftp://ftp.isi.edu/in-notes/rfc2608.txt' />
</reference>
<?rfc linefile="1423:/tmp/CGI11813.1"?>
	<?rfc linefile="1:http://xml.resource.org/public/rfc/bibxml/reference.RFC.3580.xml"?>

<reference anchor='RFC3580'>

<front>
<title>IEEE 802.1X Remote Authentication Dial In User Service (RADIUS) Usage Guidelines</title>
<author initials='P.' surname='Congdon' fullname='P. Congdon'>
<organization /></author>
<author initials='B.' surname='Aboba' fullname='B. Aboba'>
<organization /></author>
<author initials='A.' surname='Smith' fullname='A. Smith'>
<organization /></author>
<author initials='G.' surname='Zorn' fullname='G. Zorn'>
<organization /></author>
<author initials='J.' surname='Roese' fullname='J. Roese'>
<organization /></author>
<date year='2003' month='September' />
<abstract>
<t>This document provides suggestions on Remote Authentication Dial In User Service (RADIUS) usage by IEEE 802.1X Authenticators.  The material in this document is also included within a non-normative Appendix within the IEEE 802.1X specification, and is being presented as an IETF RFC for informational purposes.  This memo provides information for the Internet community.</t></abstract></front>

<seriesInfo name='RFC' value='3580' />
<format type='TXT' octets='66136' target='ftp://ftp.isi.edu/in-notes/rfc3580.txt' />
</reference>
<?rfc linefile="1424:/tmp/CGI11813.1"?>
	<?rfc linefile="1:http://xml.resource.org/public/rfc/bibxml/reference.RFC.4284.xml"?>

<reference anchor='RFC4284'>

<front>
<title>Identity Selection Hints for the Extensible Authentication Protocol (EAP)</title>
<author initials='F.' surname='Adrangi' fullname='F. Adrangi'>
<organization /></author>
<author initials='V.' surname='Lortz' fullname='V. Lortz'>
<organization /></author>
<author initials='F.' surname='Bari' fullname='F. Bari'>
<organization /></author>
<author initials='P.' surname='Eronen' fullname='P. Eronen'>
<organization /></author>
<date year='2006' month='January' />
<abstract>
<t>The Extensible Authentication Protocol (EAP) is defined in RFC 3748. This document defines a mechanism that allows an access network to provide identity selection hints to an EAP peer -- the end of the link that responds to the authenticator. The purpose is to assist the EAP peer in selecting an appropriate Network Access Identifier (NAI). This is useful in situations where the peer does not receive a lower-layer indication of what network it is connecting to, or when there is no direct roaming relationship between the access network and the peer's home network. In the latter case, authentication is typically accomplished via a mediating network such as a roaming consortium or broker.&lt;/t>&lt;t> The mechanism defined in this document is limited in its scalability. It is intended for access networks that have a small to moderate number of direct roaming partners. This memo provides information for the Internet community.</t></abstract></front>

<seriesInfo name='RFC' value='4284' />
<format type='TXT' octets='30322' target='ftp://ftp.isi.edu/in-notes/rfc4284.txt' />
</reference>
<?rfc linefile="1425:/tmp/CGI11813.1"?>
	<?rfc linefile="1:http://xml.resource.org/public/rfc/bibxml/reference.RFC.4017.xml"?>

<reference anchor='RFC4017'>

<front>
<title>Extensible Authentication Protocol (EAP) Method Requirements for Wireless LANs</title>
<author initials='D.' surname='Stanley' fullname='D. Stanley'>
<organization /></author>
<author initials='J.' surname='Walker' fullname='J. Walker'>
<organization /></author>
<author initials='B.' surname='Aboba' fullname='B. Aboba'>
<organization /></author>
<date year='2005' month='March' />
<abstract>
<t>The IEEE 802.11i MAC Security Enhancements Amendment makes use of IEEE 802.1X, which in turn relies on the Extensible Authentication Protocol (EAP).  This document defines requirements for EAP methods used in IEEE 802.11 wireless LAN deployments.  The material in this document has been approved by IEEE 802.11 and is being presented as an IETF RFC for informational purposes.  This memo provides information for the Internet community.</t></abstract></front>

<seriesInfo name='RFC' value='4017' />
<format type='TXT' octets='22183' target='ftp://ftp.isi.edu/in-notes/rfc4017.txt' />
</reference>
<?rfc linefile="1426:/tmp/CGI11813.1"?>
	<?rfc linefile="1:http://xml.resource.org/public/rfc/bibxml/reference.RFC.2486.xml"?>

<reference anchor='RFC2486'>

<front>
<title>The Network Access Identifier</title>
<author initials='B.' surname='Aboba' fullname='Bernard Aboba'>
<organization>Microsoft Corporation</organization>
<address>
<postal>
<street>One Microsoft Way</street>
<city>Redmond</city>
<region>WA</region>
<code>98052</code>
<country>USA</country></postal>
<phone>+1 425 936 6605</phone>
<email>bernarda@microsoft.com</email></address></author>
<author initials='M.' surname='Beadles' fullname='Mark A. Beadles'>
<organization>WorldCom Advanced Networks</organization>
<address>
<postal>
<street>5000 Britton Rd.</street>
<city>Hilliard</city>
<region>OH</region>
<code>43026</code>
<country>USA</country></postal>
<phone>+1 614 723 1941</phone>
<email>mbeadles@wcom.net</email></address></author>
<date year='1999' month='January' />
<abstract>
<t>
   In order to enhance the interoperability of roaming and tunneling
   services, it is desirable to have a standardized method for
   identifying users.  This document proposes syntax for the Network
   Access Identifier (NAI), the userID submitted by the client during
   PPP authentication. It is expected that this will be of interest for
   support of roaming as well as tunneling.  "Roaming capability" may be
   loosely defined as the ability to use any one of multiple Internet
   service providers (ISPs), while maintaining a formal, customer-vendor
   relationship with only one.  Examples of where roaming capabilities
   might be required include ISP "confederations" and ISP-provided
   corporate network access support.
</t></abstract></front>

<seriesInfo name='RFC' value='2486' />
<format type='TXT' octets='14261' target='ftp://ftp.isi.edu/in-notes/rfc2486.txt' />
<format type='HTML' octets='14738' target='http://xml.resource.org/public/rfc/html/rfc2486.html' />
<format type='XML' octets='15432' target='http://xml.resource.org/public/rfc/xml/rfc2486.xml' />
</reference>
<?rfc linefile="1427:/tmp/CGI11813.1"?>
	<?rfc linefile="1:http://xml.resource.org/public/rfc/bibxml/reference.RFC.4066.xml"?>

<reference anchor='RFC4066'>

<front>
<title>Candidate Access Router Discovery (CARD)</title>
<author initials='M.' surname='Liebsch' fullname='M. Liebsch'>
<organization /></author>
<author initials='A.' surname='Singh' fullname='A. Singh'>
<organization /></author>
<author initials='H.' surname='Chaskar' fullname='H. Chaskar'>
<organization /></author>
<author initials='D.' surname='Funato' fullname='D. Funato'>
<organization /></author>
<author initials='E.' surname='Shim' fullname='E. Shim'>
<organization /></author>
<date year='2005' month='July' />
<abstract>
<t>To enable seamless IP-layer handover of a mobile node (MN) from one access router (AR) to another, the MN is required to discover the identities and capabilities of candidate ARs (CARs) for handover prior to the initiation of the handover.  The act of discovery of CARs has two aspects: identifying the IP addresses of the CARs and finding their capabilities.  This process is called "candidate access router discovery" (CARD).  At the time of IP-layer handover, the CAR, whose capabilities are a good match to the preferences of the MN, is chosen as the target AR for handover.  The protocol described in this document allows a mobile node to perform CARD.  This memo defines an Experimental Protocol for the Internet community.</t></abstract></front>

<seriesInfo name='RFC' value='4066' />
<format type='TXT' octets='116733' target='ftp://ftp.isi.edu/in-notes/rfc4066.txt' />
</reference>
<?rfc linefile="1428:/tmp/CGI11813.1"?>
<!--[rfced]	&I-D.tschofenig-eap-ikev2;
	&I-D.arkko-eap-service-identity-auth;
	&I-D.groeting-eap-netselection-results;
	&I-D.josefsson-pppext-eap-tls-eap;
	&I-D.marques-ddp;
	&I-D.ohba-802dot21-basic-schema;-->


<?rfc rfcedstyle="no"?>

<reference anchor='IKEV2'>
<front>
<title>EAP-IKEv2 Method</title>

<author initials='H' surname='Tschofenig' fullname='Hannes Tschofenig'>
    <organization />
</author>

<author initials='D' surname='Kroeselberg' fullname='Dirk Kroeselberg'>
    <organization />
</author>

<author initials='A' surname='Pashalidis' fullname='Andreas Pashalidis'>
    <organization />
</author>

<author initials='Y' surname='Ohba' fullname='Yoshihiro Ohba'>
    <organization />
</author>

<author initials='F' surname='Bersani' fullname='Florent Bersani'>
    <organization />
</author>

<date month='September' day='27' year='2007' />

<abstract><t>This document specifies EAP-IKEv2, an Extensible Authentication Protocol (EAP) method that is based on the Internet Key Exchange (IKEv2) protocol. EAP-IKEv2 provides mutual authentication and session key establishment between an EAP peer and an EAP server. It supports authentication techniques that are based on passwords, high- entropy shared keys, and public key certificates. EAP-IKEv2 further provides support for cryptographic ciphersuite negotiation, hash function agility, identity confidentiality (in certain modes of operation), fragmentation, and an optional "fast reconnect" mode. EAP-IKEv2 has sucessfully passed Designated Expert Review as mandated by RFC 3748.</t></abstract>

</front>

<seriesInfo name='Work in' value='Progress' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-tschofenig-eap-ikev2-15.txt' />
</reference>




<reference anchor='ARKKO'>
<front>
<title>Authenticated Service Information for the Extensible Authentication Protocol  (EAP)</title>

<author initials='J' surname='Arkko' fullname='Jari Arkko'>
    <organization />
</author>

<author initials='P' surname='Eronen' fullname='Pasi Eronen'>
    <organization />
</author>

<date month='October' day='24' year='2005' />

<abstract><t>EAP is typically used in an arrangement where the actual service (such as a wireless LAN access point) is separated from the authentication server. However, EAP itself does not have a concept of a service identity or its parameters, and thus the client usually does not authenticate any information about the service itself, even when a mutually authenticating EAP method is used. This document specifies a backward compatible extension to popular EAP methods for authenticating service related information, such as the identity and type of the offered service. A common parameter name space is created in order to ensure that the same kinds of identifiers can be authenticated independent of the choice of the EAP authentication method, retaining the EAP media independence principle.</t></abstract>

</front>

<seriesInfo name='Work in' value='Progress' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-arkko-eap-service-identity-auth-04.txt' />
</reference>



<reference anchor='GROETING'>
<front>
<title>Network Selection Implementation Results</title>

<author initials='W' surname='Groeting' fullname='Wolfgang Groeting'>
    <organization />
</author>

<author initials='S' surname='Berg' fullname='Stefan Berg'>
    <organization />
</author>

<author initials='H' surname='Tschofenig' fullname='Hannes Tschofenig'>
    <organization />
</author>

<author initials='M' surname='Ness' fullname='Malte Ness'>
    <organization />
</author>

<date month='July' day='12' year='2004' />

<abstract><t>This document aims to highlight implementation results on network discovery as well as some new ideas for its extension. The implementation is based on the draft on mediating network discovery, a mechanism that enables a mobile node to discover roaming partners of an access network via EAP. The concept allows automatic network selection of end hosts, based on additional parameters, hence reducing interacting with the user.This document should also open a discussion on the need on network capability mechanisms.</t></abstract>

</front>

<seriesInfo name='Work in' value='Progress' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-groeting-eap-netselection-results-00.txt' />
</reference>



<reference anchor='JOSEFSSON'>
<front>
<title>Protected EAP Protocol (PEAP) Version 2</title>

<author initials='A' surname='Palekar' fullname='Ashwin Palekar'>
    <organization />
</author>

<author initials='D' surname='Simon' fullname='Daniel Simon'>
    <organization />
</author>

<author initials='J' surname='Salowey' fullname='Joseph Salowey '>
     <organization />
</author>

<author initials='H' surname='Zhou' fullname='Hao Zhou ' >
     <organization />
</author>

<author initials='G' surname='Zorn' fullname='Glen Zorn'>
    <organization />
</author>

<author initials='S' surname='Josefsson' fullname='Simon Josefsson'>
    <organization />
</author>

<date month='October' day='21' year='2004' />

<abstract><t>The Extensible Authentication Protocol (EAP) provides support for multiple authentication methods. This document defines the Protected Extensible Authentication Protocol (PEAP) Version 2, which provides an encrypted and authenticated tunnel based on transport layer security (TLS) that encapsulates EAP authentication mechanisms. PEAPv2 uses TLS to protect against rogue authenticators, protect against various attacks on the confidentiality and integrity of the inner EAP method exchange and provide EAP peer identity privacy. PEAPv2 also provides support for chaining multiple EAP mechanisms, cryptographic binding between authentications performed by inner EAP mechanisms and the tunnel, exchange of arbitrary parameters (TLVs), and fragmentation and reassembly.</t></abstract>

</front>

<seriesInfo name='Work in' value='Progress' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-josefsson-pppext-eap-tls-eap-10.txt' />
</reference>


<reference anchor='MARQUES'>
<front>
<title>Device Discovery Protocol (DDP)</title>

<author initials='R' surname='Enns' fullname='Rob Enns'>
    <organization />
</author>

<author initials='P' surname='Marques' fullname='Pedro Marques'>
    <organization />
</author>

<author initials='D' surname='Morrell' fullname='Daemon Morrell'>
    <organization />
</author>

<date month='May' day='29' year='2003' />
</front>

<seriesInfo name='Work in' value='Progress' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-marques-ddp-00.txt' />
</reference>


<reference anchor='OHBA'>
<front>
<title>IEEE 802.21 Basic Schema</title>

<author initials='K' surname='Taniuchi' fullname='Kenichi Taniuchi' >
     <organization />
</author>

<author initials='Y' surname='Ohba' fullname='Yoshihiro Ohba'>
    <organization />
</author>

<author initials='D' surname='Subir' fullname='Subir Das ' >
     <organization />
</author>

<date month='October' day='12' year='2007' />

<abstract><t>This document describes the basic schema for IEEE 802.21 Media- Independent Information Service, an RDF (Resource Description Framework) schema defined in IEEE 802.21. This document serves as the Specification required by the IANA to maintain a global registry for storing the RDF schema.</t></abstract>

</front>

<seriesInfo name='Work in' value='Progress' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ohba-802dot21-basic-schema-01.txt' />
</reference>


	<reference anchor="IEEE.802.11-2003">
	<front>
		<title>Wireless LAN Medium Access Control (MAC) and Physical
              Layer (PHY) Specifications</title>
		<author>
			<organization>IEEE</organization>
		</author>
		<date year="2003" />
	</front>
	<seriesInfo name="IEEE" value="Standard 802.11" />
	</reference>
	
	
	<reference anchor='Fixingapsel'>
	<front>
		<title>Fixing 802.11 Access Point Selection</title>
		<author initials='G' surname="Judd" fullname="Glenn Judd"></author>
		<author initials='P' surname="Steenkiste" fullname="Peter Steenkiste"></author>
		<date month='Sigcomm Poster Session' year='2002' />
	</front>
	<format type='PDF' target='http://www.cs.cmu.edu/~glennj/scp/FixingAPSelection.html' />
	</reference>


<reference anchor="IEEE.802.11k">
<front>
<title>Draft
          Ammendment to Standard for Telecommunications and Information
          Exchange Between Systems - LAN/MAN Specific Requirements -
          Part 11: Wireless LAN Medium Access Control (MAC) and Physical
          Layer (PHY) Specifications: Radio Resource Management
</title>
<author>
<organization>IEEE</organization>
</author>
<date month="January" year="2007" />
</front>
<seriesInfo name="IEEE" value="802.11k, D7.0"/>
</reference>


<reference anchor="IEEE.802.1ab">
  <front>
    <title>Draft Standard for
           Local and Metropolitan Area Networks - 
           Station and Media Access Control
           Connectivity Discovery
    </title>
    <author>
      <organization>IEEE</organization>
    </author>
    <date month="April" year="2007" />
  </front>
  <seriesInfo name="IEEE" value="802.1AB, D1.0"/>
</reference>

<reference anchor="IEEE.802.1af">
  <front>
    <title>Draft Standard for Local and Metropolitan Area
           Networks - Port-Based Network Access Control -
           Amendment 1: Authenticated Key Agreement for
           Media Access Control (MAC) Security
    </title>
    <author>
      <organization>IEEE</organization>
    </author>
    <date month="January" year="2007" />
  </front>
  <seriesInfo name="IEEE" value="802.1af, D1.2"/>
</reference>





<reference anchor="IEEE.802.11v">
<front>
<title>Draft Amemdment to Standard  for Information Technology -
       Telecommunications and Information Exchange Between Systems -
       LAN/MAN Specific Requirements -
       Part 11: Wireless Medium Access Control (MAC) and physical
       layer (PHY) specifications: Wireless Network Management
</title>
<author>
<organization>IEEE</organization>
</author>
<date month="March" year="2007" />
</front>
<seriesInfo name="IEEE" value="802.11v, D0.09"/>
</reference>


	<reference anchor="Eronen04">
	<front>
		<title>Role of authorization in wireless network security</title>
		<author initials="P" surname="Eronen"><organization></organization></author>
		<author initials="J" surname="Arkko"><organization></organization></author>
		<date month='Extended abstract presented in the DIMACS workshop, November' year='2004' />
	</front>
	</reference>


	<reference anchor="IEEE.11-04-0624">
	<front>
		<title>Information to Support Network Selection</title>
		<author initials="S" surname="Berg"></author>
		<date month='IEEE Contribution 11-04-0624' year='2004' />
	</front>
	</reference>



	<reference anchor="Priest04">
	<front>
		<title>The State of Wireless London</title>
		<author initials="J" surname="Priest"></author>
		<date month='July' year='2004' />
	</front>
	<format type='PDF' target='http://www.spacestudios.org.uk/content/articles/461.pdf' />
	</reference>
	
	
	<reference anchor="MACScale">
	<front>
		<title>Performance Anomaly of 802.11b</title>
		<author initials="M" surname="Heusse" fullname="M. Heusse"></author>
		<date month='LSR-IMAG Laboratory, Grenoble, France, IEEE Infocom' year='2003' />
	</front>
	<format type='PDF' target='http://www.ieee-infocom.org/2003/papers/21_01.PDF' />
	</reference>


	<reference anchor='Velayos'>
	<front>
		<title>Techniques to Reduce IEEE 802.11b MAC Layer Handover Time</title>
		<author initials='H' surname="Velayos" fullname="H. Velayos"></author>
		<author initials='G' surname="Karlsson" fullname="G. Karlsson"></author>
		<date month='Laboratory for Communication Networks, KTH, Royal Institute of Technology,
			Stockholm, Sweden, TRITA-IMIT-LCN R 03:02, April' year='2003' />
	</front>
	<format type='PDF' target='http://www.it.kth.se/~hvelayos/papers/TRITA-IMIT-LCN%20R%2003-02%20Handover%20in%20IEEE%20802.pdf' />
	</reference>


<reference anchor="IEEE.802.11u">
  <front>
  <title>Draft Amendment to STANDARD FOR Information Technology - 
         LAN/MAN Specific Requirements - Part 11:
         Interworking with External Networks;
         Draft Amendment to Standard;
         IEEE P802.11u/D0.04
  </title>
  <author>
  <organization>IEEE</organization>
  </author>
  <date month="April" year="2007"/>
  </front>
  <seriesInfo name="IEEE" value="802.11u, D0.04"/>
</reference>


	<reference anchor="IEEE-11-03-154r1">
	<front>
		<title>Virtual Access Points</title>
		<author initials="B" surname="Aboba" fullname="Bernard Aboba">
			<organization>Microsoft</organization>
		</author>
		<date month='IEEE Contribution 11-03-154r1, May' year='2003' />
	</front>
	</reference>


	<reference anchor="IEEE-11-03-0827">
	<front>
		<title>Co-existence of Different Authentication Models</title>

		<author initials="E" surname="Hepworth" fullname="Eleanor Hepworth">
		<organization>Siemens</organization>
	</author>
	<date month='IEEE Contribution 11-03-0827' year='2003' />
	</front>
	</reference>


	<reference
	anchor="11-05-0822-03-000u-tgu-requirements"> 
       	<front>
		<title>TGu Requirements</title>
		<author initials="M" surname="Moreton" fullname="Mike Moreton">
		<organization>Microsoft</organization></author>
		<date month='IEEE Contribution 11-05-0822-03-000u-tgu-requirements, August' year='2005' />
	</front>
	</reference>

	<reference anchor="3GPPSA2WLANTS">
	<front>
		<title>3GPP System to Wireless Local Area Network (WLAN) interworking; System De
				scription; Release 6; Stage 2</title>
		<author>
			<organization>3GPP</organization>
		</author>
		<date month="September" year="2005" />
	</front>
	<seriesInfo name="3GPP" value="Technical Specification 23.234" />
	<format type='ZIP' target='http://www.3gpp.org/ftp/Specs/archive/23_series/23.234/' />
	</reference>

	<reference anchor="3GPP-SA3-030736">
	<front>
		<title>Security of EAP and SSID based network advertisements</title>
		<author initials="" surname="Ericsson" fullname="Ericsson">
		<organization>Ericsson</organization></author>
		<date month='3GPP Contribution S3-030736, November' year='2003' />
	</front>
	<format type='ZIP' target='http://www.3gpp.org/ftp/tsg_sa/WG3_Security/2003_meetings/TSGS3_31_Munich/Docs/ZIP/S3-030736.zip' />
	</reference>

	<reference anchor='3GPP.23.122'>
	<front>
		<title>Non-Access-Stratum (NAS) functions related to Mobile Station (MS) in idle mode</title>
		<author><organization>3GPP</organization></author>
		<date day='10' month='October' year='2005' />
	</front>
	<seriesInfo name='3GPP TS' value='23.122 6.5.0' />
	<format type='HTML' target='http://www.3gpp.org/ftp/Specs/html-info/23122.htm' />
	</reference>

	<reference anchor="WWRF-ANS">
	<front>
		<title>Access Network Selection in a 4G Environment and the Role of Terminal and
				 Service Platform</title>
		<author initials="R" surname="Eijk" fullname="Ronald van Eijk"></author>
		<author initials="J" surname="Brok" fullname="Jacco Brok"></author>
		<author initials="J" surname="Bemmel" fullname="Jeroen van Bemmel"></author>
		<author initials="B" surname="Busropan" fullname="Bryan Busropan"></author>
		<date month='10th WWRF, New York, October' year='2003' />
	</front>
	<format type='PDF' target='https://doc.telin.nl/dscgi/ds.py/Get/File-34517/WWRF10_ANS_4G.pdf' />
	</reference>

	<reference anchor="WLAN3G">
	<front>
		<title>Interworking Architecture between WLAN and 3G Systems</title>
		<author initials="K" surname="Ahmavaara" fullname="Kalle Ahmavaara">
			<organization>Nokia</organization></author>
		<author initials="H" surname="Haverinen" fullname="Henry Haverinen">
			<organization>Nokia</organization></author>
		<author initials="R" surname="Pichna" fullname="Roman Pichna">
			<organization>Nokia</organization></author>
		<date month='IEEE Communications Magazine, November' year='2003' />
	</front>
	<format type='PDF' target='http://www.cs.ccu.edu.tw/~yschen/course/92-1/papers/01244926.pdf' />
	</reference>


	<reference anchor="INTELe2e">
	<front>
		<title>Wireless LAN (WLAN) End to
				End Guidelines for Enterprises
				and Public Hotspot Service
				Providers</title>
		<author fullname="Intel">
		<organization>Intel</organization></author>
		<date month='November' year='2003' />
	</front>
	<format type='PDF' target='http://www.intel.com/business/bss/infrastructure/wireless/deployment/e2e_wlan.pdf' />
	</reference>



	<reference anchor="Eronen03">
	<front>
		<title>Network Selection Issues</title>
		<author initials="P" surname="Eronen" fullname="Pasi Eronen">
		<organization>Nokia</organization></author>
		<date month='presentation to EAP WG at IETF 58, November' year='2003' />
	</front>
	<format type='PPT' target='http://www.drizzle.com/~aboba/IETF58/network/ietf58_eap_networkselect_pasi.ppt' />
	</reference>




<reference anchor="3GPPSA3WLANTS">
<front>
<title>3GPP Technical Specification Group Service and System Aspects; 3G Security;
       Wireless Local Area Network (WLAN) interworking security (Release 6); Stage 2</title>
<author>
<organization>3GPP</organization>
</author>
<date month="October" year="2005" />
</front>

<seriesInfo name="3GPP" value="Technical Specification 33.234 v 6.6.0" />

<format type='ZIP'
        target='http://www.3gpp.org/ftp/Specs/archive/33_series/33.234/33234-660.zip' />

</reference>



<reference anchor="3GPPCT1WLANTS">
<front>
<title>3GPP System to Wireless Local Area Network (WLAN) interworking;
       User Equipment (UE) to network protocols;
       Stage 3 (Release 6)</title>
<author>
<organization>3GPP</organization>
</author>
<date month="October" year="2005" />
</front>

<seriesInfo name="3GPP" value="Technical Specification 24.234 v 6.4.0" />

<format type='ZIP'
        target='http://www.3gpp.org/ftp/Specs/archive/24_series/24.234/24234-640.zip' />

</reference>







<reference anchor="IEEE.802.21">
<front>
<title>Draft IEEE Standard for Local and
       Metropolitan Area Networks:
       Media Independent Handover Services
</title>
<author>
<organization>IEEE</organization>
</author>
<date month="April" year="2007" />
</front>

<seriesInfo name="IEEE" value="802.21, D05.00"/>
</reference>




<reference anchor="3GPPCT4WLANTS">
<front>
<title>3GPP system to Wireless Local Area Network (WLAN) interworking;
       Stage 3 (Release 6)</title>
<author>
<organization>3GPP</organization>
</author>
<date month="October" year="2005" />
</front>

<seriesInfo name="3GPP" value="Technical Specification 29.234 v 6.4.0" />

<format type='ZIP'
        target='http://www.3gpp.org/ftp/Specs/archive/29_series/29.234/29234-640.zip' />

</reference>



	<reference anchor="IEEE.8021X-2004">
	<front>
		<title>Local and Metropolitan Area Networks: Port-Based Network Access
		Control</title>
		<author>
			<organization>IEEE</organization>
		</author>
		<date month="July" year="2004" />
	</front>
	<seriesInfo name="IEEE" value="Standard 802.1X" />
    <format type="TXT"/>
	</reference>
</references>
<?rfc rfcedstyle="yes"?>

<!-- //////////////////////////////////////////////////////////// -->

<vspace blankLines="100"/> <!-- start appendix on new page-->

<section anchor='existing' title='Existing Work'>

<section anchor="existingietf" title='IETF'>

<t>Several IETF WGs have dealt with aspects of the network selection
  problem, including the AAA, EAP, PPP, RADIUS, ROAMOPS, and
  RADEXT WGs.</t>

<t>ROAMOPS WG developed the NAI, originally defined in <xref target="RFC2486"/>,
  and subsequently updated in <xref target="RFC4282"/>.  Initial roaming
  implementations are described in <xref target="RFC2194"/>, and the use of
  proxies in roaming is addressed in <xref target="RFC2607"/>.
  The SEAMOBY WG developed CARD <xref target="RFC4066"/>, which assists in discovery
  of suitable base stations.  PKIX WG produced <xref target="RFC3280"/>, which
  addresses issues of certificate selection.  The AAA WG
  developed more sophisticated access routing, authentication, and
  service discovery mechanisms within Diameter <xref target="RFC3588"/>.</t>

<t>Adrangi et al. <xref target="RFC4284"/> defines the use of the EAP-Request/Identity
  to provide "realm hints" useful for identity selection.  The
  NAI syntax described in <xref target="RFC4282"/> enables the construction of
  source routes.  Together, these mechanisms enable the user
  to determine whether it possesses an identity and corresponding
  credential suitable for use with an EAP-capable NAS.  This is
  particularly useful in situations where the lower layer provides
  limited information (such as in wired IEEE 802 networks where
  IEEE 802.1X currently does not provide for advertisement of
  networks and their capabilities).</t>

<t>However, advertisement mechanisms based on the use of the
  EAP-Request/Identity have scalability problems.  As noted in
  <xref target="RFC3748"/> Section 3.1, the minimum EAP 
  Maximum Transmission Unit (MTU) is 1020 octets, so that an
  EAP-Request/Identity is only guaranteed to be able to include 1015
  octets within the Type-Data field.  Since RFC 1035 <xref target="RFC1035"/> enables
  Fully Qualified Domain Names (FQDN) to be up to 255 octets in length, this may not enable the
  announcement of many realms.  The use of network identifiers other
  than domain names is also possible.</t>

<t>As noted in <xref target="Eronen03"/>, the use of the EAP-Request/Identity for realm
  discovery has substantial negative impact on handoff latency, since
  this may result in a station needing to initiate an EAP conversation
  with each Access Point in order to receive an EAP-Request/Identity
  describing which realms are supported.  Since IEEE 802.11-2003 does
  not support use of Class 1 data frames in State 1 (unauthenticated,
  unassociated) within an Extended Service Set (ESS), this implies
  either that the APs must support 802.1X pre-authentication (optional
  in IEEE 802.11i-2004), or that the station must associate with each AP
  prior to sending an EAPOL-Start to initiate EAP (here, EAPOL refers
  to EAP over LAN).  This will
  dramatically increase handoff latency.</t>

<t>Thus, rather than thinking of <xref target="RFC4284"/> as an effective network discovery
  mechanism, it is perhaps better to consider the use of "realm hints"
  as an error recovery technique to be used to inform the EAP peer
  that AAA routing has failed, and perhaps to enable selection of
  an alternate identity that can enable successful authentication.
  Where "realm hints" are only provided in event of a problem, rather
  than as a staple network discovery technique, it is probably best to
  enable "realm hints" to be sent by core AAA proxies in the
  "default free" zone.  This way, it will not be necessary for
  NASes to send "realm hints", which would require them to maintain
  a complete and up-to-date realm routing table, something that cannot be
  easily accomplished given the existing state of AAA routing technology.</t>

<t>If realm routing tables are manually configured on
  the NAS, then changes in the "default free" realm routing table
  will not automatically be reflected in the realm list advertised by
  the NAS.  As a result, a realm advertised by the NAS might not, in
  fact, be reachable, or the NAS might neglect to advertise one or
  more realms that were reachable.  This could result in multiple
  EAP-Identity exchanges, with the initial set of "realm hints"
  supplied by the NAS subsequently updated by "realm hints" provided
  by a core AAA proxy.  In general, originating "realm hints" on
  core AAA proxies appears to be a more sound approach, since it
  provides for "fate sharing" -- generation of "realm hints" by
  the same entity (the core AAA proxy) that will eventually need
  to route the request based on the hints.  This approach is also
  preferred from a management perspective, since only core AAA
  proxies would need to be updated; no updates would be required
  to NAS devices.</t>
</section>

<section title='IEEE 802'>

<t>There has been work in several IEEE 802 working groups relating to
  network discovery:</t>

  <t><list style="symbols">
     <t><xref target="IEEE.802.11-2003"/> defines the Beacon and Probe Response
        mechanisms within IEEE 802.11.  Unfortunately, Beacons may be
        sent only at a rate within the base rate set, which typically
        consists of the lowest supported rate, or perhaps the next lowest
        rate.  Studies such as <xref target="MACScale"/> have identified MAC layer
        performance problems, and <xref target="Velayos"/> has identified scaling issues
        from a lowering of the Beacon interval.</t>

     <t><xref target="IEEE-11-03-0827"/> discusses the evolution of authentication models
        in WLANs and the need for the network to migrate from existing
        models to new ones, based on either EAP layer indications or
        through the use of SSIDs to represent more than the local network.
        It notes the potential need for management or structuring of the
        SSID space.
        <vspace blankLines='1'/>
        The paper also notes that virtual APs have scalability issues.  It
        does not compare these scalability issues to those of alternative
        solutions, however.</t>

     <t><xref target="IEEE-11-03-154r1"/> discusses mechanisms currently used to provide
        "virtual AP" capabilities within a single physical access point.
        A "virtual AP" appears at the MAC and IP layers to be a distinct
        physical AP.  As noted in the paper, full compatibility with
        existing 802.11 station implementations can only be maintained if
        each "virtual AP" uses a distinct MAC address (BSSID) for use in
        Beacons and Probe Responses.  This paper does not discuss scaling
        issues in detail, but recommends that only a limited number of
        "virtual APs" be supported by a single physical access point. 
        </t>

     <t>IEEE 802.11u is working on realm discovery and network
        selection <xref target="11-05-0822-03-000u-tgu-requirements"/>
        <xref target="IEEE.802.11u"/>.  This
        includes a mechanism for enabling a station to determine
        the identities it can use to authenticate to an access network,
        prior to associating with that network.  As noted earlier,
        solving this problem requires the AP to maintain an up-to-date,
        "default free" realm routing table, which is not feasible without
        dynamic routing support within the AAA infrastructure.  Similarly,
        a priori discovery of features supported within home realms (such as
        enrollment) is also difficult to implement in a scalable way,
        absent support for dynamic routing.  Determination of network
        capabilities (such as QoS support) is considerably simpler, since
        these depend solely on the hardware and software contained within
        the AP.  However, 802.11u is working
        on Generic Advertisement Service (GAS) mechanism, which can be
        used to carry 802.21 Information Service (IS) messages and, in that
        way, allow a more sophisticated way of delivering information from
        the network side.
        </t>

     <t>IEEE 802.21 <xref target="IEEE.802.21"/> is developing standards to
        enable handover between
        heterogeneous link layers, including both IEEE 802 and non-IEEE 802
        networks.  To enable this, a general mechanism for capability
        advertisement is being developed, which could conceivably benefit
        aspects of the network selection problem, such as realm discovery.
        For example, IEEE 802.21 is developing Information Elements (IEs) that may
        assist with network selection, including information relevant
        to both layer 2 and layer 3.  Query mechanisms (including both
        XML and TLV support) are also under development. IEEE 802.21 also defines 
        a Resource Description Framework (RDF) schema to allow use of a query
        language (i.e., SPARQL). The
        schema is a normative part of IEEE 802.21 and also defined in
        <xref target="OHBA"/>.
        </t>
     </list></t>
</section>

<section title="3GPP">

  <t>The 3GPP stage 2 technical specification <xref target="3GPPSA2WLANTS"/> covers the
     architecture of 3GPP Interworking WLAN (I-WLAN) with 2G and 3G
     networks.  This specification also discusses realm discovery and network
     selection issues.  The I-WLAN realm discovery procedure
     borrows ideas from the cellular Public Land-based Mobile Network
     (PLMN) selection principles, known as "PLMN Selection".</t>

  <t>In 3GPP PLMN selection <xref target="3GPP.23.122"/>, the mobile node monitors
     surrounding cells and prioritizes them based on signal strength before
     selecting a new potential target cell.  Each cell broadcasts its PLMN.
     A mobile node may automatically select cells that belong to its Home PLMN, Registered
     PLMN, or an allowed set of Visited PLMNs.  The PLMN lists are
     prioritized and stored in the Subscriber Identity Module (SIM).  
     In the case of manual PLMN
     selection, the mobile node lists the PLMNs it learns about from
     surrounding cells and enables the user to choose the desired PLMN.  After
     the PLMN has been selected, cell prioritization takes
     place in order to select the appropriate target cell.</t>

  <t><xref target="WLAN3G"/> discusses the new realm (PLMN) selection requirements introduced by
     I-WLAN roaming, which support automatic PLMN selection, not just manual selection.
     Multiple network levels may be present, and the hotspot owner may have a contract
     with a provider who, in turn, has a contract with a 3G network, which may
     have a roaming agreement with other networks.</t>

  <t>The I-WLAN specification requires that network discovery be performed
     as specified in the relevant WLAN link layer standards.
     In addition to network discovery, it is necessary to
     select intermediary realms to enable construction of source
     routes.  In 3GPP, the intermediary networks are PLMNs, and it is
     assumed that an access network may have a roaming agreement with more
     than one PLMN.   The PLMN may be a Home PLMN (HPLMN) or a Visited
     PLMN (VPLMN), where roaming is supported.  GSM/UMTS
     roaming principles are employed for routing AAA requests from the
     VPLMN to the Home Public Land-based Mobile Network (HPLMN) using
     either RADIUS or Diameter.  The procedure for selecting the
     intermediary network has been specified in the stage 3 technical
     specifications <xref target="3GPPCT1WLANTS"/> and
     <xref target="3GPPCT4WLANTS"/>.</t>

  <t>In order to select the PLMN, the following procedure is required:</t>
     <t><list style="symbols">
     <t>The user may choose the desired HPLMN or VPLMN manually or let the
        WLAN User Equipment (WLAN UE) choose the PLMN automatically,  based
        on user and operator defined preferences.</t>

     <t>AAA messages are routed based on the decorated or undecorated NAI.</t>

     <t>EAP is utilized as defined in <xref target="RFC3748"/> and
        <xref target="RFC3579"/>.</t>

     <t>PLMN advertisement and selection is based on <xref target="RFC4284"/>, which
        defines only realm advertisement.  The document refers to the
        potential need for extensibility, though EAP MTU restrictions
        make this difficult.</t>
     </list></t>

  <t>The I-WLAN specification states that "realm hints" are only provided
     when an unreachable realm is encountered.  Where VPLMN control is
     required, this is handled via NAI decoration.  The station may
     manually trigger PLMN advertisement by including an unknown realm
     (known as the Alternative NAI) within the EAP-Response/Identity.
     A realm guaranteed not to be reachable within 3GPP networks is
     utilized for this purpose.</t>

  <t>The I-WLAN security requirements are described in the
     3GPP stage 3 technical specification <xref target="3GPPSA3WLANTS"/>.  The security
     requirements for PLMN selection are discussed in 3GPP contribution
     <xref target="3GPP-SA3-030736"/>, which concludes that both SSID and EAP-based
     mechanisms have similar security weaknesses.  As a result, it
     recommends that PLMN advertisements should be considered as hints.</t>
</section>

<section title="Other">

  <t><xref target='INTELe2e' /> discusses the need for realm selection where an access
  network may have more than one roaming relationship path to a home
  realm.  It also describes solutions to the realm selection problem
  based on EAP, SSID and Protected EAP (PEAP) based mechanisms.</t>

  <t>Eijk et al. <xref target="WWRF-ANS"/> discusses the realm and network selection
     problem.  The authors concentrate primarily on discovery of
     access networks meeting a set of criteria, noting that information
     on the realm capabilities and reachability inherently resides in
     home AAA servers, and therefore it is not readily available in a central
     location, and may not be easily obtained by NAS devices.</t>
  </section>
</section>

<section title="Acknowledgements">

<t>The authors of this document would like to especially acknowledge the
   contributions of Farid Adrangi, Michael Richardson, Pasi
   Eronen, Mark Watson, Mark Grayson, Johan Rune, and Tomas
   Goldbeck-Lowe.</t>

<t>Input for the early versions of this document has been gathered from many sources, including
   the above persons as well as 3GPP and IEEE developments. We would also
   like to thank Alper Yegin, Victor Lortz, Stephen Hayes, and David Johnston
   for comments.</t>

<t>Jouni Korhonen would like to thank the Academy of Finland for
   providing funding to work on this document.
</t>


</section>
</back>
</rfc>


